last executing test programs: 3m40.576665945s ago: executing program 2 (id=1397): r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$EBT_SO_GET_ENTRIES(r0, 0x0, 0x81, &(0x7f0000000140)={'filter\x00', 0x0, 0x3, 0xd2, [0x4, 0x4, 0x9, 0x5, 0x5, 0x7ff], 0x2, &(0x7f0000000000)=[{}, {}], &(0x7f0000000040)=""/210}, &(0x7f00000001c0)=0x78) getsockopt$inet_sctp6_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000200)={0x0, 0x2, 0x6, 0x9, 0x3, 0x200, 0x200, 0x4, {0x0, @in6={{0xa, 0x4e23, 0x5, @private1={0xfc, 0x1, '\x00', 0x1}, 0x9}}, 0x95e0, 0x3, 0x6, 0x0, 0x5}}, &(0x7f00000002c0)=0xb0) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000300)={r1, 0x3}, 0x8) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000340), 0x50000, 0x0) write$vga_arbiter(r2, &(0x7f0000000380)=@other={'lock', ' ', 'none'}, 0xa) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_CMD_GET_REMOTE_MNG(r3, &(0x7f00000004c0)={&(0x7f00000003c0), 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x1c, r4, 0x800, 0x70bd2d, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000800}, 0x8044) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r5, &(0x7f00000005c0)={&(0x7f0000000500), 0xc, &(0x7f0000000580)={&(0x7f0000000540)={0x2c, 0x13, 0xa, 0x5, 0x0, 0x0, {0xa, 0x0, 0x5}, [@NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJ_HANDLE={0xc, 0x6, 0x1, 0x0, 0x1}]}, 0x2c}, 0x1, 0x0, 0x0, 0x400c000}, 0x0) r6 = socket$inet_sctp(0x2, 0x4, 0x84) getsockopt$inet_sctp_SCTP_RESET_STREAMS(r6, 0x84, 0x77, &(0x7f0000000600)={r1, 0x5, 0x3, [0xfff9, 0x9c, 0xfffc]}, &(0x7f0000000640)=0xe) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f00000006c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEL_TX_TS(r3, &(0x7f0000000780)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000740)={&(0x7f0000000700)={0x20, r7, 0x800, 0x70bd25, 0x25dfdbfb, {{}, {@void, @void}}, [@NL80211_ATTR_MAC={0xa}]}, 0x20}, 0x1, 0x0, 0x0, 0x4}, 0x8050) r8 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)={0x1b, 0x0, 0x0, 0x9d7b, 0x0, r6, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x5, 0x1}, 0x50) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000900)={'erspan0\x00', &(0x7f0000000840)={'syztnl0\x00', 0x0, 0x20, 0x8000, 0xd, 0x5, {{0x26, 0x4, 0x0, 0x39, 0x98, 0x66, 0x0, 0xb, 0x29, 0x0, @private=0xa010102, @multicast2, {[@lsrr={0x83, 0x7, 0x50, [@broadcast]}, @timestamp={0x44, 0x10, 0x9e, 0x0, 0xa, [0x1, 0x1, 0x6]}, @end, @ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x14, 0xec, 0x0, 0x0, [0x6, 0x1, 0x400, 0x4]}, @timestamp_addr={0x44, 0x24, 0x73, 0x1, 0x2, [{@remote, 0x80}, {@broadcast, 0x7fffffff}, {@multicast2, 0x9}, {@remote, 0x8554}]}, @timestamp={0x44, 0x2c, 0x97, 0x0, 0xc, [0x6, 0x8, 0x0, 0x2, 0x40000000, 0x0, 0x7, 0xfff, 0x8, 0x3c74]}, @noop]}}}}}) r10 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000940)=0xffffffffffffffff, 0x4) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000980)=@bloom_filter={0x1e, 0x0, 0x6, 0x5, 0x6a, r8, 0x1, '\x00', r9, r10, 0x2, 0x1, 0x0, 0xd}, 0x50) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000a40)={0x2, &(0x7f0000000a00)=[{0x9, 0x80, 0x9c}, {0x8, 0xd, 0x5, 0x6}]}) sendmsg$NFT_BATCH(r5, &(0x7f0000001300)={&(0x7f0000000a80)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000012c0)={&(0x7f0000000ac0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x2}}, [@NFT_MSG_DELOBJ={0x28, 0x14, 0xa, 0x401, 0x0, 0x0, {0x0, 0x0, 0x6}, [@NFTA_OBJ_TYPE={0x8, 0x3, 0x1, 0x0, 0x4}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz2\x00'}]}, @NFT_MSG_DELTABLE={0x134, 0x2, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x4}, [@NFTA_TABLE_USERDATA={0xbd, 0x6, "e3dd504930ff7b160cdf737bcd33c4995fb44fde9da2fbe1b659da660d0bc3f32c29d4cdb0918eaeccf6c956f880d3f9f650c41ae2b5a25d411c246a837cd745db66dde49a5872c8125ce619d1be6eca47a1557bed659fe57f3733268a62eb5f1b5a56d528d66ecf4cca4bfc9bd2abefe85498a47e48e93c7dee703ed84490c212ffba9ca037351422c3e942a8d48232a2caff329f08a4c5b930b390ae016ccd5e07427f6d1a25a65ef7f1e7a90e42945e7e74041aa731ff5c"}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x1}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x3}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x4}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x5}]}, @NFT_MSG_NEWTABLE={0xc8, 0x0, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x1}, [@NFTA_TABLE_HANDLE={0xc, 0x4, 0x1, 0x0, 0x2}, @NFTA_TABLE_USERDATA={0x94, 0x6, "15d3fbf4a623340d6c39790332155d7703da567081db96f2e868d18e843427985c29775a63ef1a36d10762ab755e4ca34ed680eb9845d87b11ce8ff440a6e5a9d835e6d6579ddac1336495e56d402b211992d713698ab09a1033fe7886737b22851c5160247ecf983516cdd4565d5523ddbe1841696328987798898853b11bbe4f84a6187079160c4c1c611c864da538"}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_FLAGS={0x8}]}, @NFT_MSG_DELSET={0x2b4, 0xb, 0xa, 0x401, 0x0, 0x0, {0xa}, [@NFTA_SET_DESC={0x2a0, 0x9, 0x0, 0x1, [@NFTA_SET_DESC_CONCAT={0x60, 0x2, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}]}, {0x1c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x44c2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7fff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8b2}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}]}]}, @NFTA_SET_DESC_CONCAT={0xbc, 0x2, 0x0, 0x1, [{0x4}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}]}, {0x2c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80000000}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}]}, {0x34, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xa}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}]}]}, @NFTA_SET_DESC_CONCAT={0x70, 0x2, 0x0, 0x1, [{0x4c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x20000000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6e87}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x80000000}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xcff1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xff}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}]}, {0x14, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}]}, {0xc, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffff7}]}]}, @NFTA_SET_DESC_SIZE={0x8, 0x1, 0x1, 0x0, 0x50b3}, @NFTA_SET_DESC_CONCAT={0x108, 0x2, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x800}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}]}, {0x3c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x4b6a}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x2}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x8}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x397}]}, {0x3c, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xfffffffa}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x9}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x6}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xffffffff}]}, {0x24, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x280}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xe0}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x5}]}, {0x44, 0x1, 0x0, 0x1, [@NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x71}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x34b}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x7}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0xf}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x101}, @NFTA_SET_FIELD_LEN={0x8, 0x1, 0x1, 0x0, 0x3}]}]}]}]}, @NFT_MSG_DELSET={0x90, 0xb, 0xa, 0x801, 0x0, 0x0, {}, [@NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x141}, @NFTA_SET_EXPR={0x54, 0x11, 0x0, 0x1, @objref={{0xb}, @val={0x44, 0x2, 0x0, 0x1, [@NFTA_OBJREF_IMM_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz2\x00'}, @NFTA_OBJREF_SET_ID={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_OBJREF_IMM_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_OBJREF_SET_NAME={0x9, 0x4, 'syz1\x00'}, @NFTA_OBJREF_SET_SREG={0x8, 0x3, 0x1, 0x0, 0x2}]}}}, @NFTA_SET_NAME={0x9, 0x2, 'syz2\x00'}, @NFTA_SET_DATA_LEN={0x8, 0x7, 0x1, 0x0, 0x1b}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_DELOBJ={0x5c, 0x14, 0xa, 0x301, 0x0, 0x0, {0x3}, [@NFTA_OBJ_USERDATA={0x18, 0x8, "b33e106282c7b5691396c1d7a2a5ed07a7f03b1f"}, @NFTA_OBJ_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_OBJ_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELRULE={0xf4, 0x8, 0xa, 0x801, 0x0, 0x0, {0x1, 0x0, 0x7}, [@NFTA_RULE_USERDATA={0x78, 0x7, 0x1, 0x0, "7b7e79b1860007eb8978268c7eb7fe62be08529a2fdb2f6ae0fa4b4e9c22544d0871d77c59cb44cb5f47c7438ea795a0864f48f7804cdf644aaaf666f82e0ccfe9658de6c4485be11664750fe2b5343e307949be32c965c92d094de1b548bf9816eaeea911b33ff55280462c747149f0ec662639"}, @NFTA_RULE_CHAIN_ID={0x8, 0xb, 0x1, 0x0, 0x1}, @NFTA_RULE_COMPAT={0x54, 0x5, 0x0, 0x1, [@NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x884c}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x9200}, @NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x1}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x73}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x8808}, @NFTA_RULE_COMPAT_PROTO_IPV6={0x8, 0x1, 0x1, 0x0, 0x3a}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x88f5}, @NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_RULE_COMPAT_PROTO_BRIDGE={0x8, 0x1, 0x1, 0x0, 0x884c}, @NFTA_RULE_COMPAT_FLAGS={0x8, 0x2, 0x1, 0x0, 0x2}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_DELRULE={0x98, 0x8, 0xa, 0x3, 0x0, 0x0, {0x1, 0x0, 0x3}, [@NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_USERDATA={0x6f, 0x7, 0x1, 0x0, "fffbd4e1756af7373ab97e1a06f989b657a65ae51cf5654a9143944c56afebda0fda5ecf5627b29abd770b3fe7e24ad16f1200cb2415df83bd3ad9d29637823adcaa896bbeee838179222285f6f4729b055e8efb092aa55c4259a2200ef0137a237cf00482f716e6417888"}, @NFTA_RULE_CHAIN_ID={0x8, 0xb, 0x1, 0x0, 0x4}]}, @NFT_MSG_NEWFLOWTABLE={0x54, 0x16, 0xa, 0x301, 0x0, 0x0, {0x5, 0x0, 0x8}, [@NFTA_FLOWTABLE_HANDLE={0xc, 0x5, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x2}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_FLAGS={0x8, 0x7, 0x1, 0x0, 