last executing test programs: 11m40.602675074s ago: executing program 32 (id=748): kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) 10m35.520794284s ago: executing program 33 (id=1703): socket$inet(0x2, 0x1, 0x9) r0 = socket$inet_icmp(0x2, 0x2, 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x15, 0x3, &(0x7f0000000040)=@framed={{0xdb, 0xa, 0xa, 0xfe00, 0x41, 0x71, 0x10, 0x1a}}, &(0x7f0000000480)='syzkaller\x00', 0xa}, 0x94) r1 = socket$can_raw(0x1d, 0x3, 0x1) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x2000004, 0x3b071, 0xffffffffffffffff, 0x0) timer_create(0x3, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='pids.current\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r2, 0x0) setsockopt$CAN_RAW_FD_FRAMES(r1, 0x65, 0x5, &(0x7f0000000040)=0x1, 0x4) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) sendmsg$can_raw(r1, &(0x7f0000000000)={&(0x7f00000000c0)={0x1d, r3}, 0x10, &(0x7f00000003c0)={&(0x7f0000000200)=@canfd={{0x3, 0x1, 0x1}, 0x19, 0x3, 0x0, 0x0, "240a86003584b924cac358fd4eb444c5fe6eee297e3a4c67d606757d568df33e2c5213673263b835cf2ba3a79fc2bf9b84364474135f7c9d64abb3c843d4d8be"}, 0x48}, 0x2, 0x0, 0x0, 0x24000884}, 0x30048009) 10m10.986510493s ago: executing program 34 (id=1946): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x80002, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffdf, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffffff, 0x2}, 0x106020, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(0xffffffffffffffff, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) sendmsg$IPCTNL_MSG_CT_DELETE(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x1c, 0x2, 0x1, 0x401, 0x0, 0x0, {0x5, 0x0, 0x3}, [@CTA_ZONE={0x6, 0x12, 0x1, 0x0, 0x3}]}, 0x1c}, 0x1, 0x0, 0x0, 0x10010}, 0x10) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000200)={0x0, 0x10, &(0x7f00000001c0)=[@in={0x2, 0x4e23, @rand_addr=0x64010100}]}, &(0x7f0000000140)=0x10) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r3, 0x84, 0x7a, &(0x7f0000000340)={r4, @in6={{0xa, 0x3, 0x4, @mcast1}}}, &(0x7f0000000040)=0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000480)={0x1, 0x4, 0x81, 0xf, r5}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$CAIFSO_LINK_SELECT(0xffffffffffffffff, 0x116, 0x7f, &(0x7f00000000c0)=0xbf5, 0x4) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x2, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={&(0x7f00000004c0), 0x5}, 0x10, 0x40010000, 0x80000000, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) readv(r0, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/135, 0x87}], 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCVHANGUP(r0, 0x5437, 0x2) 10m9.296722671s ago: executing program 35 (id=1962): r0 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x601c2, 0x0) ftruncate(r0, 0x8800000) r1 = open(&(0x7f00000001c0)='./bus\x00', 0x4c27e, 0x53) close(r1) r2 = socket$inet_tcp(0x2, 0x1, 0x0) execveat(r0, 0x0, 0x0, 0x0, 0x400) bind$inet(r2, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x2f) setsockopt$inet_tcp_int(r2, 0x6, 0x2, &(0x7f00000001c0)=0xa3, 0x4) connect$inet(r2, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r2, 0x6, 0xd, &(0x7f0000000040)='bbr', 0x3) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000140)={0x0, &(0x7f0000000100)}, 0x10) sendto(r1, &(0x7f0000000200), 0x0, 0x81, &(0x7f00000002c0)=@pptp={0x18, 0x2, {0x0, @local}}, 0x80) recvfrom$inet(r2, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) sendfile(r1, r0, 0x0, 0x578410ed) syz_emit_ethernet(0x3b6, &(0x7f00000003c0)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "122d92", 0x380, 0x3a, 0xff, @remote, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, [{0x18, 0xa, "a78ce54006598080a8030037004023493b87aafaffffffffffffff23732472eefa45ad96579269748e254c1e4a8a8b3f0ab0c430d3be27df3e34066d42ca0a5c15b37adac15084dbaf736b41e5af1802"}, {0x0, 0x1, "000000001c00000026000400"}, {0x19, 0x18, "fe906d26efe39393fe08f73eabc5977b1190a3a6ad8338f1511cdd10c35d8f6de79fc7fd175f75649fa368a32c829af02d7f44d92324a7051e460a13ddde25a5b85b9d930914625d8a049b4cf0d129806a610ad8477a2499a9a0527f75b655a6653d0363a979acf93f88eea07d68423e90280409de1657275f716a2bf2915d1783e8eb477b0d1170f0ecbdef4c23e1b76e9ab3d2fbe4b34438d2a77577edd0ebed9682b851b380ae0cab282af9d7ebe668177704c5fd4698c934de4731f3f61effc978"}, {0x0, 0x1d, "06aa85616177c41bc943afcb84619755403946b0730a18d5c38cf7dcad830f2dc8674b87ba8b58f81ece27975cc39e595e9af90b4fe92a38d25551c2d9ebfc5dfc5a2a501b7e483de3f808895c5f4a1a2367bc591dd8b094822ff0dea07c9a1f643c822a18b79f7c5eba31fb68b2d734a6671e27182aee96f24a4a5cf390dab23b500b0c0272479611e4f7f4299ec4d926d443367b105185e6ecd9602ba95392343e9bbd047ef6bc1ba42399907ccd0a562db212baa39eb8164e240069f656d3a05fecf894222a141123f5ac010000000000000090aa235a670670ffc5dc49dfb58d00000000000000"}, {0x18, 0xb, "17dcea46805d4809c20547406b18901b0aeff04c0300f3c75dc2d227a83b89483b1084743475671545e65eb2e9ac946a3f0e2bc4619f91394c02bcfbbb7d71138537d68e2d2c6393a9f3becd1a9f51a948b5b303f4f003"}, {0x21, 0x7, "000000ffffff00000000000200000000000000000000000000008879e66485201a0015ca8374d15a3b66294d00"/55}, {0x2, 0x14, "5e14f0e7e72d42cfb3f27fafb60845f90b6dfc2e37bc87c6905bbc94d33e1ea71a28105f543e868a8a53b360a9d33e2b1e26eb1d18065daa7628cf9ef083611c9f6ae2e1eb3d8bf9c6ab2642c4808288e62afbf03269f1f98aea6ab3beb5fdc5fdaabc2c676d8800871a6aa54155dea2d995cb22c9924e0ad38c6967052cc7786d779b8353aac33a57d79b05613a12328f61129017fa632dbf04542188b196e213408c"}, {0x3, 0x5, "d5170000dce9674a36da018dff16e70b8b14c4b7a94fe18e88605aa6be1a02a326a6bce65f81ed"}]}}}}}}, 0x0) 10m0.570074519s ago: executing program 36 (id=2049): socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="b7020000b96871dfbfa30000000000000703000000feffff7a0af0fff8ffff1971a4f0ff00000000b7060000080000001e6400000000000045040400010000001704000001000a00b7040000000100006a0af2fe0000004f850000001a000000b7000000000000009500000000000000455781a5feee5e1ce784909b849d5550adf200000000000000b61d69f2ffdaa10350e11cb97c8ad51bcda0c4ee6d9674c77404ceb9971e43405d62de53a9a53608c10556e5734eb84049761451ce2e2d9f8004e26f7fcc059c06220002595f6dba87b81d1106fb026cce67a66afd9ac3d09e29a9d542ca9d85a5c9c88474895c679838def0a83a733dc6a39b63a5ed69d32394c53361d7480884bd6fee53f5b2e7b91c61ced1ebad000000000000e8122a793c080a882add4e1179bd4a44f2fcb6d753a78845d8363e0401861abebe428ba953df4aece69311687f4122073a236c3ad198e3f3a532efa04137d452ff47d2638da3261c8362bb7c7824be6195a66d2e17e122040e11e3bd4a69fc6e8d9f7043e09b9e10dc7777bfae5884e4ba1e9cc4a2bbe99e30810400000000000000d63d716c0975e1ce4a655362e7062ff6ab3934555c01840219829472adefa06d3482c7b2711b98eabdca89b77efd13e6dba4a431ce47911834118093b6cabaa17a57727474e1785ee234835088445aa4a9b677d3d342640e328504aea02a2d727e62b7f097a02dbf8fe1d704765de7482040b2fc3000000000000000008947baeaaf954aff687deaa2f804924600273ee26d8115cbca081a14cba24788779291745083fccdddc90d7af35c048d46362ea0d8d79c79ddca066da478c197d4a550470557bc99cca336bd88cd28a5ee651627e3a6fbf6ea53b95ddb64c69c7d8d2f4baddc239828760459564124bad68209d2a1d16ad085886c017679cfcda8b10700ac1e2bcc5ede5b5687aa418abfa29acd7339e73b2cd185c9eb5fb34fccd20ffa155b16c0c309ed6f6663677df37de0ec0d0f548b273940be5d1fe0bae14d1a76bf741330dacd9cc19c0163bcc93059e8d2d120ea257bba458ecd989cb3581a3f270ad48255ac0dad4923e3e357e4e90583ce8d43ec65ed491d87a51d7c13f665dcf772e3ead71112008b16b0ea821f70aee1ccbd71c5a1c21e87d5b7b73d356337dbcf3456ff6cd0d6b98a258e3509a7d15b9dcae4d0d750ffa07909c955e718585b2456308beda2fa03bb9bcf03cdff31ee4b1665b987829c0f0872c006c6e4ed666fe23b343aae943923eedbdb0e7abee90e3da7b98b7d07d2d4816201ad1737798635b0a3ebd3aed120e4500c16e6c9dc729f009db49c6b8b19613e4d792cb4ff5106419291d4222980b49ddb9527ce785822d8f4e2bc30a96767f500b9e26e3b12854da63083320d8bfe49d85e0842803dc59d6375bce2b8a93caf39c0ba767880bbb9bf9407e6a6c0f9a43d1ab51dabf9423b482e848fbe1653ff0c6161fa43543546ce17a42e6cddadaf0767d84407478ffe2d0b567d81201efc81e800d4c0874235ff5cd7f5f0ee71cc2b0193bfc9290627ceaeb0b02931a817688f3a51fa2861e70cbab50a5d434ed8d8841694dba46f3d5a95ae86e4d471684ccf427b2ba53a157b2a7cf7a4c10051bb77822190a14c2ab1f271a7cf9c240b99"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19, 0x0, 0xffffffffffffffff, 0x54}, 0x42) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x32, &(0x7f0000000b00)=r0, 0x4) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) socket$rds(0x15, 0x5, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000000600)=0x0) r3 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x18000000000002a0, 0xe, 0x0, &(0x7f0000000540)="d2b7010000001f91cdfa02e0864c", 0x0, 0xd5b1, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) io_submit(r2, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2002000000, 0x4, 0x0, 0x1, 0x0, r1, &(0x7f0000000040)="5400ffff0000", 0x6, 0x0, 0x0, 0x2}]) 10m0.320550913s ago: executing program 8 (id=2053): stat(0x0, &(0x7f0000000180)) 10m0.320335124s ago: executing program 37 (id=2053): stat(0x0, &(0x7f0000000180)) 9m51.27472901s ago: executing program 38 (id=2142): preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000000000)=""/4096, 0x1000}, {&(0x7f0000001100)=""/222, 0xde}, {&(0x7f0000001200)=""/220, 0xdc}, {&(0x7f0000001300)=""/79, 0x4f}], 0x4, 0xdf1, 0xe7) r0 = accept(0xffffffffffffffff, &(0x7f0000001400)=@in={0x2, 0x0, @initdev}, &(0x7f0000001480)=0x80) getsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f00000014c0)={0x0, 0x100}, &(0x7f0000001500)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000001640)={r1, 0xdc, &(0x7f0000001540)=[@in6={0xa, 0x4e24, 0x2d, @mcast1, 0xffffffff}, @in={0x2, 0x4e24, @rand_addr=0x64010100}, @in6={0xa, 0x4e23, 0x80, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, 0x9}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e22, @broadcast}, @in6={0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x9}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e20, 0xfffffffc, @ipv4={'\x00', '\xff\xff', @empty}, 0x9}, @in6={0xa, 0x4e20, 0xfffffffc, @private1, 0x1}, @in={0x2, 0x4e22, @loopback}]}, &(0x7f0000001680)=0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) r2 = syz_genetlink_get_family_id$l2tp(&(0x7f0000001700), r0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000001800)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000017c0)={&(0x7f0000001740)={0x48, r2, 0x808, 0x70bd2a, 0x25dfdbfb, {}, [@L2TP_ATTR_IP_SADDR={0x8, 0x18, @local}, @L2TP_ATTR_L2SPEC_LEN={0x5, 0x6, 0x6}, @L2TP_ATTR_VLAN_ID={0x6, 0xe, 0xd}, @L2TP_ATTR_DEBUG={0x8}, @L2TP_ATTR_IP6_DADDR={0x14, 0x20, @private1={0xfc, 0x1, '\x00', 0x1}}]}, 0x48}, 0x1, 0x0, 0x0, 0x20000800}, 0x4080) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000001900)={'syztnl2\x00', &(0x7f0000001880)={'syztnl1\x00', 0x0, 0x2f, 0x9, 0x9, 0xd, 0x51, @private2, @private0, 0x8000, 0x10, 0x1}}) sendmsg$nl_route(r0, &(0x7f0000001a00)={&(0x7f0000001840)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f00000019c0)={&(0x7f0000001940)=@ipv6_deladdrlabel={0x4c, 0x49, 0x8, 0x70bd27, 0x25dfdbfb, {0xa, 0x0, 0x8, 0x0, r3, 0xffff}, [@IFAL_LABEL={0x8, 0x2, 0x1}, @IFAL_ADDRESS={0x14, 0x1, @loopback}, @IFAL_ADDRESS={0x14, 0x1, @private0={0xfc, 0x0, '\x00', 0x1}}]}, 0x4c}}, 0x4001) keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000001a40)=""/4096, 0x1000) ioctl$IOCTL_GET_NCIDEV_IDX(0xffffffffffffffff, 0x0, &(0x7f0000002a40)=0x0) bind$nfc_llcp(r0, &(0x7f0000002a80)={0x27, r4, 0x0, 0x5, 0x5, 0x3, "686848a863ae17af41e42e5cbdbf3b27da70305c86a985f5a4aa8ecc68e97a2c8699cd7d5d6d8c2c5f7d506888f88a2dd6abda1fb37c43eb65956420483b46", 0x3b}, 0x60) r5 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_SIOCBRADDBR(r5, 0x89a0, &(0x7f0000002b00)='bond_slave_1\x00') keyctl$KEYCTL_CAPABILITIES(0x1f, &(0x7f0000002b40)=""/174, 0xae) socket$igmp(0x2, 0x3, 0x2) lremovexattr(&(0x7f0000002c00)='./file0\x00', &(0x7f0000002c40)=@random={'osx.', '\x00'}) sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000003240)={&(0x7f0000002c80)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000003200)={&(0x7f0000002cc0)={0x504, 0x0, 0x100, 0x70bd27, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x74, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r3}, {0x200, 0x2, 0x0, 0x1, [{0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8ea}}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r3}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x7, 0x1, 0xf6, 0x10000}, {0x5e, 0x1, 0xa6, 0x7c5c}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x401}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r3}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x6, 0xff, 0xd2, 0x5}, {0x5, 0x0, 0x4, 0x8}]}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x44, 0x1, @name={{0x24}, {0x5}, {0x11, 0x4, 'activebackup\x00'}}}]}}, {{0x8, 0x1, r3}, {0x170, 0x2, 0x0, 0x1, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8}}}, {0x40, 0x1, @priority={{{0x24}, {0x5}, {0x8, 0x4, 0x7}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24}, {0x5}, {0x8, 0x4, r3}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xe8a}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0xb}}}]}}, {{0x8, 0x1, r3}, {0xec, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @activeport={{0x24}, {0x5}, {0x8, 0x4, r3}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x9}}}]}}]}, 0x504}, 0x1, 0x0, 0x0, 0x4000000}, 0x4000) accept4$phonet_pipe(r0, 0x0, &(0x7f0000003280), 0x0) r6 = open_tree(0xffffffffffffff9c, &(0x7f00000032c0)='./file0\x00', 0x300) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r6, 0x80489439, &(0x7f0000003300)) removexattr(&(0x7f0000003380)='./file0\x00', &(0x7f00000033c0)=@random={'user.', '\x00'}) ioctl$TIOCL_SETSEL(r6, 0x541c, &(0x7f0000003400)={0x2, {0x2, 0x4, 0x8, 0x5, 0x4, 0x1}}) unshare(0x10000) connect$can_j1939(r6, &(0x7f0000003440)={0x1d, 0x0, 0x1, {0x1, 0xf0, 0x2}, 0xfe}, 0x18) getpeername$packet(r0, &(0x7f0000006ac0), &(0x7f0000006b00)=0x14) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r6, 0x89f2, &(0x7f0000006bc0)={'ip6gre0\x00', &(0x7f0000006b40)={'syztnl1\x00', r3, 0x29, 0x7f, 0xd9, 0x0, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}, @local, 0x8000, 0x20, 0x400, 0xe}}) ioctl$USBDEVFS_SUBMITURB(r6, 0x8038550a, &(0x7f0000007000)=@urb_type_iso={0x0, {}, 0x4, 0x80, &(0x7f0000006ec0)="d453e547e73c53e712b4c66c6cf93b5b6ffa90a853f56ab75f1393bc25e84e8f23c399f447e60560af439783e68da032ce9436c8ac6b1a4f648cf3a27a749a3e728abe9c94cea990dfb0d3fca20df3a3e44dbd7f", 0x54, 0x9, 0x8001, 0x9, 0x7, 0x2, &(0x7f0000006f40)="84f683ee821587dae754fd1c65c0655b10d2be4f3b773fbbfab129bbe3bfeddfea1f69882a01476de08593734f8e0abc495b7b3787758e27ccc348917d6995ed4ce31cd34e6ec600c393cf6dde75eb740c141ce494e7e434c2267678f3136fbf2fa03359e6976950fbb97dbb0cbce72a6366de4642ff0a323cb28da5637f8842549ea642547e81acaf69801a8fcd203367906d2fd473a806ad6bb99072c67e0b0a7df7cf0e61", [{0x7ff, 0x6, 0x4}, {0x63da, 0x9, 0x1}, {0x0, 0x0, 0x8}, {0x7, 0x4, 0x800}, {0x9, 0x516, 0x9}, {0x5, 0x77e, 0x980b}, {0x3, 0xfffffffd, 0x5}, {0x8, 0x6, 0x7}, {0x2, 0x1ff, 0x10001}]}) 9m51.169173746s ago: executing program 39 (id=2145): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x8, 0x0, 0x0, 0x0, 0x73, 0x11, 0x9b}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0xb7}, @exit={0x95, 0x0, 0xc2}], {0x95, 0x0, 0x1200}}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls}, 0x70) r0 = perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0xfffffffd, 0xfc}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0xcb, 0xffff, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) r3 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x8) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r3, 0x0) write$binfmt_format(r2, &(0x7f0000000100)='0\x00', 0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x78, '\x00', 0x0, @fallback=0x30, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) r5 = socket$netlink(0x10, 0x3, 0x4) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1c, r6, 0xb15, 0x0, 0x1, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c400}, 0x20000044) getsockopt$netlink(r5, 0x10e, 0x9, 0x0, &(0x7f0000000100)) write$qrtrtun(r2, &(0x7f0000000300)="ca0e808bb3", 0x5) process_vm_readv(0x0, 0x0, 0x0, &(0x7f0000000240), 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r4, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=[0x7], 0x0, 0x0, 0x1}}, 0x40) r8 = semget(0x1, 0x4, 0x39c) semop(r8, &(0x7f0000000080)=[{0x1, 0x8001, 0x1000}, {0x1, 0x5b7a, 0x800}], 0x2) semop(r8, &(0x7f0000000000)=[{0x1, 0xbbdd, 0x1000}, {0x1, 0x8, 0x1000}], 0x2) semctl$SETALL(r8, 0x0, 0x11, &(0x7f0000000140)=[0x6, 0x7fff]) semctl$SEM_STAT_ANY(r8, 0x1, 0x14, &(0x7f0000000000)=""/63) 9m18.331351238s ago: executing program 40 (id=2261): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x2, 0x0, {0x0, 0x0, 0x0, r2, {0x0, 0xc}, {0xffff, 0xffff}, {0x0, 0x8}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8, 0x7, 0x7}]}}]}, 0x38}}, 0x8c0) (fail_nth: 4) 9m15.650193384s ago: executing program 41 (id=2278): memfd_create(0x0, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x40042, 0x1) close(r0) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r1, 0x0, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) sendmmsg$inet(r1, &(0x7f000000a480)=[{{0x0, 0x0, &(0x7f0000000ec0)=[{&(0x7f0000000080)='&', 0x1}], 0x1}}], 0x1, 0x24044c45) r2 = fsopen(&(0x7f0000000080)='binfmt_misc\x00', 0x1) mount$9p_fd(0x0, &(0x7f0000000680)='./file0\x00', &(0x7f0000000380), 0x14c98, &(0x7f0000002780)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 9m13.425832294s ago: executing program 42 (id=2295): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], 0x0, 0xffffffdf, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0xffffffffffffffff, 0x2}, 0x106020, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) r2 = syz_io_uring_setup(0x4b5, &(0x7f0000010400)={0x0, 0x86e1, 0x1, 0x8, 0xa0}, &(0x7f0000010080), &(0x7f0000000000)) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000003c0)=[{0x0}, {0x0}], 0x2) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r2, 0x10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340), 0xa002a0}], &(0x7f00000005c0), 0x2}, 0x20) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f00000003c0)=0x2) shutdown(0xffffffffffffffff, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, &(0x7f00000032c0)=[{0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="30000000000000008400000001000000000000017c"], 0x30}], 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x3c1, 0x3, 0x3a8, 0x0, 0xffffff80, 0x178, 0x0, 0x178, 0x2d8, 0x230, 0x258, 0x2d8, 0x258, 0x2034, 0x0, {[{{@uncond, 0x1d, 0x150, 0x198, 0x12, {0x959f1400}, [@common=@unspec=@rateest={{0x68}, {'xfrm0\x00', 'veth0_to_bond\x00', 0x0, 0x1, 0x7, 0x8001, 0x3, 0x4, {}, {0x7}}}, @common=@unspec=@connlimit={{0x40}, {[0x0, 0x0, 0x0, 0xff], 0x5, 0x1, {0x4}}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xb03, 'syz1\x00', {0x200}}}}, {{@ipv6={@loopback, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [0x0, 0xff000000], 'veth0_to_team\x00', 'hsr0\x00', {}, {}, 0x0, 0x0, 0x6}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@ipv6header={{0x28}, {0x0, 0xc4, 0x1}}, @common=@mh={{0x28}, {"77e9", 0x1}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv6=@remote, 'xfrm0\x00', {0x5}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x408) readv(0xffffffffffffffff, &(0x7f0000000600)=[{&(0x7f00000002c0)=""/135, 0x87}], 0x1) ioctl$TIOCVHANGUP(0xffffffffffffffff, 0x5437, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0xe, 0x2, &(0x7f0000000180)=ANY=[@ANYBLOB="91107f00000000009500"], &(0x7f00000001c0)='GPL\x00', 0x200, 0x43, 0x0, 0x0, 0x26}, 0x94) 9m11.032510954s ago: executing program 3 (id=2316): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0xef159eeab7aefad5, 0x0) ioctl$TCGETS(r0, 0x5401, &(0x7f0000000140)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000100a05"], 0xd4}}, 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000a8000000180100002020692500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001500)=ANY=[@ANYBLOB="500000001000050400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000300012800b00010065727370616e00002000028004001200060018008d0004000500160002"], 0x50}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000200)={r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r4}, 0xc) close_range(r3, 0xffffffffffffffff, 0x0) syz_clone(0x26801000, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = getpid() getgroups(0x1, &(0x7f0000000180)=[0xee01]) sendmsg$unix(r1, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=[@cred={{0x1c, 0x1, 0x2, {r6}}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee00, r7}}}], 0x40}, 0x8841) 9m10.996248935s ago: executing program 3 (id=2317): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$UHID_INPUT(r0, &(0x7f0000000000)={0xfc, {"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", 0x1000}}, 0x1006) 9m10.864879043s ago: executing program 8 (id=2296): socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0xe, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x0, 0x10, &(0x7f0000000340), 0xfffffffffffffe19, 0x0, 0xffffffffffffffff, 0x54}, 0x42) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_attach_bpf(r1, 0x1, 0x32, &(0x7f0000000b00)=r0, 0x4) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000040)={0x2, 0x4e22, @loopback}, 0x10) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000000600)) r3 = perf_event_open(&(0x7f00000004c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r4}, &(0x7f0000000180), &(0x7f00000001c0)=r3}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWCHAIN={0x12c, 0x3, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_CHAIN_ID={0x8, 0xb, 0x1, 0x0, 0x1}, @NFTA_CHAIN_TYPE={0xa, 0x7, 'route\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x4}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_CHAIN_HANDLE={0xc, 0x2, 0x1, 0x0, 0x3}, @NFTA_CHAIN_USERDATA={0x3c, 0xc, "a78ecd266fb8213e33b84bcf01d2d37da2a6be71748eed677be0a08c7e97415fcdac48e970927ea664942df5a235989d670a4c54fa6e1ff8"}, @NFTA_CHAIN_COUNTERS={0x58, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x6}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x9}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x8000000000000001}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x6}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x4026}, @NFTA_COUNTER_PACKETS={0xc}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x4}]}, @NFTA_CHAIN_COUNTERS={0x4c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0xffffffffffffffff}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x8}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x1}, @NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x7}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0xff}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x9}]}]}, @NFT_MSG_DELTABLE={0xb8, 0x2, 0xa, 0x3, 0x0, 0x0, {0xa}, [@NFTA_TABLE_USERDATA={0x65, 0x6, "a1b93bfc51d69f7dd1293878e474455f7eba8a80947bb3b740f9494ff1bbf4663a11e02bf5f84d07437afc965fea3601f32e881b29f49f70c3e3e834397c48cd5dd2bb3042f90f77318fb06ff1faa2a102598163c8019834271874698598026459"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x3}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0xc}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_TABLE_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}]}], {0x14}}, 0x20c}, 0x1, 0x0, 0x0, 0x8010}, 0x4000800) unshare(0x62010280) r5 = socket$rds(0x15, 0x5, 0x0) bind$rds(r5, &(0x7f0000000100)={0x2, 0x4e21, @empty}, 0x10) fremovexattr(0xffffffffffffffff, &(0x7f00000002c0)=@random={'system.', '-(\x00'}) memfd_create(&(0x7f0000000300)='\x00', 0x5) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r6, 0x84, 0xa, &(0x7f0000000000)={0x9, 0x2, 0x820e, 0x80000, 0x0, 0x401, 0x3, 0x40000003}, 0x20) 9m10.800503467s ago: executing program 3 (id=2318): r0 = socket$can_bcm(0x1d, 0x2, 0x2) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000480)) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000000000)={0x0, @in={{0x2, 0x4e22, @rand_addr=0x64010102}}}, &(0x7f0000000140)=0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000200)={r1, 0x68, &(0x7f0000000180)=[@in6={0xa, 0x4e20, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xf5f0}, @in={0x2, 0x4e20, @multicast1}, @in={0x2, 0x4e20, @local}, @in={0x2, 0x4e22, @empty}, @in6={0xa, 0x4e23, 0x0, @loopback, 0xfff}]}, &(0x7f0000000240)=0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00'}) perf_event_open(0x0, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) mprotect(&(0x7f0000000000/0x1000)=nil, 0x1000, 0x4) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r2, 0x29, 0x2, &(0x7f0000001040)=0x40007, 0x2d) setsockopt$inet6_int(r2, 0x29, 0x8, &(0x7f00000000c0)=0xf2b, 0x4) getsockopt$inet6_buf(r2, 0x29, 0x6, &(0x7f0000001500)=""/17, &(0x7f0000000080)=0x11) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000100)={'vxcan1\x00', 0x0}) connect$can_bcm(r0, &(0x7f00000000c0)={0x1d, r3}, 0x10) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_WPAN_PHY(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x1c, r4, 0xb15, 0x0, 0x1, {}, [@NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x1}]}, 0x1c}, 0x1, 0x0, 0x0, 0x400c400}, 0x20000044) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f00000001c0), r6) sendmsg$NLBL_UNLABEL_C_STATICREMOVEDEF(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000200)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="01000000000000000000037400062c00070073797352656d5f753a6f626a6563745f723a756465765f68656c7065725f657865635f743a73300008000200000000000800070026093a0014000600626f6e64300000000000000000000000080003"], 0x78}, 0x1, 0xffffffff00000003}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICADD(r5, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)={0x9c, r7, 0x1, 0x70bd2c, 0x25dfdbfe, {}, [@NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:userio_device_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2b, 0x7, 'system_u:object_r:traceroute_exec_t:s0\x00'}, @NLBL_UNLABEL_A_SECCTX={0x2f, 0x7, 'system_u:object_r:syslogd_initrc_exec_t:s0\x00'}]}, 0x9c}}, 0x80c4) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x0, &(0x7f0000000680), 0x1, 0x482, &(0x7f0000001040)="$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") sendmsg$can_bcm(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)=ANY=[@ANYBLOB="0100"/16, @ANYRES64, @ANYRES64=0x2710, @ANYRES64=0x77359400, @ANYRES64=0x0, @ANYBLOB="00000000010000000000e39cdd"], 0x48}}, 0x0) 9m10.734954811s ago: executing program 8 (id=2319): bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x19, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r1, 0x40042408, r0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r2, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000640)='\f', 0x1}], 0x1, 0x0, 0x0, 0x2804c044}, 0x0) setsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r2, 0x84, 0x7c, 0x0, 0x0) 9m10.701025433s ago: executing program 3 (id=2320): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0)={[{@i_version}, {@min_batch_time={'min_batch_time', 0x3d, 0x3a5}}, {@bh}]}, 