0x1}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz0\x00'}, @NFTA_FLOWTABLE_NAME={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x2}}}, 0x7cc}, 0x1, 0x0, 0x0, 0x100}, 0x20044844) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000001340)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000013c0)={&(0x7f0000001380)={0x1c, 0x0, 0x2, 0x301, 0x0, 0x0, {0x1, 0x0, 0x4}, [@CTA_EXPECT_CLASS={0x8, 0x9, 0x1, 0x0, 0xfffffc00}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000005}, 0x10) r12 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000001440)='/sys/power/resume_offset', 0x88a00, 0x0) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r12, 0x89f2, &(0x7f0000001500)={'erspan0\x00', &(0x7f0000001480)={'gre0\x00', r9, 0x73cace3d67bad25, 0x8, 0xd, 0x5, {{0xd, 0x4, 0x0, 0x3d, 0x34, 0xc31d, 0x0, 0x14, 0x2f, 0x0, @private=0xa010102, @multicast1, {[@cipso={0x86, 0x1e, 0xffffffffffffffff, [{0x0, 0x9, "82dfd89c37cc51"}, {0x2, 0xf, "254f3a39df8bfed1819e3f57e2"}]}]}}}}}) r13 = syz_usbip_server_init(0x1) ioctl$BLKTRACESETUP(r12, 0xc0481273, &(0x7f00000016c0)={'\x00', 0x5, 0x557dc8aa, 0x9, 0x8, 0x1, 0x0}) getsockopt$sock_cred(r12, 0x1, 0x11, &(0x7f0000001740)={0x0, 0x0}, &(0x7f0000001780)=0xc) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r12, 0xc018937b, &(0x7f00000017c0)={{0x1, 0x1, 0x18, r6, {0xee01, 0xee00}}, './file0\x00'}) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000001800)={0x0}, &(0x7f0000001840)=0xc) sendmmsg$unix(r12, &(0x7f0000002000)=[{{&(0x7f0000001540), 0x6e, &(0x7f0000001680)=[{&(0x7f00000015c0)="3f41fd42912de53a27b85434ce08a486fb577dca061e8ef4e179d50ab2492bcdeacd81fa1c98923d461cf68c5f735fd5159f", 0x32}, {&(0x7f0000001600)="0476235f5e66585ca410393a7f0e56651c04fe3b3417c7ad02c1592dbf787565470dde6414a4667663eefbf58661594fcf936009374ce2c53e63fa548acd67d44ea41e1b30b8d23ef9a188863c21ea52649681ff39e8e758991256b881517d45c8ad30c1", 0x64}], 0x2, &(0x7f0000001bc0)=[@rights={{0x1c, 0x1, 0x1, [r13, r12, r12]}}, @cred={{0x1c, 0x1, 0x2, {r14, r15, r16}}}, @cred={{0x1c, 0x1, 0x2, {r17}}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xa0, 0x20000000}}, {{&(0x7f0000001c80)=@abs={0xb63e46f9adcd3b0d, 0x0, 0x4e20}, 0x6e, &(0x7f0000001dc0)=[{&(0x7f0000001d00)="1f11d71f481fdcd8d318f65c8952ed28816f2abd60179c4348a74767140d9adf432b65d2986e26cb2e5a0ae9ae7e8f5190271c1d20329b9cde12add91b170f249b194e819a5d34cb1a7e7228869ec8b8d3c412c202e1e9c3a2df7983fc299524afa5e56afcd6235c3a7c34b9af6fc1c8b3347e333b26ab613fc574dff1df4b6c44c456dc036e888dadc5b3bfbc42740bf688ae936894be2c37d8a7e4e460b4b6188904e027e334efa27aaca1f11e45ae1ee4f7b75fd84e13", 0xb8}], 0x1, &(0x7f0000001f80)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [r3, r11, r3, r8, 0xffffffffffffffff, r11, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0x70, 0x4000090}}], 0x2, 0x11) 3m39.77834017s ago: executing program 2 (id=1404): r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="01000000040000000400000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) lsetxattr$system_posix_acl(&(0x7f00000001c0)='.\x00', &(0x7f0000000080)='system.posix_acl_default\x00', &(0x7f00000000c0)={{}, {}, [], {0x2}, [], {0x2}, {0x2, 0x2}}, 0x24, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet_sctp6_SCTP_INITMSG(r3, 0x84, 0x2, &(0x7f0000000040)={0x3, 0xc, 0x3, 0x7}, 0x8) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f00000191c0)=ANY=[@ANYBLOB="010000000b000000050010000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r5, @ANYRES32, @ANYBLOB="0000000002"], 0x48) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) getpriority(0x2, 0x0) sendmsg$RDMA_NLDEV_CMD_DELLINK(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="18000000041401002dbd7000fedbdf250800010000000000ba30b28e994c1a08d1ca4eb6b8b4889cdd4e786eb807e04eb88b935d785f3d3201c58033c88e160d2745a91b08363bcc34006d0009788455ec9ad10b24"], 0x18}, 0x1, 0x0, 0x0, 0x671ec167a4b72164}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r7) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000500000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x3, 0xd, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, [@call={0x85, 0x0, 0x0, 0x61}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r9}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getpeername$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000004c0)=0x14) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000500)=0x0, &(0x7f0000000540)=0x4) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(r4, &(0x7f0000000680)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000600)={&(0x7f0000000740)={0x178, r8, 0x2, 0x70bd2c, 0x25dfdbff, {}, [@HEADER={0x40, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp0\x00'}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @HEADER={0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x914df8be5fe67174}]}, @HEADER={0x4}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r10}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x7}]}, @HEADER={0x70, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'pim6reg1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r11}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'hsr0\x00'}]}]}, 0x178}, 0x1, 0x0, 0x0, 0x20000001}, 0x4) 3m39.74306011s ago: executing program 2 (id=1405): socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x6, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x1e1802, 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f00000000c0)) write$selinux_access(0xffffffffffffffff, &(0x7f0000000840)=ANY=[@ANYBLOB="73797374656d5f753a77626a6563745f723a64686370635f657394635f743a733020756e636f6e66696e656420303030303030302c30303030303030303030303700"], 0x42) pwritev(r2, &(0x7f0000000180)=[{&(0x7f0000000000)='\x00!', 0x2}], 0x1, 0xee, 0x4000004) openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x149a82, 0x4) 3m39.578562761s ago: executing program 2 (id=1408): add_key(&(0x7f0000000240)='asymmetric\x00', 0x0, &(0x7f0000000480)="10", 0x1, 0xffffffffffffffff) 3m39.512726482s ago: executing program 2 (id=1411): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) connect$netlink(r0, &(0x7f0000000500)=@proc={0x10, 0x0, 0x25dfdbfb, 0x4000}, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x50) ioctl$TCSETS(0xffffffffffffffff, 0x5402, &(0x7f00000004c0)={0x9, 0x1000005, 0x8, 0xd, 0x18, "4240755a41142a3f25f18e203b2385d5a077fe"}) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = socket$can_raw(0x1d, 0x3, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0xe0000000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0x7}, 0x18) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000300)={'vxcan1\x00', 0x0}) bind$can_raw(r2, &(0x7f0000000000)={0x1d, r5}, 0x10) bind$can_raw(r2, &(0x7f0000000080), 0x10) writev(0xffffffffffffffff, &(0x7f00000000c0)=[{&(0x7f0000008f40)="d4d84b77145279839cbb6761e3a28f6283e3b2ffa8454ffd82ad350a5ae6c6ffe18ca746694c2f2a2ea50965f1c922a0ccf1dd8637c50edf448ee02aa6e466c0f574d9c57894ba73d4ff6e453e02a529e3a73c874ec970960d", 0x59}], 0x1) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) ioctl$KDFONTOP_SET(0xffffffffffffffff, 0x4b72, &(0x7f0000000040)={0x0, 0x4000000, 0x8, 0xd, 0x200, &(0x7f0000000080)="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"}) mount_setattr(0xffffffffffffffff, 0x0, 0x800, &(0x7f0000000200)={0x20, 0x76, 0x80000}, 0x20) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) io_uring_setup(0x3c92, &(0x7f0000000100)={0x0, 0x3, 0x0, 0xffffffff, 0x2}) bind$vsock_stream(0xffffffffffffffff, &(0x7f0000000040)={0x28, 0x0, 0x2710, @local}, 0x10) listen(0xffffffffffffffff, 0x0) pipe(&(0x7f0000000000)) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r6, 0x0, 0x60, &(0x7f00000001c0)={'filter\x00', 0x5, 0x4, 0x3f0, 0x220, 0x220, 0x220, 0x308, 0x308, 0x220, 0x4, 0x0, {[{{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @private, @empty}}}, {{@uncond, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac=@multicast, @empty, @local, @private}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x440) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="6000000002060103000000000000000000000004050001000700000013000300686173683a6e65742c696661636500000900020073797a30000000000500040000000000050005000a00000014000780050015000000000008001240"], 0x60}}, 0x0) 3m38.771160686s ago: executing program 2 (id=1413): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000d60400000000000003000000850000002c000000850000000e000000fd0d000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ffffc}, 0x94) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) pivot_root(&(0x7f0000000000)='./file2\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x2107, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x6a) close(r3) socket$tipc(0x1e, 0x4, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="0b00000073790101000000000000000000000000000af7f4f0c55de8ca0000000000000000000000000000000000000000f3c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000020000000000000030000000000000000000000004119202532aeecfcdbb73887feb3f14db126c935954a335f6469a793"], 0x138) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00', r6}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x5, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x2) r7 = mq_open(&(0x7f0000000480)='!selinuxwk1\x1f\xd0m\xc3\x7f9\xc9\x9e*\rT\x93\xfd\xe2\x91\xef\xaa\x16#j\x97\x8f\xbc\xdeY\x0f\xcc\xc5mV\xcb\x15vm(p\xc9-QZ#\xd2{\x84\xbf\x06\x00\x00\xd9', 0x840, 0x104, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r9}, 0x10) syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x11, 0x2, 0x4}, 0x0, 0x0) finit_module(r7, 0x0, 0x0) write$UHID_DESTROY(r4, &(0x7f0000000340), 0x4) socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0), 0x200480, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESOCT=0x0]) set_mempolicy(0x8000, &(0x7f0000000200)=0x9, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 3m23.652930101s ago: executing program 32 (id=1413): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x6, 0x5, &(0x7f0000000080)=ANY=[@ANYBLOB="18020000d60400000000000003000000850000002c000000850000000e000000fd0d000000000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7ffffc}, 0x94) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r2}, 0x10) pivot_root(&(0x7f0000000000)='./file2\x00', 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x0, 0x2107, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) r3 = creat(&(0x7f0000000080)='./file0\x00', 0x6a) close(r3) socket$tipc(0x1e, 0x4, 0x0) r4 = openat$uhid(0xffffffffffffff9c, &(0x7f00000000c0), 0x802, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000100)=ANY=[@ANYBLOB="0b00000073790101000000000000000000000000000af7f4f0c55de8ca0000000000000000000000000000000000000000f3c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000020000000000000030000000000000000000000004119202532aeecfcdbb73887feb3f14db126c935954a335f6469a793"], 0x138) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00', r6}, 0x18) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x5, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000100)=0x2) r7 = mq_open(&(0x7f0000000480)='!selinuxwk1\x1f\xd0m\xc3\x7f9\xc9\x9e*\rT\x93\xfd\xe2\x91\xef\xaa\x16#j\x97\x8f\xbc\xdeY\x0f\xcc\xc5mV\xcb\x15vm(p\xc9-QZ#\xd2{\x84\xbf\x06\x00\x00\xd9', 0x840, 0x104, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r9}, 0x10) syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x11, 0x2, 0x4}, 0x0, 0x0) finit_module(r7, 0x0, 0x0) write$UHID_DESTROY(r4, &(0x7f0000000340), 0x4) socket$nl_route(0x10, 0x3, 0x0) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f00000002c0), 0x200480, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESOCT=0x0]) set_mempolicy(0x8000, &(0x7f0000000200)=0x9, 0x8) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x15, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32], 0x0, 0x800000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1m29.025271405s ago: executing program 4 (id=3494): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[], 0x48) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) r0 = socket$qrtr(0x2a, 0x2, 0x0) (async, rerun: 64) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) (rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) (async, rerun: 64) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x1000, 0x0, 0x0, 0x41000, 0x45, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 64) socket(0x28, 0x5, 0x0) (async) r3 = socket(0x2, 0x80805, 0x0) (async, rerun: 32) socket$inet(0xa, 0x801, 0x0) (async, rerun: 32) socket$nl_route(0x10, 0x3, 0x0) socket$inet_udp(0x2, 0x2, 0x0) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) (async) socket$vsock_stream(0x28, 0x1, 0x0) (async) socket$kcm(0x2, 0x3, 0x2) (async) socket$packet(0x11, 0x3, 0x300) socket$vsock_stream(0x28, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) (async) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r3, 0x84, 0x12, &(0x7f0000000000)=0xcc7, 0x4) (async) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000940)={&(0x7f00000013c0)=ANY=[@ANYBLOB="640000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="e5fda988000000002800128009000100766c616e00000000180002800c0002001c0000001f000000060001000000000008000500", @ANYRES32=r4, @ANYBLOB='\b\x00\n\x00', @ANYRES32], 0x64}, 0x1, 0x0, 0x0, 0x8811}, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) (async) openat(0xffffffffffffff9c, 0x0, 0x88240, 0x0) (async) llistxattr(0x0, 0x0, 0x0) (async, rerun: 64) sendmsg$key(0xffffffffffffffff, 0x0, 0x10000000) (async, rerun: 64) connect$qrtr(r0, &(0x7f0000000200)={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0xc) (async, rerun: 32) syz_io_uring_setup(0xc9b, &(0x7f0000000840)={0x0, 0x4620, 0x800, 0x1, 0xa85}, &(0x7f00000004c0)=0x0, &(0x7f0000000540)=0x0) (rerun: 32) syz_memcpy_off$IO_URING_METADATA_GENERIC(r6, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) perf_event_open(0x0, 0x0, 0x400c, 0xffffffffffffffff, 0xb) (async) syz_io_uring_submit(r6, r7, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r0, 0x0, 0x0}) 1m28.939447376s ago: executing program 4 (id=3498): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffbfffff01"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000810018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r1) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000100)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="0193a2e89a00000000001f"], 0x20}}, 0x0) 1m28.921855566s ago: executing program 4 (id=3501): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa1000000"], 0x0, 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x4, 0x4, &(0x7f0000000700)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) getrusage(0x1, &(0x7f0000000900)) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) r3 = fsmount(r2, 0x0, 0x20) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r4, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r5 = socket(0x10, 0x803, 0x10004) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000ac0)=ANY=[@ANYBLOB="340000008600000007000000f7ffffff080a0000317e36d35218a716aadda0d95e5803df5d49d50238db2cd97e168f4f861fc618f0c67685a99db49c2b8daa0732aad98f141e6c121dbae895a4a2bfcd09af7937eb86ebc657a19ffc6e76e2dc0c6ad77df9f03cf30ea57db766b7e3879058677283dcc16cb4e83f3010ef5ddfff46cef7936052a156abb034603b2d6752f47e011309268a6b5c151214", @ANYRES32=r3, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=r3, @ANYBLOB="0500000002000000020000000b00"/28], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000000000000000001812", @ANYRES32=r6], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f00000001c0)='rtc_alarm_irq_enable\x00', r7, 0x0, 0x1e12}, 0x18) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f00000002c0)={'veth0_to_team\x00', &(0x7f00000000c0)=@ethtool_stats}) set_mempolicy(0x3, &(0x7f0000000000)=0x4000000ffb, 0x8) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r8 = getpid() sched_setscheduler(r8, 0x2, &(0x7f0000000200)=0x4) futex(&(0x7f000000cffc)=0x1, 0x6, 0xffffffff, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x6, 0xf0, 0x0, 0x0, 0x0) timer_create(0x7, &(0x7f0000000680)={0x0, 0x21, 0x2, @tid=0xffffffffffffffff}, &(0x7f0000000100)) timer_settime(0x0, 0x0, &(0x7f000006b000)={{0x0, 0x8}, {0x0, 0x9}}, 0x0) 1m27.988858362s ago: executing program 4 (id=3526): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x1f, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYRES16=r0], &(0x7f0000000240)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000006a80), 0x1, 0x0) write$vga_arbiter(r2, 0x0, 0x15) socket$inet6_sctp(0xa, 0x5, 0x84) bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000340)=ANY=[], 0x0, 0x4, 0x0, 0x0, 0x0, 0x4f, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x5}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000060a0b040000000000000000020000002c0004802800018007000100637400001c0002800800014000000002080002400000000b05000300000000000900010073797a30000000000900020073797a320000000014000000110001"], 0x80}}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r5 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @broadcast}) write$tun(r4, &(0x7f0000000280)=ANY=[@ANYBLOB="016f0800010027000000140000004600003f00000000008490783fffff20ac1414aa00000000", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="be0003009078002d09c400050200000000000000000002d58838068b91000000"], 0xfd6c) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xffffffff, 0x0, 0x0, 0x40f00, 0x16, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) r7 = socket$netlink(0x10, 0x3, 0xf) r8 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(0xffffffffffffffff, &(0x7f0000000a40)={0x10, 0x0, 0x25dfdbfe, 0x1000}, 0xc) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x2a, 0x1, 0x0, 0x0, 0x0, 0xc, 0x8510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x6, 0x6}, 0x0, 0x10000, 0xfff, 0x5, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x6, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180200050000000000000085000000410000009500"/32], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r9, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x1008, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) setsockopt$sock_int(r8, 0x1, 0x8, &(0x7f0000000000), 0x4) r10 = socket$netlink(0x10, 0x3, 0x9) sendmsg$nl_route(r10, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000740)=ANY=[@ANYBLOB="4800000010001fff2abd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="000000000000000028001280090001007665746800000000180002801400010000000000", @ANYRES32=0x0, @ANYBLOB="8008000041c600004420d9accd9e2abba495dcf28b0bf3c838f39390ae6caa577c5db1b1114cdc27f809bc36c09c25d8d6cabc12b5274ad6e4af8fb5366b1071fa265c09389b94777b94669e8ec62109f5b97f806af620087c6916d718c59ff82626578586bfa1e422c5d4630ed120cfd7d8a47e985ef45713676facba9e9b7dc537ab55154290e42dcc0b2a333984381de05572882ad2a9fc06f6d3af60b8281351f93a7c0101b297b26e170103fcd0a37dd619825a2c24c3dd8f1c14e9455701b2a782"], 0x48}}, 0x0) sendmsg$IPCTNL_MSG_TIMEOUT_GET(r7, 0x0, 0x0) lsm_list_modules(&(0x7f0000000000)=[0x0, 0x0], &(0x7f0000000140)=0x10, 0x0) 1m27.647284943s ago: executing program 4 (id=3536): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(&(0x7f0000000280)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x22004004, &(0x7f0000000140), 0x81, 0x477, &(0x7f0000000a40)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000002c0)=0x10) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x3800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r3 = perf_event_open(&(0x7f0000000c40)={0x2, 0x80, 0xad, 0x1, 0x0, 0x0, 0x0, 0x1b3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x100000001, 0xfffffffffffffffd}, 0x0, 0x0, 0xcd, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40001ff}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f0000000100)='cpu&\t0X+7') syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x4098, &(0x7f0000000080)={[{@nogrpid}, {@errors_remount}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x66}}, {@nodioread_nolock}, {@nodiscard}, {@noquota}]}, 0x3, 0x438, &(0x7f0000000d80)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) truncate(&(0x7f0000000900)='./file1\x00', 0x3000000) ioctl$EXT4_IOC_MOVE_EXT(r4, 0x40305829, &(0x7f0000000240)={0x17c04, 0xffffffffffffffff, 0x89d9, 0x100000001, 0x20000000002, 0x2}) 1m27.482327745s ago: executing program 4 (id=3538): r0 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x6, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008000000a5"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x11, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000900000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x6a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r3}, 0x18) syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x82) syz_open_dev$tty20(0xc, 0x4, 0x1) timer_create(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f00000007c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f0000000640), 0x1, 0x5c0, &(0x7f0000000c40)="$eJzs3V+IHHcdAPDv7u2m7SWYVmo11TZXq23sn73cXQmmFiSP2qbU/nkyEo9kcwm3l423G+xdLVwpQgUjofqkTwqCig8RQUF8KIj1UfBNKRUsogRCsRRFU12Z2Zmw8TZ3ud6fsTefD8zdb34ze7/v7Jfv7M4vs5sASmss+VGJ2BURr0bE7v7q1TuM9X+dn7pwMlkq0es99WYl3e/5qQsn813zx+1MflQjPpT8+nXEzvrycTsLi7PTrVZzPlsf786dGe8sLD54am56pjnTPD05NXFg/+SBiQMHN+xYf/jcy599/bnHLp+7NPr91/bs/UcS765s2+BxbJSxGMuek3p8dHBDJeLTGz1YQUYiohYRHyg6ENbsyO++/kyev3pa/7tjJF2LGJ068tbuOPdI0TECm6eXutbWkR6wnVWi6AiAYuSv9Mn1b75s1XuP2e1yEfwedulQ/wLw+Wxu5/yV/Neimu1T36Tr+71/jRiL7n0XPnPXV5MlNmkehmtbeiHSibrl9V9J58Zuzva7OyL2RcTHIuLjEXFPRNy7zrGf/kKS/z9+c7BP/rfW9eb/ExHRiIj7IuL+iHggIh5c59i3HU7yv/OLg33yXx63f67oCCjSb18qOgLS8//+Wm3Y+b+6zr991yrbe+m/Ky69Mdjn/F8eTz5VdAQU6fEDRUdAkb7zZtER8Mqh/sXc8tf/atw2sF/S/mD/UjH2JO/dI+LDEfGRiLgjIu6MiL35/UTX6SuPJvs3moN9y1//qxfXc3ys7NKhiEcG7u06P5D/zM0j2Vo9nQ+oV06cajX3R8T70jmh+g3J+sQKY3xt6VePDuv/8R1J/j/1eD7/lyzJ+PlcYBbHxdoNVz/u+HR3er3HTd+lFyJurw3LfyW7E6h/X18vIsbf5Rgv7vvJb4b1f/LJJP/3PLBy/tlMve/253GH5T9XWfn+zPH0fDCenxWWezFuPTes/4nLSf7f+IP8Fyep/9GV85+e/6/cr9tZ+xi18xe/MbR/Lsn/n3/5bs7/OypPpwHuyPqene525ycidlQeW94/ufaYt6v8+cifryT/++4e/vr//uwxyROaVPa/I+I/EfHPiPhXRFyOiHci4m8R8dYKY/7i5Yd/Pqx/6pkk/395Vf0XJ8n/8VXqv3JV/a+98e07D3552Ng/+F6S/9HG6vX/UBrMvqzH+7/VXW+Cio4TAAAAAAAAgI1RTb8Dr1JtXGlXq41G/zv8bo3Raqvd6d5/on329PHIPg9ar+Z3eu0euB90IvusaL4++T/rUxFxS0S8NHJTut441m4dL/rgoZxquyJe/+mXju3YeY36T7w2UnSYwGZI6v/Et0aWkvbb6hxKJan/H709l34uS/1Duah/KJvaO3lL/UN5qX8oL/UP5aX+obzUP5SX+ofyUv9QXoP1D5TTE4cPJ0sv/97P0+2ZU7Mnzxyc3N+YO3uscaw9f6Yx027PpJ/YmVv977Xa7TMTD8XZZ8e7zU53vLOweHSuffZ092j6vdFHm/UtOCZgdX//0+d/dsveV35fiYilh29Klxj47my1CtubS38or1rRAQCF8R4fqKyy/cZrbTiy8bEAW2O9/8c/8N517x7z/1BW5v+hvMz/Q3l5jw+Y/4fyMf8P5dWc7ywszk63WssaRUcGAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFBOnYXF2elWqzmvsfmNG7Mn/f8lHo3SN/4bAAD//x/0RNY=") r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={0x0, r4}, 0x18) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r6, 0x0) r7 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) close_range(r5, 0xffffffffffffffff, 0x0) 1m12.455590898s ago: executing program 33 (id=3538): r0 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x6, 0x0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008000000a5"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x11, 0x3, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000900000000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x6a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r3}, 0x18) syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x82) syz_open_dev$tty20(0xc, 0x4, 0x1) timer_create(0x2, 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000005c0)='ext4\x00', &(0x7f00000007c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f0000000640), 0x1, 0x5c0, &(0x7f0000000c40)="$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") r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={0x0, r4}, 0x18) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) close(0xffffffffffffffff) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @empty, 0x1}, 0x1c) listen(r6, 0x0) r7 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r7, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) close_range(r5, 0xffffffffffffffff, 0x0) 1.53120657s ago: executing program 5 (id=4791): r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000000), 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r1, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x0, 0x0, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x42, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_DISALLOCATE(r5, 0x5608) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) sendmsg$key(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="0213f803030000002cbd7000fddbdf25010018"], 0x18}}, 0x2000) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000800)={'filter\x00', 0x104, 0x4, 0x3c8, 0x110, 0x110, 0x110, 0x2e0, 0x2e0, 0x2e0, 0x4, 0x0, {[{{@arp={@empty, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac}, {@empty, {[0x0, 0x0, 0x0, 0xff]}}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 'dvmrp0\x00', 'netdevsim0\x00'}, 0xc0, 0x110}, @mangle={0x50, 'mangle\x00', 0x0, {@mac, @empty, @dev={0xac, 0x14, 0x14, 0x41}, @rand_addr=0x64010101, 0x8, 0x1}}}, {{@arp={@loopback, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pim6reg0\x00', 'veth0\x00', {}, {}, 0x0, 0x20}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x80ca, 0x8}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffe}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x418) r6 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) 1.387735281s ago: executing program 5 (id=4792): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2b, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000005c0)={{r0}, &(0x7f0000000540), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0), 0x88002, 0x0) pwritev(r2, &(0x7f0000000100)=[{0x0, 0x72}, {&(0x7f0000000140)="de", 0x1}], 0x2, 0x0, 0x0) 1.387241811s ago: executing program 5 (id=4793): mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x300000c, 0x3032, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x6) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x39b3) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000700)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x72, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f00000001c0), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) ioctl$int_in(r1, 0x5452, &(0x7f0000000040)=0xffffffffffff2836) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="12000000040000000400000012"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000ac0)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000048c0)={r3, &(0x7f00000047c0), &(0x7f0000004880)=@udp=r1}, 0x20) recvmmsg(r1, &(0x7f0000005b80)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000000c0)=""/163, 0xa3}], 0x1}, 0x6}], 0x1, 0x21, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x19, &(0x7f0000000280)=0x1, 0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) recvmmsg(0xffffffffffffffff, &(0x7f0000000380), 0x0, 0x2, 0x0) r4 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r6, &(0x7f0000000180)=[{&(0x7f0000000000)="9c", 0xffffff7d}], 0x1) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r6, &(0x7f0000000100)) shutdown(r5, 0x1) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a310000000014000780050015000c00000008001240000000000500050002000000050004000000000010000300686173683a69702c6d6163"], 0x5c}}, 0x0) write$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000340)={'some', 0x20, 0x5, 0x20, 0x6}, 0x2f) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000240)=ANY=[@ANYBLOB="1c000095b8d9f50200000000000000000a0000010500010007001ffd7ad184edbf00009da6790dfeaa9a85c049198a69acff24dd49"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000800)={&(0x7f0000000300)=ANY=[@ANYBLOB="9feb010018000000000000006c0000006c00000007000000000000000000000d0a000000000000000100000604"], &(0x7f0000000f40)=""/4089, 0x8b, 0xff9, 0x8}, 0x28) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x751040, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="05000000040000000900000044"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$INCFS_IOC_CREATE_FILE(0xffffffffffffffff, 0xc058671e, &(0x7f0000000580)={{}, {0x6}, 0x2, 0x0, 0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0)='./file0\x00', &(0x7f0000000440)="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", 0x140, 0x0, &(0x7f0000000840)={0x2, 0x16f, {0x1, 0xc, 0xfe, "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", 0x64, "aa352540ece3989d7c612810476919f28d18c2ac9c2207d3fcf446568018897f0d49f4cc860b2493005353ad7b15c65f62bd235ca5a18551846b20fc47c0a08d569550b648424973875c6f7187cb01a3822f38dc41c19e4d8b6e81b4e33790a8080ca1af"}, 0xc1, "fd27ca2843b5611d0cacaf3c4046749d0c1ca3786797e4fc890d08b97e981dd1d6d7af51c963ca26be0f26a35fe90a4252a49ed0ecaeac4386a41d5f0af1a4fe6a4722b79189fb5e4206041e5a5f26bb304ec71d85e3c93a24bb07d2d3cec1bff1fed64917366f077f1587ad93da98d044d460dcee59bd39d14372475b969d8e7dd0c3e5954c5b88c6d569548935e279bd5ca9208907d442d859589c4316c18a46a69523dbff2e60825090214cc2015f86f82a04e095724ec69a6def02079e6b5f"}, 0x23c}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r8}, 0x18) umount2(0x0, 0x0) 1.213253652s ago: executing program 1 (id=4801): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000035c0)={0x0, 0x0, 0x0}, 0x4004) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000640)=0xcde, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r2) socket$pppl2tp(0x18, 0x1, 0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x0, 0x7ffc0005}]}) msgsnd(0x0, &(0x7f0000000a00)={0x1, "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"}, 0x401, 0x0) 1.190906012s ago: executing program 6 (id=4802): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x4}, 