0x1, 0x51d, &(0x7f0000000200)="$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") mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xb, 0xc3072, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x1da) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r0, 0x0, 0x0) 9m10.508460724s ago: executing program 3 (id=2323): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000380)=ANY=[@ANYBLOB="200000005e00010004000000000000000c000000010000001e"], 0x20}], 0x1}, 0x0) (async) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) (async) r2 = socket$inet(0x2, 0x1, 0x0) setsockopt$inet_mreqn(r2, 0x0, 0x27, &(0x7f0000000000)={@multicast1, @local}, 0xc) (async) setsockopt$inet_msfilter(r2, 0x0, 0x29, &(0x7f0000000080)={@multicast1, @local, 0x1, 0x2, [@private=0xa010102, @local]}, 0x18) (async) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000000340)) (async) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r4, 0x25, &(0x7f0000000000)={0x1}) fcntl$lock(r4, 0x7, &(0x7f0000001140)={0x1, 0x2, 0x6, 0x5, r3}) (async) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r5, 0x26, &(0x7f0000000380)={0x0, 0x1, 0x0, 0x1}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r6, 0x26, &(0x7f0000000140)={0x0, 0x0, 0x76, 0x6031}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) io_submit(0x0, 0x1, &(0x7f00000012c0)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x2004, 0xffffffffffffffff, 0x0, 0x0, 0x800, 0x0, 0x6}]) (async) r7 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r7, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) (async) setsockopt$inet_msfilter(r7, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027fa80a010100000004"], 0x57) r8 = socket$netlink(0x10, 0x3, 0x0) writev(r8, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r9 = syz_open_dev$loop(&(0x7f0000000040), 0x9, 0x20400) ioctl$BLKCRYPTOIMPORTKEY(r9, 0xc0401289, &(0x7f0000000300)={&(0x7f0000000240)="7476e8f9f841ba130b0133c0baea1c174b7fc8043582fb18df858cc92d725fbbd38f14b1c99acdd0", 0x28, &(0x7f0000000280)=""/91, 0x5b}) (async) r10 = socket$packet(0x11, 0x2, 0x300) (async) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setsockopt$sock_attach_bpf(r10, 0x1, 0x32, &(0x7f0000000180)=r11, 0x4) (async) syz_genetlink_get_family_id$batadv(&(0x7f0000000200), 0xffffffffffffffff) 9m9.873176701s ago: executing program 8 (id=2335): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0)={[{@i_version}, {@min_batch_time={'min_batch_time', 0x3d, 0x3a5}}, {@bh}]}, 0x1, 0x51d, &(0x7f0000000200)="$eJzs3c9vHFcdAPDvTLK2k7h1WnoABG1oCwFFWceb1qp6gHJCCFVC9AhSauyNZXnXa3nXpTaRcM9ckajECY78AZx74s4FwY1LOSDxwwLVSBwGzezY2di79uaHvZb385FG89688X7fizPvzbxd7wtgbN2IiJ2ImIiI9yNipjyelFu8093y8z7bfbC4t/tgMYkse++fSVGeH4uen8ldK19zKiJ+8J2IHydH47a3tlcXGo36Rpmf7TTXZ9tb27dXmgvL9eX6Wq02Pzd/5627b9YeozVTx5a+0pwoU1/+9A873/hpXq3p8khvO56lbtMrB3FylyPie6cRbAQule2ZGHVFeCJpRLwYEa8W1/9MXCp+mwDARZZlM5HN9OYBgIsuLebAkrRazgVMR5pWq905vJfiatpotTu37rc215a6c2XXo5LeX2nU75RzhdejkuT5uSL9MF87lL8bES9ExC8mrxT56mKrsTTKGx8AGGPXDo3//5nsjv8AwAV3/MdmAICLyPgPAOPH+A8A48f4DwDjpzv+X3ncH8uy7GenUR0A4Ax4/geA8WP8B4Cx8v133823bK/8/uulD7Y2V1sf3F6qt1erzc3F6mJrY7263GotF9/Z0zzp9Rqt1vrcG7H54fVvrrc7s+2t7XvN1uZa517xvd736pXirJ0zaBkAMMgLr3zy5yQfkd++UmzRs5ZDZaQ1A05bOuoKACNzadQVAEbGal8wvh4+4z/2hwBMD8AF0WeJ3kdM9fsDoSzLstOrEnDKbn7B/D+Mq575f58ChjFz0vx/sTawNwnhQjL/D+Mry5Jh1/yPYU8EAM63Y+b4r5/lfQgwOgPe/3+x3P+2fHPgR0uHz/j4NGsFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA59v++r/Vcpnf6UjTajXiuWIBoEpyf6VRvxMRz0fEnyYrk3l+bsR1BgCeVvq3pFz/6+bM69OPFL187SA5ERE/+dV7v/xwodPZ+GPERPKvyf3jnY/L47UTg02dRgsAgOPtj9PFvudB/rPdB4v721nW5+/f7t4V5HH3didi7yD+5bhc7KeiEhFX/52U+a6kZ+7iaex8FBGf79f+JKaLOZDuLcvh+Hns5840fvpI/LRcoDkt/y0+9wzqAuPmk7z/eaff9ZfGjWLf//qfKnqop1f2f/lLLe4VfeDD+Pv936UB/d+NYWO88fvvdlNXjpZ9FPHFyxH7sfd6+p/9+MmA+K8PGf8vX3r51UFl2a8jbkb/+L2xZjvN9dn21vbtlebCcn25vlarzc/N33nr7pu12WKOenbwaPCPt289P6gsb//VAfGnTmj/V4ds/2/+9/4Pv3JM/K+/1i9+Gi8dEz8fE782ZPyFq78b+Nydx1862v5kmN//rSHjf/rX7SPLhgMAo9Pe2l5daDTqGxIS5z+R/5c9B9Xom/jWWcWaiP5FP3+te00fKsqyJ4o1qMd4FrNuwHlwcNFHxH9HXRkAAAAAAAAAAAAAAKCvs/iLpVG3EQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgIvr/wEAAP//Rb3T2A==") mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xb, 0xc3072, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x1da) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r0, 0x0, 0x0) 9m9.674927953s ago: executing program 8 (id=2336): recvfrom(0xffffffffffffffff, &(0x7f0000000780)=""/147, 0x93, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000340)=@newqdisc={0x38, 0x24, 0xd0f, 0x3, 0x0, {0x60, 0x0, 0x0, r1, {0x0, 0x2}, {0xffff, 0xffff}, {0xfff1}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}, 0x1, 0x60, 0x0, 0x4008094}, 0x8840) 9m9.158220563s ago: executing program 3 (id=2346): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0)={[{@i_version}, {@min_batch_time={'min_batch_time', 0x3d, 0x3a5}}, {@bh}]}, 0x1, 0x51d, &(0x7f0000000200)="$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") mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xb, 0xc3072, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x1da) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r0, 0x0, 0x0) 9m9.102659406s ago: executing program 43 (id=2346): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0)={[{@i_version}, {@min_batch_time={'min_batch_time', 0x3d, 0x3a5}}, {@bh}]}, 0x1, 0x51d, &(0x7f0000000200)="$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") mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xb, 0xc3072, 0xffffffffffffffff, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x1da) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r0, 0x0, 0x0) 9m7.121764501s ago: executing program 8 (id=2364): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6000, &(0x7f00000001c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e14fe02000000000e0001000000000002900000121f", 0x2e}], 0x1}, 0x40) 9m6.992577839s ago: executing program 44 (id=2364): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x6000, &(0x7f00000001c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e14fe02000000000e0001000000000002900000121f", 0x2e}], 0x1}, 0x40) 7m29.175341495s ago: executing program 2 (id=2942): open(&(0x7f0000000400)='./bus\x00', 0x42b42, 0x1c0) socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet6(0xa, 0x1, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) socket$nl_audit(0x10, 0x3, 0x9) socket$inet6_tcp(0xa, 0x1, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000002980)=[{{0x0, 0x0, &(0x7f0000002540)=[{&(0x7f0000000300)="75ec073accf2b984ecd3742de6ec", 0xe}], 0x1, 0x0, 0x0, 0x10}}], 0x1, 0x8881) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) r1 = socket$unix(0x1, 0x2, 0x0) ppoll(&(0x7f0000000300)=[{r1, 0x4236}], 0x1, 0x0, 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000300), 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0xfffb, 0x5, @empty, 0xa098}, {0xa, 0x4ea5, 0x9, @mcast1, 0x8}, r2, 0x8001}}, 0x48) writev(r0, &(0x7f0000000040)=[{&(0x7f0000000100), 0x86}], 0x2) 7m29.129467277s ago: executing program 2 (id=2944): prlimit64(0x0, 0xe, &(0x7f0000000140)={0xc, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) timer_create(0x0, 0x0, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) clock_nanosleep(0x8, 0x0, &(0x7f00000004c0)={0x0, 0x3938700}, 0x0) 7m29.034988073s ago: executing program 2 (id=2949): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) 7m29.012070994s ago: executing program 2 (id=2951): r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet6_SIOCDELRT(r0, 0x890b, &(0x7f0000000080)={@loopback={0xfec0ffff00000000}, @private1={0xfc, 0x1, '\x00', 0x1}, @remote, 0x0, 0x2000, 0x0, 0x500, 0xa, 0x242}) inotify_init() openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='\x13\x13w\xc5\xfc5\xd4\x14T\xd5\xd4\x1d)\xad\x1a`)Y\x81F\xe6\xbe\x16nA\xad\r\xbd@T\x03<\x9f3\xbb\xda\x82$\xa2\xf3\xd7r\xe7cnH\xb3<\xbfp\x83r\xe8\xf1\xb9\x93>\xc5\x12wC\xbe\"\x06 \x9e\xf0-\xf9\xcb\xf2\xf6\xe8\x80\xd38/\x00', 0x3c1143, 0x14) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000540)=ANY=[@ANYBLOB="020320000e000000000000000000000004000300000000000000000000000000000000000000030006000000000002000a0000000000000000000000000002000100000000000000fd0000000000030005000000000002004e21ffffffff000000000000000000000000000000000000be3c58ae29b8b65a21eea64cce11571413c91319"], 0x70}}, 0x0) r2 = inotify_init1(0x180000) inotify_add_watch(r2, &(0x7f0000000240)='./control\x00', 0x800) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x204001, &(0x7f0000000240), 0x1, 0xb9f, &(0x7f0000000c00)="$eJzs3E9vVFUbAPDn3k5LS/vS8ubNqxATmxjUaBwKJZiwAtdGTXThktpOSdPhj21NbMOi4F5dGOOCxPARTNzLxpWJC1wofgJiJIboBliMufOnjEyn1DLtgfL7JWfuOXNm7vM8c2HuucncBvDUGi8e8ogDEXE6ixhtPp9HxEC9Nxix2njd3dsXp4uWRa327h9ZZBFx5/bF6da+suZ2uDkYjIjrb2Tx30864y4ur8xPVauVheb48NLZC4cXl1demzs7daZypnLu2OTrxyaPT072sNabFz746rmf3nrx8tVPJ97+ct8PWZyMkeZcex29Mh7ja59Ju1JETPU6WCJ9zXra68xKCRMCAGBDedsa7v8xGn1xf/E2Gt//nDQ5AAAAoCdqfRE1AAAAYJfLXP8DAADALtf6HcCd2xenWy3tLxJ21q1TETHWqL91f3NjphSr9e1g9EfE3j+zaL+tNWu87ZGNF5G+/bFStNim+5A3snopIp5d7/hn9frH6ndxd9afR8RED+KPPzB+kuo/2YP4qesH4Ol07VTjRNZ5/svX1j+xzvmvtM65aytSn/9a67+7Heu/+/X3dVn/vbPJGAfvvXK921z7+u/9z36dKeIX20cq6l+4dSniYGm9+rO1+rMu9Z/eZIzh6ZtXus0V9Rf1ttpO11+7GnGovprrrL8l2+jvEx2enatWJhqP6+x/+fjG8duPf9GK+K1rgZ1QHP+9sbXjf2GTMcae+f1At7mH15//NpC9V+8NNJ/5eGppaeFIxED2ZufzRzfOpfWa1j6K+l9+YeP//+vVX3wnrDY/h+Jfz6XmthhffiDm8KGj32y9/u1V1D+zxeP/+SZjfP3dlQ+7zaWuHwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAnQx4RI5Hl5bV+npfLEcMR8b/Ym1fPLy69Onv+o3MzxVzEWPTns3PVykREjDbGWTE+Uu/fHx99YDwZEfsj4ovRofq4PH2+OpO6eAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANYMR8RIZHk5IvKI+Gs0z8vl1FkBAAAAPTeWOgEAAABg27n+BwAAgN2v4/q/9I/R4E7mAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwK60//lrN7KIWD0xVG+FgeZcf9LMgO2Wp04ASKYvdQJAMqW2fq1WqyVMBdhhrvGB7CHzg11n9vQ8FwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeXy8duHYji4jVE0P1VhhozvUnzQzYbnnqBIBk+jaazHYuD2DnlVInACTjGh9oLPXv1Ro65we7vnPPdqYFAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwGNmpN6yvBwReb2f5+VyxH8iYiz6s9m5amUiIvZFxC+j/XuK8ZHUSQMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANBzi8sr81PVamVBR0enh52heCzS2HIn9TcTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAApLC6vzE9Vq5WFxdSZAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKktLq/MT1WrlYVt7KSuEQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAdP4OAAD//1rfDrQ=") r3 = openat$binfmt_register(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) write$binfmt_register(r3, &(0x7f00000001c0)={0x3a, 'syz3', 0x3a, 'M', 0x3a, 0x1, 0x3a, 'usrjquota=', 0x3a, '\x00\x03!\f\xee\x998r~\b\x13\x89\xae\xf1\x06hz\xcc\xd6\xbb\xb8\x19\x90\x9e\xdb\xa2F\xfa_F(\x05\b\x13\x82\x12\xad\x0f^\xdc\xf2\xb5', 0x3a, './file2', 0x3a, [0x46]}, 0x5c) mount(0x0, &(0x7f0000000240)='.\x00', 0x0, 0x2390024, 0x0) 7m28.755809509s ago: executing program 2 (id=2960): setresuid(0x0, 0xee00, 0x0) capset(&(0x7f0000000500)={0x20080522}, &(0x7f0000000200)={0x200002, 0x200003, 0x801, 0x4, 0x7}) r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = fsopen(&(0x7f00000003c0)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x1) close_range(r0, 0xffffffffffffffff, 0x0) 7m28.408783279s ago: executing program 2 (id=2969): mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280), 0x1000000, &(0x7f0000000080)=ANY=[@ANYBLOB='mpol=interleave:0-N:3/N\\']) 7m28.276832127s ago: executing program 45 (id=2969): mount$tmpfs(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000280), 0x1000000, &(0x7f0000000080)=ANY=[@ANYBLOB='mpol=interleave:0-N:3/N\\']) 5m6.110179535s ago: executing program 6 (id=6353): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000080000000d"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x20}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r1}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETSTEERINGEBPF(r3, 0x800454e0, &(0x7f0000000200)=r2) 5m5.976832743s ago: executing program 6 (id=6355): r0 = socket$xdp(0x2c, 0x3, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, 0x0) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) bind$xdp(r0, &(0x7f00000001c0)={0x2c, 0x8}, 0x10) 5m5.917447016s ago: executing program 6 (id=6356): r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x68001, 0x0) ioctl$TIOCGPKT(r0, 0x80045438, &(0x7f00000000c0)) r1 = syz_open_dev$ttys(0xc, 0x2, 0x1) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) io_setup(0x81, &(0x7f0000000400)) setresuid(0x0, 0xee00, 0x0) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) syz_usb_connect$hid(0x2, 0x3f, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000f, 0x8031, 0xffffffffffffffff, 0x1000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r2, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = socket$inet(0x2, 0x3, 0x4) setsockopt$inet_opts(r5, 0x0, 0x4, &(0x7f0000000400)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f00000000c0)='xfrm0\x00', 0x10) connect$inet(r5, &(0x7f0000000080)={0x2, 0x4e20, @private=0xa010100}, 0x10) sendmmsg$inet(r5, &(0x7f0000000f40)=[{{&(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10, 0x0}}], 0x68000, 0x0) 5m2.494879416s ago: executing program 6 (id=6407): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x800000, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) chroot(&(0x7f0000000440)='./file0/../file0/../file0/../file0\x00') r1 = open_tree(0xffffffffffffff9c, &(0x7f0000000600)='./file0/../file0/../file0/../file0\x00', 0x89901) move_mount(r1, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', 0x0) pivot_root(&(0x7f00000006c0)='./file0/../file0/../file0/../file0\x00', &(0x7f0000000800)='./file0/../file0/../file0/../file0/file0\x00') 5m1.860846993s ago: executing program 6 (id=6408): socket$inet6(0xa, 0x3, 0xff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000840)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x2, 0xba, &(0x7f0000000140)=""/186, 0x41100, 0x2b, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x39}, 0x94) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f04ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x400000000000041, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000004180)='/proc/mdstat\x00', 0x0, 0x0) preadv2(r2, &(0x7f0000004140)=[{&(0x7f0000000040)=""/4096, 0x1000}], 0x1, 0x33, 0x4, 0x0) 5m1.679935923s ago: executing program 6 (id=6409): syz_open_dev$tty1(0xc, 0x4, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x86800, 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x200000, &(0x7f0000000240)={[{@dioread_nolock}, {@norecovery}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}, {@minixdf}, {@prjquota}, {@nodelalloc}, {@errors_remount}, {@grpjquota}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x343}}, {@jqfmt_vfsold}, {@barrier_val={'barrier', 0x3d, 0x40000000000007}}, {@nombcache}], [{@euid_lt}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@fsname={'fsname', 0x3d, '.'}}, {@obj_type={'obj_type', 0x3d, 'nodelalloc'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}, 0xfd, 0x573, &(0x7f0000000cc0)="$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") r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) read(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x5, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x99}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "c683faa6825f1a25af3b6191facc8751ba3d8a447a0f359cf181bb0d58924dd9d9b34837a9ef3a3f72c925bbd42a07f3b2f9b25d4e7c08909985c4a4734ae2bd"}, 0x48, 0xfffffffffffffffe) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)=')\x00', r1) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @local, @val, {@ipv6={0x86dd, @generic={0x0, 0x6, "76cd8a", 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @dev}}}}, 0x0) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, 0x0, 0x1) 5m1.383956331s ago: executing program 46 (id=6409): syz_open_dev$tty1(0xc, 0x4, 0x1) openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x86800, 0x0) socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x200000, &(0x7f0000000240)={[{@dioread_nolock}, {@norecovery}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}, {@minixdf}, {@prjquota}, {@nodelalloc}, {@errors_remount}, {@grpjquota}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x343}}, {@jqfmt_vfsold}, {@barrier_val={'barrier', 0x3d, 0x40000000000007}}, {@nombcache}], [{@euid_lt}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}, {@fsname={'fsname', 0x3d, '.'}}, {@obj_type={'obj_type', 0x3d, 'nodelalloc'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}, 0xfd, 0x573, &(0x7f0000000cc0)="$eJzs3V9rW+UfAPDvSZP9636/djCGeiGDXTgZS9fWPxOEzUvR4UDvZ2izMpouo0nHWgduF+7GGxmCiAPxBXjv5fAN+CoGOhgyil6IUDnpSZe1Sf8tNbH5fOBsz5Nzkud58pzvyfOck/QEMLBOpv/kIl6OiK+SiJGWdfnIVp5c3W756e2pdEliZeXj35O4sO61kuz/4SzzUkT8/EXEmdzGcmuLS7OlSqU8n+XH6nM3xmqLS2evzZVmyjPl6xOTk+ffnJx45+23utbW1y//+e1HD98//+Wp5W9+fHzsfhIX42i2Lm1XF4q405o5Wfo7SxXi4roNx7tQWD9Jel0BdmUoi/NCpMeAkRjKoh7Y/z6PiBVgQCXiHwZUcxzQnNt3aR78n/HkvdUJ0Mb251fPjcShxtzoyHLy3Mwone+OdqH8tIyffntwP11i8/MQh7fIA+zInbsRcS6f33j8S7Lj3+6da5w83tz6Mgbt8wd66WE6/knuRGyI/9za+CfajH+G28Tubmwd/7nHXSimo3T8927b8e/aoWt0KMv9rzHmKyRXr1XK5yLi/xFxOgoH0/xm13POLz9a6bSudfyXLmn5zbFgVo/H+YPPP2e6VC+9SJtbPbkb8Urb8W+y1v9Jm/5P34/L2yzjRPnBq53Wbd3+vbXyQ8Rrbfv/2RWtZPPrk2ON/WGsuVds9Me9E790Kr/X7U/7/8jm7R9NWq/X1nZexveH/ip3Wrfb/f9A8kkjfSB77FapXp8fjziQfJgfXv/4xLPnNvPN7dP2nz7VPv432//Tyden22z/veP3Om7aD/0/vaP+33ni0Qeffdep/O31/xuN1Onske0c/7ZbwRd57wAAAAAAAKDf5CLiaCS54lo6lysWV7/fcTyO5CrVWv3M1erC9elo/FZ2NAq55pXukZbvQ4xn34dt5ifW5Scj4lhEfD10uJEvTlUr071uPAAAAAAAAAAAAAAAAAAAAPSJ4Q6//0/9OtTr2gF7rnFjg4O9rgXQC1ve8r8bd3oC+tKW8Q/sWzuPf2cGYL/w+Q+DS/zD4BL/MLi2G/+FkT2uCPCv8/kPg0v8AwAAAAAAAAAAAAAAAAAAAAAAAAAAQFddvnQpXVaWn96eSvPTNxcXZqs3z06Xa7PFuYWp4lR1/kZxplqdqZSLU9W5rV6vUq3eGJ+IhVtj9XKtPlZbXLoyV124Xr9yba40U75SLvhjwwAAAAAAAAAAAAAAAAAAALBBbXFptlSplOclOiYuRF9UYy8buGpXT8/3Syskupro8YEJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFr8EwAA//8DDjNQ") r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) read(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x5, &(0x7f0000000000)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x8}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0x99}], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) r1 = add_key$fscrypt_v1(&(0x7f0000000180), &(0x7f00000001c0)={'fscrypt:', @desc3}, &(0x7f0000000280)={0x0, "c683faa6825f1a25af3b6191facc8751ba3d8a447a0f359cf181bb0d58924dd9d9b34837a9ef3a3f72c925bbd42a07f3b2f9b25d4e7c08909985c4a4734ae2bd"}, 0x48, 0xfffffffffffffffe) request_key(&(0x7f0000000340)='user\x00', &(0x7f0000000380)={'syz', 0x3}, &(0x7f00000003c0)=')\x00', r1) syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @local, @val, {@ipv6={0x86dd, @generic={0x0, 0x6, "76cd8a", 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @dev}}}}, 0x0) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0) keyctl$KEYCTL_MOVE(0x1e, r1, 0x0, 0x0, 0x1) 1m49.832803584s ago: executing program 1 (id=10100): r0 = socket$nl_route(0x10, 0x3, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000040)={0x0, 0x0, 0xfd8b, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) bind$l2tp(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x0, @loopback}, 0x10) r1 = syz_io_uring_setup(0x1f87, &(0x7f0000000080)={0x0, 0x0, 0x13580}, &(0x7f0000000100)=0x0, &(0x7f0000000280)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_READV=@pass_iovec={0x1, 0x2b, 0x0, @fd, 0x0, 0x0}) io_uring_enter(r1, 0x54, 0x4, 0x5, 0x0, 0x0) perf_event_open(&(0x7f0000000500)={0x5, 0x80, 0x4, 0x7, 0x8, 0x42, 0x0, 0x3ff, 0x0, 0x6, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x2, @perf_bp={0x0, 0x1}, 0x2000, 0x2, 0x800, 0x2, 0xc, 0x1, 0x81, 0x0, 0xc05, 0x0, 0x4e9c}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xa) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'hsr0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=ANY=[@ANYBLOB="4400000010000104fcffffff8000000000000000", @ANYRES32=0x0, @ANYBLOB="0317049d4faeeda582b6a1dc421a28000000000000140012800b0001006d616373656300000418f08008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32=r4, @ANYBLOB], 0x44}, 0x1, 0x0, 0x0, 0x2004d808}, 0x0) 1m49.832670204s ago: executing program 1 (id=10101): sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000300000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10040003}, 0x0) 1m49.679986753s ago: executing program 1 (id=10104): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) 1m49.612673137s ago: executing program 1 (id=10105): r0 = syz_mount_image$ext4(&(0x7f0000000ac0)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x3810744, &(0x7f00000000c0)={[{@nombcache}, {@inlinecrypt}, {@usrquota}, {@jqfmt_vfsv1}, {@jqfmt_vfsv0}, {@delalloc}, {@journal_dev={'journal_dev', 0x3d, 0x844d}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@i_version}]}, 0x1, 0x46b, &(0x7f0000000b00)="$eJzs3M1vVFUbAPDn3s4AL/AyFfEDBK2isfGjpQWVhS40mrjQxEQXuKxtIchADa2JEKLVGFwaEvfGpYl/gStXRl2ZuNW9ISFKTEA3jrkz99LOMFOmMO1A5/dLLpwz98w958k953LmnBkCGFgj2R9JxPaI+DUiKo1sc4GRxl9XL5+b/vvyuekkarU3/0jq5a5cPjddFC3ety3PjKYR6adJXkmz+TNnT0xVq7On8/z4wsn3xufPnH36+MmpY7PHZk9NHj586ODEc89OPtOTOLM2Xdnz4dze3a++feH16SMX3vnxm6y99+5rnF8eRze2d1FmJAv8z1pd67nHVlPZHeDf2lKcSanfraFbQxGR3a5yffxXYiiWbl4lXvmkr40D1lT2zN7c+fRiDdjAkuh3C4D+KP6hzz7/Fsc6TT1uC5debHwAyuK+mh+NM6VI8zLlNax/JCKOLP7zZXZEyzpErc26AQDArfoum/88df38r7430ijywra8bCUihiPirojYGRF3R8SuiLgnL3tfRNy/yvpbt4aun3+mF282tm5k87/n872t5vlfMfuL4aE89/96/OXk6PHq7IGI2BERo1HenOUn2l28uMTLv3zeqf7l87/syOov5oL5RS6WWhboZqYWpno1Kb30ccSeUrv4k2s7AVlf2B0Re1Z36R1F4vgTX+/tVOjG8a+gB/tMta8iHm/c/8Voib+QrLw/Ob4lqrMHxotecb2ffj7/Rqf6byn+Hsju/9bm/t9SovJXsny/dn71dZz/7bOOnylLN9n/NyVv1fdgN+WvfTC1sHB6ImJT8lo93/T65NJ7i3xRPot/dP9S/BFL439n/p4s/gciIuvE+yLiwYh4KL93D0fEIxGxf4X4f3jp0Xc7nbsd7v9M2+fftf4/3Hz/V58YOvH9t53q7+75d6ieGs1fqT//bqBzc7bkJW62NwMAAMCdJ61/lz1Jx66l03RsrPF9+V2xNa3OzS88eXTu/VMzje+8D0c5LVa6KsvWQyeSxfyKjfxkvlZcnD+Yrxt/MfS/en5seq460+fYYdBt6zD+M78P9bt1wJq70T6a5wBsXK3jP+1TO4D15/faMLiMfxhc3Y7/Q2vcDmD9tRv/H7XkrQHCxmT+D4PL+IfBZfzD4DL+YSDdyu/61ypRWuHX++uWKK/4nwhInI30tmiGRJtEqQeju88PJgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgB75LwAA//+MOu7f") r1 = syz_clone(0x1000100, &(0x7f0000000040)="3d35477900117f0660691bc56c14f719f33f84a7daa86ae18f37dd189c0c3505199c7c42ada50a18b0b1870cf8b46a64728ec517d5fdaac84b2835be1b361ce13f41dee8bb0d5092b749328eac39e695fbe7b3c6d937fb131da7528db5292ad882e6e6e8d7d1a31845595808d89b5d0d85ac", 0x72, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000280)="bb9b55664830157880fb9aad8a0378c711e67e54d9ad8379aa0169388a41edff60614749b75095ff738ff543367855d6429e7cf05d1ac583f158d571389c673f30f0a53741c048965980b9ffc84a0bd46a2ae61031d4f708b280c3e631c105e642f9146ea8b827e4c8595987f734861eff13d293f866a8dd72c7d43f3a02f2c7be1918616162c69aa205b5d4ac0374793e06d2ffac73004ec7a15d3fef0f58e8ac022fbb68a86aa456373207b32f16e669d85e076346b3e4c19a423223011ab52e554339b3d34ba34614e7716414868ea258c3") r2 = perf_event_open(&(0x7f0000000a00)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x650b9, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800004, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x2, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r3) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x100) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000900)={&(0x7f0000000780)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@enum]}}, 0x0, 0x26}, 0x20) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000200)={r4, 0x20, &(0x7f0000000140)={&(0x7f0000001980)=""/4096, 0x1000, 0x0, &(0x7f0000000500)=""/238, 0xee}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x19, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r5 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r5, 0x89f0, &(0x7f0000000000)={'bridge0\x00', &(0x7f00000001c0)=@ethtool_regs={0x7, 0x0, 0x3, "281b74"}}) r6 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000a40)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd28, 0xffffffff, {0x0, 0x0, 0x0, r7, {0x0, 0xfff4}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000006080)=@newtfilter={0x44, 0x2c, 0xd27, 0x70bd27, 0x0, {0x0, 0x0, 0x0, r7, {0x1c, 0xfff3}, {}, {0xffe0, 0xc}}, [@filter_kind_options=@f_route={{0xa}, {0x30, 0x2, [@TCA_ROUTE4_FROM={0x8, 0x3, 0x9c}, @TCA_ROUTE4_FROM={0x8, 0x3, 0xe5}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x240488d0) sendmsg$AUDIT_MAKE_EQUIV(r6, &(0x7f00000006c0)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)={0x28, 0x3f7, 0x810, 0x70bd2b, 0x25dfdbfe, {0x7, 0x7, './file1', './file1'}, [""]}, 0x28}, 0x1, 0x0, 0x0, 0x8102}, 0x8000) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f00000004c0)) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) symlinkat(&(0x7f0000000080)='.