0x18) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r3) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000b000000050010000200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r5, @ANYRES32, @ANYBLOB="00000000024000"/17], 0x50) 1.190113512s ago: executing program 1 (id=4803): r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x24000811}, 0xe000000) r1 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000340)={0x1d, r2, 0x0, {0x1, 0xf0, 0x4}, 0xfe}, 0x18) setsockopt$SO_J1939_PROMISC(r1, 0x6b, 0x2, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000000540)="81b641f1f3843704b6", 0x9}], 0x1}, 0x4048081) setsockopt$SO_J1939_ERRQUEUE(r1, 0x6b, 0x4, &(0x7f0000000380)=0x1, 0x4) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r5, 0x0, 0x4000054) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f00000001c0)={'wlan1\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='kfree\x00'}, 0x18) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000780)=@newtfilter={0x24, 0x11, 0x1, 0x70bd2a, 0x25dfdbfc, {0x0, 0x0, 0x74, r2, {0xfff3, 0xfff3}, {0xfff1, 0x9}, {0x2, 0xd}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x404c083}, 0x20000050) (fail_nth: 2) 942.039674ms ago: executing program 6 (id=4804): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000a00)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc0800034000000014400000000c0a01011d000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103"], 0xac}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x2}, 0x18) close(r0) 911.258355ms ago: executing program 0 (id=4805): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000040340000000000000800000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000357500007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000340)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f00000002c0), 0x88002, 0x0) pwritev(r2, &(0x7f0000000100)=[{0x0, 0x72}, {&(0x7f0000000140)="de", 0x1}], 0x2, 0x0, 0x0) (fail_nth: 2) 903.059635ms ago: executing program 6 (id=4806): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r1) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r2) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3], 0x38}}, 0x0) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x305200, 0x0) close(r4) r5 = socket$unix(0x1, 0x1, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000006c0)=@newqdisc={0x6c, 0x24, 0x4ee4e6a52ff56541, 0x789d2d, 0xffffffff, {0x0, 0x0, 0x0, r7, {0x0, 0xb}, {0xffff, 0xffff}, {0xb}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x40, 0x2, [@TCA_TBF_PARMS={0x28, 0x1, {{0x8, 0x0, 0x1, 0x4, 0x9, 0x4cca}, {0x6, 0x1, 0x5, 0x10, 0x7, 0x312}, 0x3, 0x10, 0xd1d}}, @TCA_TBF_PRATE64={0xc, 0x5, 0xa89d84ea6e694e0f}, @TCA_TBF_BURST={0x8, 0x6, 0xb1a}]}}]}, 0x6c}, 0x1, 0x0, 0x0, 0x20008001}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000740)=@newqdisc={0x44, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0x80000, {0x0, 0x0, 0x0, r7, {0x0, 0x9}, {0xffe6, 0xb}, {0xffe0, 0xb}}, [@qdisc_kind_options=@q_gred={{0x9}, {0x14, 0x2, [@TCA_GRED_DPS={0x10, 0x3, {0xe, 0x4, 0x1}}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x2000c031}, 0x4008000) ioctl$SIOCSIFHWADDR(r4, 0x8922, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 639.485446ms ago: executing program 0 (id=4808): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000a00)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc0800034000000014400000000c0a01011d000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xac}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) close(r2) 638.168896ms ago: executing program 3 (id=4810): bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x40, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x1018}, './file0\x00'}) 632.813906ms ago: executing program 0 (id=4811): r0 = socket$kcm(0x2, 0x1000000000000002, 0x0) sendmsg$inet(r0, &(0x7f0000000b40)={&(0x7f0000000080)={0x2, 0x4e20, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000180)=[@ip_pktinfo={{0x1c, 0x0, 0x7, {0x0, @rand_addr=0x64010100, @loopback}}}], 0x20, 0x1000000}, 0x0) 598.605216ms ago: executing program 0 (id=4812): bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="000800000206e600004a74756f076aca44ea752f3b0200"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r0}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x10000, 0x4}, 0x50) 597.700886ms ago: executing program 6 (id=4813): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000035c0)={0x0, 0x0, 0x0}, 0x4004) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000640)=0xcde, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r2) socket$pppl2tp(0x18, 0x1, 0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x0, 0x7ffc0005}]}) msgsnd(0x0, &(0x7f0000000a00)={0x1, "1ed0c436a214761fd7732fb6cb3ea28a9f48bb02eb141f79bf60b803048f88ff56c163e58fccc51656c914a2aab43c1a8f330b17e465467c2b1281717176bfd8155eb6a5f7b99be8731f4bb5065ca1d00c286692f1dbef423d804a7aed7326347d8c9b24f60fb42ca7daf28d317dd44a96e825684ee2f99dcc17aa0a5d8222ac28e071217d9556765da9db24dcdfd2fec4d502c6d1815cef885111edce9c2f39142319f5b234c707c027bcab6f1b207130c963e2071b7de4aba435ad27d2923252ce76d4a07d920a174a6fcebef85ca405dc1407d27596c1a3e02fe9756894f929aad6cfe644932fe5aae77ad0d24efc289f3d2e2c2fb1c8db334278b6b5cf2d4f1fa7d4b91061fd6da9031cc72f457d2bb19f17ec0a8d85fb3c7c32e94ed52b8bf9f8a71d295978fb78666bf68ef15f11e101cd0db8392c8d45bff0772256ebb00574423ae8306575edc31598c570b8417c8d2087e85352116dcbc28df5cd92c2047ad4471167e99c84d86309533e77dddc7ae97271df280e95be64e6dab8055b0a1248ac5a9fd496b2434c0a2e188660c05dcfd9350d0ac619519b057c08742cdf94579b121a1bc5e350f45bb69c876797d9820cd06f8d14e61c3d51f0c91eb2e8ccab11f5d3f7f53ca3b420c4c023144124391b3d054d70a7526655120e46d385a184bf930ae19d360943235f800b9658f9bd139774ca7ba27de416447438cd5ae524a3f8fe13f4d5699e4d406fc820c0a2914efdf8326e994f63ca6bb37c1cf4830e4a1f35552cbe3c72134879dfd2038969f91c237de7e8bfae14d772b20677e175772a725f9630d0000a49e6b26bc82e2ed151e69e22a02b1a9c9baf8e8806b22f34fe082ac5412396002f806ddb7d0665e9678a264a5487dcf29253943840c20ab5388735f22237681923f447386621f6aef2d7cae61723b5c3ca062de416655588751d802911ce58f8a64c149c927286338b54579b105e3e6881eb1a1302bbcf91c1fd176706744dba253a6007d7511a8d0b92a00fa04701364370e9048662a1ce71b362f64bcb2f452811d21bd64c73061c839232ae24d8df5299952eaf4eabf2db9f35f1384ded0037b6a401303cec4020dca9b729829171df72c2979695420ee007107ddd670d5c2610b95830fb5683e1e0d9365ca8b2dba742a289a9d370ae8d4c0827ce63908162d39b5243a50da528f24d93d9a987b6da7736d2129de83e324e544826bdf24ae219db40271d9e3ac283046742740de4d65b0b66d425248f42df859fb0c07e6be4f16476390ecfc3ee64157ab113af8b700ea54cada85cdede584cb8a92dbb7b338248a97237ed3ddcc72fedf5d45b4ec6390f191767ba979a75f1db73736791a6f8c9f68eec2e4170e90bac256a5a28722a956b191ffd752ddf285252ec522f4fc9d1a961553cd6db7b7a7b"}, 0x401, 0x0) 597.220166ms ago: executing program 3 (id=4814): r0 = syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x88002, &(0x7f0000000000), 0x1, 0x5d8, &(0x7f0000000c00)="$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") openat(r0, &(0x7f0000000140)='./bus\x00', 0x24002, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r1}, 0x10) r2 = perf_event_open(&(0x7f0000000fc0)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x550, 0xfffffffffffffc75}, 0x0, 0x0, 0x3, 0x4, 0x0, 0x40d}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f0000000180)='cpu<=0||!') 567.392267ms ago: executing program 6 (id=4815): syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x4004) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0xcde, 0x4) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x2, 0x0, 0x4, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x32) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bind$phonet(0xffffffffffffffff, &(0x7f0000000100)={0x23, 0x9, 0x5f, 0x7}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="18040000000000000000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000680)={0x1e4, r7, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10000}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0x9823}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x3ff}, {0x8}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfff}, {0x5}, {0x6, 0x11, 0xa}, {0x8, 0xb, 0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x8}, {0x6, 0x16, 0x2}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x164}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xfffffffc}, {0x6, 0x16, 0x8}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x3056}, {0x8, 0xb, 0x5}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x1ff}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8}}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x8000}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x1c, r4, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x1c}}, 0x40) 536.243957ms ago: executing program 6 (id=4816): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000000c0)=ANY=[], 0x50) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_open_dev$tty20(0xc, 0x4, 0x1) syz_clone3(&(0x7f00000004c0)={0x100000000, &(0x7f0000000180), &(0x7f00000001c0), &(0x7f0000000240), {0x40}, &(0x7f0000000300)=""/220, 0xdc, &(0x7f0000000400)=""/88, &(0x7f0000000280)=[r0, r0, r0], 0x3}, 0x58) ioctl$TIOCSTI(r3, 0x5412, &(0x7f0000000040)=0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000011c0), r4) sendmsg$IEEE802154_LLSEC_LIST_DEV(r4, &(0x7f0000001280)={0x0, 0x0, &(0x7f0000001240)={&(0x7f0000001200)={0x14, r5, 0x301, 0x70bd27, 0x25dfdbfc}, 0x14}}, 0x40004) unshare(0x64000680) 486.362547ms ago: executing program 5 (id=4817): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) msgsnd(0x0, &(0x7f0000000a00)={0x1, "1ed0c436a214761fd7732fb6cb3ea28a9f48bb02eb141f79bf60b803048f88ff56c163e58fccc51656c914a2aab43c1a8f330b17e465467c2b1281717176bfd8155eb6a5f7b99be8731f4bb5065ca1d00c286692f1dbef423d804a7aed7326347d8c9b24f60fb42ca7daf28d317dd44a96e825684ee2f99dcc17aa0a5d8222ac28e071217d9556765da9db24dcdfd2fec4d502c6d1815cef885111edce9c2f39142319f5b234c707c027bcab6f1b207130c963e2071b7de4aba435ad27d2923252ce76d4a07d920a174a6fcebef85ca405dc1407d27596c1a3e02fe9756894f929aad6cfe644932fe5aae77ad0d24efc289f3d2e2c2fb1c8db334278b6b5cf2d4f1fa7d4b91061fd6da9031cc72f457d2bb19f17ec0a8d85fb3c7c32e94ed52b8bf9f8a71d295978fb78666bf68ef15f11e101cd0db8392c8d45bff0772256ebb00574423ae8306575edc31598c570b8417c8d2087e85352116dcbc28df5cd92c2047ad4471167e99c84d86309533e77dddc7ae97271df280e95be64e6dab8055b0a1248ac5a9fd496b2434c0a2e188660c05dcfd9350d0ac619519b057c08742cdf94579b121a1bc5e350f45bb69c876797d9820cd06f8d14e61c3d51f0c91eb2e8ccab11f5d3f7f53ca3b420c4c023144124391b3d054d70a7526655120e46d385a184bf930ae19d360943235f800b9658f9bd139774ca7ba27de416447438cd5ae524a3f8fe13f4d5699e4d406fc820c0a2914efdf8326e994f63ca6bb37c1cf4830e4a1f35552cbe3c72134879dfd2038969f91c237de7e8bfae14d772b20677e175772a725f9630d0000a49e6b26bc82e2ed151e69e22a02b1a9c9baf8e8806b22f34fe082ac5412396002f806ddb7d0665e9678a264a5487dcf29253943840c20ab5388735f22237681923f447386621f6aef2d7cae61723b5c3ca062de416655588751d802911ce58f8a64c149c927286338b54579b105e3e6881eb1a1302bbcf91c1fd176706744dba253a6007d7511a8d0b92a00fa04701364370e9048662a1ce71b362f64bcb2f452811d21bd64c73061c839232ae24d8df5299952eaf4eabf2db9f35f1384ded0037b6a401303cec4020dca9b729829171df72c2979695420ee007107ddd670d5c2610b95830fb5683e1e0d9365ca8b2dba742a289a9d370ae8d4c0827ce63908162d39b5243a50da528f24d93d9a987b6da7736d2129de83e324e544826bdf24ae219db40271d9e3ac283046742740de4d65b0b66d425248f42df859fb0c07e6be4f16476390ecfc3ee64157ab113af8b700ea54cada85cdede584cb8a92dbb7b338248a97237ed3ddcc72fedf5d45b4ec6390f191767ba979a75f1db73736791a6f8c9f68eec2e4170e90bac256a5a28722a956b191ffd752ddf285252ec522f4fc9d1a961553cd6db7b7a7b"}, 0x401, 0x0) 485.742877ms ago: executing program 3 (id=4818): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000840)=ANY=[@ANYBLOB="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"], 0x2dc}}, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[{0x10, 0x7, 0x81, 0xa7}, {0x1, 0x8, 0xce, 0x77}, {0x7, 0x5, 0x2, 0x5}, {0x8, 0x3, 0xe, 0x8000}, {0x80f3, 0xb1, 0x2, 0x7}]}, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0xfff, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x18, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x9, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) quotactl$Q_GETNEXTQUOTA(0xffffffff80000901, &(0x7f0000000000)=@loop={'/dev/loop', 0x0}, 0xee00, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r2 = open_tree(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x81000) write$binfmt_elf64(r2, &(0x7f0000000a00)=ANY=[@ANYBLOB="7f454c460705090aff070000000000000300060000000080390300000000000040000000000000001703000000000000050000000001380003000d0002007f00020000000600000003000000000000000600000000000000eb4a000000000000d1878007000000000100000000000000060000000000000051e57464040000007d000000000000000900000000000000340800000000000028000000000000000193000000000000c00000000000000003000000040000000000200100000000da590000000000005e780000000000000000000000000000feffffffffffffffff0f000000000000b67e4bc0b1282aa14300657b1e546693af18cac4676b6675970b82619f55641eb2bef65f6757444dc50d28bc785f1110ed0de1d7452bdb06ba47fca4ba9649402c0b337a53041780968c8e6677e553b513f347ab6f91c6451d557dda0a75635a842653dfdc3937d2f8bb79b660c90000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000700"/2902], 0xb56) move_mount(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x0) 439.983377ms ago: executing program 0 (id=4819): sched_setscheduler(0x0, 0x2, 0x0) sendmsg$IPCTNL_MSG_EXP_NEW(0xffffffffffffffff, 0x0, 0x4) r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRES32, @ANYBLOB='\x00'/17, @ANYRES32=0x0, @ANYRESDEC=r0, @ANYBLOB='\x00'/27], 0x48) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r6}, @IFLA_MASTER={0x8, 0xa, r6}]}, 0x44}, 0x1, 0x0, 0x0, 0x2004d808}, 0x0) 371.432348ms ago: executing program 5 (id=4820): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x200000000000016f, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000580)=@newqdisc={0x58, 0x24, 0x5820a61ca228659, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0x0, 0x9}, {0xffff, 0xffff}, {0x0, 0x7}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0x5, 0x7, 0x9, 0x200, 0x6, 0x500, 0x7, 0x398, 0x620b}}}}]}, 0x58}}, 0x800) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=@base={0x5, 0xa, 0x42, 0x40, 0xc0, 0x1, 0x1}, 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000080), &(0x7f0000000080), 0x1003, r0}, 0x38) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000100)={r0, &(0x7f0000000240), &(0x7f0000000080)=""/95}, 0x20) socket(0x36, 0x3, 0x3) r1 = syz_genetlink_get_family_id$smc(&(0x7f0000000280), 0xffffffffffffffff) r2 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000000), &(0x7f00000002c0)={'syz', 0x1}, 0x0, 0x0, r2) r4 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r3) r5 = add_key$keyring(&(0x7f0000000280), &(0x7f0000000180)={'syz', 0x2}, 0x0, 0x0, r4) r6 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000340)={'syz', 0x0}, 0x0, 0x0, r5) keyctl$unlink(0x9, r6, r3) r7 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$SMC_PNETID_ADD(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)=ANY=[@ANYBLOB='4\x00 \x00', @ANYRES16=r1], 0x34}}, 0x0) sendmsg$SMC_PNETID_DEL(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000000c0)={0x14, r1, 0xe27, 0x70bd28, 0x0, {0x4, 0x7, 0x2}}, 0x14}, 0x1, 0x40030000000000}, 0x4000) syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x1a00404, &(0x7f0000000080), 0x1, 0xbb8, &(0x7f00000017c0)="$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") syz_open_procfs(0x0, &(0x7f0000000240)='net/kcm\x00') 368.471468ms ago: executing program 3 (id=4821): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f00000035c0)={0x0, 0x0, 0x0}, 0x4004) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r1, 0x0) r2 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r2, 0x10e, 0x4, &(0x7f0000000640)=0xcde, 0x4) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r2) socket$pppl2tp(0x18, 0x1, 0x1) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) socket$phonet_pipe(0x23, 0x5, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x0, 0x7ffc0005}]}) msgsnd(0x0, &(0x7f0000000a00)={0x1, "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"}, 0x401, 0x0) 310.278238ms ago: executing program 1 (id=4822): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4010}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000a00)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc0800034000000014400000000c0a01011d000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xac}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) close(r2) 136.161009ms ago: executing program 5 (id=4823): sendmsg$NFC_CMD_GET_TARGET(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000140), 0xffffffffffffffff) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000040)={'wg0\x00', 0x0}) bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_genetlink_get_family_id$l2tp(&(0x7f0000000280), 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000005c40)={0x0, 0x0, 0x0}, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x10000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB], 0xe8}, 0x1, 0x0, 0x0, 0x40040000}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000080)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a58000000160a0302000200"], 0x80}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000046c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x8000000, 0x0, {0x0, 0x0, 0x0, r1, {0x0, 0xb}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x2, 0x2000000, 0x0, 0x0, 0x10000000, 0x0, 0x40000000, 0x1000, 0x6, 0x0, 0x0, 0x8000002, 0x0, 0x7e150a0b, 0x0, 0x80005, 0x0, 0x0, 0x4, 0x4, 0x0, 0x100000, 0x0, 0x43, 0x0, 0x974, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x10000, 0x5d2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7fffffe, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401, 0x0, 0x1007, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x40000000, 0x3, 0x3, 0x6, 0x1, 0x8, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x7, 0x2, 0x9, 0x0, 0x3, 0x7, 0xfbfffffd, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x4fd, 0x2000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x7e98263b, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10000000, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2d3, 0x0, 0x0, 0xb2e, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xff, 0x1000, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x6, 0xc3f3, 0x1, 0x0, 0x800, 0x9, 0x800, 0x0, 0x8, 0xe, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0xfffffffe, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x8000, 0x0, 0xfffffffd, 0x0, 0x0, 0xd819ac9, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x1, 0x0, 0x80000001, 0x0, 0x10, 0x20, 0x4, 0x400000b2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1000, 0x100, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xfffffffd, 0x1, 0x1, 0xfffffffe, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x44, 0x0, 0x0, 0x20000041, 0xffffffff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x8, 0x0, 0x80, 0x0, 0x0, 0x8000, 0x1ff, 0x23, 0xaaf0]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000001}, {0x3, 0x0, 0xf, 0x0, 0x1, 0xffffffff}, 0x7, 0x10, 0x2000000}}]}}]}, 0x45c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 118.087479ms ago: executing program 0 (id=4824): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0xa, 0xc, &(0x7f0000000880)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r0, @ANYBLOB="eb1ce7ce487d031aefe4793765a673eecdbbedccbace23d00bc0d4c5ebd3b4b813bf3a44db8fe12e3ce7d7f4930fa781b4ed254f007aae08a09c4ee73405c36c789090a4555c76e6b20fcffd53d19cb72ece4c5a1a20a1cc28a5715cdfdc144e0762c3e0deb7de6312bfa24c83013cc845472aeb910b152b490b867e1165bfdc34a06211bf22c5df79a8594ecebe8e0dc66a0b34770f4d70a889ac4e8edb6a6780de52dec19a4bbc102e66f3aa9a31c1b1c380afe79509ec18f487913de17291b0fee0a0ee5ff582289090"], 0x0, 0x2, 0x0, 0x0, 0x40f00, 0x5b, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYRES16=r1], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x18) r5 = mq_open(&(0x7f0000000040)='!seli\x1a\x1d!\xa7\x00\x00inux\x00G\xd0\xc6(X', 0x6e93ebbbcc0884f2, 0x10, &(0x7f0000000300)={0x0, 0x1, 0x3}) mq_timedreceive(r5, &(0x7f00000003c0)=""/83, 0x53, 0x8000000000002003, 0x0) mq_timedsend(r5, 0x0, 0x0, 0x0, 0x0) getsockopt$inet_tcp_int(r4, 0x6, 0x1, &(0x7f0000000180), &(0x7f0000000340)=0x4) r6 = socket(0x10, 0x3, 0x0) r7 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x0, 0x2, 0xfffffe81, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000400000008"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r9}, 0x18) setxattr$security_capability(&(0x7f0000004600)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000200), 0x0, 0x0, 0x3) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, r7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r11 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x80, 0x2, 0x1f9}, &(0x7f0000000000)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r12, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r12, r13, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r11, 0x0, &(0x7f0000000040)='./file0\x00', 0x64, 0x183000, 0x12345}) r14 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/tty/drivers\x00', 0x0, 0x0) read$rfkill(r14, &(0x7f0000000040), 0x8) io_uring_enter(r11, 0x47f6, 0x0, 0x0, 0x0, 0x0) write$tun(r7, &(0x7f0000000600)=ANY=[@ANYRES8=r10, @ANYRES16, @ANYBLOB="82b3e00381"], 0x32) setsockopt$inet_tcp_TLS_RX(r7, 0x11a, 0x2, &(0x7f00000000c0)=@gcm_128={{0x303}, "4668900d62849fe5", "d057fafdbc3dbe7965e565e44a778b54", "0c78d583", "c9172569430ed5c9"}, 0x28) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0xc, &(0x7f0000000280)={0x4000}, 0x10) sendmsg$nl_generic(r6, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001571c484a4913736e0fb00000000000087c7aff42e881428d455ecf55cc97f50cfb3b7ec48d43cd0d43918c5720cc0114e2e3b56015e7f6dd288d5e0f695c38d2ce477ae4965cf0cf7090017a87738a03c052e00"/102], 0x14}}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000c00), r6) 101.445749ms ago: executing program 1 (id=4825): bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x40, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x1018}, './file0\x00'}) 80.126799ms ago: executing program 3 (id=4826): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) dup2(0xffffffffffffffff, r0) 48.85922ms ago: executing program 1 (id=4827): syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(0xffffffffffffffff, 0x0, 0x4004) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000640)=0xcde, 0x4) r1 = socket$pppl2tp(0x18, 0x1, 0x1) r2 = socket$inet_udp(0x2, 0x2, 0x0) connect$pppl2tp(r1, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r2, 0x2, 0x0, 0x4, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x32) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bind$phonet(0xffffffffffffffff, &(0x7f0000000100)={0x23, 0x9, 0x5f, 0x7}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="180400"/15, @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r0) sendmsg$DEVLINK_CMD_SB_TC_POOL_BIND_SET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000680)={0x1e4, r7, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [{{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x2}}, {0x8, 0xb, 0x10000}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x6}, {0x8, 0xb, 0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x1}}, {0x8, 0xb, 0x7}, {0x6, 0x16, 0x9823}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x3ff}, {0x8}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0x2}, {0x6, 0x16, 0xfff}, {0x5}, {0x6, 0x11, 0xa}, {0x8, 0xb, 0x6}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8}}, {0x8, 0xb, 0x8}, {0x6, 0x16, 0x2}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x2}, {0x8, 0xb, 0x164}}, {{@pci={{0x8}, {0x11}}, {0x8, 0x3, 0x3}}, {0x8, 0xb, 0xfffffffc}, {0x6, 0x16, 0x8}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x3056}, {0x8, 0xb, 0x5}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x8, 0xb, 0x1ff}, {0x6, 0x16, 0x7}, {0x5, 0x12, 0x1}, {0x6, 0x11, 0x7}, {0x8}}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x8000}, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r6}, 0x10) sendmsg$L2TP_CMD_TUNNEL_DELETE(r3, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x1c, r4, 0x1, 0x70bd28, 0x25dfdbfc, {}, [@L2TP_ATTR_CONN_ID={0x8, 0x9, 0x2}]}, 0x1c}}, 0x40) 48.25365ms ago: executing program 3 (id=4828): syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x1000000, &(0x7f0000000000), 0x1, 0x7b9, &(0x7f00000007c0)="$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") bpf$MAP_LOOKUP_ELEM(0x2, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000038c0)=ANY=[@ANYBLOB], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2, 0x0, 0x4}, 0x18) r3 = syz_open_dev$loop(&(0x7f0000000240), 0xffffffff7ffffffd, 0x160862) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/pm_print_times', 0x82802, 0xf) ioctl$LOOP_CONFIGURE(r3, 0x4c0a, &(0x7f0000000080)={r4, 0x0, {0x0, 0x0, 0x0, 0x4, 0x4000000000000ffd, 0x0, 0x0, 0x1e, 0xc, "faf900000080149989fc8dbe43ea6acc96e3a2503dc3bd3fe37d58128bbad0099cebdc25f5ab60c9e6d665f985881a350000ddffffff00", "32d8cc26f7061a74df2cfc06c89f3d9e234b30c50997d3bef409ff2176ff7bfe55cd4a5d83cd4a524bd3ffe70c7f3f800b2f7b6aa54cc50a1fcaed1e831fa79a", "715237601a8ca5b07dcc141802c4dacf162e43ac61f7ad330000000000a04100", [0xfffffffffffffce8, 0xa]}}) quotactl$Q_SYNC(0xffffffff80000102, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000540)='rcu_utilization\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) openat$ptmx(0xffffffffffffff9c, 0x0, 0xc0100, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) 0s ago: executing program 1 (id=4829): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="070000000400000008000000d9"], 0x50) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x44000, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8916, &(0x7f0000000080)={'veth1_to_team\x00', {0x2, 0x4e20, @private=0xa010101}}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x5, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000480)=@gcm_256={{0x303}, "000200", "e123c5876ff425b1ebe250a8486be34705f4f827ae60ecb65e528248d5552bff", "7e25837b", "15d0db2c77179e1a"}, 0x38) getsockopt$inet6_tcp_TCP_ZEROCOPY_RECEIVE(r2, 0x6, 0x23, 0x0, 0x0) writev(r2, &(0x7f0000000080)=[{&(0x7f0000000a40)=')', 0x1}, {&(0x7f0000000380)="8d441916", 0x4}], 0x2) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000000)=@newqdisc={0x44, 0x24, 0x3fe3aa0262d8c583, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, r4, {0x0, 0xf}, {0xffff, 0xffff}, {0x6}}, [@qdisc_kind_options=@q_fq_pie={{0xb}, {0x14, 0x8002, [@TCA_FQ_PIE_BETA={0x7, 0x6, 0x5}, @TCA_FQ_PIE_ALPHA={0x8, 0x5, 0x3}]}}]}, 0x44}, 0x1, 0x0, 0x0, 0x2}, 0x2000400c) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'veth0_macvtap\x00'}) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r8}, 0x18) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102"], 0xfdef) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000500000000850000001b000000b700f9c189d27f1d7a4ac06ba0f02bf0"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r9}, 0x18) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) r10 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000005c0), 0x2, 0x0) r11 = openat$selinux_policy(0xffffff9c, &(0x7f0000000300), 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r11, &(0x7f0000000340)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000440)={0x68, 0x2, 0x6, 0x401, 0x0, 0x0, {0x3, 0x0, 0x3}, [@IPSET_ATTR_FAMILY={0x5}, @IPSET_ATTR_TYPENAME={0xc, 0x3, 'hash:ip\x00'}, @IPSET_ATTR_REVISION={0x5, 0x4, 0x2}, @IPSET_ATTR_TYPENAME={0x12, 0x3, 'hash:net,port\x00'}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x3}, @IPSET_ATTR_TYPENAME={0xd, 0x3, 'list:set\x00'}]}, 0x68}, 0x1, 0x0, 0x0, 0x40001}, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r11, 0x0) write$selinux_load(r10, &(0x7f0000000000)=ANY=[], 0x190da) kernel console output (not intermixed with test programs): : type=1326 audit(1761859897.876:9383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13274 comm="syz.0.3592" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 244.407712][ T29] audit: type=1326 audit(1761859897.876:9384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13274 comm="syz.0.3592" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 244.431378][ T29] audit: type=1326 audit(1761859897.876:9385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13274 comm="syz.0.3592" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 244.455663][ T29] audit: type=1326 audit(1761859897.876:9386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13274 comm="syz.0.3592" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 244.479162][ T29] audit: type=1326 audit(1761859897.876:9387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13274 comm="syz.0.3592" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 244.502772][ T29] audit: type=1326 audit(1761859897.886:9388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13274 comm="syz.0.3592" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 244.526442][ T29] audit: type=1326 audit(1761859897.886:9389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13274 comm="syz.0.3592" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 244.693441][T13290] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3599'. [ 244.947229][T13298] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 244.953791][T13298] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 244.961704][T13298] vhci_hcd vhci_hcd.0: Device attached [ 244.974324][T13304] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(3) [ 244.980884][T13304] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 