\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00') mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x101091, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000180)='./file0\x00', 0x2010008, &(0x7f00000001c0), 0xff, 0x53b, &(0x7f0000000b80)="$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") mount$bind(&(0x7f0000000440)='./file0\x00', &(0x7f0000000000)='./file0/file0\x00', 0x0, 0x10a5840, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r8, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000400)=[0x9], 0x0, 0x0, 0x1, 0x1}}, 0x40) r9 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000540)='/proc/sys/net/ipv4/vs/lblc_expiration\x00', 0x2, 0x0) write$char_usb(r9, &(0x7f00000008c0)='-0', 0x2) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r9, 0xc0189373, &(0x7f0000000700)={{0x1, 0x1, 0x18, r0}, './file1\x00'}) sendmsg$AUDIT_SET(r0, &(0x7f00000003c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000200)={0x3c, 0x3e9, 0x0, 0x70bd25, 0x25dfdbfe, {0x1, 0x1, 0x0, r1, 0xa62, 0xa2, 0x7, 0x5, 0x0, 0x4, 0xb}, ["", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x8010}, 0x240481d3) 1m49.442106117s ago: executing program 1 (id=10107): io_setup(0x8f0, &(0x7f0000002400)) 1m49.330218214s ago: executing program 1 (id=10108): sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000300000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10040003}, 0x0) (fail_nth: 2) 1m49.330093214s ago: executing program 47 (id=10108): sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000780)=ANY=[@ANYBLOB="74000000090601020000000000000000030000000900020073797a310000000005000100070000004c0007801800018014000240fe8000000000000000000300000000aa1800148014000240fc000000000000000000000000000000060004404e1f0000050007008400000006000540"], 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) sendmsg$IPSET_CMD_ADD(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10040003}, 0x0) (fail_nth: 2) 3.747634221s ago: executing program 0 (id=11785): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000003c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000000)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_SEC_DEVKEY(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000000c0)=ANY=[@ANYBLOB='\\_\x00\x00', @ANYRES16=r1, @ANYBLOB="0100fdffffff000000001d00000008000300", @ANYRES32=r2, @ANYBLOB="40002f800c00020000000000000000000800010000000000280003801c0003800600010000030000080002000200000006000300feff00000800010000000000"], 0x5c}}, 0x0) r3 = syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x2000c12, &(0x7f00000008c0)=ANY=[], 0x2, 0x9fc, &(0x7f0000002680)="$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") r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSET(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000c80)=ANY=[@ANYBLOB="2c0000000a0a05"], 0x2c}, 0x1, 0x0, 0x0, 0x24048014}, 0x4000) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x60001, 0x0) syz_mount_image$ext4(&(0x7f0000000500)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000380)={[{@grpquota}, {@nogrpid}, {@quota}, {@nobh}]}, 0x1, 0x511, &(0x7f0000000ac0)="$eJzs3c9vI2cZAOB3nDhxsmmTlh4AQbu0hQWt1km8bVT1AOWEEKqE6BGkbUi8URQ7jmKnNGEP2zNXJCpxgiN/AOeeuHNBcOOyHJD4EYE2SByMZjzOerN2Ntps7BA/jzSa+ebz+n2/tWa+zJt4JoCxdT0i7kfEVER8GBHz+f4kX+K9zpK+7uHhvbWjw3trSbTbH/wjyfrTfdHzb1LX8vcsRcQPvhPx4+TJuM39g63VWq26m7cXW/Wdxeb+wa3N+upGdaO6XamsLK8svXP77cpzG+tr9al868sPfn//Gz9N05rL9/SO41kknSH32x8RxeM4qcmI+N55gl0iE/l4pkadCM+kEBEvR8Tr2fE/HxPZpwkAXGXt9ny053vbAMBVV8hqYEmhnNcC5qJQKJc7NbxXYrZQazRbN+829rbXO7WyhSgW7m7Wqkt5rXAhiknaXs62H7UrnfZ0t307Il6KiJ9Pz2Tt8lqjtj7KH3wAYIxdOzH//3u6M/8DAFdcadQJAABDZ/4HgPFj/geA8WP+B4Dx05n/Z0adBgAwRKde/7sfEABcSer/ADBWvv/+++nSPsrvf73+0f7eVuOjW+vV5la5vrdWXmvs7pQ3Go2N7J499ae9X63R2Fl+K/Y+XvjmTrO12Nw/uFNv7G237mT39b5TLWav6nurbABgSF567bM/JemM/O5MtkTPsxyKI80MuGiFUScAjMzEqBMARsZf98D4Osc1vvIAXBF9HtH7mFK/Lwi12+32xaUEXLAbX1D/h3HVU//3V8AwZtT/YXyp/8P4areTsz7zP876QgDgclPjBwb8/v/lfP2b/JcDP1o/+YpPLzIrAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAuNy6z/8t588Cn4tCoVyOeCEiFqKY3N2sVZci4sWI+ON0cTptL484ZwDgvAp/TfLnf92Yf3Pusa5Xrx1vTkXET375wS8+Xm21dv8QMZX8c7q7v/Vpvr8y/OwBgNOl1/rdeTpb91zIPzy8t9ZdhpnT374dEaVO/KPDqTg6jj8Zk9m6FMWImP1Xkrc7kp7axXnc/yQiPt9v/EnMZTWQzpNPT8ZPY78w1PiFx+IXsr7OOv2/+NxzyAXGzWfp+ee9fsdfIa5n6/7Hfyk7Q51ffv5L32rtKDsHPorfPf9NDDj/XT9rjLd+993O1syTfZ9EfHEyohv7qOf8042fDIj/5hnj//lLr74+qK/9q4gb0T9+b6zFVn1nsbl/cGuzvrpR3ahuVyoryytL79x+u7KY1agXB88Gf3/35ouD+tLxzw6IX3rK+L96xvH/+r8f/vArp8T/+hv94hfilVPip3Pi184Yf3X2t6VBfWn89QHjf9rnf/OM8R/85eCJx4YDAKPT3D/YWq3Vqrv/7xtzxc6ALks+Ni5iI/2EL0EafTe+NaxYU9G/62dvdA6BE13t9jPFGnTGeB5VN+AyOD7oI+I/o04GAAAAAAAAAAAAAADoaxjfWBr1GAEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALi6/hcAAP//leLMXA==") openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r6 = socket$kcm(0x1e, 0x5, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001800010000000000000000000a000000000000000000000008000400", @ANYRES32=r7, @ANYBLOB="06001500070000000c0016800800", @ANYRES64=r6], 0x38}}, 0x10) socket$packet(0x11, 0x3, 0x300) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(0xffffffffffffffff, 0x84, 0x65, &(0x7f00000009c0)=[@in={0x2, 0x4e23, @private=0xa010100}, @in={0x2, 0x4e21, @private=0xa010102}, @in={0x2, 0x4e23, @private=0xa010102}, @in6={0xa, 0x4e23, 0x8, @mcast1, 0x3}, @in6={0xa, 0x4e23, 0x7f, @remote, 0x1}, @in={0x2, 0x4e21, @rand_addr=0x64010102}, @in6={0xa, 0x4e20, 0x1, @private2={0xfc, 0x2, '\x00', 0x1}, 0xef99}, @in={0x2, 0x4e21, @multicast1}, @in={0x2, 0x4e20, @broadcast}, @in6={0xa, 0x4e22, 0xfffffffd, @mcast1, 0xfff}], 0xd0) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x40801, 0x0) r9 = epoll_create(0x802) epoll_ctl$EPOLL_CTL_ADD(r9, 0x1, r8, &(0x7f0000000300)={0x10000001}) ioctl$FS_IOC_GETFLAGS(r8, 0x5437, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3, {0x2}}, './file0\x00'}) ioctl$IMCTRLREQ(r10, 0x80044945, &(0x7f0000000880)={0x2000, 0x1e, 0x3, 0xffff}) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000100)=ANY=[@ANYBLOB="b400000000000000791048000000000071003b00000000009500000000000000db74589d4b38cc306ac390649f72dea0e50e2317db042855d6c74ff3493c7e31e3f6c643155a8e2e01d50bc3347475750472719cc516fa14b769e7f385ba72c60242263c05ddab05e37efe81b8bffc35cdf2ac0d93263ff755d611c4cca1684b1470af6a83366aa430ad2d700b186da622d6fba70000000000000000000000000200"/173], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x48) r11 = socket$packet(0x11, 0x3, 0x300) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r11, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) syz_emit_ethernet(0x2a, &(0x7f0000000100)=ANY=[@ANYBLOB="bbbbbbbbbbbb8a0a63cdec5908060001080006040001aaaaaaaaaa16ac1414bbaaaaaaaaaa14ac"], 0x0) sendto$packet(r11, &(0x7f0000000100)="f257a8ea7bc273dfaeab96850806", 0x2a, 0x0, &(0x7f0000000200)={0x11, 0x0, r12, 0x1, 0x0, 0x6, @link_local}, 0x14) pselect6(0x40, &(0x7f0000000100)={0x0, 0x0, 0xfffffffffffffffe, 0x0, 0x800, 0x0, 0x100000}, 0x0, &(0x7f0000000240)={0x1f, 0x2, 0xffff, 0x3, 0x4, 0x80000000000000, 0x6a9}, &(0x7f0000000280)={0x0, 0x3938700}, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r5, 0x0) 3.472143278s ago: executing program 0 (id=11788): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc0042, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefffffc, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x3, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$kcm(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000000)) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3ffffe, 0x0, 0x41000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}], 0x60}, 0x0) perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x3a) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000100)) r2 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000000d000000b7"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r3, 0x0, 0xe80, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888808", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 2.459784307s ago: executing program 0 (id=11796): r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f00000001c0)={0x0, 0x89, "c4ef591c52a98864cb8e66c7cf4ce4ea2beea551d15bc6a23c38e079cdbe593e2c70d5913b2846ba184ec1cb340d3294637ab1db2b7f5d63722cb4e001d3c70d4d6a0948ac740b7b71574a4f4ab30d678c24dd08c2abd224503ed96c0db696263f3fd834e259904398fc04f576024ee1a96b343a27647aeca3d7e047ecd1b78528b2c85304ca31cd2d"}, &(0x7f0000000100)=0x91) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f0000000400)={r1, 0x4f, "d429036b58f8b7eb1608775fa1f3157272c8e7b3e871b765d7049bd0c1f5e60f7f0ed4102c158f8f9c417bf98aa2a35d2ca3d11fb46c24485d848fb29d40b678704945572b7b1ac33c0eb4f3e20fa0"}, &(0x7f0000000380)=0x57) r2 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r5, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) connect$inet6(r5, &(0x7f0000000080)={0xa, 0x0, 0x4000, @empty, 0x4}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r5, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r5, 0x11a, 0x2, &(0x7f0000000300)=@gcm_128={{0x303}, "fc674d000000f8f7", "c5991ee20139b401046a89606ffcf92e", "2c5be7c6", "a0ca05c0707e52f4"}, 0x28) recvfrom$inet6(r5, &(0x7f0000000100), 0x4, 0x200, 0x0, 0x0) recvmmsg(r3, 0x0, 0x0, 0x2, 0x0) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff8000}]}) close_range(r6, 0xffffffffffffffff, 0x0) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000040), 0x121101, 0x0) clock_settime(0x6, &(0x7f0000000280)={0x0, 0x989680}) setresgid(0xee00, 0xee01, 0x0) r7 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) sendmmsg$unix(r8, &(0x7f00000081c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001fc0)=[@cred={{0x1c, 0x1, 0x2, {r7, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r7}}}], 0x40}}], 0x1, 0x84) splice(r5, 0x0, r4, 0x0, 0x10000008ebc, 0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f0000000040)={0x0, 0x0, 0x10001, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) r9 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x5) ioctl$SG_IO(r9, 0x2285, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r10 = gettid() perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0}, 0x0, 0xd53, 0x0, 0x7, 0x8, 0xd9a, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, r10, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 2.413263269s ago: executing program 9 (id=11797): bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x9, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0x6, 0x2}]}, @typedef={0x7, 0x0, 0x0, 0x8, 0x3}, @float={0x6, 0x0, 0x0, 0x10, 0x4}]}, {0x0, [0x0, 0x30, 0x2e, 0x5f, 0x30, 0x61, 0x5f]}}, 0x0, 0x4d}, 0x28) migrate_pages(0x0, 0x7, &(0x7f0000000080)=0x46, &(0x7f0000000200)=0x101) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1", 0x12}], 0x1}, 0x404c080) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCBRDELBR(r0, 0x89a2, &(0x7f0000000000)='bridge0\x00') mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.cpu/syz0\x00', 0x1ff) 2.336799914s ago: executing program 0 (id=11798): r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x1e1802, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000180), 0x2, 0x862b01) ioctl$EVIOCSFF(r1, 0x40304580, &(0x7f00000003c0)={0x57, 0x0, 0xd, {0xffff, 0x1}, {0x45, 0x2}, @cond=[{0x8, 0x5388, 0x8, 0x800, 0x80cb, 0x7}, {0x2, 0x5, 0x1, 0x7, 0x6, 0x1}]}) write$char_usb(r1, &(0x7f0000000040)="e2", 0x2250) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMAXCID(r0, 0x40047451, &(0x7f0000000080)=0x4) ioctl$PPPIOCSFLAGS1(r0, 0x40047459, &(0x7f0000000100)=0x2000004) pwritev(r0, &(0x7f0000000280)=[{&(0x7f00000001c0)="00214717a70700000000030600710a5eeb9d04710400", 0x16}], 0x1, 0xee, 0x4200004) write(0xffffffffffffffff, &(0x7f0000000000)="240000001a005f0214f9f4e6ff0804000a000000fe0000000000aa0008000f00fd", 0x21) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="240000001a0001000000ff7f0000000080"], 0x24}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$nl_route(r2, &(0x7f0000001780)={&(0x7f00000016c0)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000001740)={&(0x7f0000001700)=@ipv6_getanyicast={0x14, 0x3e, 0x400, 0x70bd2d, 0x25dfdbfd, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x10) sendmsg$TIPC_NL_MON_PEER_GET(r3, &(0x7f0000000600)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000140)={0x458, r4, 0x100, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0xa8, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xd}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3ff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xf}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x101}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_MEDIA_PROP={0x54, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x18}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x2}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1ff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}]}, @TIPC_NLA_NET={0x40, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x7}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_ID={0x8}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x401}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x3}]}, @TIPC_NLA_PUBL={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_PUBL_TYPE={0x8, 0x1, 0x6b9c}, @TIPC_NLA_PUBL_UPPER={0x8, 0x3, 0x4}, @TIPC_NLA_PUBL_LOWER={0x8, 0x2, 0x1}]}, @TIPC_NLA_SOCK={0x2c, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x706}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}]}, @TIPC_NLA_NODE={0xe8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xe2, 0x3, "79b40f8c47e07c36e2dc5d2070a396ecf93a882c40229890267166ac42746c550b746391cee9e5ef1fb6e68f776e9468ba13e1c0dc983c9ca53d91b2ab771338540bad1848a56514e2b7e2c7884ce7104704a8383f32b10bb17f992c9b136dc8e00a9c6bdf455e906dbca811f1e15d00603c5dc99bee5d21502d23778d96e384c92eaa62fbd1bfd55e7086ed37c9cead64890962a37a1476bc0ead281a5ad87758277e48fe6b6e5819e747b58a5bd8ddcaa3a1d6537c538018b4d147fc88305d3b2992b474e27d05075384df1bcd306736c0c7b5730176712e1f8f111043"}]}, @TIPC_NLA_NODE={0xc, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x7}]}, @TIPC_NLA_SOCK={0xdc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_CON={0x2c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0xacc}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x4}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x6}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xbc}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x9}]}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x5}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}]}, @TIPC_NLA_SOCK_CON={0x14, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x6}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x8}]}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x100}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_SOCK_CON={0x3c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x7}, @TIPC_NLA_CON_NODE={0x8, 0x2, 0x3ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0xfffffd6a}, @TIPC_NLA_CON_NODE={0x8}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x4}]}, @TIPC_NLA_SOCK_CON={0x1c, 0x3, 0x0, 0x1, [@TIPC_NLA_CON_FLAG={0x8, 0x1, 0x400}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x3ff}, @TIPC_NLA_CON_FLAG={0x8, 0x1, 0x8001}]}]}, @TIPC_NLA_NODE={0xb4, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0xaa, 0x3, "164b332a68c543269566932011540c8c1b13755b544aa67e6c01d8b2bb538e1f38cdf92dce0e99b6a4f7017e18b391d08778f3f8391d95f2e4d7cfdc9176ba0961faf9f432e3b28c6d3c485f305f6093e5daf56e1758884413c6208e15736765f82d0f5f4dbd71538e0e10c9023ea84d08f6d310d984ce4f67e9423c93c6ca1a0b3cd2535adbb2ad8f7d96ab76cbfb363db5633fdb8c5f65ad94f923a9a73f2e9aa951b87c02"}, @TIPC_NLA_NODE_KEY_MASTER={0x4}]}, @TIPC_NLA_LINK={0x90, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x9}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xac7}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz1\x00'}, @TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x458}, 0x1, 0x0, 0x0, 0x20040040}, 0x0) setxattr$system_posix_acl(&(0x7f0000002a00)='.\x00', &(0x7f0000002a40)='system.posix_acl_access\x00', 0x0, 0x0, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000001640)={&(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ff2000/0xb000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000640)="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", 0x1000, r1}, 0x68) socket$can_raw(0x1d, 0x3, 0x1) 2.292532986s ago: executing program 0 (id=11799): pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) write$P9_RGETLOCK(r0, &(0x7f0000000640)=ANY=[], 0x200002e6) fcntl$setpipe(r0, 0x407, 0x7000000) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xa, 0x31, 0xffffffffffffffff, 0xf2de1000) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) io_setup(0x8f0, &(0x7f0000002400)) (fail_nth: 2) 2.178617023s ago: executing program 9 (id=11802): socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, 0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000120000007f00000001"], 0x48) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000240)={r1, 0x58, &(0x7f0000000340)}, 0x10) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="fd4b753ebb5c0000c74c0e123c00e13536e000"/31, @ANYRES16=r4, @ANYBLOB="010027bd7000fbdbdf25250000000e0001006e657464657673696d0000000f0002006e657464657673696d30000008008b00", @ANYRES32=r2, @ANYBLOB], 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x30) 2.124163216s ago: executing program 9 (id=11806): sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, 0x0, 0x2) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x2, 0xf4139, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_config_ext={0x2, 0x1}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x1) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x2600, 0x0) openat$cgroup_type(r0, &(0x7f0000000040), 0x2, 0x0) 2.081432219s ago: executing program 9 (id=11809): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x4c02}) readv(r0, &(0x7f0000001680)=[{&(0x7f0000000040)=""/82, 0x52}, {&(0x7f00000003c0)=""/4096, 0x1000}], 0x2) r1 = socket$kcm(0x2, 0xa, 0x2) syncfs(r1) ioctl$F2FS_IOC_DEFRAGMENT(r1, 0xc010f508, &(0x7f0000000180)={0x0, 0x11}) ioctl$TUNSETVNETHDRSZ(r0, 0x400454d8, &(0x7f0000000100)=0x730) ioctl$SIOCSIFHWADDR(r0, 0x8914, &(0x7f0000000000)={'batadv0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(0xffffffffffffffff, 0x10, &(0x7f0000000600)={0x4, 0x0, &(0x7f0000000540)=[{0x0}, {&(0x7f0000000340)}], &(0x7f0000000200)=[0x3, 0xffffffffffffffff, 0x1, 0x3, 0x5, 0x3, 0x9], 0x2}, 0x20) r2 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) close(r2) removexattr(&(0x7f00000001c0)='./file0\x00', 0xffffffffffffffff) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f0000001c40)) r4 = memfd_create(&(0x7f0000000080)=',\xea\x02', 0x4) ftruncate(r4, 0x7000000) r5 = dup(r4) preadv2(r5, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/83, 0x200000}], 0x1000000000000146, 0x3700, 0x0, 0x0) 2.004017593s ago: executing program 5 (id=11812): r0 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000280)=@v1={0x0, @aes128, 0x1, @desc2}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) syz_io_uring_complete(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) ioctl$TUNSETPERSIST(r1, 0x400454c9, 0x1) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x40000) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0xfffffffffffffffe) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000080)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x2003, 0x2, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}, {0x17}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0xc, 0x2, [@TCA_FQ_CODEL_QUANTUM={0x8, 0x6, 0x1000007}]}}]}, 0x40}}, 0x4000010) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r3, 0x0) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, 0x0, 0x0) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x20, r5, 0x7, 0x70bd2b, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x48050}, 0x0) 2.003589943s ago: executing program 4 (id=11814): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000380), r0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), r0) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1200000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000f8ff00"/28], 0x48) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/178, 0xb2}], 0x1, 0x8, 0xffffffff) r1 = getpid() perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x6}, r1, 0x0, 0xffffffffffffffff, 0x2) r2 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r2, 0x400, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) r3 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4}]}) openat$dir(0xffffff9c, &(0x7f0000000580)='./file0\x00', 0x4041, 0x148) close_range(r3, 0xffffffffffffffff, 0x0) 1.735292979s ago: executing program 0 (id=11824): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000004080)=ANY=[@ANYBLOB="7c0000001a00010025bd7000fddb5f250a001406ff01000100080000080006000bfeffff08000300", @ANYRES32, @ANYBLOB="969c110003049eb1e0f10d05b94eb5a165b80f445401719e000000000000f8f2b868939c6226cc89add70f347c11162196cde863a2474956e8164d31fcda1c1acdcb11c429b490b6c4d5de79500c69a0eeb17dcc02c33cec0efd5457ac657abbf7e3a1d542775e10323f5636127e4188753ac7ca44d4a26b", @ANYRES32], 0x7c}, 0x1, 0x2000000000000000, 0x0, 0x10}, 0x40000) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$WG_CMD_SET_DEVICE(r2, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000100)={&(0x7f00000000c0)={0x30, r3, 0x400, 0x70bd29, 0x25dfdbff, {}, [@WGDEVICE_A_IFNAME={0x14, 0x2, 'wg2\x00'}, @WGDEVICE_A_LISTEN_PORT={0x6, 0x6, 0x4e23}]}, 0x30}, 0x1, 0x0, 0x0, 0x200000c0}, 0x11) setsockopt$ARPT_SO_SET_REPLACE(r1, 0x0, 0x60, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r5, 0x0, 0x1, 0x4) vmsplice(r5, &(0x7f00000003c0)=[{0x0}], 0x1, 0x7) ioctl$sock_inet_udp_SIOCINQ(r5, 0x541b, 0x0) getsockopt$inet_tcp_int(r5, 0x6, 0x8, &(0x7f00000001c0), &(0x7f0000000200)=0x4) syz_read_part_table(0x406c, &(0x7f0000004140)="$eJzszjFKA1EQBuD/JdlklYAIdkIw2It2VnuLXCAHsLK2cPEKHkCwCV7Ba3idFdFVJBqbFCrfV+zO7v/mzYRf4imlbDywt9NX94Nk+bCf5GiedpKkTjL6ouf0LNVuXTJNcrkeL1ZbWR0AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPhjysa0fnlU75/Lw7RXTc6nyXiS5HqYqpmVHCTzk59nLVZbWBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+O9G7fjbrH57d13XfQqGfXF3nLaZVUlK/+vm8bWhW79v8DE1ycXtM7tzTAAAAIMAaCVX0pSG8IUE3GftAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAlB04EAAAAAAA8n9thKqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqirswAEJAAAAgKD/r9sRKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAXQEAAP//IIgYbg==") 1.195488901s ago: executing program 9 (id=11829): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x1, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000380), 0xffffffffffffffff) syz_genetlink_get_family_id$nl802154(&(0x7f0000000180), 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1200000004000000080000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000000f8ff00"/28], 0x48) preadv(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)=""/178, 0xb2}], 0x1, 0x8, 0xffffffff) r0 = getpid() perf_event_open(&(0x7f0000001100)={0x5, 0x80, 0x9, 0x8, 0xb, 0xfb, 0x0, 0x3c, 0xc002, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x1}, 0x18842, 0x0, 0x7fffffff, 0x2, 0x3cd, 0x3, 0x7, 0x0, 0x0, 0x0, 0x6}, r0, 0x0, 0xffffffffffffffff, 0x2) r1 = open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) fcntl$setlease(r1, 0x400, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4}]}) openat$dir(0xffffff9c, &(0x7f0000000580)='./file0\x00', 0x4041, 0x148) close_range(r2, 0xffffffffffffffff, 0x0) 1.145241743s ago: executing program 5 (id=11830): setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000100)='wlan1\x00', 0xfffffffffffffd6a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) setsockopt$inet6_tcp_int(r0, 0x6, 0x2000000000000022, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @loopback}, 0x7}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@getchain={0x24, 0x11, 0x1, 0x2000000, 0x0, {0x0, 0x0, 0x0, r2, {}, {}, {0x5}}}, 0x24}}, 0x0) io_setup(0x6, &(0x7f0000000680)=0x0) io_submit(r3, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x180a, 0x3c, 0x3, 0x1, 0x0, r0, 0x0, 0x1802}]) 1.142740743s ago: executing program 4 (id=11831): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETSW2(r1, 0x402c542c, &(0x7f0000000040)={0xfffffff8, 0x401, 0xfffffffd, 0xc4cf, 0x7, "0441920887e87fcb367800000000080100", 0x4, 0x200}) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000180)=0x1) ioctl$TIOCSTI(r1, 0x5412, &(0x7f00000001c0)=0x3) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'ip6_vti0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=@newlink={0x64, 0x10, 0x20, 0x70bd29, 0x80, {0x0, 0x0, 0x0, r2, 0x24403}, [@IFLA_GROUP={0x8, 0x1b, 0x2}, @IFLA_PHYS_PORT_ID={0x10, 0x22, "dcfe2db808e2878af7d46b5c"}, @IFLA_MAP={0x24, 0xe, {0x2, 0x6, 0x7d, 0xfa7, 0x0, 0x40}}, @IFLA_CARRIER_CHANGES={0x8, 0x23, 0x9}]}, 0x64}, 0x1, 0x0, 0x0, 0x2004d808}, 0x0) 1.084691577s ago: executing program 4 (id=11832): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0)={[{@i_version}, {@min_batch_time={'min_batch_time', 0x3d, 0x3a5}}, {@bh}]}, 0x1, 0x51d, &(0x7f0000000200)="$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") r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x1da) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000940)=ANY=[@ANYBLOB="5800000000010108000000000000000005000005200004801c00018005000100410000000600050048a3000006000500f705000024e565be2865f18840d5ed0d5a81c7bbb0000f800800034080000000080003400000000408000140000002d0080003400000000d"], 0x58}, 0x1, 0x0, 0x0, 0x810}, 0x20040000) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, r1) recvfrom$inet_nvme(r0, &(0x7f0000000740)=""/145, 0x91, 0x2031, &(0x7f0000000b00)=@pppol2tpin6={0x18, 0x1, {0x0, r0, 0x0, 0x8b, 0x4, 0x1, {0xa, 0x4e22, 0x9, @empty, 0x8066}}}, 0x80) r2 = geteuid() symlinkat(&(0x7f0000000080)='.\x00', 0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00') exit(0x1) openat(0xffffffffffffff9c, &(0x7f0000000380)='./file0/file0/..\x00', 0x22a040, 0x121) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x10001, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) write(r4, &(0x7f0000000340), 0x11000) io_setup(0x3fc, &(0x7f0000000500)=0x0) io_submit(r5, 0x1, &(0x7f0000000040)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x5, 0x0, r4, 0x0}]) vmsplice(r3, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) lsetxattr$security_ima(0x0, &(0x7f0000000080), 0x0, 0x0, 0x1) setreuid(r2, r2) quotactl_fd$Q_SETINFO(r1, 0xffffffff80000602, r2, &(0x7f0000000040)={0x1, 0x9, 0x0, 0x4}) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) write$cgroup_type(r6, &(0x7f0000000180), 0x13bb711e) write$P9_RWSTAT(r0, &(0x7f0000000100)={0x7, 0x7f, 0x1}, 0x7) sendmsg$AUDIT_USER(r6, &(0x7f0000000ac0)={&(0x7f0000000800)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000840)={&(0x7f00000009c0)={0xe4, 0x3ed, 0x2, 0x70bd25, 0x25dfdbff, "6681d146cfd28d653ef676d88e10bc02e16749398c84974b40b8ad5041eecc41827f319d88c833085f3319f254144685348b05dc1749f4093ce53b565e6f3da62d3477d618c8f2fecd9206d25e5934a313346e343e523240e59dc4bc5408551cd9b8c53eaf534795c3cd614fe8c656d2bb78972046f60f9c2ce096930424586475cc08ccd234eec466652d61d8c7450870f4c4e5ab36900c42cf4411c17c4bb0db6f52a7668c12ed4b5ed638d884e41b2db2da9826d58d5dbbd8d3d4a3d71121f48641c9afacbb56913c4ab594d1835651", ["", ""]}, 0xe4}, 0x1, 0x0, 0x0, 0x840}, 0x8807) 686.35127ms ago: executing program 7 (id=11834): r0 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r0, &(0x7f0000000380)={0x2, 0x0, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='veth0_to_team\x00', 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x810) perf_event_open(&(0x7f0000000040)={0x9, 0x80, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x7, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f00000000c0)='./bus\x00', 0x400, &(0x7f0000000100)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c757466383d302c636865636b3d7374726963742c646973636172642c757466383d312c757466383d312c73686f72746e616d653d77696e39352c73686f72746e616d653d6c6f7765722c757466383d312c00ef5c3556"], 0xfd, 0x2bc, &(0x7f0000000580)="$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") migrate_pages(0x0, 0x7, 0x0, &(0x7f0000001fc0)=0x7c) symlinkat(0x0, 0xffffffffffffff9c, &(0x7f0000000040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00') open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) 657.263892ms ago: executing program 7 (id=11835): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc0042, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefffffc, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x3, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$kcm(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3ffffe, 0x0, 0x41000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x3a) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0xe80, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888808", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 596.645045ms ago: executing program 7 (id=11836): sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=ANY=[@ANYBLOB="7c000000090601020000000000000000030000000900020073797a3100000000050001000700000054000780060004404e1f0000180014801400024000000000000000000000000000000000050007003a0000000500150006000000080008400000000218000180"], 0x7c}, 0x1, 0x0, 0x0, 0x10040003}, 0x4000) r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x550, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000ac0)={0x6, 0x10, &(0x7f0000000140)=ANY=[@ANYBLOB="1800000022bf0000000000000500000018110000", @ANYRES16=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000db003000a0000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000200)='syzkaller\x00', 0x7}, 0x94) socket$phonet_pipe(0x23, 0x5, 0x2) mount$tmpfs(0x0, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000f80), 0x400, &(0x7f0000000000)=ANY=[]) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_uring_register$IORING_REGISTER_RESTRICTIONS(0xffffffffffffffff, 0xb, &(0x7f00000001c0)=[@ioring_restriction_register_op={0x0, 0xc}], 0x1) io_uring_register$IORING_REGISTER_ENABLE_RINGS(0xffffffffffffffff, 0xc, 0x0, 0x0) io_uring_register$IORING_REGISTER_ENABLE_RINGS(0xffffffffffffffff, 0xc, 0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000b80)=[{&(0x7f0000000300)=""/21, 0x15}, {&(0x7f00000004c0)=""/212, 0xd4}, {&(0x7f00000005c0)=""/215, 0xd7}, {&(0x7f00000006c0)=""/135, 0x87}, {&(0x7f0000000780)=""/238, 0xee}, {&(0x7f0000000380)=""/38, 0x26}, {&(0x7f0000000880)=""/185, 0xb9}, {&(0x7f0000000940)=""/246, 0xf6}, {&(0x7f0000000a40)=""/168, 0xa8}, {&(0x7f0000000b00)=""/74, 0x4a}], 0xa) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_NETID(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x24, r2, 0x7902b9d156bc5109, 0x70bd26, 0x25dfdbfc, {{}, {}, {0x8, 0x2, 0x2}}}, 0x24}, 0x1, 0x0, 0x0, 0x4008004}, 0x1000) connect$inet6(0xffffffffffffffff, &(0x7f0000002140)={0xa, 0x4ea9, 0x4000000c, @loopback, 0x5}, 0x1c) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000006c0)) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) msgget$private(0x0, 0x60c) 596.211355ms ago: executing program 7 (id=11837): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xc97c, 0x1, @perf_bp={0x0, 0x5}, 0x0, 0xa88, 0x8408, 0x5, 0x0, 0xf6d, 0xfffe, 0x0, 0x0, 0x0, 0x70}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f00000003c0)=[@in6={0xa, 0x4e21, 0x6, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x5}]}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x82, &(0x7f0000000040)={r1}, &(0x7f00000000c0)=0x8) (fail_nth: 1) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8458, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 395.397357ms ago: executing program 7 (id=11838): getsockopt(0xffffffffffffffff, 0x200000000114, 0x271d, 0x0, &(0x7f0000000000)) r0 = socket(0xf, 0x6, 0x1) socket$unix(0x1, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x601c2, 0x0) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$UHID_SET_REPORT_REPLY(r1, &(0x7f0000000280)=ANY=[@ANYBLOB="0e00001ef05ffe684e55000000000005010000"], 0xc) sendmsg$NL80211_CMD_LEAVE_MESH(r0, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="01010000", @ANYRES16=0x0, @ANYBLOB="080027bd7000fcdbdf254500000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x11000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) socket$nl_route(0x10, 0x3, 0x0) openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x0) io_uring_enter(0xffffffffffffffff, 0x3498, 0x969, 0xffff000000000000, 0x0, 0x0) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x84, @dev={0xac, 0x14, 0x14, 0xb}, 0x17, 0x3, 'lblc\x00', 0xd, 0x4, 0x7}, 0x2c) r3 = socket$kcm(0xa, 0x2, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x1000000009, 0x690bb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x4, @perf_config_ext={0xef, 0x3d27}, 0x400, 0x32, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r5) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x84, @private=0xa010101, 0x4e21, 0x3, 'wrr\x00', 0x23, 0x81, 0x5}, {@dev={0xac, 0x14, 0x14, 0x3c}, 0x4e22, 0x0, 0x1cb, 0x12d61, 0x12d58}}, 0x44) sendmsg$sock(r3, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e22, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) 377.239308ms ago: executing program 7 (id=11839): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x100000001, 0xdd5}, 0x0, 0x0, 0x10000, 0x2, 0x64a, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x9) syz_mount_image$ext4(&(0x7f0000002800)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000002880), 0x1, 0x5fd, &(0x7f0000002ec0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./bus\x00', 0x4040, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=@newlink={0x4c, 0x10, 0x401, 0x2000000, 0x0, {0x0, 0x0, 0x0, 0x0, 0x13101}, [@IFLA_LINKINFO={0x2c, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x18, 0x2, 0x0, 0x1, [@IFLA_GRE_IKEY={0x8}, @IFLA_GRE_COLLECT_METADATA={0x4}, @IFLA_GRE_OKEY={0x8, 0x5, 0x10000}]}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000900)={0x0, 0x0, &(0x7f00000008c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="d80000001b00010000000000fdfffffffc000000000000000000000000000000200100000000000000000000000000004e240000000000010000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000ffffffffffffff7ffcffffffffffffff04000000000000000000000000000000fdffffffffffffff00000000000000000000000000000000050000000000000000000000000000000000000000000000000000000000000006fcffff00000000000003000000000000000000000000000c0008"], 0xd8}}, 0x20008004) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'bond0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000140)={'gretap0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="400d0000000000003000128008000100687372002400028008000200", @ANYRES32=r3, @ANYBLOB="08000100", @ANYRES32=r2], 0x50}, 0x1, 0x0, 0x0, 0x40000}, 0x8000) r4 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r4, &(0x7f0000004200)='t', 0x1) unshare(0x36010000) syz_read_part_table(0x5bf, &(0x7f0000000280)="$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") r5 = creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) write$binfmt_elf32(r5, 0x0, 0x69) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000002080)='task\x00') lseek(r7, 0xfffffffffffffffd, 0x0) r8 = syz_genetlink_get_family_id$tipc(&(0x7f0000000140), r0) sendmsg$TIPC_CMD_ENABLE_BEARER(r7, &(0x7f0000000840)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x3c, r8, 0x100, 0x70bd2a, 0x25dfdbff, {{}, {}, {0x20, 0x17, {0x12, 0x7fffffff, @l2={'eth', 0x3a, 'veth0_to_batadv\x00'}}}}, ["", "", "", "", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x2, &(0x7f0000006680)) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r9 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) fchdir(r9) mount_setattr(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x0, &(0x7f0000001dc0)={0xf, 0x5, 0x0, {r9}}, 0x20) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="240000001800090000000000010000001c140000fe00000100000000080005"], 0x24}}, 0x0) socket(0x10, 0x3, 0x0) sendfile(r4, r0, 0x0, 0x3ffff) sendfile(r4, r0, 0x0, 0x7ffff000) syz_open_dev$usbfs(&(0x7f00000001c0), 0x800000001fe, 0x2) 329.220591ms ago: executing program 9 (id=11840): r0 = openat2$dir(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000280)=@v1={0x0, @aes128, 0x1, @desc2}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) syz_io_uring_complete(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000000)={'\x00', 0x5}) ioctl$TUNSETPERSIST(r1, 0x400454c9, 0x1) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0x40000) ioctl$TUNSETPERSIST(r1, 0x400454cb, 0xfffffffffffffffe) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000640)={&(0x7f0000000080)=@newqdisc={0x40, 0x24, 0x4ee4e6a52ff56541, 0x2003, 0x2, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}, {0x17}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0xc, 0x2, [@TCA_FQ_CODEL_QUANTUM={0x8, 0x6, 0x1000007}]}}]}, 0x40}}, 0x4000010) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r3, &(0x7f0000000080)={0xa, 0x4e22, 0x0, @empty}, 0x1c) listen(r3, 0x0) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(0xffffffffffffffff, 0x0, 0x0) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_DEL_ADDR(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)={0x20, r5, 0x7, 0x70bd2b, 0x0, {}, [@MPTCP_PM_ATTR_ADDR={0xc, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0x1}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x48050}, 0x0) 232.730416ms ago: executing program 4 (id=11841): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x9840c, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x1700, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x652c0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800000, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x169a82, 0x109) sendfile(r1, r1, 0x0, 0xb) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) shmget$private(0x0, 0x400000, 0x8, &(0x7f000000e000/0x400000)=nil) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f00000003c0), 0xffffffffffffffff) r3 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$selinux_context(r3, &(0x7f0000000340)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) 218.958567ms ago: executing program 5 (id=11842): r0 = socket(0x40000000015, 0x5, 0x0) getsockopt(r0, 0x200000000114, 0x271d, 0x0, &(0x7f0000000000)) r1 = socket(0xf, 0x6, 0x1) socket$unix(0x1, 0x1, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x601c2, 0x0) r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$UHID_SET_REPORT_REPLY(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="0e00001ef05ffe684e55000000000005010000"], 0xc) sendmsg$NL80211_CMD_LEAVE_MESH(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="01010000", @ANYRES16=0x0, @ANYBLOB="080027bd7000fcdbdf254500000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}, 0x1, 0x0, 0x0, 0x40}, 0x4) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x11000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) ftruncate(r2, 0x8800000) socket$nl_route(0x10, 0x3, 0x0) openat$qrtrtun(0xffffffffffffff9c, 0x0, 0x0) socket$qrtr(0x2a, 0x2, 0x0) io_uring_enter(0xffffffffffffffff, 0x3498, 0x969, 0xffff000000000000, 0x0, 0x0) r4 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ADD(r4, 0x0, 0x482, &(0x7f0000000040)={0x84, @dev={0xac, 0x14, 0x14, 0xb}, 0x17, 0x3, 'lblc\x00', 0xd, 0x4, 0x7}, 0x2c) r5 = socket$kcm(0xa, 0x2, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) r6 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x1000000009, 0x690bb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x4, @perf_config_ext={0xef, 0x3d27}, 0x400, 0x32, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x48, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, r7) setsockopt$IP_VS_SO_SET_ADDDEST(r4, 0x0, 0x487, &(0x7f0000000000)={{0x84, @private=0xa010101, 0x4e21, 0x3, 'wrr\x00', 0x23, 0x81, 0x5}, {@dev={0xac, 0x14, 0x14, 0x3c}, 0x4e22, 0x0, 0x1cb, 0x12d61, 0x12d58}}, 0x44) sendmsg$sock(r5, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e22, 0x0, @dev}, 0x80, 0x0, 0x0, &(0x7f0000000000)=[@mark={{0x14, 0x1, 0x24, 0x3}}], 0x18}, 0x0) 180.86645ms ago: executing program 5 (id=11843): r0 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd75, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000025c0)="d8000000180081054e81f782db4cb904021d080406037c09e8fe55a10a0015400400142603600e122f00160006000400a8000600200005400700027c035c0461c1d67f6f94007134cf6efb8000a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db798262f3d40fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43370e9703920723f9a941", 0xd8}], 0x1, 0x0, 0x0, 0x4a0f0000}, 0x0) 88.932184ms ago: executing program 4 (id=11844): r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000004c0)=@newtaction={0x6c, 0x30, 0x48b, 0x0, 0x0, {}, [{0x58, 0x1, [@m_nat={0x54, 0x1, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x0, 0x0, 0x20000000}, @multicast2, @remote}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x6c}}, 0x980) r1 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r1, 0x84, 0x0, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.net/devices.allow\x00', 0x2, 0x48) write$cgroup_devices(r3, &(0x7f0000000040)=ANY=[@ANYBLOB='b *:2 m'], 0x9) setsockopt$packet_rx_ring(r2, 0x107, 0xd, &(0x7f0000000040)=@req3={0x203, 0x6, 0x5, 0x9, 0x6, 0xb, 0x1}, 0x1c) setsockopt$packet_int(r2, 0x107, 0xc, &(0x7f00000003c0), 0x4) getsockopt$inet_buf(r1, 0x0, 0x10, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000000)={0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2}, 0x38) 88.407424ms ago: executing program 5 (id=11845): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x6, 0x4, 0x8, 0x8}, 0x50) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000180)={'dummy0\x00', &(0x7f00000004c0)=@ethtool_perm_addr={0x4b, 0x1d, "337e4530f0ead9936890b807026965d85c3116934efc98000000000000"}}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1f, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x6, 0x5, &(0x7f0000000080)=@framed={{0x18, 0x2, 0x0, 0x0, 0x4d6, 0x0, 0x0, 0x0, 0x3}, [@call={0x85, 0x0, 0x0, 0x17}, @call={0x85, 0x0, 0x0, 0x11}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ffffc}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x0, 0x2107, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000300)={r1, 0x6, 0x69c, 0xb}) bpf$PROG_BIND_MAP(0xa, &(0x7f00000004c0)={r2}, 0xc) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800000, 0xfffffffffffffffb}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) r5 = open_tree(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) sendmsg$nl_generic(r5, &(0x7f0000000340)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000002c0)={&(0x7f0000000500)={0xb0, 0x27, 0x4, 0x70bd2d, 0x25dfdbff, {0x1}, [@generic="9de43fa393eb959fe1", @typed={0x90, 0x11, 0x0, 0x0, @binary="d0f08a33577ebf3238323f1d46ee939fc42897d740dcff580966f9139dfb13da7e3fe084a6fadbf9a7501941b710de9eb37f5d1bc84e0830794cab5bc2b6458178b004f0004f7ac91e78d1dabf667dffcb8430a0186d63a558e84de0015010fb651d3a40db634f23b8609a8a7b570b56ef74fb9a937cfe620d250afde5ec15b352d42c03c2c478d5f4f893bf"}]}, 0xb0}, 0x1, 0x0, 0x0, 0xc080}, 0x80) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000380)={r6}, 0x4) ptrace$getregset(0x4205, r4, 0x202, &(0x7f0000000240)={&(0x7f0000000180)=""/120, 0xffffffffffffff28}) 436.57µs ago: executing program 4 (id=11846): perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x48, 0x1, 0x0, 0x0, 0x0, 0x0, 0xc0042, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfefffffc, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x3fe, 0x3, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xa}, 0x806, 0x0, 0x0, 0x8, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$kcm(0x11, 0x3, 0x0) socket$kcm(0x10, 0x3, 0x10) socketpair$tipc(0x1e, 0x5, 0x0, 0x0) socket$kcm(0x2, 0x5, 0x84) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1a, 0x1, 0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3ffffe, 0x0, 0x41000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$kcm(0xa, 0x3, 0x3a) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)) r0 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x3, 0x8, &(0x7f0000000d80)=ANY=[@ANYBLOB="1800000000000000000000000000000018020000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000000d000000b70000000000000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000003c0)={r1, 0x0, 0xe80, 0x0, &(0x7f0000000900)="c1dfb080cd21d308098ee6888808", 0x0, 0xadf0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 0s ago: executing program 5 (id=11847): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c10, &(0x7f0000000400), 0x1, 0x23f, &(0x7f0000000540)="$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") setuid(0xee01) fchdir(0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001140)={0x18, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="180200000e00000000000000fdffffff95000000007600b02c801a35a552aae7"], &(0x7f0000000000)='GPL\x00', 0x8, 0x99, &(0x7f00000000c0)=""/153}, 0x94) r0 = socket$inet(0x2, 0x2, 0x10101004) setsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) writev(r1, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r1, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f93132", 0x39}], 0x1) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, 0x0, 0x57) setsockopt$inet_mreqsrc(r0, 0x0, 0x24, 0x0, 0x0) unshare(0x60400) r2 = socket$kcm(0xa, 0x2, 0x3a) sendmsg$kcm(r2, &(0x7f0000000440)={&(0x7f0000000800)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000000c00)=[{&(0x7f0000000780)="80005b020eaa4da2", 0xfdef}], 0x1, 0x0, 0x0, 0x900}, 0x0) recvmsg(r2, &(0x7f0000000040)={0x0, 0xe0, 0x0}, 0x0) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='smaps\x00') prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x1018658, &(0x7f00000012c0)={[{@resgid}, {@noblock_validity}, {@nombcache}, {@max_batch_time={'max_batch_time', 0x3d, 0x8c9}}, {@nodiscard}, {@debug}, {@noauto_da_alloc}], [{@fowner_gt}, {@pcr={'pcr', 0x3d, 0x3a}}]}, 0x6, 0x620, &(0x7f0000000b00)="$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") lseek(r3, 0x289e0cb5, 0x0) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r4, 0x84, 0x9, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e23, @empty}}, 0x0, 0x2002, 0x40000002, 0x4, 0xa17433da3c5d6980, 0x2, 0x81}, 0x9c) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1/file3\x00', 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_COMPLETION_RING(r5, 0x11b, 0x6, 0x0, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f0000001980)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000580)={'batadv_slave_0\x00'}) kernel console output (not intermixed with test programs): deactivated: batadv_slave_0 [ 763.646955][ T5358] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 763.652501][ T5365] ieee802154 phy0 wpan0: encryption failed: -22 [ 763.667174][ T5365] netlink: 28 bytes leftover after parsing attributes in process `syz.7.11060'. [ 763.676344][ T5365] netlink: 28 bytes leftover after parsing attributes in process `syz.7.11060'. [ 763.684379][ T5358] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 763.760553][ T5370] netlink: 16 bytes leftover after parsing attributes in process `syz.0.11062'. [ 764.154648][ T5392] xt_CONNSECMARK: invalid mode: 0 [ 764.185945][ T5397] usb usb7: usbfs: process 5397 (syz.5.11071) did not claim interface 0 before use [ 764.206017][ T5397] vhci_hcd vhci_hcd.3: default hub control req: a100 v0000 i0000 l0 [ 764.519227][ T5420] syzkaller0: entered promiscuous mode [ 764.524872][ T5420] syzkaller0: entered allmulticast mode [ 764.657155][ T1395] netdevsim netdevsim9 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 764.718366][ T29] audit: type=1326 audit(4137606476.651:11472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.5.11085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe42055aeb9 code=0x7ffc0000 [ 764.742139][ T29] audit: type=1326 audit(4137606476.651:11473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5437 comm="syz.5.11085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe42055aeb9 code=0x7ffc0000 [ 764.758592][ T5426] ip6_vti0 speed is unknown, defaulting to 1000 [ 764.829888][ T1395] netdevsim netdevsim9 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 764.892745][ T5426] chnl_net:caif_netlink_parms(): no params data found [ 764.905502][ T1395] netdevsim netdevsim9 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 764.929633][ T5445] netlink: 4 bytes leftover after parsing attributes in process `syz.7.11087'. [ 764.963646][ T1395] netdevsim netdevsim9 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 764.996173][ T5457] x_tables: duplicate underflow at hook 3 [ 765.009220][ T5457] can0: slcan on ttyS3. [ 765.017107][ T5426] bridge0: port 1(bridge_slave_0) entered blocking state [ 765.024349][ T5426] bridge0: port 1(bridge_slave_0) entered disabled state [ 765.033697][ T5426] bridge_slave_0: entered allmulticast mode [ 765.040956][ T5426] bridge_slave_0: entered promiscuous mode [ 765.047788][ T5459] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11091'. [ 765.056871][ T5459] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 765.068841][ T5426] bridge0: port 2(bridge_slave_1) entered blocking state [ 765.076075][ T5426] bridge0: port 2(bridge_slave_1) entered disabled state [ 765.083941][ T5426] bridge_slave_1: entered allmulticast mode [ 765.093522][ T5426] bridge_slave_1: entered promiscuous mode [ 765.153232][ T5426] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 765.164404][ T5426] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 765.188151][ T5426] team0: Port device team_slave_0 added [ 765.195760][ T5426] team0: Port device team_slave_1 added [ 765.218958][ T5426] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 765.226064][ T5426] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 765.252209][ T5426] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 765.309072][ T5426] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 765.316248][ T5426] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 765.342289][ T5426] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 765.371569][ T5426] hsr_slave_0: entered promiscuous mode [ 765.377823][ T5426] hsr_slave_1: entered promiscuous mode [ 765.403629][ T5474] xt_CONNSECMARK: invalid mode: 0 [ 765.424280][ T5456] can0 (unregistered): slcan off ttyS3. [ 765.708688][ T5487] SELinux: failed to load policy [ 765.744179][ T5487] netlink: 36 bytes leftover after parsing attributes in process `syz.0.11098'. [ 765.753298][ T5487] netlink: 36 bytes leftover after parsing attributes in process `syz.0.11098'. [ 765.787685][ T5487] netlink: 36 bytes leftover after parsing attributes in process `syz.0.11098'. [ 765.796895][ T5487] netlink: 36 bytes leftover after parsing attributes in process `syz.0.11098'. [ 765.866231][ T1395] bond0 (unregistering): left promiscuous mode [ 765.872494][ T1395] bond_slave_0: left promiscuous mode [ 765.878162][ T1395] bond_slave_1: left promiscuous mode [ 765.884963][ T1395] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 765.896277][ T1395] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 765.907388][ T1395] bond0 (unregistering): Released all slaves [ 766.013746][ T1395] team0: left promiscuous mode [ 766.018639][ T1395] team_slave_0: left promiscuous mode [ 766.024171][ T1395] team_slave_1: left promiscuous mode [ 766.046829][ T1395] hsr_slave_0: left promiscuous mode [ 766.057951][ T1395] hsr_slave_1: left promiscuous mode [ 766.063882][ T1395] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 766.071407][ T1395] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 766.095692][ T1395] veth1_macvtap: left promiscuous mode [ 766.101931][ T1395] veth0_macvtap: left promiscuous mode [ 766.108148][ T1395] veth1_vlan: left promiscuous mode [ 766.113423][ T1395] veth0_vlan: left promiscuous mode [ 766.183569][ T5533] xt_hashlimit: max too large, truncated to 1048576 [ 766.192527][ T5533] xt_CT: You must specify a L4 protocol and not use inversions on it [ 766.306715][ T1395] team0 (unregistering): Port device team_slave_1 removed [ 766.332086][ T1395] team0 (unregistering): Port device team_slave_0 removed [ 766.346004][ T5545] program syz.4.11106 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 766.953115][ T5575] loop7: detected capacity change from 0 to 512 [ 766.964515][ T5575] msdos: Unknown parameter './file0' [ 767.127365][ T5426] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 767.188662][ T5593] xt_CONNSECMARK: invalid mode: 0 [ 767.198144][ T5426] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 767.207789][ T5426] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 767.231420][ T5426] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 767.278492][ T5599] ip6t_srh: unknown srh match flags 4000 [ 767.389939][ T5426] 8021q: adding VLAN 0 to HW filter on device bond0 [ 767.405588][ T5426] 8021q: adding VLAN 0 to HW filter on device team0 [ 767.416283][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 767.423429][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 767.436732][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 767.443864][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 767.463013][ T5426] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 767.473571][ T5426] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 767.558313][ T5426] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 767.612413][ T5617] tun8: tun_chr_ioctl cmd 1074025675 [ 767.617866][ T5617] tun8: persist enabled [ 767.622942][ T5617] tun8: tun_chr_ioctl cmd 1074025675 [ 767.628366][ T5617] tun8: persist enabled [ 767.698283][ T5426] veth0_vlan: entered promiscuous mode [ 767.706573][ T5426] veth1_vlan: entered promiscuous mode [ 767.725140][ T5426] veth0_macvtap: entered promiscuous mode [ 767.732851][ T5426] veth1_macvtap: entered promiscuous mode [ 767.746319][ T5426] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 767.760655][ T5426] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 767.773484][ T52] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 767.864649][ T52] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 767.877209][ T5638] SELinux: failed to load policy [ 767.897791][ T52] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 767.918154][ T52] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 767.942481][ T5638] __nla_validate_parse: 3 callbacks suppressed [ 767.942500][ T5638] netlink: 36 bytes leftover after parsing attributes in process `syz.4.11123'. [ 767.958217][ T5638] netlink: 36 bytes leftover after parsing attributes in process `syz.4.11123'. [ 767.974328][T27119] IPVS: starting estimator thread 0... [ 767.984567][ T5638] netlink: 36 bytes leftover after parsing attributes in process `syz.4.11123'. [ 767.989026][ T5650] tun9: tun_chr_ioctl cmd 1074025675 [ 767.993842][ T5638] netlink: 36 bytes leftover after parsing attributes in process `syz.4.11123'. [ 767.999084][ T5650] tun9: persist enabled [ 768.028386][ T5650] tun9: tun_chr_ioctl cmd 1074025675 [ 768.033789][ T5650] tun9: persist enabled [ 768.075074][ T5652] IPVS: using max 2160 ests per chain, 108000 per kthread [ 768.113739][ T5638] netlink: 36 bytes leftover after parsing attributes in process `syz.4.11123'. [ 768.122977][ T5638] netlink: 36 bytes leftover after parsing attributes in process `syz.4.11123'. [ 768.152212][ T5658] netlink: 4 bytes leftover after parsing attributes in process `syz.9.11128'. [ 768.181423][ T5658] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 768.247917][ T5658] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 768.322557][ T2343] syz-executor invoked oom-killer: gfp_mask=0x100cca(GFP_HIGHUSER_MOVABLE), order=0, oom_score_adj=0 [ 768.333700][ T2343] CPU: 0 UID: 0 PID: 2343 Comm: syz-executor Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 768.333745][ T2343] Tainted: [W]=WARN [ 768.333755][ T2343] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 768.333818][ T2343] Call Trace: [ 768.333828][ T2343] [ 768.333839][ T2343] __dump_stack+0x1d/0x30 [ 768.333871][ T2343] dump_stack_lvl+0x95/0xd0 [ 768.333901][ T2343] dump_stack+0x15/0x1b [ 768.334039][ T2343] dump_header+0x80/0x240 [ 768.334068][ T2343] oom_kill_process+0x295/0x350 [ 768.334103][ T2343] out_of_memory+0x97d/0xb80 [ 768.334186][ T2343] try_charge_memcg+0x62e/0xa10 [ 768.334224][ T2343] mem_cgroup_swapin_charge_folio+0x103/0x1f0 [ 768.334274][ T2343] __read_swap_cache_async+0x17b/0x2d0 [ 768.334392][ T2343] swap_cluster_readahead+0x262/0x3c0 [ 768.334471][ T2343] swapin_readahead+0xde/0x840 [ 768.334583][ T2343] ? __perf_event_task_sched_in+0xa65/0xad0 [ 768.334620][ T2343] ? __rcu_read_unlock+0x4e/0x70 [ 768.334669][ T2343] ? swap_cache_get_folio+0x26f/0x280 [ 768.334718][ T2343] do_swap_page+0x59b/0x2a50 [ 768.334822][ T2343] ? finish_task_switch+0x79/0x280 [ 768.334861][ T2343] ? __schedule+0x82d/0xc90 [ 768.334886][ T2343] ? __rcu_read_lock+0x36/0x50 [ 768.334924][ T2343] ? __pfx_default_wake_function+0x10/0x10 [ 768.335035][ T2343] handle_mm_fault+0xb40/0x3030 [ 768.335090][ T2343] ? vma_start_read+0x1c7/0x2c0 [ 768.335164][ T2343] do_user_addr_fault+0x62f/0x1050 [ 768.335205][ T2343] exc_page_fault+0x62/0xa0 [ 768.335238][ T2343] asm_exc_page_fault+0x26/0x30 [ 768.335271][ T2343] RIP: 0033:0x7fb2b72d60d7 [ 768.335289][ T2343] Code: 48 89 fa 4c 89 df e8 a8 56 00 00 8b 93 08 03 00 00 59 5e 48 83 f8 fc 74 1a 5b c3 0f 1f 84 00 00 00 00 00 48 8b 44 24 10 0f 05 <5b> c3 0f 1f 80 00 00 00 00 83 e2 39 83 fa 08 75 de e8 23 ff ff ff [ 768.335315][ T2343] RSP: 002b:00007ffcaf06ecc0 EFLAGS: 00010202 [ 768.335382][ T2343] RAX: 0000000000000000 RBX: 000055557c210500 RCX: 00007fb2b72d60d7 [ 768.335467][ T2343] RDX: 00007ffcaf06ed00 RSI: 0000000000000000 RDI: 0000000000000000 [ 768.335485][ T2343] RBP: 00007ffcaf06ed6c R08: 0000000000000000 R09: 0000000000000000 [ 768.335572][ T2343] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000001388 [ 768.335590][ T2343] R13: 00000000000927c0 R14: 00000000000bb8f3 R15: 00007ffcaf06edc0 [ 768.335617][ T2343] [ 768.559428][ T2343] memory: usage 225576kB, limit 307200kB, failcnt 229 [ 768.566311][ T2343] memory+swap: usage 225660kB, limit 9007199254740988kB, failcnt 0 [ 768.574281][ T2343] kmem: usage 225420kB, limit 9007199254740988kB, failcnt 0 [ 768.581608][ T2343] Memory cgroup stats for /syz7: [ 768.583351][ T2343] cache 0 [ 768.591313][ T2343] rss 102400 [ 768.594597][ T2343] shmem 0 [ 768.597620][ T2343] mapped_file 0 [ 768.601143][ T2343] dirty 0 [ 768.604123][ T2343] writeback 0 [ 768.607441][ T2343] workingset_refault_anon 79 [ 768.612100][ T2343] workingset_refault_file 0 [ 768.616700][ T2343] swap 86016 [ 768.619914][ T2343] swapcached 122880 [ 768.623816][ T2343] pgpgin 109059 [ 768.627385][ T2343] pgpgout 109027 [ 768.630950][ T2343] pgfault 83787 [ 768.634460][ T2343] pgmajfault 44 [ 768.637999][ T2343] inactive_anon 0 [ 768.641706][ T2343] active_anon 126976 [ 768.645742][ T2343] inactive_file 0 [ 768.649468][ T2343] active_file 4096 [ 768.653279][ T2343] unevictable 0 [ 768.656870][ T2343] hierarchical_memory_limit 314572800 [ 768.662266][ T2343] hierarchical_memsw_limit 9223372036854771712 [ 768.668647][ T2343] total_cache 0 [ 768.672131][ T2343] total_rss 102400 [ 768.675922][ T2343] total_shmem 0 [ 768.679407][ T2343] total_mapped_file 0 [ 768.683427][ T2343] total_dirty 0 [ 768.686985][ T2343] total_writeback 0 [ 768.690845][ T2343] total_workingset_refault_anon 79 [ 768.696007][ T2343] total_workingset_refault_file 0 [ 768.701047][ T2343] total_swap 86016 [ 768.704831][ T2343] total_swapcached 122880 [ 768.709183][ T2343] total_pgpgin 109059 [ 768.713220][ T2343] total_pgpgout 109027 [ 768.717348][ T2343] total_pgfault 83787 [ 768.721403][ T2343] total_pgmajfault 44 [ 768.725422][ T2343] total_inactive_anon 0 [ 768.729592][ T2343] total_active_anon 126976 [ 768.734054][ T2343] total_inactive_file 0 [ 768.738251][ T2343] total_active_file 4096 [ 768.742512][ T2343] total_unevictable 0 [ 768.746608][ T2343] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz7,task_memcg=/syz7,task=syz.7.11125,pid=5641,uid=0 [ 768.761378][ T2343] Memory cgroup out of memory: Killed process 5641 (syz.7.11125) total-vm:100548kB, anon-rss:1332kB, file-rss:26516kB, shmem-rss:0kB, UID:0 pgtables:132kB oom_score_adj:1000 [ 769.018424][ T5682] xt_CONNSECMARK: invalid mode: 0 [ 769.136146][ T29] kauditd_printk_skb: 17 callbacks suppressed [ 769.136165][ T29] audit: type=1326 audit(4137606481.071:11491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5688 comm="syz.4.11139" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feafd92aeb9 code=0x7ffc0000 [ 769.167155][ T29] audit: type=1326 audit(4137606481.071:11492): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5688 comm="syz.4.11139" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7feafd92aeb9 code=0x7ffc0000 [ 769.190975][ T29] audit: type=1326 audit(4137606481.071:11493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5688 comm="syz.4.11139" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feafd92aeb9 code=0x7ffc0000 [ 769.214818][ T29] audit: type=1326 audit(4137606481.071:11494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5688 comm="syz.4.11139" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7feafd92aeb9 code=0x7ffc0000 [ 769.239324][ T29] audit: type=1326 audit(4137606481.121:11495): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5688 comm="syz.4.11139" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feafd92aeb9 code=0x7ffc0000 [ 769.263057][ T29] audit: type=1326 audit(4137606481.121:11496): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5688 comm="syz.4.11139" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feafd92aeb9 code=0x7ffc0000 [ 769.714657][ T5692] tun5: tun_chr_ioctl cmd 1074025675 [ 769.720325][ T5692] tun5: persist enabled [ 769.725119][ T5692] tun5: tun_chr_ioctl cmd 1074025675 [ 769.730466][ T5692] tun5: persist enabled [ 770.168350][ T5716] loop7: detected capacity change from 0 to 512 [ 770.184739][ T5716] msdos: Unknown parameter './file0' [ 770.287665][ T5723] FAULT_INJECTION: forcing a failure. [ 770.287665][ T5723] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 770.300836][ T5723] CPU: 0 UID: 0 PID: 5723 Comm: syz.4.11154 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 770.300926][ T5723] Tainted: [W]=WARN [ 770.300935][ T5723] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 770.300951][ T5723] Call Trace: [ 770.301019][ T5723] [ 770.301027][ T5723] __dump_stack+0x1d/0x30 [ 770.301073][ T5723] dump_stack_lvl+0x95/0xd0 [ 770.301153][ T5723] dump_stack+0x15/0x1b [ 770.301225][ T5723] should_fail_ex+0x263/0x280 [ 770.301314][ T5723] should_fail+0xb/0x20 [ 770.301346][ T5723] should_fail_usercopy+0x1a/0x20 [ 770.301487][ T5723] _copy_to_user+0x20/0xa0 [ 770.301522][ T5723] simple_read_from_buffer+0xb5/0x130 [ 770.301630][ T5723] proc_fail_nth_read+0x10e/0x150 [ 770.301660][ T5723] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 770.301696][ T5723] vfs_read+0x1ab/0x7f0 [ 770.301723][ T5723] ? __rcu_read_unlock+0x4e/0x70 [ 770.301773][ T5723] ? __fget_files+0x184/0x1c0 [ 770.301872][ T5723] ? mutex_lock+0x57/0x90 [ 770.301978][ T5723] ksys_read+0xdc/0x1a0 [ 770.302000][ T5723] __x64_sys_read+0x40/0x50 [ 770.302026][ T5723] x64_sys_call+0x2889/0x3000 [ 770.302060][ T5723] do_syscall_64+0xc0/0x2a0 [ 770.302153][ T5723] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 770.302183][ T5723] RIP: 0033:0x7feafd8eb78e [ 770.302205][ T5723] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 770.302231][ T5723] RSP: 002b:00007feafc365fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 770.302297][ T5723] RAX: ffffffffffffffda RBX: 00007feafc3666c0 RCX: 00007feafd8eb78e [ 770.302312][ T5723] RDX: 000000000000000f RSI: 00007feafc3660a0 RDI: 0000000000000006 [ 770.302326][ T5723] RBP: 00007feafc366090 R08: 0000000000000000 R09: 0000000000000000 [ 770.302345][ T5723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 770.302363][ T5723] R13: 00007feafdba6128 R14: 00007feafdba6090 R15: 00007fffacbf3388 [ 770.302391][ T5723] [ 770.600730][ T5724] xt_CONNSECMARK: invalid mode: 0 [ 770.610202][ T29] audit: type=1326 audit(4137606482.541:11497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5730 comm="syz.4.11157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feafd92aeb9 code=0x7ffc0000 [ 770.646935][ T29] audit: type=1326 audit(4137606482.541:11498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5730 comm="syz.4.11157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feafd92aeb9 code=0x7ffc0000 [ 770.670785][ T29] audit: type=1326 audit(4137606482.571:11499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5730 comm="syz.4.11157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7feafd92aeb9 code=0x7ffc0000 [ 770.694897][ T29] audit: type=1326 audit(4137606482.571:11500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5730 comm="syz.4.11157" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feafd92aeb9 code=0x7ffc0000 [ 770.823488][ T5745] netlink: 4 bytes leftover after parsing attributes in process `syz.5.11163'. [ 770.843465][ T5752] netlink: 12 bytes leftover after parsing attributes in process `syz.9.11165'. [ 770.910466][ T5756] netlink: 60 bytes leftover after parsing attributes in process `syz.5.11166'. [ 770.919717][ T5754] hub 8-0:1.0: USB hub found [ 770.924572][ T5754] hub 8-0:1.0: 8 ports detected [ 771.203395][ T5764] tun0: tun_chr_ioctl cmd 1074025675 [ 771.208797][ T5764] tun0: persist enabled [ 771.228474][ T5764] tun0: tun_chr_ioctl cmd 1074025675 [ 771.233865][ T5764] tun0: persist enabled [ 771.269876][ T5770] loop7: detected capacity change from 0 to 512 [ 771.281731][ T5770] EXT4-fs: Ignoring removed nobh option [ 771.314855][ T5770] EXT4-fs error (device loop7): ext4_do_update_inode:5617: inode #16: comm syz.7.11172: corrupted inode contents [ 771.327234][ T5770] EXT4-fs (loop7): Remounting filesystem read-only [ 771.334149][ T5770] EXT4-fs (loop7): 1 truncate cleaned up [ 771.341116][ T5770] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 771.354309][ T5770] ext4 filesystem being mounted at /213/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 771.364967][ T1395] EXT4-fs (loop7): Quota write (off=5120, len=1024) cancelled because transaction is not started [ 771.375554][ T1395] EXT4-fs (loop7): Quota write (off=5120, len=1024) cancelled because transaction is not started [ 771.387516][ T5770] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 771.397486][ T1395] EXT4-fs (loop7): Quota write (off=8, len=24) cancelled because transaction is not started [ 771.545881][ T5797] FAULT_INJECTION: forcing a failure. [ 771.545881][ T5797] name failslab, interval 1, probability 0, space 0, times 0 [ 771.558625][ T5797] CPU: 1 UID: 0 PID: 5797 Comm: syz.9.11182 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 771.558655][ T5797] Tainted: [W]=WARN [ 771.558705][ T5797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 771.558723][ T5797] Call Trace: [ 771.558729][ T5797] [ 771.558778][ T5797] __dump_stack+0x1d/0x30 [ 771.558801][ T5797] dump_stack_lvl+0x95/0xd0 [ 771.558821][ T5797] dump_stack+0x15/0x1b [ 771.558840][ T5797] should_fail_ex+0x263/0x280 [ 771.558909][ T5797] should_failslab+0x8c/0xb0 [ 771.558930][ T5797] __kmalloc_noprof+0xb8/0x580 [ 771.559006][ T5797] ? iovec_from_user+0x84/0x200 [ 771.559028][ T5797] iovec_from_user+0x84/0x200 [ 771.559068][ T5797] __import_iovec+0xf3/0x530 [ 771.559087][ T5797] ? terminate_walk+0x1e6/0x210 [ 771.559143][ T5797] ? path_openat+0x1d94/0x23c0 [ 771.559173][ T5797] import_iovec+0x60/0x80 [ 771.559193][ T5797] ___sys_recvmsg+0x394/0x3b0 [ 771.559254][ T5797] do_recvmmsg+0x1ef/0x560 [ 771.559277][ T5797] ? get_timespec64+0xd2/0x100 [ 771.559305][ T5797] __x64_sys_recvmmsg+0xfb/0x170 [ 771.559423][ T5797] x64_sys_call+0x2b75/0x3000 [ 771.559537][ T5797] do_syscall_64+0xc0/0x2a0 [ 771.559596][ T5797] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 771.559659][ T5797] RIP: 0033:0x7ffaa144aeb9 [ 771.559675][ T5797] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 771.559696][ T5797] RSP: 002b:00007ffa9fea7028 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 771.559729][ T5797] RAX: ffffffffffffffda RBX: 00007ffaa16c5fa0 RCX: 00007ffaa144aeb9 [ 771.559780][ T5797] RDX: 04000000000003b4 RSI: 00002000000037c0 RDI: 0000000000000003 [ 771.559828][ T5797] RBP: 00007ffa9fea7090 R08: 0000200000003700 R09: 0000000000000000 [ 771.559842][ T5797] R10: 0000000002040000 R11: 0000000000000246 R12: 0000000000000001 [ 771.559855][ T5797] R13: 00007ffaa16c6038 R14: 00007ffaa16c5fa0 R15: 00007fff77b3fc28 [ 771.559875][ T5797] [ 771.788981][ T5800] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 771.801612][ T5800] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 771.858800][ T5810] FAULT_INJECTION: forcing a failure. [ 771.858800][ T5810] name failslab, interval 1, probability 0, space 0, times 0 [ 771.871732][ T5810] CPU: 1 UID: 0 PID: 5810 Comm: syz.4.11186 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 771.871766][ T5810] Tainted: [W]=WARN [ 771.871774][ T5810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 771.871787][ T5810] Call Trace: [ 771.871826][ T5810] [ 771.871837][ T5810] __dump_stack+0x1d/0x30 [ 771.871869][ T5810] dump_stack_lvl+0x95/0xd0 [ 771.871896][ T5810] dump_stack+0x15/0x1b [ 771.871921][ T5810] should_fail_ex+0x263/0x280 [ 771.871981][ T5810] should_failslab+0x8c/0xb0 [ 771.872053][ T5810] __kmalloc_cache_noprof+0x64/0x4a0 [ 771.872089][ T5810] ? rtnl_newlink+0x5c/0x1370 [ 771.872121][ T5810] ? __pfx_rtnl_newlink+0x10/0x10 [ 771.872151][ T5810] rtnl_newlink+0x5c/0x1370 [ 771.872265][ T5810] ? tracing_gen_ctx_irq_test+0xe4/0x120 [ 771.872292][ T5810] ? __memcg_slab_free_hook+0x135/0x230 [ 771.872335][ T5810] ? __rcu_read_unlock+0x4e/0x70 [ 771.872440][ T5810] ? avc_has_perm_noaudit+0xab/0x130 [ 771.872484][ T5810] ? cred_has_capability+0x224/0x290 [ 771.872676][ T5810] ? selinux_capable+0x31/0x40 [ 771.872712][ T5810] ? security_capable+0x7b/0x90 [ 771.872895][ T5810] ? ns_capable+0x7c/0xb0 [ 771.872928][ T5810] ? __pfx_rtnl_newlink+0x10/0x10 [ 771.872983][ T5810] rtnetlink_rcv_msg+0x64b/0x720 [ 771.873098][ T5810] netlink_rcv_skb+0x123/0x220 [ 771.873168][ T5810] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 771.873245][ T5810] rtnetlink_rcv+0x1c/0x30 [ 771.873266][ T5810] netlink_unicast+0x5c0/0x690 [ 771.873303][ T5810] netlink_sendmsg+0x5c8/0x6f0 [ 771.873361][ T5810] ? __pfx_netlink_sendmsg+0x10/0x10 [ 771.873381][ T5810] ____sys_sendmsg+0x5af/0x600 [ 771.873432][ T5810] ___sys_sendmsg+0x195/0x1e0 [ 771.873470][ T5810] __x64_sys_sendmsg+0xd4/0x160 [ 771.873494][ T5810] x64_sys_call+0x17ba/0x3000 [ 771.873524][ T5810] do_syscall_64+0xc0/0x2a0 [ 771.873644][ T5810] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 771.873680][ T9] kernel write not supported for file bpf-prog (pid: 9 comm: kworker/0:0) [ 771.873737][ T5810] RIP: 0033:0x7feafd92aeb9 [ 771.873819][ T5810] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 771.873897][ T5810] RSP: 002b:00007feafc387028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 771.873974][ T5810] RAX: ffffffffffffffda RBX: 00007feafdba5fa0 RCX: 00007feafd92aeb9 [ 771.873989][ T5810] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000003 [ 771.874036][ T5810] RBP: 00007feafc387090 R08: 0000000000000000 R09: 0000000000000000 [ 771.874096][ T5810] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 771.874138][ T5810] R13: 00007feafdba6038 R14: 00007feafdba5fa0 R15: 00007fffacbf3388 [ 771.874209][ T5810] [ 772.384280][ T5828] FAULT_INJECTION: forcing a failure. [ 772.384280][ T5828] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 772.397528][ T5828] CPU: 1 UID: 0 PID: 5828 Comm: syz.5.11191 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 772.397606][ T5828] Tainted: [W]=WARN [ 772.397613][ T5828] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 772.397626][ T5828] Call Trace: [ 772.397632][ T5828] [ 772.397638][ T5828] __dump_stack+0x1d/0x30 [ 772.397667][ T5828] dump_stack_lvl+0x95/0xd0 [ 772.397820][ T5828] dump_stack+0x15/0x1b [ 772.397838][ T5828] should_fail_ex+0x263/0x280 [ 772.397868][ T5828] should_fail+0xb/0x20 [ 772.397952][ T5828] should_fail_usercopy+0x1a/0x20 [ 772.398047][ T5828] _copy_from_user+0x1c/0xb0 [ 772.398067][ T5828] br_ioctl_stub+0x1fa/0x8f0 [ 772.398163][ T5828] ? selinux_file_ioctl+0x5f7/0xcb0 [ 772.398188][ T5828] ? __pfx_br_ioctl_stub+0x10/0x10 [ 772.398209][ T5828] sock_ioctl+0x39c/0x610 [ 772.398229][ T5828] ? mutex_lock+0x57/0x90 [ 772.398301][ T5828] ? __pfx_sock_ioctl+0x10/0x10 [ 772.398343][ T5828] __se_sys_ioctl+0xce/0x140 [ 772.398387][ T5828] __x64_sys_ioctl+0x43/0x50 [ 772.398506][ T5828] x64_sys_call+0x14b0/0x3000 [ 772.398559][ T5828] do_syscall_64+0xc0/0x2a0 [ 772.398606][ T5828] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 772.398703][ T5828] RIP: 0033:0x7fe42055aeb9 [ 772.398718][ T5828] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 772.398735][ T5828] RSP: 002b:00007fe41ef96028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 772.398753][ T5828] RAX: ffffffffffffffda RBX: 00007fe4207d6090 RCX: 00007fe42055aeb9 [ 772.398766][ T5828] RDX: 0000200000002b00 RSI: 00000000000089a0 RDI: 0000000000000006 [ 772.398779][ T5828] RBP: 00007fe41ef96090 R08: 0000000000000000 R09: 0000000000000000 [ 772.398824][ T5828] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 772.398836][ T5828] R13: 00007fe4207d6128 R14: 00007fe4207d6090 R15: 00007ffee63e2188 [ 772.398854][ T5828] [ 773.102748][ T5833] __nla_validate_parse: 2 callbacks suppressed [ 773.102764][ T5833] netlink: 4 bytes leftover after parsing attributes in process `syz.7.11192'. [ 774.795219][ T5803] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 774.929172][ T5843] syzkaller0: entered promiscuous mode [ 774.934845][ T5843] syzkaller0: entered allmulticast mode [ 774.982267][ T5862] netlink: 12 bytes leftover after parsing attributes in process `syz.9.11203'. [ 775.013119][ T5859] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=5859 comm=syz.4.11202 [ 775.046615][ T5867] option changes via remount are deprecated (pid=5865 comm=syz.4.11205) [ 775.053158][ T5868] netlink: 60 bytes leftover after parsing attributes in process `syz.9.11203'. [ 775.064273][ T5868] netlink: 16 bytes leftover after parsing attributes in process `syz.9.11203'. [ 775.073397][ T5868] netlink: 60 bytes leftover after parsing attributes in process `syz.9.11203'. [ 775.090789][ T29] kauditd_printk_skb: 21 callbacks suppressed [ 775.090808][ T29] audit: type=1326 audit(4137606487.021:11516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5863 comm="syz.7.11204" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fb2b731aeb9 code=0x0 [ 775.136799][ T5873] netlink: 4 bytes leftover after parsing attributes in process `syz.4.11205'. [ 775.161290][ T29] audit: type=1326 audit(4137606487.091:11517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5875 comm="syz.5.11206" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe42055aeb9 code=0x0 [ 775.283020][ T5887] netlink: 4 bytes leftover after parsing attributes in process `syz.4.11210'. [ 775.534010][ T5901] option changes via remount are deprecated (pid=5900 comm=syz.4.11217) [ 775.545836][ T5899] syzkaller0: entered promiscuous mode [ 775.551490][ T5899] syzkaller0: entered allmulticast mode [ 775.577440][ T5901] netlink: 4 bytes leftover after parsing attributes in process `syz.4.11217'. [ 775.958588][ T5923] tun10: tun_chr_ioctl cmd 1074025675 [ 775.964193][ T5923] tun10: persist enabled [ 775.968948][ T5923] tun10: tun_chr_ioctl cmd 1074025675 [ 775.974473][ T5923] tun10: persist enabled [ 776.047725][ T5933] FAULT_INJECTION: forcing a failure. [ 776.047725][ T5933] name failslab, interval 1, probability 0, space 0, times 0 [ 776.060568][ T5933] CPU: 0 UID: 0 PID: 5933 Comm: syz.0.11231 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 776.060652][ T5933] Tainted: [W]=WARN [ 776.060662][ T5933] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 776.060679][ T5933] Call Trace: [ 776.060686][ T5933] [ 776.060696][ T5933] __dump_stack+0x1d/0x30 [ 776.060729][ T5933] dump_stack_lvl+0x95/0xd0 [ 776.060825][ T5933] dump_stack+0x15/0x1b [ 776.060851][ T5933] should_fail_ex+0x263/0x280 [ 776.060915][ T5933] should_failslab+0x8c/0xb0 [ 776.060947][ T5933] __kmalloc_noprof+0xb8/0x580 [ 776.060980][ T5933] ? security_sk_alloc+0x52/0x120 [ 776.061005][ T5933] ? should_failslab+0x8c/0xb0 [ 776.061115][ T5933] security_sk_alloc+0x52/0x120 [ 776.061142][ T5933] sk_prot_alloc+0xc2/0x180 [ 776.061186][ T5933] sk_alloc+0x34/0x3d0 [ 776.061229][ T5933] bpf_prog_test_run_skb+0x31b/0xf50 [ 776.061349][ T5933] ? __rcu_read_unlock+0x4e/0x70 [ 776.061386][ T5933] ? __fget_files+0x184/0x1c0 [ 776.061417][ T5933] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 776.061485][ T5933] bpf_prog_test_run+0x204/0x340 [ 776.061527][ T5933] __sys_bpf+0x4c0/0x7b0 [ 776.061573][ T5933] __x64_sys_bpf+0x41/0x50 [ 776.061636][ T5933] x64_sys_call+0x28e1/0x3000 [ 776.061724][ T5933] do_syscall_64+0xc0/0x2a0 [ 776.061765][ T5933] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 776.061791][ T5933] RIP: 0033:0x7ffa4c14aeb9 [ 776.061812][ T5933] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 776.061848][ T5933] RSP: 002b:00007ffa4aba7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 776.061873][ T5933] RAX: ffffffffffffffda RBX: 00007ffa4c3c5fa0 RCX: 00007ffa4c14aeb9 [ 776.061888][ T5933] RDX: 0000000000000050 RSI: 00002000000002c0 RDI: 000000000000000a [ 776.061901][ T5933] RBP: 00007ffa4aba7090 R08: 0000000000000000 R09: 0000000000000000 [ 776.061982][ T5933] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 776.062055][ T5933] R13: 00007ffa4c3c6038 R14: 00007ffa4c3c5fa0 R15: 00007ffef58739d8 [ 776.062139][ T5933] [ 776.062978][ T5932] option changes via remount are deprecated (pid=5930 comm=syz.7.11229) [ 776.170445][ T5936] hub 8-0:1.0: USB hub found [ 776.284166][ T5936] hub 8-0:1.0: 8 ports detected [ 776.293108][ T5932] netlink: 4 bytes leftover after parsing attributes in process `syz.7.11229'. [ 776.491431][ T5954] loop7: detected capacity change from 0 to 2048 [ 776.503964][ T5956] netlink: 28 bytes leftover after parsing attributes in process `syz.9.11237'. [ 776.524998][ T5954] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 776.597555][ T29] audit: type=1326 audit(4137606488.531:11518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5962 comm="syz.4.11239" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7feafd92aeb9 code=0x0 [ 776.683458][ T5975] option changes via remount are deprecated (pid=5974 comm=syz.9.11244) [ 777.284747][ T2343] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 777.432795][ T6005] FAULT_INJECTION: forcing a failure. [ 777.432795][ T6005] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 777.445951][ T6005] CPU: 0 UID: 0 PID: 6005 Comm: syz.4.11255 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 777.446050][ T6005] Tainted: [W]=WARN [ 777.446061][ T6005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 777.446079][ T6005] Call Trace: [ 777.446089][ T6005] [ 777.446101][ T6005] __dump_stack+0x1d/0x30 [ 777.446132][ T6005] dump_stack_lvl+0x95/0xd0 [ 777.446155][ T6005] dump_stack+0x15/0x1b [ 777.446182][ T6005] should_fail_ex+0x263/0x280 [ 777.446219][ T6005] should_fail+0xb/0x20 [ 777.446247][ T6005] should_fail_usercopy+0x1a/0x20 [ 777.446323][ T6005] _copy_from_user+0x1c/0xb0 [ 777.446352][ T6005] do_sock_getsockopt+0xf1/0x210 [ 777.446395][ T6005] __x64_sys_getsockopt+0x11d/0x1a0 [ 777.446432][ T6005] x64_sys_call+0x2dc7/0x3000 [ 777.446499][ T6005] do_syscall_64+0xc0/0x2a0 [ 777.446542][ T6005] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 777.446614][ T6005] RIP: 0033:0x7feafd92aeb9 [ 777.446634][ T6005] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 777.446658][ T6005] RSP: 002b:00007feafc387028 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 777.446790][ T6005] RAX: ffffffffffffffda RBX: 00007feafdba5fa0 RCX: 00007feafd92aeb9 [ 777.446810][ T6005] RDX: 000000000000006f RSI: 0000000000000084 RDI: 0000000000000003 [ 777.446828][ T6005] RBP: 00007feafc387090 R08: 0000200000000180 R09: 0000000000000000 [ 777.446847][ T6005] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 777.446863][ T6005] R13: 00007feafdba6038 R14: 00007feafdba5fa0 R15: 00007fffacbf3388 [ 777.446889][ T6005] [ 777.774786][ T6016] netlink: 'syz.4.11260': attribute type 39 has an invalid length. [ 777.800358][ T6020] loop7: detected capacity change from 0 to 512 [ 777.819806][ T6020] EXT4-fs (loop7): feature flags set on rev 0 fs, running e2fsck is recommended [ 777.828970][ T6020] EXT4-fs (loop7): mounting ext2 file system using the ext4 subsystem [ 777.872710][ T6020] EXT4-fs (loop7): warning: mounting unchecked fs, running e2fsck is recommended [ 777.891913][ T6020] [EXT4 FS bs=2048, gc=1, bpg=16384, ipg=32, mo=a002e01c, mo2=0006] [ 777.910416][ T6020] System zones: 0-2, 18-18, 34-35 [ 777.921082][ T6020] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 777.966909][ T2343] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 778.143036][ T6041] bridge0: port 2(bridge_slave_1) entered disabled state [ 778.150370][ T6041] bridge0: port 1(bridge_slave_0) entered disabled state [ 778.174211][ T6041] bridge0: entered allmulticast mode [ 778.191287][ T6041] bridge_slave_1: left allmulticast mode [ 778.197012][ T6041] bridge_slave_1: left promiscuous mode [ 778.202844][ T6041] bridge0: port 2(bridge_slave_1) entered disabled state [ 778.214753][ T29] audit: type=1326 audit(4137606490.091:11519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6038 comm="syz.4.11270" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7feafd92aeb9 code=0x0 [ 778.239698][ T6041] bridge_slave_0: left allmulticast mode [ 778.245430][ T6041] bridge_slave_0: left promiscuous mode [ 778.251137][ T6041] bridge0: port 1(bridge_slave_0) entered disabled state [ 778.365735][ T6056] __nla_validate_parse: 3 callbacks suppressed [ 778.365820][ T6056] netlink: 20 bytes leftover after parsing attributes in process `syz.9.11271'. [ 778.444754][ T6041] program syz.9.11271 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 778.699414][ T6079] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=6079 comm=syz.0.11285 [ 778.779394][ T6083] option changes via remount are deprecated (pid=6082 comm=syz.0.11287) [ 779.025456][ T6098] netlink: 28 bytes leftover after parsing attributes in process `syz.9.11293'. [ 779.046150][ T29] audit: type=1400 audit(4137606490.981:11520): avc: denied { setopt } for pid=6089 comm="syz.4.11289" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 779.121870][ T6107] netlink: 16 bytes leftover after parsing attributes in process `syz.9.11296'. [ 779.265032][ T6119] netlink: 24 bytes leftover after parsing attributes in process `syz.5.11301'. [ 779.266834][ T29] audit: type=1326 audit(4137606491.201:11521): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6113 comm="syz.0.11299" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ffa4c14aeb9 code=0x0 [ 779.334947][ T6124] FAULT_INJECTION: forcing a failure. [ 779.334947][ T6124] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 779.348146][ T6124] CPU: 1 UID: 0 PID: 6124 Comm: syz.4.11303 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 779.348190][ T6124] Tainted: [W]=WARN [ 779.348201][ T6124] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 779.348219][ T6124] Call Trace: [ 779.348228][ T6124] [ 779.348239][ T6124] __dump_stack+0x1d/0x30 [ 779.348345][ T6124] dump_stack_lvl+0x95/0xd0 [ 779.348429][ T6124] dump_stack+0x15/0x1b [ 779.348456][ T6124] should_fail_ex+0x263/0x280 [ 779.348546][ T6124] should_fail+0xb/0x20 [ 779.348593][ T6124] should_fail_usercopy+0x1a/0x20 [ 779.348715][ T6124] _copy_from_user+0x1c/0xb0 [ 779.348744][ T6124] kstrtouint_from_user+0x69/0xf0 [ 779.348787][ T6124] proc_fail_nth_write+0x50/0x160 [ 779.348907][ T6124] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 779.348941][ T6124] vfs_write+0x269/0x9f0 [ 779.348965][ T6124] ? __rcu_read_unlock+0x4e/0x70 [ 779.349016][ T6124] ? __fget_files+0x184/0x1c0 [ 779.349047][ T6124] ? mutex_lock+0x57/0x90 [ 779.349088][ T6124] ksys_write+0xdc/0x1a0 [ 779.349117][ T6124] __x64_sys_write+0x40/0x50 [ 779.349197][ T6124] x64_sys_call+0x2847/0x3000 [ 779.349230][ T6124] do_syscall_64+0xc0/0x2a0 [ 779.349270][ T6124] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 779.349356][ T6124] RIP: 0033:0x7feafd8eb78e [ 779.349376][ T6124] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 779.349395][ T6124] RSP: 002b:00007feafc386fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 779.349418][ T6124] RAX: ffffffffffffffda RBX: 00007feafc3876c0 RCX: 00007feafd8eb78e [ 779.349438][ T6124] RDX: 0000000000000001 RSI: 00007feafc3870a0 RDI: 0000000000000004 [ 779.349456][ T6124] RBP: 00007feafc387090 R08: 0000000000000000 R09: 0000000000000000 [ 779.349528][ T6124] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 779.349546][ T6124] R13: 00007feafdba6038 R14: 00007feafdba5fa0 R15: 00007fffacbf3388 [ 779.349572][ T6124] [ 779.682891][ T29] audit: type=1400 audit(4137606491.611:11522): avc: denied { map } for pid=6118 comm="syz.5.11301" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 779.707007][ T29] audit: type=1400 audit(4137606491.611:11523): avc: denied { execute } for pid=6118 comm="syz.5.11301" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 779.825138][ T6135] usb usb7: usbfs: process 6135 (syz.4.11306) did not claim interface 0 before use [ 779.834881][ T6135] usb usb7: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 779.920645][ T6146] usb usb7: usbfs: process 6146 (syz.4.11311) did not claim interface 0 before use [ 779.930241][ T6146] FAULT_INJECTION: forcing a failure. [ 779.930241][ T6146] name failslab, interval 1, probability 0, space 0, times 0 [ 779.943009][ T6146] CPU: 0 UID: 0 PID: 6146 Comm: syz.4.11311 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 779.943115][ T6146] Tainted: [W]=WARN [ 779.943130][ T6146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 779.943148][ T6146] Call Trace: [ 779.943156][ T6146] [ 779.943165][ T6146] __dump_stack+0x1d/0x30 [ 779.943200][ T6146] dump_stack_lvl+0x95/0xd0 [ 779.943264][ T6146] dump_stack+0x15/0x1b [ 779.943281][ T6146] should_fail_ex+0x263/0x280 [ 779.943310][ T6146] should_failslab+0x8c/0xb0 [ 779.943380][ T6146] __kmalloc_cache_noprof+0x64/0x4a0 [ 779.943444][ T6146] ? alloc_async+0x2d/0x90 [ 779.943463][ T6146] alloc_async+0x2d/0x90 [ 779.943480][ T6146] proc_do_submiturb+0x76d/0x1d10 [ 779.943529][ T6146] ? proc_do_submiturb+0xb0/0x1d10 [ 779.943550][ T6146] proc_submiturb+0x7b/0xa0 [ 779.943579][ T6146] usbdev_ioctl+0xcb4/0x1750 [ 779.943606][ T6146] ? __pfx_usbdev_ioctl+0x10/0x10 [ 779.943675][ T6146] __se_sys_ioctl+0xce/0x140 [ 779.943716][ T6146] __x64_sys_ioctl+0x43/0x50 [ 779.943775][ T6146] x64_sys_call+0x14b0/0x3000 [ 779.943804][ T6146] do_syscall_64+0xc0/0x2a0 [ 779.943833][ T6146] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 779.943900][ T6146] RIP: 0033:0x7feafd92aeb9 [ 779.943915][ T6146] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 779.943932][ T6146] RSP: 002b:00007feafc387028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 779.943951][ T6146] RAX: ffffffffffffffda RBX: 00007feafdba5fa0 RCX: 00007feafd92aeb9 [ 779.943985][ T6146] RDX: 0000200000000380 RSI: 000000008038550a RDI: 0000000000000003 [ 779.943997][ T6146] RBP: 00007feafc387090 R08: 0000000000000000 R09: 0000000000000000 [ 779.944038][ T6146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 779.944055][ T6146] R13: 00007feafdba6038 R14: 00007feafdba5fa0 R15: 00007fffacbf3388 [ 779.944106][ T6146] [ 780.160234][ T6149] option changes via remount are deprecated (pid=6148 comm=syz.9.11312) [ 780.202787][ T6149] netlink: 4 bytes leftover after parsing attributes in process `syz.9.11312'. [ 780.304337][ T6165] netlink: 20 bytes leftover after parsing attributes in process `syz.0.11319'. [ 780.336695][ T6171] netlink: 32 bytes leftover after parsing attributes in process `syz.9.11321'. [ 780.348616][ T29] audit: type=1400 audit(4137606492.281:11524): avc: denied { setattr } for pid=6170 comm="syz.9.11321" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 780.360700][ T6171] netlink: 104 bytes leftover after parsing attributes in process `syz.9.11321'. [ 780.443232][ T29] audit: type=1326 audit(4137606492.371:11525): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.9.11323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 780.467086][ T29] audit: type=1326 audit(4137606492.371:11526): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.9.11323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 780.491046][ T29] audit: type=1326 audit(4137606492.371:11527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.9.11323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 780.514847][ T29] audit: type=1326 audit(4137606492.371:11528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.9.11323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 780.538506][ T29] audit: type=1326 audit(4137606492.371:11529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.9.11323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 780.565454][ T29] audit: type=1326 audit(4137606492.471:11530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.9.11323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 780.589264][ T29] audit: type=1326 audit(4137606492.471:11531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6176 comm="syz.9.11323" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 780.843561][ T6183] option changes via remount are deprecated (pid=6182 comm=syz.5.11325) [ 780.869445][ T6183] netlink: 4 bytes leftover after parsing attributes in process `syz.5.11325'. [ 780.910593][ T6187] FAULT_INJECTION: forcing a failure. [ 780.910593][ T6187] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 780.923845][ T6187] CPU: 0 UID: 0 PID: 6187 Comm: syz.5.11326 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 780.923969][ T6187] Tainted: [W]=WARN [ 780.924052][ T6187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 780.924070][ T6187] Call Trace: [ 780.924079][ T6187] [ 780.924090][ T6187] __dump_stack+0x1d/0x30 [ 780.924123][ T6187] dump_stack_lvl+0x95/0xd0 [ 780.924209][ T6187] dump_stack+0x15/0x1b [ 780.924320][ T6187] should_fail_ex+0x263/0x280 [ 780.924365][ T6187] should_fail+0xb/0x20 [ 780.924403][ T6187] should_fail_usercopy+0x1a/0x20 [ 780.924503][ T6187] _copy_from_iter+0xcf/0xea0 [ 780.924531][ T6187] ? alloc_pages_noprof+0xa8/0x130 [ 780.924634][ T6187] ? skb_page_frag_refill+0xc0/0x2f0 [ 780.924733][ T6187] tcp_sendmsg_locked+0x16df/0x2c40 [ 780.924788][ T6187] ? __pfx_tcp_sendmsg+0x10/0x10 [ 780.924821][ T6187] tcp_sendmsg+0x2f/0x50 [ 780.924923][ T6187] inet_sendmsg+0x76/0xd0 [ 780.925026][ T6187] ____sys_sendmsg+0x53a/0x600 [ 780.925112][ T6187] ___sys_sendmsg+0x195/0x1e0 [ 780.925156][ T6187] __sys_sendmmsg+0x185/0x320 [ 780.925196][ T6187] __x64_sys_sendmmsg+0x57/0x70 [ 780.925218][ T6187] x64_sys_call+0x1e28/0x3000 [ 780.925252][ T6187] do_syscall_64+0xc0/0x2a0 [ 780.925291][ T6187] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 780.925383][ T6187] RIP: 0033:0x7fe42055aeb9 [ 780.925404][ T6187] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 780.925430][ T6187] RSP: 002b:00007fe41efb7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 780.925458][ T6187] RAX: ffffffffffffffda RBX: 00007fe4207d5fa0 RCX: 00007fe42055aeb9 [ 780.925480][ T6187] RDX: 0000000000000002 RSI: 0000200000002280 RDI: 0000000000000003 [ 780.925515][ T6187] RBP: 00007fe41efb7090 R08: 0000000000000000 R09: 0000000000000000 [ 780.925533][ T6187] R10: 00000000040088c5 R11: 0000000000000246 R12: 0000000000000001 [ 780.925552][ T6187] R13: 00007fe4207d6038 R14: 00007fe4207d5fa0 R15: 00007ffee63e2188 [ 780.925580][ T6187] [ 781.183315][ T6196] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 781.192035][ T6196] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 781.363124][ T6205] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 781.375867][ T29] audit: type=1400 audit(4137606493.311:11532): avc: denied { connect } for pid=6204 comm="syz.0.11332" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 781.458904][ T6219] bond1: Removing last ns target with arp_interval on [ 781.505115][ T6222] ip6_vti0 speed is unknown, defaulting to 1000 [ 781.655386][ T29] audit: type=1326 audit(4137606493.591:11533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6227 comm="syz.0.11337" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ffa4c14aeb9 code=0x0 [ 781.732000][ T6232] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6232 comm=syz.5.11339 [ 781.805680][ T6239] syzkaller0: entered promiscuous mode [ 781.811353][ T6239] syzkaller0: entered allmulticast mode [ 781.896229][ T52] bridge_slave_1: left allmulticast mode [ 781.902041][ T52] bridge_slave_1: left promiscuous mode [ 781.907871][ T52] bridge0: port 2(bridge_slave_1) entered disabled state [ 781.925701][ T52] bridge_slave_0: left allmulticast mode [ 781.931493][ T52] bridge_slave_0: left promiscuous mode [ 781.937293][ T52] bridge0: port 1(bridge_slave_0) entered disabled state [ 781.949055][ T52] erspan0: left allmulticast mode [ 781.954460][ T52] erspan0: left promiscuous mode [ 781.959711][ T52] GPL: port 1(erspan0) entered disabled state [ 782.137141][ T6252] netlink: 80 bytes leftover after parsing attributes in process `syz.4.11346'. [ 782.225459][ T52] bond0 (unregistering): left promiscuous mode [ 782.231697][ T52] bond_slave_0: left promiscuous mode [ 782.237227][ T52] bond_slave_1: left promiscuous mode [ 782.243746][ T52] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 782.253727][ T52] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 782.262952][ T52] bond0 (unregistering): Released all slaves [ 782.335519][ T52] team0: left promiscuous mode [ 782.340356][ T52] team_slave_0: left promiscuous mode [ 782.345929][ T52] team_slave_1: left promiscuous mode [ 782.357676][ T52] hsr_slave_0: left promiscuous mode [ 782.363719][ T52] hsr_slave_1: left promiscuous mode [ 782.432516][ T52] team0 (unregistering): Port device team_slave_1 removed [ 782.449772][ T52] team0 (unregistering): Port device team_slave_0 removed [ 782.525558][ T6263] FAULT_INJECTION: forcing a failure. [ 782.525558][ T6263] name failslab, interval 1, probability 0, space 0, times 0 [ 782.538426][ T6263] CPU: 1 UID: 0 PID: 6263 Comm: syz.7.11351 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 782.538472][ T6263] Tainted: [W]=WARN [ 782.538482][ T6263] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 782.538501][ T6263] Call Trace: [ 782.538511][ T6263] [ 782.538522][ T6263] __dump_stack+0x1d/0x30 [ 782.538609][ T6263] dump_stack_lvl+0x95/0xd0 [ 782.538648][ T6263] dump_stack+0x15/0x1b [ 782.538742][ T6263] should_fail_ex+0x263/0x280 [ 782.538775][ T6263] should_failslab+0x8c/0xb0 [ 782.538812][ T6263] __kmalloc_cache_noprof+0x64/0x4a0 [ 782.538849][ T6263] ? bpf_prog_alloc_no_stats+0xc4/0x380 [ 782.538962][ T6263] bpf_prog_alloc_no_stats+0xc4/0x380 [ 782.538999][ T6263] bpf_prog_alloc+0x3c/0x150 [ 782.539114][ T6263] bpf_prog_load+0x506/0x1140 [ 782.539201][ T6263] ? security_bpf+0x2b/0x90 [ 782.539234][ T6263] __sys_bpf+0x469/0x7b0 [ 782.539279][ T6263] __x64_sys_bpf+0x41/0x50 [ 782.539312][ T6263] x64_sys_call+0x28e1/0x3000 [ 782.539457][ T6263] do_syscall_64+0xc0/0x2a0 [ 782.539518][ T6263] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 782.539548][ T6263] RIP: 0033:0x7fb2b731aeb9 [ 782.539579][ T6263] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 782.539632][ T6263] RSP: 002b:00007fb2b5d77028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 782.539659][ T6263] RAX: ffffffffffffffda RBX: 00007fb2b7595fa0 RCX: 00007fb2b731aeb9 [ 782.539680][ T6263] RDX: 0000000000000048 RSI: 0000200000000200 RDI: 0000000000000005 [ 782.539733][ T6263] RBP: 00007fb2b5d77090 R08: 0000000000000000 R09: 0000000000000000 [ 782.539748][ T6263] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 782.539761][ T6263] R13: 00007fb2b7596038 R14: 00007fb2b7595fa0 R15: 00007ffcaf06e9c8 [ 782.539782][ T6263] [ 782.916860][ T6288] hub 8-0:1.0: USB hub found [ 782.921610][ T6288] hub 8-0:1.0: 8 ports detected [ 783.452308][ T6318] __nla_validate_parse: 4 callbacks suppressed [ 783.452362][ T6318] netlink: 4 bytes leftover after parsing attributes in process `syz.0.11369'. [ 783.468652][ T6319] netlink: 12 bytes leftover after parsing attributes in process `syz.0.11369'. [ 783.795122][ T6332] netlink: 12 bytes leftover after parsing attributes in process `syz.5.11374'. [ 783.952874][ T6340] FAULT_INJECTION: forcing a failure. [ 783.952874][ T6340] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 783.966070][ T6340] CPU: 1 UID: 0 PID: 6340 Comm: syz.5.11378 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 783.966162][ T6340] Tainted: [W]=WARN [ 783.966168][ T6340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 783.966250][ T6340] Call Trace: [ 783.966256][ T6340] [ 783.966263][ T6340] __dump_stack+0x1d/0x30 [ 783.966286][ T6340] dump_stack_lvl+0x95/0xd0 [ 783.966306][ T6340] dump_stack+0x15/0x1b [ 783.966345][ T6340] should_fail_ex+0x263/0x280 [ 783.966374][ T6340] should_fail+0xb/0x20 [ 783.966401][ T6340] should_fail_usercopy+0x1a/0x20 [ 783.966431][ T6340] _copy_to_user+0x20/0xa0 [ 783.966451][ T6340] simple_read_from_buffer+0xb5/0x130 [ 783.966612][ T6340] proc_fail_nth_read+0x10e/0x150 [ 783.966640][ T6340] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 783.966664][ T6340] vfs_read+0x1ab/0x7f0 [ 783.966681][ T6340] ? ldsem_up_read+0x8a/0xd0 [ 783.966760][ T6340] ? __rcu_read_unlock+0x4e/0x70 [ 783.966794][ T6340] ? __fget_files+0x184/0x1c0 [ 783.966901][ T6340] ? tiocsti+0x19a/0x1d0 [ 783.966925][ T6340] ? mutex_lock+0x57/0x90 [ 783.966952][ T6340] ksys_read+0xdc/0x1a0 [ 783.967011][ T6340] __x64_sys_read+0x40/0x50 [ 783.967029][ T6340] x64_sys_call+0x2889/0x3000 [ 783.967103][ T6340] do_syscall_64+0xc0/0x2a0 [ 783.967219][ T6340] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 783.967306][ T6340] RIP: 0033:0x7fe42051b78e [ 783.967320][ T6340] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 783.967338][ T6340] RSP: 002b:00007fe41efb6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 783.967356][ T6340] RAX: ffffffffffffffda RBX: 00007fe41efb76c0 RCX: 00007fe42051b78e [ 783.967369][ T6340] RDX: 000000000000000f RSI: 00007fe41efb70a0 RDI: 0000000000000004 [ 783.967461][ T6340] RBP: 00007fe41efb7090 R08: 0000000000000000 R09: 0000000000000000 [ 783.967551][ T6340] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 783.967562][ T6340] R13: 00007fe4207d6038 R14: 00007fe4207d5fa0 R15: 00007ffee63e2188 [ 783.967610][ T6340] [ 784.362023][ T6354] option changes via remount are deprecated (pid=6349 comm=syz.9.11382) [ 784.395947][ T6354] netlink: 4 bytes leftover after parsing attributes in process `syz.9.11382'. [ 786.317570][ T6308] nci: __nci_request: wait_for_completion_interruptible_timeout failed -512 [ 786.391137][ T6379] netlink: 12 bytes leftover after parsing attributes in process `syz.4.11388'. [ 786.397952][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 786.398010][ T29] audit: type=1326 audit(4137606498.331:11557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6380 comm="syz.9.11390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 786.430081][ T29] audit: type=1326 audit(4137606498.331:11558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6380 comm="syz.9.11390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 786.453795][ T6379] netlink: 44 bytes leftover after parsing attributes in process `syz.4.11388'. [ 786.463003][ T29] audit: type=1326 audit(4137606498.331:11559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6380 comm="syz.9.11390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 786.486673][ T29] audit: type=1326 audit(4137606498.331:11560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6380 comm="syz.9.11390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 786.510313][ T29] audit: type=1326 audit(4137606498.331:11561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6380 comm="syz.9.11390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 786.534100][ T29] audit: type=1326 audit(4137606498.331:11562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6380 comm="syz.9.11390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 786.570008][ T6392] tmpfs: Bad value for 'mpol' [ 786.703768][ T29] audit: type=1326 audit(4137606498.491:11563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6380 comm="syz.9.11390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 786.727581][ T29] audit: type=1326 audit(4137606498.491:11564): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6380 comm="syz.9.11390" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffaa144aeb9 code=0x7ffc0000 [ 786.751254][ T29] audit: type=1326 audit(4137606498.581:11565): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6398 comm="syz.4.11397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feafd92aeb9 code=0x7ffc0000 [ 786.774981][ T29] audit: type=1326 audit(4137606498.581:11566): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6398 comm="syz.4.11397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feafd92aeb9 code=0x7ffc0000 [ 787.102528][ T6408] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 787.120823][ T6408] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 787.144624][ T6408] netlink: 'syz.7.11400': attribute type 4 has an invalid length. [ 787.169549][ T6408] loop7: detected capacity change from 0 to 512 [ 787.202772][ T6408] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 787.258474][ T6408] ext4 filesystem being mounted at /256/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 787.471219][ T6420] FAULT_INJECTION: forcing a failure. [ 787.471219][ T6420] name failslab, interval 1, probability 0, space 0, times 0 [ 787.483937][ T6420] CPU: 0 UID: 0 PID: 6420 Comm: syz.9.11404 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 787.483974][ T6420] Tainted: [W]=WARN [ 787.483984][ T6420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 787.484002][ T6420] Call Trace: [ 787.484016][ T6420] [ 787.484028][ T6420] __dump_stack+0x1d/0x30 [ 787.484078][ T6420] dump_stack_lvl+0x95/0xd0 [ 787.484107][ T6420] dump_stack+0x15/0x1b [ 787.484133][ T6420] should_fail_ex+0x263/0x280 [ 787.484212][ T6420] should_failslab+0x8c/0xb0 [ 787.484243][ T6420] __kvmalloc_node_noprof+0x148/0x680 [ 787.484280][ T6420] ? alloc_fdtable+0xc2/0x1d0 [ 787.484321][ T6420] alloc_fdtable+0xc2/0x1d0 [ 787.484343][ T6420] dup_fd+0x492/0x510 [ 787.484363][ T6420] ? __fget_files+0x184/0x1c0 [ 787.484451][ T6420] __se_sys_close_range+0x10c/0x480 [ 787.484476][ T6420] ? fput+0x8f/0xc0 [ 787.484510][ T6420] ? ksys_write+0x194/0x1a0 [ 787.484596][ T6420] __x64_sys_close_range+0x43/0x50 [ 787.484625][ T6420] x64_sys_call+0x1eea/0x3000 [ 787.484718][ T6420] do_syscall_64+0xc0/0x2a0 [ 787.484761][ T6420] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 787.484791][ T6420] RIP: 0033:0x7ffaa144aeb9 [ 787.484834][ T6420] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 787.484854][ T6420] RSP: 002b:00007ffa9fea7028 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 787.484875][ T6420] RAX: ffffffffffffffda RBX: 00007ffaa16c5fa0 RCX: 00007ffaa144aeb9 [ 787.484901][ T6420] RDX: 0000000000000002 RSI: ffffffffffffffff RDI: ffffffffffffffff [ 787.484920][ T6420] RBP: 00007ffa9fea7090 R08: 0000000000000000 R09: 0000000000000000 [ 787.484939][ T6420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 787.484954][ T6420] R13: 00007ffaa16c6038 R14: 00007ffaa16c5fa0 R15: 00007fff77b3fc28 [ 787.484975][ T6420] [ 787.783679][ T6425] netlink: 4 bytes leftover after parsing attributes in process `syz.0.11406'. [ 787.812573][ T6428] netlink: 4 bytes leftover after parsing attributes in process `syz.5.11405'. [ 787.845386][ T2343] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 787.873669][ T6438] netlink: 'syz.9.11410': attribute type 6 has an invalid length. [ 787.881636][ T6438] netlink: 56 bytes leftover after parsing attributes in process `syz.9.11410'. [ 787.921785][ T6442] netlink: 72 bytes leftover after parsing attributes in process `syz.4.11412'. [ 788.073268][ T6457] bridge0: entered allmulticast mode [ 788.204869][ T6457] program syz.0.11418 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 788.266259][ T6465] netlink: 'syz.7.11423': attribute type 21 has an invalid length. [ 788.284440][ T6465] netlink: 'syz.7.11423': attribute type 4 has an invalid length. [ 788.292333][ T6465] netlink: 'syz.7.11423': attribute type 5 has an invalid length. [ 788.303145][ T6465] SELinux: Context @ is not valid (left unmapped). [ 788.626741][ T6491] tipc: Trying to set illegal importance in message [ 788.794447][ T6506] xt_CT: No such helper "snmp_trap" [ 789.006535][ T6524] __nla_validate_parse: 5 callbacks suppressed [ 789.006590][ T6524] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11447'. [ 789.022158][ T6524] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11447'. [ 789.124700][ T6538] FAULT_INJECTION: forcing a failure. [ 789.124700][ T6538] name failslab, interval 1, probability 0, space 0, times 0 [ 789.137541][ T6538] CPU: 1 UID: 0 PID: 6538 Comm: syz.9.11452 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 789.137609][ T6538] Tainted: [W]=WARN [ 789.137617][ T6538] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 789.137630][ T6538] Call Trace: [ 789.137638][ T6538] [ 789.137647][ T6538] __dump_stack+0x1d/0x30 [ 789.137702][ T6538] dump_stack_lvl+0x95/0xd0 [ 789.137725][ T6538] dump_stack+0x15/0x1b [ 789.137748][ T6538] should_fail_ex+0x263/0x280 [ 789.137819][ T6538] should_failslab+0x8c/0xb0 [ 789.137847][ T6538] __kmalloc_cache_noprof+0x64/0x4a0 [ 789.137912][ T6538] ? ip_mc_add_src+0x2e4/0x5f0 [ 789.137947][ T6538] ip_mc_add_src+0x2e4/0x5f0 [ 789.137987][ T6538] ip_mc_msfilter+0x3e6/0x5a0 [ 789.138043][ T6538] ? __kmalloc_noprof+0x2a3/0x580 [ 789.138141][ T6538] ? set_mcast_msfilter+0x3c/0x180 [ 789.138187][ T6538] set_mcast_msfilter+0x15d/0x180 [ 789.138223][ T6538] ip_set_mcast_msfilter+0x244/0x290 [ 789.138415][ T6538] do_ip_setsockopt+0x16c9/0x2290 [ 789.138524][ T6538] ip_setsockopt+0x58/0x110 [ 789.138623][ T6538] udp_setsockopt+0x99/0xb0 [ 789.138674][ T6538] sock_common_setsockopt+0x69/0x80 [ 789.138711][ T6538] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 789.138747][ T6538] __sys_setsockopt+0x184/0x200 [ 789.138850][ T6538] __x64_sys_setsockopt+0x64/0x80 [ 789.138917][ T6538] x64_sys_call+0x21d5/0x3000 [ 789.138949][ T6538] do_syscall_64+0xc0/0x2a0 [ 789.139061][ T6538] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 789.139087][ T6538] RIP: 0033:0x7ffaa144aeb9 [ 789.139104][ T6538] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 789.139124][ T6538] RSP: 002b:00007ffa9fea7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 789.139149][ T6538] RAX: ffffffffffffffda RBX: 00007ffaa16c5fa0 RCX: 00007ffaa144aeb9 [ 789.139182][ T6538] RDX: 0000000000000030 RSI: 0000000000000000 RDI: 0000000000000003 [ 789.139196][ T6538] RBP: 00007ffa9fea7090 R08: 0000000000000190 R09: 0000000000000000 [ 789.139210][ T6538] R10: 0000200000000600 R11: 0000000000000246 R12: 0000000000000001 [ 789.139266][ T6538] R13: 00007ffaa16c6038 R14: 00007ffaa16c5fa0 R15: 00007fff77b3fc28 [ 789.139288][ T6538] [ 789.633636][ T6555] netlink: 8 bytes leftover after parsing attributes in process `syz.7.11459'. [ 789.642681][ T6555] netlink: 12 bytes leftover after parsing attributes in process `syz.7.11459'. [ 789.646555][ T6556] bridge0: entered allmulticast mode [ 789.664863][ T6555] netlink: 8 bytes leftover after parsing attributes in process `syz.7.11459'. [ 789.673904][ T6555] netlink: 12 bytes leftover after parsing attributes in process `syz.7.11459'. [ 789.699927][ T6559] netlink: 12 bytes leftover after parsing attributes in process `syz.9.11460'. [ 789.725291][ T52] netdevsim netdevsim7 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 789.733894][ T52] netdevsim netdevsim7 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 789.742216][ T52] netdevsim netdevsim7 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 789.759776][ T52] netdevsim netdevsim7 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 789.781030][ T6556] program syz.5.11457 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 789.986764][ T6581] loop7: detected capacity change from 0 to 128 [ 789.993584][ T6581] msdos: Bad value for 'fmask' [ 790.004353][ T6586] netlink: 12 bytes leftover after parsing attributes in process `syz.4.11472'. [ 790.153215][ T6598] netlink: 4 bytes leftover after parsing attributes in process `syz.9.11476'. [ 790.166032][ T6594] netlink: 24 bytes leftover after parsing attributes in process `syz.4.11474'. [ 790.354816][ T6616] FAULT_INJECTION: forcing a failure. [ 790.354816][ T6616] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 790.368092][ T6616] CPU: 0 UID: 0 PID: 6616 Comm: syz.0.11482 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 790.368137][ T6616] Tainted: [W]=WARN [ 790.368147][ T6616] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 790.368165][ T6616] Call Trace: [ 790.368173][ T6616] [ 790.368296][ T6616] __dump_stack+0x1d/0x30 [ 790.368328][ T6616] dump_stack_lvl+0x95/0xd0 [ 790.368358][ T6616] dump_stack+0x15/0x1b [ 790.368379][ T6616] should_fail_ex+0x263/0x280 [ 790.368473][ T6616] should_fail+0xb/0x20 [ 790.368504][ T6616] should_fail_usercopy+0x1a/0x20 [ 790.368564][ T6616] _copy_from_user+0x1c/0xb0 [ 790.368588][ T6616] ___sys_sendmsg+0xc1/0x1e0 [ 790.368665][ T6616] __x64_sys_sendmsg+0xd4/0x160 [ 790.368774][ T6616] x64_sys_call+0x17ba/0x3000 [ 790.368804][ T6616] do_syscall_64+0xc0/0x2a0 [ 790.368837][ T6616] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 790.368859][ T6616] RIP: 0033:0x7ffa4c14aeb9 [ 790.368897][ T6616] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 790.368922][ T6616] RSP: 002b:00007ffa4aba7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 790.369022][ T6616] RAX: ffffffffffffffda RBX: 00007ffa4c3c5fa0 RCX: 00007ffa4c14aeb9 [ 790.369040][ T6616] RDX: 0000000000000800 RSI: 0000200000000200 RDI: 0000000000000005 [ 790.369058][ T6616] RBP: 00007ffa4aba7090 R08: 0000000000000000 R09: 0000000000000000 [ 790.369072][ T6616] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 790.369085][ T6616] R13: 00007ffa4c3c6038 R14: 00007ffa4c3c5fa0 R15: 00007ffef58739d8 [ 790.369140][ T6616] [ 790.841533][ T6645] sch_tbf: burst 0 is lower than device veth0_to_bridge mtu (1514) ! [ 790.851622][ T6645] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 790.916057][ T6652] FAULT_INJECTION: forcing a failure. [ 790.916057][ T6652] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 790.929263][ T6652] CPU: 0 UID: 0 PID: 6652 Comm: syz.0.11495 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 790.929300][ T6652] Tainted: [W]=WARN [ 790.929307][ T6652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 790.929320][ T6652] Call Trace: [ 790.929327][ T6652] [ 790.929338][ T6652] __dump_stack+0x1d/0x30 [ 790.929458][ T6652] dump_stack_lvl+0x95/0xd0 [ 790.929478][ T6652] dump_stack+0x15/0x1b [ 790.929496][ T6652] should_fail_ex+0x263/0x280 [ 790.929526][ T6652] should_fail+0xb/0x20 [ 790.929614][ T6652] should_fail_usercopy+0x1a/0x20 [ 790.929644][ T6652] _copy_to_iter+0x251/0xea0 [ 790.929732][ T6652] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 790.929752][ T6652] __skb_datagram_iter+0xc6/0x680 [ 790.929770][ T6652] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 790.929818][ T6652] skb_copy_datagram_iter+0x3d/0x100 [ 790.929837][ T6652] netlink_recvmsg+0x1a8/0x550 [ 790.929858][ T6652] ? __pfx_netlink_recvmsg+0x10/0x10 [ 790.929959][ T6652] sock_recvmsg+0x139/0x160 [ 790.929984][ T6652] ____sys_recvmsg+0xf5/0x280 [ 790.930065][ T6652] ___sys_recvmsg+0x11f/0x3b0 [ 790.930128][ T6652] do_recvmmsg+0x1ef/0x560 [ 790.930153][ T6652] ? get_timespec64+0xd2/0x100 [ 790.930254][ T6652] __x64_sys_recvmmsg+0xfb/0x170 [ 790.930282][ T6652] x64_sys_call+0x2b75/0x3000 [ 790.930323][ T6652] do_syscall_64+0xc0/0x2a0 [ 790.930354][ T6652] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 790.930374][ T6652] RIP: 0033:0x7ffa4c14aeb9 [ 790.930389][ T6652] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 790.930487][ T6652] RSP: 002b:00007ffa4aba7028 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 790.930506][ T6652] RAX: ffffffffffffffda RBX: 00007ffa4c3c5fa0 RCX: 00007ffa4c14aeb9 [ 790.930519][ T6652] RDX: 04000000000003b4 RSI: 00002000000037c0 RDI: 0000000000000003 [ 790.930531][ T6652] RBP: 00007ffa4aba7090 R08: 0000200000003700 R09: 0000000000000000 [ 790.930613][ T6652] R10: 0000000002040000 R11: 0000000000000246 R12: 0000000000000001 [ 790.930625][ T6652] R13: 00007ffa4c3c6038 R14: 00007ffa4c3c5fa0 R15: 00007ffef58739d8 [ 790.930680][ T6652] [ 791.301865][ T6675] FAULT_INJECTION: forcing a failure. [ 791.301865][ T6675] name failslab, interval 1, probability 0, space 0, times 0 [ 791.311529][ T6677] FAULT_INJECTION: forcing a failure. [ 791.311529][ T6677] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 791.314839][ T6675] CPU: 1 UID: 0 PID: 6675 Comm: syz.0.11504 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 791.314999][ T6675] Tainted: [W]=WARN [ 791.315021][ T6675] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 791.315064][ T6675] Call Trace: [ 791.315085][ T6675] [ 791.315108][ T6675] __dump_stack+0x1d/0x30 [ 791.315192][ T6675] dump_stack_lvl+0x95/0xd0 [ 791.315273][ T6675] dump_stack+0x15/0x1b [ 791.315388][ T6675] should_fail_ex+0x263/0x280 [ 791.315536][ T6675] should_failslab+0x8c/0xb0 [ 791.315607][ T6675] kmem_cache_alloc_noprof+0x68/0x490 [ 791.315768][ T6675] ? prepare_creds+0x38/0x550 [ 791.315941][ T6675] ? get_random_u64+0x13f/0x1f0 [ 791.316058][ T6675] prepare_creds+0x38/0x550 [ 791.316204][ T6675] copy_creds+0x8f/0x340 [ 791.316305][ T6675] ? dup_task_struct+0x60b/0x940 [ 791.316407][ T6675] copy_process+0x639/0x1f10 [ 791.316600][ T6675] kernel_clone+0x16b/0x5b0 [ 791.316737][ T6675] ? vfs_write+0x86e/0x9f0 [ 791.316811][ T6675] __x64_sys_clone+0x143/0x180 [ 791.316899][ T6675] x64_sys_call+0x12d0/0x3000 [ 791.317008][ T6675] do_syscall_64+0xc0/0x2a0 [ 791.317149][ T6675] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 791.317241][ T6675] RIP: 0033:0x7ffa4c14aeb9 [ 791.317323][ T6675] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 791.317379][ T6675] RSP: 002b:00007ffa4aba6fd8 EFLAGS: 00000246 ORIG_RAX: 0000000000000038 [ 791.317474][ T6675] RAX: ffffffffffffffda RBX: 00007ffa4c3c5fa0 RCX: 00007ffa4c14aeb9 [ 791.317552][ T6675] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 791.317616][ T6675] RBP: 00007ffa4aba7090 R08: 0000000000000000 R09: 0000000000000000 [ 791.317682][ T6675] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 791.317724][ T6675] R13: 00007ffa4c3c6038 R14: 00007ffa4c3c5fa0 R15: 00007ffef58739d8 [ 791.317796][ T6675] [ 791.519409][ T6677] CPU: 0 UID: 0 PID: 6677 Comm: syz.4.11505 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 791.519444][ T6677] Tainted: [W]=WARN [ 791.519454][ T6677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 791.519471][ T6677] Call Trace: [ 791.519553][ T6677] [ 791.519560][ T6677] __dump_stack+0x1d/0x30 [ 791.519586][ T6677] dump_stack_lvl+0x95/0xd0 [ 791.519613][ T6677] dump_stack+0x15/0x1b [ 791.519702][ T6677] should_fail_ex+0x263/0x280 [ 791.519736][ T6677] should_fail+0xb/0x20 [ 791.519764][ T6677] should_fail_usercopy+0x1a/0x20 [ 791.519872][ T6677] _copy_to_user+0x20/0xa0 [ 791.519894][ T6677] simple_read_from_buffer+0xb5/0x130 [ 791.519962][ T6677] proc_fail_nth_read+0x10e/0x150 [ 791.519995][ T6677] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 791.520032][ T6677] vfs_read+0x1ab/0x7f0 [ 791.520074][ T6677] ? ppp_get_filter+0x55/0x180 [ 791.520105][ T6677] ? mutex_unlock+0x4e/0x90 [ 791.520135][ T6677] ? ppp_ioctl+0x1123/0x1230 [ 791.520244][ T6677] ksys_read+0xdc/0x1a0 [ 791.520269][ T6677] __x64_sys_read+0x40/0x50 [ 791.520289][ T6677] x64_sys_call+0x2889/0x3000 [ 791.520317][ T6677] do_syscall_64+0xc0/0x2a0 [ 791.520398][ T6677] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 791.520427][ T6677] RIP: 0033:0x7feafd8eb78e [ 791.520448][ T6677] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 791.520545][ T6677] RSP: 002b:00007feafc386fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 791.520573][ T6677] RAX: ffffffffffffffda RBX: 00007feafc3876c0 RCX: 00007feafd8eb78e [ 791.520591][ T6677] RDX: 000000000000000f RSI: 00007feafc3870a0 RDI: 0000000000000004 [ 791.520609][ T6677] RBP: 00007feafc387090 R08: 0000000000000000 R09: 0000000000000000 [ 791.520627][ T6677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 791.520644][ T6677] R13: 00007feafdba6038 R14: 00007feafdba5fa0 R15: 00007fffacbf3388 [ 791.520672][ T6677] [ 791.736888][ T6679] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 791.745638][ T6679] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 791.758670][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 791.758689][ T29] audit: type=1326 audit(4137606503.691:11614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6680 comm="syz.5.11507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe42055aeb9 code=0x7ffc0000 [ 791.789203][ T29] audit: type=1326 audit(4137606503.691:11615): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6680 comm="syz.5.11507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe42055aeb9 code=0x7ffc0000 [ 791.815953][ T6684] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1544 sclass=netlink_route_socket pid=6684 comm=syz.9.11508 [ 791.819490][ T29] audit: type=1326 audit(4137606503.721:11616): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6680 comm="syz.5.11507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=269 compat=0 ip=0x7fe42055aeb9 code=0x7ffc0000 [ 791.852396][ T29] audit: type=1326 audit(4137606503.721:11617): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6680 comm="syz.5.11507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe42055aeb9 code=0x7ffc0000 [ 791.876149][ T29] audit: type=1326 audit(4137606503.721:11618): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6680 comm="syz.5.11507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe42055aeb9 code=0x7ffc0000 [ 791.899839][ T29] audit: type=1326 audit(4137606503.751:11619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6680 comm="syz.5.11507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fe42055aeb9 code=0x7ffc0000 [ 791.923472][ T29] audit: type=1326 audit(4137606503.751:11620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6680 comm="syz.5.11507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe42055aeb9 code=0x7ffc0000 [ 791.947097][ T29] audit: type=1326 audit(4137606503.751:11621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6680 comm="syz.5.11507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe42055aeb9 code=0x7ffc0000 [ 791.970747][ T29] audit: type=1326 audit(4137606503.751:11622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6680 comm="syz.5.11507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fe42055aeb9 code=0x7ffc0000 [ 792.004137][ T29] audit: type=1326 audit(4137606503.931:11623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6680 comm="syz.5.11507" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe42055aeb9 code=0x7ffc0000 [ 792.080522][ T6696] usb usb7: usbfs: process 6696 (syz.5.11512) did not claim interface 0 before use [ 792.090035][ T6696] vhci_hcd vhci_hcd.3: default hub control req: a100 v0000 i0000 l0 [ 792.115822][ T6701] netlink: 'syz.5.11514': attribute type 21 has an invalid length. [ 792.123945][ T6701] netlink: 'syz.5.11514': attribute type 4 has an invalid length. [ 792.132519][ T6701] netlink: 'syz.5.11514': attribute type 5 has an invalid length. [ 792.185625][ T6706] SET target dimension over the limit! [ 792.886198][ T6748] FAULT_INJECTION: forcing a failure. [ 792.886198][ T6748] name failslab, interval 1, probability 0, space 0, times 0 [ 792.899002][ T6748] CPU: 1 UID: 0 PID: 6748 Comm: syz.9.11533 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 792.899039][ T6748] Tainted: [W]=WARN [ 792.899048][ T6748] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 792.899064][ T6748] Call Trace: [ 792.899073][ T6748] [ 792.899084][ T6748] __dump_stack+0x1d/0x30 [ 792.899174][ T6748] dump_stack_lvl+0x95/0xd0 [ 792.899201][ T6748] dump_stack+0x15/0x1b [ 792.899269][ T6748] should_fail_ex+0x263/0x280 [ 792.899310][ T6748] should_failslab+0x8c/0xb0 [ 792.899364][ T6748] kmem_cache_alloc_noprof+0x68/0x490 [ 792.899397][ T6748] ? skb_clone+0x151/0x1f0 [ 792.899424][ T6748] skb_clone+0x151/0x1f0 [ 792.899449][ T6748] __netlink_deliver_tap+0x2c9/0x500 [ 792.899547][ T6748] netlink_unicast+0x66b/0x690 [ 792.899634][ T6748] netlink_sendmsg+0x5c8/0x6f0 [ 792.899662][ T6748] ? __pfx_netlink_sendmsg+0x10/0x10 [ 792.899748][ T6748] ____sys_sendmsg+0x5af/0x600 [ 792.899770][ T6748] ___sys_sendmsg+0x195/0x1e0 [ 792.899801][ T6748] __x64_sys_sendmsg+0xd4/0x160 [ 792.899831][ T6748] x64_sys_call+0x17ba/0x3000 [ 792.899879][ T6748] do_syscall_64+0xc0/0x2a0 [ 792.899921][ T6748] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 792.899945][ T6748] RIP: 0033:0x7ffaa144aeb9 [ 792.899962][ T6748] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 792.900009][ T6748] RSP: 002b:00007ffa9fea7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 792.900030][ T6748] RAX: ffffffffffffffda RBX: 00007ffaa16c5fa0 RCX: 00007ffaa144aeb9 [ 792.900072][ T6748] RDX: 0000000000000000 RSI: 00002000000002c0 RDI: 0000000000000003 [ 792.900086][ T6748] RBP: 00007ffa9fea7090 R08: 0000000000000000 R09: 0000000000000000 [ 792.900100][ T6748] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 792.900113][ T6748] R13: 00007ffaa16c6038 R14: 00007ffaa16c5fa0 R15: 00007fff77b3fc28 [ 792.900174][ T6748] [ 793.258482][ T6731] syz.0.11526 (6731) used greatest stack depth: 6296 bytes left [ 793.393616][ T6764] Invalid option length (0) for dns_resolver key [ 793.518439][ T6770] FAULT_INJECTION: forcing a failure. [ 793.518439][ T6770] name failslab, interval 1, probability 0, space 0, times 0 [ 793.531350][ T6770] CPU: 1 UID: 0 PID: 6770 Comm: syz.0.11538 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 793.531401][ T6770] Tainted: [W]=WARN [ 793.531409][ T6770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 793.531423][ T6770] Call Trace: [ 793.531432][ T6770] [ 793.531443][ T6770] __dump_stack+0x1d/0x30 [ 793.531525][ T6770] dump_stack_lvl+0x95/0xd0 [ 793.531549][ T6770] dump_stack+0x15/0x1b [ 793.531575][ T6770] should_fail_ex+0x263/0x280 [ 793.531616][ T6770] should_failslab+0x8c/0xb0 [ 793.531646][ T6770] __kvmalloc_node_noprof+0x148/0x680 [ 793.531678][ T6770] ? alloc_netdev_mqs+0xa5/0xa40 [ 793.531701][ T6770] ? __pfx_ppp_setup+0x10/0x10 [ 793.531721][ T6770] alloc_netdev_mqs+0xa5/0xa40 [ 793.531765][ T6770] ? __mutex_lock_slowpath+0xa/0x10 [ 793.531847][ T6770] ppp_ioctl+0x4e1/0x1230 [ 793.531872][ T6770] ? __fget_files+0x184/0x1c0 [ 793.532039][ T6770] ? mutex_lock+0x57/0x90 [ 793.532069][ T6770] ? __pfx_ppp_ioctl+0x10/0x10 [ 793.532094][ T6770] __se_sys_ioctl+0xce/0x140 [ 793.532134][ T6770] __x64_sys_ioctl+0x43/0x50 [ 793.532230][ T6770] x64_sys_call+0x14b0/0x3000 [ 793.532256][ T6770] do_syscall_64+0xc0/0x2a0 [ 793.532363][ T6770] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 793.532386][ T6770] RIP: 0033:0x7ffa4c14aeb9 [ 793.532403][ T6770] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 793.532465][ T6770] RSP: 002b:00007ffa4aba7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 793.532493][ T6770] RAX: ffffffffffffffda RBX: 00007ffa4c3c5fa0 RCX: 00007ffa4c14aeb9 [ 793.532510][ T6770] RDX: 0000200000000100 RSI: 00000000c004743e RDI: 0000000000000005 [ 793.532596][ T6770] RBP: 00007ffa4aba7090 R08: 0000000000000000 R09: 0000000000000000 [ 793.532610][ T6770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 793.532622][ T6770] R13: 00007ffa4c3c6038 R14: 00007ffa4c3c5fa0 R15: 00007ffef58739d8 [ 793.532749][ T6770] [ 793.769955][T18466] IPVS: starting estimator thread 0... [ 793.894280][ T6779] IPVS: using max 1680 ests per chain, 84000 per kthread [ 793.949968][ T6795] loop7: detected capacity change from 0 to 2048 [ 793.984664][ T6795] loop7: p1 p2 p3 [ 793.990287][ T6795] loop7: p3 start 8388352 is beyond EOD, truncated [ 794.099524][ T6807] hub 8-0:1.0: USB hub found [ 794.104358][ T6807] hub 8-0:1.0: 8 ports detected [ 794.142145][ T6809] __nla_validate_parse: 10 callbacks suppressed [ 794.142168][ T6809] netlink: 20 bytes leftover after parsing attributes in process `syz.4.11553'. [ 794.159482][ T6809] program syz.4.11553 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 794.575547][ T6805] udevd[6805]: inotify_add_watch(7, /dev/loop7p2, 10) failed: No such file or directory [ 794.586153][ T6375] udevd[6375]: inotify_add_watch(7, /dev/loop7p1, 10) failed: No such file or directory [ 794.675649][ T6824] FAULT_INJECTION: forcing a failure. [ 794.675649][ T6824] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 794.688893][ T6824] CPU: 1 UID: 0 PID: 6824 Comm: syz.5.11558 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 794.688951][ T6824] Tainted: [W]=WARN [ 794.688962][ T6824] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 794.688975][ T6824] Call Trace: [ 794.688981][ T6824] [ 794.688989][ T6824] __dump_stack+0x1d/0x30 [ 794.689082][ T6824] dump_stack_lvl+0x95/0xd0 [ 794.689136][ T6824] dump_stack+0x15/0x1b [ 794.689186][ T6824] should_fail_ex+0x263/0x280 [ 794.689216][ T6824] should_fail+0xb/0x20 [ 794.689319][ T6824] should_fail_usercopy+0x1a/0x20 [ 794.689426][ T6824] _copy_to_iter+0x251/0xea0 [ 794.689471][ T6824] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 794.689491][ T6824] __skb_datagram_iter+0xc6/0x680 [ 794.689510][ T6824] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 794.689530][ T6824] skb_copy_datagram_iter+0x3d/0x100 [ 794.689627][ T6824] netlink_recvmsg+0x1a8/0x550 [ 794.689649][ T6824] ? __pfx_netlink_recvmsg+0x10/0x10 [ 794.689667][ T6824] sock_recvmsg+0x139/0x160 [ 794.689712][ T6824] ____sys_recvmsg+0xf5/0x280 [ 794.689739][ T6824] ___sys_recvmsg+0x11f/0x3b0 [ 794.689768][ T6824] do_recvmmsg+0x1ef/0x560 [ 794.689799][ T6824] ? get_timespec64+0xd2/0x100 [ 794.689908][ T6824] __x64_sys_recvmmsg+0xfb/0x170 [ 794.689945][ T6824] x64_sys_call+0x2b75/0x3000 [ 794.689975][ T6824] do_syscall_64+0xc0/0x2a0 [ 794.690063][ T6824] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 794.690084][ T6824] RIP: 0033:0x7fe42055aeb9 [ 794.690099][ T6824] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 794.690176][ T6824] RSP: 002b:00007fe41efb7028 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 794.690195][ T6824] RAX: ffffffffffffffda RBX: 00007fe4207d5fa0 RCX: 00007fe42055aeb9 [ 794.690208][ T6824] RDX: 04000000000003b4 RSI: 00002000000037c0 RDI: 0000000000000003 [ 794.690220][ T6824] RBP: 00007fe41efb7090 R08: 0000200000003700 R09: 0000000000000000 [ 794.690233][ T6824] R10: 0000000002040000 R11: 0000000000000246 R12: 0000000000000001 [ 794.690245][ T6824] R13: 00007fe4207d6038 R14: 00007fe4207d5fa0 R15: 00007ffee63e2188 [ 794.690330][ T6824] [ 794.952567][ T6829] FAULT_INJECTION: forcing a failure. [ 794.952567][ T6829] name failslab, interval 1, probability 0, space 0, times 0 [ 794.965349][ T6829] CPU: 1 UID: 0 PID: 6829 Comm: syz.9.11559 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 794.965435][ T6829] Tainted: [W]=WARN [ 794.965443][ T6829] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 794.965460][ T6829] Call Trace: [ 794.965469][ T6829] [ 794.965479][ T6829] __dump_stack+0x1d/0x30 [ 794.965512][ T6829] dump_stack_lvl+0x95/0xd0 [ 794.965564][ T6829] dump_stack+0x15/0x1b [ 794.965586][ T6829] should_fail_ex+0x263/0x280 [ 794.965679][ T6829] should_failslab+0x8c/0xb0 [ 794.965711][ T6829] __kvmalloc_node_noprof+0x148/0x680 [ 794.965747][ T6829] ? traverse+0xa2/0x3a0 [ 794.965887][ T6829] ? __rcu_read_unlock+0x4e/0x70 [ 794.965928][ T6829] traverse+0xa2/0x3a0 [ 794.965988][ T6829] seq_lseek+0xb5/0x170 [ 794.966027][ T6829] __x64_sys_lseek+0xe8/0x160 [ 794.966110][ T6829] x64_sys_call+0x285d/0x3000 [ 794.966139][ T6829] do_syscall_64+0xc0/0x2a0 [ 794.966182][ T6829] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 794.966239][ T6829] RIP: 0033:0x7ffaa144aeb9 [ 794.966260][ T6829] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 794.966282][ T6829] RSP: 002b:00007ffa9fea7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000008 [ 794.966302][ T6829] RAX: ffffffffffffffda RBX: 00007ffaa16c5fa0 RCX: 00007ffaa144aeb9 [ 794.966321][ T6829] RDX: 0000000000000000 RSI: 0000000000010001 RDI: 0000000000000004 [ 794.966334][ T6829] RBP: 00007ffa9fea7090 R08: 0000000000000000 R09: 0000000000000000 [ 794.966374][ T6829] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 794.966389][ T6829] R13: 00007ffaa16c6038 R14: 00007ffaa16c5fa0 R15: 00007fff77b3fc28 [ 794.966416][ T6829] [ 795.244343][ T6841] option changes via remount are deprecated (pid=6840 comm=syz.0.11563) [ 795.291407][ T6841] netlink: 4 bytes leftover after parsing attributes in process `syz.0.11563'. [ 795.432692][ T6851] syzkaller0: entered promiscuous mode [ 795.436305][ T6823] Set syz1 is full, maxelem 65536 reached [ 795.438357][ T6851] syzkaller0: entered allmulticast mode [ 795.730263][ T6870] hub 8-0:1.0: USB hub found [ 795.735059][ T6870] hub 8-0:1.0: 8 ports detected [ 795.952574][ T6879] netlink: 20 bytes leftover after parsing attributes in process `syz.0.11575'. [ 795.963534][ T6879] program syz.0.11575 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 796.320733][ T6897] netlink: 'syz.5.11578': attribute type 21 has an invalid length. [ 796.328747][ T6897] netlink: 128 bytes leftover after parsing attributes in process `syz.5.11578'. [ 796.344125][ T6897] netlink: 'syz.5.11578': attribute type 4 has an invalid length. [ 796.352170][ T6897] netlink: 'syz.5.11578': attribute type 5 has an invalid length. [ 796.360118][ T6897] netlink: 3 bytes leftover after parsing attributes in process `syz.5.11578'. [ 796.430662][ T6905] option changes via remount are deprecated (pid=6904 comm=syz.5.11580) [ 796.472366][ T6905] netlink: 4 bytes leftover after parsing attributes in process `syz.5.11580'. [ 796.785218][ T6931] FAULT_INJECTION: forcing a failure. [ 796.785218][ T6931] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 796.798497][ T6931] CPU: 1 UID: 0 PID: 6931 Comm: syz.5.11590 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 796.798536][ T6931] Tainted: [W]=WARN [ 796.798546][ T6931] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 796.798631][ T6931] Call Trace: [ 796.798640][ T6931] [ 796.798652][ T6931] __dump_stack+0x1d/0x30 [ 796.798692][ T6931] dump_stack_lvl+0x95/0xd0 [ 796.798716][ T6931] dump_stack+0x15/0x1b [ 796.798779][ T6931] should_fail_ex+0x263/0x280 [ 796.798837][ T6931] should_fail+0xb/0x20 [ 796.798875][ T6931] should_fail_usercopy+0x1a/0x20 [ 796.798925][ T6931] _copy_to_user+0x20/0xa0 [ 796.799012][ T6931] simple_read_from_buffer+0xb5/0x130 [ 796.799092][ T6931] proc_fail_nth_read+0x10e/0x150 [ 796.799133][ T6931] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 796.799238][ T6931] vfs_read+0x1ab/0x7f0 [ 796.799338][ T6931] ? __pfx_seq_read+0x10/0x10 [ 796.799424][ T6931] ? vfs_read+0x4eb/0x7f0 [ 796.799450][ T6931] ? putname+0x90/0x100 [ 796.799484][ T6931] ksys_read+0xdc/0x1a0 [ 796.799536][ T6931] __x64_sys_read+0x40/0x50 [ 796.799563][ T6931] x64_sys_call+0x2889/0x3000 [ 796.799595][ T6931] do_syscall_64+0xc0/0x2a0 [ 796.799685][ T6931] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 796.799768][ T6931] RIP: 0033:0x7fe42051b78e [ 796.799790][ T6931] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 796.799815][ T6931] RSP: 002b:00007fe41efb6fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 796.799896][ T6931] RAX: ffffffffffffffda RBX: 00007fe41efb76c0 RCX: 00007fe42051b78e [ 796.799916][ T6931] RDX: 000000000000000f RSI: 00007fe41efb70a0 RDI: 0000000000000004 [ 796.799934][ T6931] RBP: 00007fe41efb7090 R08: 0000000000000000 R09: 0000000000000000 [ 796.800032][ T6931] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 796.800103][ T6931] R13: 00007fe4207d6038 R14: 00007fe4207d5fa0 R15: 00007ffee63e2188 [ 796.800126][ T6931] [ 797.000743][ T29] kauditd_printk_skb: 15 callbacks suppressed [ 797.000779][ T29] audit: type=1326 audit(4137606509.938:11639): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6928 comm="syz.0.11589" exe="/root/syz-executor" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7ffa4c14aeb9 code=0x0 [ 797.148687][ T6938] netlink: 'syz.5.11592': attribute type 21 has an invalid length. [ 797.156720][ T6938] netlink: 128 bytes leftover after parsing attributes in process `syz.5.11592'. [ 797.171471][ T6938] netlink: 'syz.5.11592': attribute type 4 has an invalid length. [ 797.179391][ T6938] netlink: 'syz.5.11592': attribute type 5 has an invalid length. [ 797.187273][ T6938] netlink: 3 bytes leftover after parsing attributes in process `syz.5.11592'. [ 797.195816][ T6941] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=43562 sclass=netlink_route_socket pid=6941 comm=syz.7.11593 [ 797.269488][ T6945] option changes via remount are deprecated (pid=6944 comm=syz.7.11595) [ 797.300001][ T6945] netlink: 4 bytes leftover after parsing attributes in process `syz.7.11595'. [ 797.481508][ T6955] hub 8-0:1.0: USB hub found [ 797.486667][ T6955] hub 8-0:1.0: 8 ports detected [ 797.516117][ T29] audit: type=1400 audit(4137606510.448:11640): avc: denied { nlmsg_write } for pid=6952 comm="syz.4.11598" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_audit_socket permissive=1 [ 797.830152][ T6964] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 798.006560][ T6964] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 798.021619][ T6975] netlink: 'syz.7.11606': attribute type 21 has an invalid length. [ 798.030052][ T6975] netlink: 128 bytes leftover after parsing attributes in process `syz.7.11606'. [ 798.039540][ T6975] netlink: 'syz.7.11606': attribute type 4 has an invalid length. [ 798.047621][ T6975] netlink: 'syz.7.11606': attribute type 5 has an invalid length. [ 798.078127][ T6964] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 798.117082][ T6977] option changes via remount are deprecated (pid=6976 comm=syz.9.11607) [ 798.148003][ T6964] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 798.267091][T12121] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 798.363006][ T6998] can0: slcan on ttyS3. [ 798.376332][T12121] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 798.385892][T12121] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 798.396700][T12121] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 798.444395][ T6998] can0 (unregistered): slcan off ttyS3. [ 798.498331][ T7004] netlink: 'syz.7.11619': attribute type 21 has an invalid length. [ 798.598158][ T7009] option changes via remount are deprecated (pid=7007 comm=syz.9.11621) [ 798.621505][ T29] audit: type=1326 audit(4137606511.548:11641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7011 comm="syz.5.11622" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fe42055aeb9 code=0x0 [ 798.676049][ T29] audit: type=1400 audit(4137606511.608:11642): avc: denied { checkpoint_restore } for pid=7011 comm="syz.5.11622" capability=40 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 799.022684][ T29] audit: type=1400 audit(4137606511.948:11643): avc: denied { write } for pid=7042 comm="syz.9.11636" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 [ 799.427843][ T7072] __nla_validate_parse: 8 callbacks suppressed [ 799.427866][ T7072] netlink: 128 bytes leftover after parsing attributes in process `syz.9.11647'. [ 799.443466][ T7072] netlink: 3 bytes leftover after parsing attributes in process `syz.9.11647'. [ 799.489142][ T7076] FAULT_INJECTION: forcing a failure. [ 799.489142][ T7076] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 799.502317][ T7076] CPU: 1 UID: 0 PID: 7076 Comm: syz.4.11649 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 799.502427][ T7076] Tainted: [W]=WARN [ 799.502437][ T7076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 799.502454][ T7076] Call Trace: [ 799.502460][ T7076] [ 799.502470][ T7076] __dump_stack+0x1d/0x30 [ 799.502503][ T7076] dump_stack_lvl+0x95/0xd0 [ 799.502546][ T7076] dump_stack+0x15/0x1b [ 799.502574][ T7076] should_fail_ex+0x263/0x280 [ 799.502639][ T7076] should_fail+0xb/0x20 [ 799.502675][ T7076] should_fail_usercopy+0x1a/0x20 [ 799.502721][ T7076] _copy_from_user+0x1c/0xb0 [ 799.502826][ T7076] sctp_getsockopt_connectx3+0xd9/0x340 [ 799.502912][ T7076] sctp_getsockopt+0x910/0xaa0 [ 799.502940][ T7076] sock_common_getsockopt+0x60/0x70 [ 799.502978][ T7076] ? __pfx_sock_common_getsockopt+0x10/0x10 [ 799.503015][ T7076] do_sock_getsockopt+0x1c4/0x210 [ 799.503101][ T7076] __x64_sys_getsockopt+0x11d/0x1a0 [ 799.503238][ T7076] x64_sys_call+0x2dc7/0x3000 [ 799.503358][ T7076] do_syscall_64+0xc0/0x2a0 [ 799.503417][ T7076] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 799.503444][ T7076] RIP: 0033:0x7feafd92aeb9 [ 799.503540][ T7076] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 799.503566][ T7076] RSP: 002b:00007feafc387028 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 799.503630][ T7076] RAX: ffffffffffffffda RBX: 00007feafdba5fa0 RCX: 00007feafd92aeb9 [ 799.503650][ T7076] RDX: 000000000000006f RSI: 0000000000000084 RDI: 0000000000000003 [ 799.503725][ T7076] RBP: 00007feafc387090 R08: 0000200000000180 R09: 0000000000000000 [ 799.503779][ T7076] R10: 0000200000000040 R11: 0000000000000246 R12: 0000000000000001 [ 799.503793][ T7076] R13: 00007feafdba6038 R14: 00007feafdba5fa0 R15: 00007fffacbf3388 [ 799.503822][ T7076] [ 799.839168][ T7092] No source specified [ 799.942483][ T7104] netlink: 128 bytes leftover after parsing attributes in process `syz.4.11661'. [ 799.958919][ T7104] netlink: 3 bytes leftover after parsing attributes in process `syz.4.11661'. [ 800.007334][ T7108] vlan2: entered allmulticast mode [ 800.012539][ T7108] bridge_slave_0: entered allmulticast mode [ 800.041329][ T7100] netlink: 76 bytes leftover after parsing attributes in process `syz.5.11659'. [ 800.192570][ T7125] xt_CONNSECMARK: invalid mode: 0 [ 800.215729][ T7127] netlink: 8 bytes leftover after parsing attributes in process `syz.9.11671'. [ 800.260476][ T7127] A link change request failed with some changes committed already. Interface wg1 may have been left with an inconsistent configuration, please check. [ 800.404144][ T29] audit: type=1326 audit(4137606513.328:11644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7145 comm="syz.7.11679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2b731aeb9 code=0x7ffc0000 [ 800.427940][ T29] audit: type=1326 audit(4137606513.328:11645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7145 comm="syz.7.11679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2b731aeb9 code=0x7ffc0000 [ 800.456596][ T29] audit: type=1326 audit(4137606513.388:11646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7145 comm="syz.7.11679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7fb2b731aeb9 code=0x7ffc0000 [ 800.480347][ T29] audit: type=1326 audit(4137606513.388:11647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7145 comm="syz.7.11679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2b731aeb9 code=0x7ffc0000 [ 800.508727][ T29] audit: type=1326 audit(4137606513.438:11648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7145 comm="syz.7.11679" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7fb2b731aeb9 code=0x7ffc0000 [ 800.603808][ T7165] FAULT_INJECTION: forcing a failure. [ 800.603808][ T7165] name failslab, interval 1, probability 0, space 0, times 0 [ 800.616574][ T7165] CPU: 1 UID: 0 PID: 7165 Comm: syz.0.11686 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 800.616604][ T7165] Tainted: [W]=WARN [ 800.616691][ T7165] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 800.616703][ T7165] Call Trace: [ 800.616709][ T7165] [ 800.616717][ T7165] __dump_stack+0x1d/0x30 [ 800.616755][ T7165] dump_stack_lvl+0x95/0xd0 [ 800.616775][ T7165] dump_stack+0x15/0x1b [ 800.616793][ T7165] should_fail_ex+0x263/0x280 [ 800.616822][ T7165] should_failslab+0x8c/0xb0 [ 800.616872][ T7165] kmem_cache_alloc_noprof+0x68/0x490 [ 800.616895][ T7165] ? getname_flags+0x7f/0x3b0 [ 800.616998][ T7165] ? vfs_write+0x86e/0x9f0 [ 800.617044][ T7165] getname_flags+0x7f/0x3b0 [ 800.617126][ T7165] user_path_at+0x28/0x130 [ 800.617200][ T7165] do_fchownat+0x92/0x1e0 [ 800.617225][ T7165] __x64_sys_fchownat+0x64/0x80 [ 800.617250][ T7165] x64_sys_call+0x1d79/0x3000 [ 800.617275][ T7165] do_syscall_64+0xc0/0x2a0 [ 800.617304][ T7165] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 800.617404][ T7165] RIP: 0033:0x7ffa4c14aeb9 [ 800.617419][ T7165] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 800.617436][ T7165] RSP: 002b:00007ffa4aba7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000104 [ 800.617454][ T7165] RAX: ffffffffffffffda RBX: 00007ffa4c3c5fa0 RCX: 00007ffa4c14aeb9 [ 800.617498][ T7165] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000005 [ 800.617510][ T7165] RBP: 00007ffa4aba7090 R08: 0000000000001000 R09: 0000000000000000 [ 800.617522][ T7165] R10: 00000000ffffffff R11: 0000000000000246 R12: 0000000000000001 [ 800.617533][ T7165] R13: 00007ffa4c3c6038 R14: 00007ffa4c3c5fa0 R15: 00007ffef58739d8 [ 800.617580][ T7165] [ 800.823713][ T7173] netlink: 36 bytes leftover after parsing attributes in process `syz.4.11689'. [ 800.835768][ T7169] bond1: entered promiscuous mode [ 800.850874][ T7169] 8021q: adding VLAN 0 to HW filter on device bond1 [ 800.862881][ T7161] netlink: 12 bytes leftover after parsing attributes in process `syz.9.11683'. [ 800.875156][ T7169] netlink: 28 bytes leftover after parsing attributes in process `syz.0.11688'. [ 800.887369][ T7169] bond1: entered allmulticast mode [ 801.133332][ T7196] ip6_vti0 speed is unknown, defaulting to 1000 [ 801.287308][ T7219] netlink: 128 bytes leftover after parsing attributes in process `syz.5.11704'. [ 801.391804][ T7229] option changes via remount are deprecated (pid=7228 comm=syz.5.11709) [ 801.594623][ T7253] FAULT_INJECTION: forcing a failure. [ 801.594623][ T7253] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 801.607831][ T7253] CPU: 0 UID: 0 PID: 7253 Comm: syz.5.11719 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 801.607866][ T7253] Tainted: [W]=WARN [ 801.607875][ T7253] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 801.607996][ T7253] Call Trace: [ 801.608003][ T7253] [ 801.608011][ T7253] __dump_stack+0x1d/0x30 [ 801.608043][ T7253] dump_stack_lvl+0x95/0xd0 [ 801.608072][ T7253] dump_stack+0x15/0x1b [ 801.608096][ T7253] should_fail_ex+0x263/0x280 [ 801.608169][ T7253] should_fail+0xb/0x20 [ 801.608274][ T7253] should_fail_usercopy+0x1a/0x20 [ 801.608314][ T7253] _copy_from_user+0x1c/0xb0 [ 801.608343][ T7253] ___sys_sendmsg+0xc1/0x1e0 [ 801.608390][ T7253] __sys_sendmmsg+0x185/0x320 [ 801.608483][ T7253] __x64_sys_sendmmsg+0x57/0x70 [ 801.608511][ T7253] x64_sys_call+0x1e28/0x3000 [ 801.608545][ T7253] do_syscall_64+0xc0/0x2a0 [ 801.608585][ T7253] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 801.608608][ T7253] RIP: 0033:0x7fe42055aeb9 [ 801.608635][ T7253] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 801.608660][ T7253] RSP: 002b:00007fe41efb7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 801.608687][ T7253] RAX: ffffffffffffffda RBX: 00007fe4207d5fa0 RCX: 00007fe42055aeb9 [ 801.608707][ T7253] RDX: 0000000000000002 RSI: 0000200000002280 RDI: 0000000000000003 [ 801.608769][ T7253] RBP: 00007fe41efb7090 R08: 0000000000000000 R09: 0000000000000000 [ 801.608786][ T7253] R10: 00000000040088c5 R11: 0000000000000246 R12: 0000000000000001 [ 801.608802][ T7253] R13: 00007fe4207d6038 R14: 00007fe4207d5fa0 R15: 00007ffee63e2188 [ 801.608830][ T7253] [ 801.871892][ T7263] loop7: detected capacity change from 0 to 512 [ 801.889844][ T7263] msdos: Unknown parameter './file0' [ 802.115962][ T7270] xt_CONNSECMARK: invalid mode: 0 [ 802.124196][ T29] kauditd_printk_skb: 84 callbacks suppressed [ 802.124214][ T29] audit: type=1400 audit(4137606515.048:11733): avc: denied { setopt } for pid=7262 comm="syz.7.11723" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 802.150127][ T29] audit: type=1400 audit(4137606515.048:11734): avc: denied { write } for pid=7262 comm="syz.7.11723" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 [ 802.298623][ T7271] IPVS: set_ctl: invalid protocol: 60 10.1.1.1:20001 [ 802.420639][ T29] audit: type=1400 audit(4137606515.348:11735): avc: denied { read write } for pid=7273 comm="syz.4.11725" name="rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 802.445166][ T29] audit: type=1400 audit(4137606515.348:11736): avc: denied { open } for pid=7273 comm="syz.4.11725" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=252 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:infiniband_device_t tclass=chr_file permissive=1 [ 802.610556][ T29] audit: type=1400 audit(4137606515.538:11737): avc: denied { append } for pid=7279 comm="syz.4.11726" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 802.822599][ T7299] 9pnet_fd: Insufficient options for proto=fd [ 802.862405][ T29] audit: type=1400 audit(4137606515.788:11738): avc: denied { setopt } for pid=7305 comm="syz.7.11737" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 802.909556][ T7312] FAULT_INJECTION: forcing a failure. [ 802.909556][ T7312] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 802.910129][ T29] audit: type=1400 audit(4137606515.838:11739): avc: denied { bind } for pid=7310 comm="syz.4.11738" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 802.922887][ T7312] CPU: 1 UID: 0 PID: 7312 Comm: syz.4.11738 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 802.923087][ T7312] Tainted: [W]=WARN [ 802.923110][ T7312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 802.923180][ T7312] Call Trace: [ 802.923210][ T7312] [ 802.923235][ T7312] __dump_stack+0x1d/0x30 [ 802.923323][ T7312] dump_stack_lvl+0x95/0xd0 [ 802.923414][ T7312] dump_stack+0x15/0x1b [ 802.923484][ T7312] should_fail_ex+0x263/0x280 [ 802.923608][ T7312] should_fail+0xb/0x20 [ 802.923697][ T7312] should_fail_usercopy+0x1a/0x20 [ 802.923847][ T7312] _copy_to_user+0x20/0xa0 [ 802.923925][ T7312] simple_read_from_buffer+0xb5/0x130 [ 802.924119][ T7312] proc_fail_nth_read+0x10e/0x150 [ 802.924273][ T7312] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 802.924378][ T7312] vfs_read+0x1ab/0x7f0 [ 802.924473][ T7312] ? __rcu_read_unlock+0x4e/0x70 [ 802.924580][ T7312] ? __fget_files+0x184/0x1c0 [ 802.924691][ T7312] ? mutex_lock+0x57/0x90 [ 802.924782][ T7312] ksys_read+0xdc/0x1a0 [ 802.924907][ T7312] __x64_sys_read+0x40/0x50 [ 802.925000][ T7312] x64_sys_call+0x2889/0x3000 [ 802.925141][ T7312] do_syscall_64+0xc0/0x2a0 [ 802.925249][ T7312] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 802.925347][ T7312] RIP: 0033:0x7feafd8eb78e [ 802.925423][ T7312] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 802.925478][ T7312] RSP: 002b:00007feafc386fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 802.925546][ T7312] RAX: ffffffffffffffda RBX: 00007feafc3876c0 RCX: 00007feafd8eb78e [ 802.925595][ T7312] RDX: 000000000000000f RSI: 00007feafc3870a0 RDI: 0000000000000006 [ 802.925698][ T7312] RBP: 00007feafc387090 R08: 0000000000000000 R09: 0000000000000000 [ 802.925762][ T7312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 802.925818][ T7312] R13: 00007feafdba6038 R14: 00007feafdba5fa0 R15: 00007fffacbf3388 [ 802.925909][ T7312] [ 803.034607][ T7316] program syz.9.11731 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 803.036063][ T29] audit: type=1400 audit(4137606515.838:11740): avc: denied { listen } for pid=7291 comm="syz.9.11731" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 803.168815][ T29] audit: type=1400 audit(4137606515.838:11741): avc: denied { accept } for pid=7291 comm="syz.9.11731" lport=46553 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 803.211032][ T7322] loop7: detected capacity change from 0 to 128 [ 803.215797][ T29] audit: type=1400 audit(4137606515.958:11742): avc: denied { read } for pid=7291 comm="syz.9.11731" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 803.258266][ T7322] FAT-fs (loop7): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 803.270527][ T7322] FAT-fs (loop7): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 803.281343][ T7322] vfat filesystem being mounted at /316/file0 supports timestamps until 2107-12-31 (0x10391447e) [ 803.292802][ T7327] FAULT_INJECTION: forcing a failure. [ 803.292802][ T7327] name failslab, interval 1, probability 0, space 0, times 0 [ 803.305561][ T7327] CPU: 1 UID: 0 PID: 7327 Comm: syz.4.11741 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 803.305613][ T7327] Tainted: [W]=WARN [ 803.305621][ T7327] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 803.305635][ T7327] Call Trace: [ 803.305644][ T7327] [ 803.305656][ T7327] __dump_stack+0x1d/0x30 [ 803.305689][ T7327] dump_stack_lvl+0x95/0xd0 [ 803.305793][ T7327] dump_stack+0x15/0x1b [ 803.305820][ T7327] should_fail_ex+0x263/0x280 [ 803.305858][ T7327] should_failslab+0x8c/0xb0 [ 803.305888][ T7327] kmem_cache_alloc_node_noprof+0x6a/0x4a0 [ 803.305974][ T7327] ? __alloc_skb+0x2f0/0x4b0 [ 803.306006][ T7327] __alloc_skb+0x2f0/0x4b0 [ 803.306035][ T7327] ? __alloc_skb+0x219/0x4b0 [ 803.306090][ T7327] netlink_ack+0xfd/0x500 [ 803.306138][ T7327] netlink_rcv_skb+0x192/0x220 [ 803.306170][ T7327] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 803.306211][ T7327] rtnetlink_rcv+0x1c/0x30 [ 803.306300][ T7327] netlink_unicast+0x5c0/0x690 [ 803.306418][ T7327] netlink_sendmsg+0x5c8/0x6f0 [ 803.306441][ T7327] ? __pfx_netlink_sendmsg+0x10/0x10 [ 803.306461][ T7327] ____sys_sendmsg+0x5af/0x600 [ 803.306492][ T7327] ___sys_sendmsg+0x195/0x1e0 [ 803.306560][ T7327] __x64_sys_sendmsg+0xd4/0x160 [ 803.306589][ T7327] x64_sys_call+0x17ba/0x3000 [ 803.306623][ T7327] do_syscall_64+0xc0/0x2a0 [ 803.306694][ T7327] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 803.306764][ T7327] RIP: 0033:0x7feafd92aeb9 [ 803.306853][ T7327] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 803.306873][ T7327] RSP: 002b:00007feafc366028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 803.306899][ T7327] RAX: ffffffffffffffda RBX: 00007feafdba6090 RCX: 00007feafd92aeb9 [ 803.306918][ T7327] RDX: 0000000024040004 RSI: 00002000000001c0 RDI: 0000000000000004 [ 803.306990][ T7327] RBP: 00007feafc366090 R08: 0000000000000000 R09: 0000000000000000 [ 803.307060][ T7327] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 803.307077][ T7327] R13: 00007feafdba6128 R14: 00007feafdba6090 R15: 00007fffacbf3388 [ 803.307101][ T7327] [ 803.542740][ T7322] ip6_vti0 speed is unknown, defaulting to 1000 [ 803.765028][ T7338] xt_CONNSECMARK: invalid mode: 0 [ 804.131675][ T7351] syzkaller0: entered allmulticast mode [ 804.137957][ T7351] syzkaller0: entered promiscuous mode [ 804.458870][ T7373] __nla_validate_parse: 8 callbacks suppressed [ 804.458887][ T7373] netlink: 20 bytes leftover after parsing attributes in process `syz.7.11755'. [ 804.475873][ T7373] program syz.7.11755 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 804.870549][ T7398] openvswitch: netlink: Missing key (keys=40, expected=2000) [ 804.883124][ T7398] geneve2: entered promiscuous mode [ 804.955680][ T7350] syzkaller0: left promiscuous mode [ 804.961191][ T7350] syzkaller0: left allmulticast mode [ 805.188440][ T7415] xt_CONNSECMARK: invalid mode: 0 [ 805.930452][ T7451] netlink: 24 bytes leftover after parsing attributes in process `syz.0.11785'. [ 805.941354][ T7453] FAULT_INJECTION: forcing a failure. [ 805.941354][ T7453] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 805.955120][ T7453] CPU: 1 UID: 0 PID: 7453 Comm: syz.5.11784 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 805.955170][ T7453] Tainted: [W]=WARN [ 805.955179][ T7453] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 805.955197][ T7453] Call Trace: [ 805.955272][ T7453] [ 805.955282][ T7453] __dump_stack+0x1d/0x30 [ 805.955316][ T7453] dump_stack_lvl+0x95/0xd0 [ 805.955408][ T7453] dump_stack+0x15/0x1b [ 805.955435][ T7453] should_fail_ex+0x263/0x280 [ 805.955479][ T7453] should_fail+0xb/0x20 [ 805.955516][ T7453] should_fail_usercopy+0x1a/0x20 [ 805.955567][ T7453] strncpy_from_user+0x27/0x250 [ 805.955679][ T7453] getname_flags+0xad/0x3b0 [ 805.955716][ T7453] getname_uflags+0x21/0x30 [ 805.955786][ T7453] __x64_sys_execveat+0x5d/0x90 [ 805.955812][ T7453] x64_sys_call+0x1c0e/0x3000 [ 805.955898][ T7453] do_syscall_64+0xc0/0x2a0 [ 805.955941][ T7453] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 805.955996][ T7453] RIP: 0033:0x7fe42055aeb9 [ 805.956017][ T7453] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 805.956042][ T7453] RSP: 002b:00007fe41efb7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 805.956069][ T7453] RAX: ffffffffffffffda RBX: 00007fe4207d5fa0 RCX: 00007fe42055aeb9 [ 805.956086][ T7453] RDX: 0000000000000000 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 805.956140][ T7453] RBP: 00007fe41efb7090 R08: 0000000000001000 R09: 0000000000000000 [ 805.956157][ T7453] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 805.956176][ T7453] R13: 00007fe4207d6038 R14: 00007fe4207d5fa0 R15: 00007ffee63e2188 [ 805.956203][ T7453] [ 806.165651][ T7458] loop7: detected capacity change from 0 to 164 [ 806.210465][ T7458] ISOFS: root inode is unusable. Disabling Rock Ridge and switching to Joliet. [ 806.331729][ T7465] hub 8-0:1.0: USB hub found [ 806.336799][ T7465] hub 8-0:1.0: 8 ports detected [ 806.435420][ T7469] loop7: detected capacity change from 0 to 512 [ 806.442359][ T7469] msdos: Unknown parameter './file0' [ 806.574133][ T7470] program syz.9.11791 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 806.671215][ T7472] xt_CONNSECMARK: invalid mode: 0 [ 807.175854][ T29] kauditd_printk_skb: 38 callbacks suppressed [ 807.175874][ T29] audit: type=1404 audit(4137606520.108:11781): enforcing=1 old_enforcing=0 auid=4294967295 ses=4294967295 enabled=1 old-enabled=1 lsm=selinux res=1 [ 807.207131][ T29] audit: type=1400 audit(4137606520.108:11782): avc: denied { map_create } for pid=7479 comm="syz.9.11795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 807.227156][ T29] audit: type=1400 audit(4137606520.128:11783): avc: denied { prog_load } for pid=7479 comm="syz.9.11795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 807.246970][ T29] audit: type=1400 audit(4137606520.128:11784): avc: denied { prog_load } for pid=7479 comm="syz.9.11795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 807.266393][ T29] audit: type=1400 audit(4137606520.128:11785): avc: denied { map_create } for pid=7479 comm="syz.9.11795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 807.285827][ T29] audit: type=1400 audit(4137606520.128:11786): avc: denied { prog_load } for pid=7479 comm="syz.9.11795" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 807.350432][ T29] audit: type=1400 audit(4137606520.138:11787): avc: denied { create } for pid=7481 comm="syz.0.11796" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 807.370234][ T29] audit: type=1400 audit(4137606520.158:11788): avc: denied { bpf } for pid=7483 comm="syz.9.11797" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=0 [ 807.391003][ T29] audit: type=1400 audit(4137606520.158:11789): avc: denied { bind } for pid=7477 comm="syz.4.11794" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=0 [ 807.410659][ T29] audit: type=1400 audit(4137606520.238:11790): avc: denied { write } for pid=7481 comm="syz.0.11796" name="ptp0" dev="devtmpfs" ino=247 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=0 [ 807.866421][ T7549] FAULT_INJECTION: forcing a failure. [ 807.866421][ T7549] name failslab, interval 1, probability 0, space 0, times 0 [ 807.879245][ T7549] CPU: 0 UID: 0 PID: 7549 Comm: syz.7.11823 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 807.879291][ T7549] Tainted: [W]=WARN [ 807.879302][ T7549] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 807.879321][ T7549] Call Trace: [ 807.879329][ T7549] [ 807.879410][ T7549] __dump_stack+0x1d/0x30 [ 807.879444][ T7549] dump_stack_lvl+0x95/0xd0 [ 807.879494][ T7549] dump_stack+0x15/0x1b [ 807.879521][ T7549] should_fail_ex+0x263/0x280 [ 807.879563][ T7549] should_failslab+0x8c/0xb0 [ 807.879594][ T7549] __kmalloc_cache_noprof+0x64/0x4a0 [ 807.879665][ T7549] ? rtnl_newlink+0x5c/0x1370 [ 807.879729][ T7549] ? __pfx_rtnl_newlink+0x10/0x10 [ 807.879760][ T7549] rtnl_newlink+0x5c/0x1370 [ 807.879808][ T7549] ? __rcu_read_unlock+0x4e/0x70 [ 807.879847][ T7549] ? strlen+0x19/0x40 [ 807.879947][ T7549] ? __memcg_slab_free_hook+0x135/0x230 [ 807.880070][ T7549] ? __rcu_read_unlock+0x4e/0x70 [ 807.880109][ T7549] ? avc_has_perm_noaudit+0xab/0x130 [ 807.880165][ T7549] ? cred_has_capability+0x224/0x290 [ 807.880207][ T7549] ? selinux_capable+0x31/0x40 [ 807.880232][ T7549] ? security_capable+0x7b/0x90 [ 807.880272][ T7549] ? ns_capable+0x7c/0xb0 [ 807.880310][ T7549] ? __pfx_rtnl_newlink+0x10/0x10 [ 807.880335][ T7549] rtnetlink_rcv_msg+0x64b/0x720 [ 807.880419][ T7549] netlink_rcv_skb+0x123/0x220 [ 807.880455][ T7549] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 807.880507][ T7549] rtnetlink_rcv+0x1c/0x30 [ 807.880529][ T7549] netlink_unicast+0x5c0/0x690 [ 807.880565][ T7549] netlink_sendmsg+0x5c8/0x6f0 [ 807.880589][ T7549] ? __pfx_netlink_sendmsg+0x10/0x10 [ 807.880644][ T7549] ____sys_sendmsg+0x5af/0x600 [ 807.880669][ T7549] ___sys_sendmsg+0x195/0x1e0 [ 807.880704][ T7549] __x64_sys_sendmsg+0xd4/0x160 [ 807.880730][ T7549] x64_sys_call+0x17ba/0x3000 [ 807.880838][ T7549] do_syscall_64+0xc0/0x2a0 [ 807.880915][ T7549] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 807.880939][ T7549] RIP: 0033:0x7fb2b731aeb9 [ 807.880956][ T7549] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 807.881020][ T7549] RSP: 002b:00007fb2b5d77028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 807.881043][ T7549] RAX: ffffffffffffffda RBX: 00007fb2b7595fa0 RCX: 00007fb2b731aeb9 [ 807.881059][ T7549] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000010 [ 807.881145][ T7549] RBP: 00007fb2b5d77090 R08: 0000000000000000 R09: 0000000000000000 [ 807.881159][ T7549] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 807.881173][ T7549] R13: 00007fb2b7596038 R14: 00007fb2b7595fa0 R15: 00007ffcaf06e9c8 [ 807.881195][ T7549] [ 807.883941][ T7551] netlink: 80 bytes leftover after parsing attributes in process `syz.0.11824'. [ 808.507885][ T7568] netlink: 4 bytes leftover after parsing attributes in process `syz.5.11830'. [ 809.044670][ T7586] FAULT_INJECTION: forcing a failure. [ 809.044670][ T7586] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 809.058002][ T7586] CPU: 0 UID: 0 PID: 7586 Comm: syz.7.11837 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 809.058037][ T7586] Tainted: [W]=WARN [ 809.058045][ T7586] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 809.058127][ T7586] Call Trace: [ 809.058135][ T7586] [ 809.058144][ T7586] __dump_stack+0x1d/0x30 [ 809.058170][ T7586] dump_stack_lvl+0x95/0xd0 [ 809.058200][ T7586] dump_stack+0x15/0x1b [ 809.058227][ T7586] should_fail_ex+0x263/0x280 [ 809.058335][ T7586] should_fail+0xb/0x20 [ 809.058369][ T7586] should_fail_usercopy+0x1a/0x20 [ 809.058408][ T7586] _copy_to_user+0x20/0xa0 [ 809.058436][ T7586] simple_read_from_buffer+0xb5/0x130 [ 809.058643][ T7586] proc_fail_nth_read+0x10e/0x150 [ 809.058671][ T7586] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 809.058695][ T7586] vfs_read+0x1ab/0x7f0 [ 809.058711][ T7586] ? __rcu_read_unlock+0x4e/0x70 [ 809.058783][ T7586] ? __fget_files+0x184/0x1c0 [ 809.058813][ T7586] ? mutex_lock+0x57/0x90 [ 809.058838][ T7586] ksys_read+0xdc/0x1a0 [ 809.058863][ T7586] __x64_sys_read+0x40/0x50 [ 809.058931][ T7586] x64_sys_call+0x2889/0x3000 [ 809.058954][ T7586] do_syscall_64+0xc0/0x2a0 [ 809.059008][ T7586] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 809.059027][ T7586] RIP: 0033:0x7fb2b72db78e [ 809.059095][ T7586] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 809.059112][ T7586] RSP: 002b:00007fb2b5d76fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 809.059130][ T7586] RAX: ffffffffffffffda RBX: 00007fb2b5d776c0 RCX: 00007fb2b72db78e [ 809.059196][ T7586] RDX: 000000000000000f RSI: 00007fb2b5d770a0 RDI: 0000000000000003 [ 809.059208][ T7586] RBP: 00007fb2b5d77090 R08: 0000000000000000 R09: 0000000000000000 [ 809.059220][ T7586] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 809.059231][ T7586] R13: 00007fb2b7596038 R14: 00007fb2b7595fa0 R15: 00007ffcaf06e9c8 [ 809.059249][ T7586] [ 809.299452][ T7590] validate_nla: 17 callbacks suppressed [ 809.299475][ T7590] netlink: 'syz.7.11839': attribute type 8 has an invalid length. [ 809.313101][ T7590] netlink: 4 bytes leftover after parsing attributes in process `syz.7.11839'. [ 809.483731][ T7599] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 809.496708][ T7601] netlink: 'syz.5.11843': attribute type 21 has an invalid length. [ 809.504791][ T7601] netlink: 128 bytes leftover after parsing attributes in process `syz.5.11843'. [ 809.514467][ T7601] netlink: 'syz.5.11843': attribute type 4 has an invalid length. [ 809.522316][ T7601] netlink: 'syz.5.11843': attribute type 5 has an invalid length. [ 809.530299][ T7601] netlink: 3 bytes leftover after parsing attributes in process `syz.5.11843'. [ 809.644171][ T7590] ================================================================== [ 809.652311][ T7590] BUG: KCSAN: data-race in atime_needs_update / touch_atime [ 809.659650][ T7590] [ 809.661996][ T7590] write to 0xffff888105277540 of 4 bytes by task 7594 on cpu 1: [ 809.669657][ T7590] touch_atime+0x1e8/0x340 [ 809.674118][ T7590] shmem_file_read_iter+0x477/0x540 [ 809.679366][ T7590] copy_splice_read+0x471/0x6c0 [ 809.684271][ T7590] splice_direct_to_actor+0x28f/0x670 [ 809.689679][ T7590] do_splice_direct+0x119/0x1a0 [ 809.694561][ T7590] do_sendfile+0x382/0x650 [ 809.699030][ T7590] __x64_sys_sendfile64+0x105/0x150 [ 809.704287][ T7590] x64_sys_call+0x2db1/0x3000 [ 809.709022][ T7590] do_syscall_64+0xc0/0x2a0 [ 809.713575][ T7590] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 809.719527][ T7590] [ 809.721881][ T7590] read to 0xffff888105277540 of 4 bytes by task 7590 on cpu 0: [ 809.729445][ T7590] atime_needs_update+0x25f/0x3e0 [ 809.734537][ T7590] touch_atime+0x4a/0x340 [ 809.738921][ T7590] shmem_file_read_iter+0x477/0x540 [ 809.744194][ T7590] copy_splice_read+0x471/0x6c0 [ 809.749097][ T7590] splice_direct_to_actor+0x28f/0x670 [ 809.754501][ T7590] do_splice_direct+0x119/0x1a0 [ 809.759377][ T7590] do_sendfile+0x382/0x650 [ 809.763836][ T7590] __x64_sys_sendfile64+0x105/0x150 [ 809.769075][ T7590] x64_sys_call+0x2db1/0x3000 [ 809.773804][ T7590] do_syscall_64+0xc0/0x2a0 [ 809.778351][ T7590] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 809.784277][ T7590] [ 809.786622][ T7590] value changed: 0x21dd0215 -> 0x22759895 [ 809.792364][ T7590] [ 809.794717][ T7590] Reported by Kernel Concurrency Sanitizer on: [ 809.800890][ T7590] CPU: 0 UID: 0 PID: 7590 Comm: syz.7.11839 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 809.812308][ T7590] Tainted: [W]=WARN [ 809.816138][ T7590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 809.826229][ T7590] ==================================================================