244.988473][T13304] vhci_hcd vhci_hcd.0: Device attached [ 245.030141][T13298] block device autoloading is deprecated and will be removed. [ 245.086164][T13304] block device autoloading is deprecated and will be removed. [ 245.203117][ T3420] usb 3-1: new low-speed USB device number 21 using vhci_hcd [ 245.233114][ T3515] usb 11-1: new low-speed USB device number 11 using vhci_hcd [ 245.264565][T13299] vhci_hcd: connection reset by peer [ 245.269947][ T7383] vhci_hcd: stop threads [ 245.274255][ T7383] vhci_hcd: release socket [ 245.278723][ T7383] vhci_hcd: disconnect device [ 245.292173][T13305] vhci_hcd: connection reset by peer [ 245.298113][ T7383] vhci_hcd: stop threads [ 245.302427][ T7383] vhci_hcd: release socket [ 245.306885][ T7383] vhci_hcd: disconnect device [ 245.551630][T13322] netlink: 'syz.0.3608': attribute type 4 has an invalid length. [ 245.883749][T13345] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3619'. [ 245.974915][T13363] vhci_hcd vhci_hcd.0: pdev(3) rhport(0) sockfd(3) [ 245.975015][T13363] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 245.975050][T13363] vhci_hcd vhci_hcd.0: Device attached [ 246.064032][T13363] block device autoloading is deprecated and will be removed. [ 246.114935][T13373] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(3) [ 246.121523][T13373] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 246.129227][T13373] vhci_hcd vhci_hcd.0: Device attached [ 246.163398][T13378] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 246.169948][T13378] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 246.177521][T13378] vhci_hcd vhci_hcd.0: Device attached [ 246.204138][T13364] vhci_hcd: connection closed [ 246.204447][ T7387] vhci_hcd: stop threads [ 246.213455][ T7387] vhci_hcd: release socket [ 246.217884][ T7387] vhci_hcd: disconnect device [ 246.222751][ T3421] usb 7-1: new low-speed USB device number 19 using vhci_hcd [ 246.230350][ T3421] usb 7-1: enqueue for inactive port 0 [ 246.247689][T13373] block device autoloading is deprecated and will be removed. [ 246.253225][ T3421] usb 7-1: enqueue for inactive port 0 [ 246.260682][ T3421] usb 7-1: enqueue for inactive port 0 [ 246.294772][T13378] block device autoloading is deprecated and will be removed. [ 246.343110][ T3421] vhci_hcd: vhci_device speed not set [ 246.367650][T13389] rdma_rxe: rxe_newlink: failed to add lo [ 246.431757][T13389] netlink: 68 bytes leftover after parsing attributes in process `syz.0.3637'. [ 246.445407][T13374] vhci_hcd: connection closed [ 246.453279][ T7387] vhci_hcd: stop threads [ 246.462248][ T7387] vhci_hcd: release socket [ 246.466695][ T7387] vhci_hcd: disconnect device [ 246.559685][T13379] vhci_hcd: connection closed [ 246.560053][ T7387] vhci_hcd: stop threads [ 246.569031][ T7387] vhci_hcd: release socket [ 246.573495][ T7387] vhci_hcd: disconnect device [ 246.599805][T13400] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3640'. [ 246.834967][T13417] FAULT_INJECTION: forcing a failure. [ 246.834967][T13417] name failslab, interval 1, probability 0, space 0, times 0 [ 246.848009][T13417] CPU: 0 UID: 0 PID: 13417 Comm: syz.3.3648 Not tainted syzkaller #0 PREEMPT(voluntary) [ 246.848034][T13417] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 246.848052][T13417] Call Trace: [ 246.848136][T13417] [ 246.848145][T13417] __dump_stack+0x1d/0x30 [ 246.848190][T13417] dump_stack_lvl+0xe8/0x140 [ 246.848210][T13417] dump_stack+0x15/0x1b [ 246.848231][T13417] should_fail_ex+0x265/0x280 [ 246.848254][T13417] should_failslab+0x8c/0xb0 [ 246.848302][T13417] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 246.848340][T13417] ? __alloc_skb+0x101/0x320 [ 246.848446][T13417] __alloc_skb+0x101/0x320 [ 246.848478][T13417] alloc_skb_with_frags+0x7d/0x470 [ 246.848508][T13417] ? __rt6_find_exception_rcu+0x8e/0x2e0 [ 246.848536][T13417] ? fib6_select_path+0x2ad/0x400 [ 246.848616][T13417] sock_alloc_send_pskb+0x430/0x4e0 [ 246.848643][T13417] __ip6_append_data+0x1896/0x2390 [ 246.848698][T13417] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 246.848731][T13417] ? __rcu_read_unlock+0x4f/0x70 [ 246.848760][T13417] ? __pfx_ip6_mtu+0x10/0x10 [ 246.848833][T13417] ? ip6_mtu+0xf5/0x120 [ 246.848917][T13417] ip6_make_skb+0x1da/0x4a0 [ 246.848941][T13417] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 246.848977][T13417] udpv6_sendmsg+0x14d6/0x15b0 [ 246.849008][T13417] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 246.849091][T13417] ? __rcu_read_unlock+0x4f/0x70 [ 246.849126][T13417] ? __pfx_udpv6_sendmsg+0x10/0x10 [ 246.849151][T13417] inet6_sendmsg+0xac/0xd0 [ 246.849199][T13417] __sock_sendmsg+0x8b/0x180 [ 246.849229][T13417] __sys_sendto+0x268/0x330 [ 246.849273][T13417] __x64_sys_sendto+0x76/0x90 [ 246.849305][T13417] x64_sys_call+0x2d14/0x3000 [ 246.849370][T13417] do_syscall_64+0xd2/0x200 [ 246.849387][T13417] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 246.849420][T13417] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 246.849519][T13417] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 246.849551][T13417] RIP: 0033:0x7fc4c7ebefc9 [ 246.849566][T13417] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 246.849587][T13417] RSP: 002b:00007fc4c6927038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 246.849610][T13417] RAX: ffffffffffffffda RBX: 00007fc4c8115fa0 RCX: 00007fc4c7ebefc9 [ 246.849635][T13417] RDX: 000000000000ff00 RSI: 0000000000000000 RDI: 0000000000000006 [ 246.849684][T13417] RBP: 00007fc4c6927090 R08: 0000000000000000 R09: 0000000000000000 [ 246.849698][T13417] R10: 0000000000000700 R11: 0000000000000246 R12: 0000000000000001 [ 246.849714][T13417] R13: 00007fc4c8116038 R14: 00007fc4c8115fa0 R15: 00007ffdd3907a18 [ 246.849735][T13417] [ 246.853383][T13408] netlink: 796 bytes leftover after parsing attributes in process `syz.0.3644'. [ 247.150958][T13425] rdma_rxe: rxe_newlink: failed to add lo [ 247.313954][T13435] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 247.326020][T13441] netlink: 68 bytes leftover after parsing attributes in process `syz.1.3651'. [ 247.441294][T13446] lo speed is unknown, defaulting to 1000 [ 247.447627][T13446] lo speed is unknown, defaulting to 1000 [ 247.453896][T13446] lo speed is unknown, defaulting to 1000 [ 247.990628][T13460] netlink: 796 bytes leftover after parsing attributes in process `syz.1.3664'. [ 248.176970][T13481] FAULT_INJECTION: forcing a failure. [ 248.176970][T13481] name failslab, interval 1, probability 0, space 0, times 0 [ 248.189736][T13481] CPU: 1 UID: 0 PID: 13481 Comm: syz.3.3672 Not tainted syzkaller #0 PREEMPT(voluntary) [ 248.189844][T13481] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 248.189856][T13481] Call Trace: [ 248.189863][T13481] [ 248.189869][T13481] __dump_stack+0x1d/0x30 [ 248.189891][T13481] dump_stack_lvl+0xe8/0x140 [ 248.189910][T13481] dump_stack+0x15/0x1b [ 248.189927][T13481] should_fail_ex+0x265/0x280 [ 248.190024][T13481] should_failslab+0x8c/0xb0 [ 248.190052][T13481] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 248.190083][T13481] ? __alloc_skb+0x101/0x320 [ 248.190171][T13481] __alloc_skb+0x101/0x320 [ 248.190198][T13481] netlink_alloc_large_skb+0xbf/0xf0 [ 248.190230][T13481] netlink_sendmsg+0x3cf/0x6b0 [ 248.190250][T13481] ? __pfx_netlink_sendmsg+0x10/0x10 [ 248.190421][T13481] __sock_sendmsg+0x145/0x180 [ 248.190445][T13481] ____sys_sendmsg+0x31e/0x4e0 [ 248.190486][T13481] ___sys_sendmsg+0x17b/0x1d0 [ 248.190530][T13481] __x64_sys_sendmsg+0xd4/0x160 [ 248.190618][T13481] x64_sys_call+0x191e/0x3000 [ 248.190640][T13481] do_syscall_64+0xd2/0x200 [ 248.190658][T13481] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 248.190685][T13481] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 248.190782][T13481] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 248.190803][T13481] RIP: 0033:0x7fc4c7ebefc9 [ 248.190849][T13481] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 248.190867][T13481] RSP: 002b:00007fc4c6927038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 248.190885][T13481] RAX: ffffffffffffffda RBX: 00007fc4c8115fa0 RCX: 00007fc4c7ebefc9 [ 248.190897][T13481] RDX: 0000000000000000 RSI: 0000200000000380 RDI: 0000000000000003 [ 248.190955][T13481] RBP: 00007fc4c6927090 R08: 0000000000000000 R09: 0000000000000000 [ 248.190967][T13481] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 248.190978][T13481] R13: 00007fc4c8116038 R14: 00007fc4c8115fa0 R15: 00007ffdd3907a18 [ 248.191071][T13481] [ 249.495911][T13496] lo speed is unknown, defaulting to 1000 [ 249.502082][T13496] lo speed is unknown, defaulting to 1000 [ 249.508248][T13496] lo speed is unknown, defaulting to 1000 [ 249.544659][ T29] kauditd_printk_skb: 250 callbacks suppressed [ 249.544685][ T29] audit: type=1326 audit(1761859903.066:9640): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13506 comm="syz.0.3686" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fc397a35e67 code=0x7ffc0000 [ 249.668499][ T29] audit: type=1326 audit(1761859903.106:9641): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13506 comm="syz.0.3686" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fc3979db099 code=0x7ffc0000 [ 249.692067][ T29] audit: type=1326 audit(1761859903.106:9642): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13506 comm="syz.0.3686" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fc397a35e67 code=0x7ffc0000 [ 249.715623][ T29] audit: type=1326 audit(1761859903.106:9643): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13506 comm="syz.0.3686" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fc3979db099 code=0x7ffc0000 [ 249.739244][ T29] audit: type=1326 audit(1761859903.106:9644): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13506 comm="syz.0.3686" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 249.762924][ T29] audit: type=1326 audit(1761859903.106:9645): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13506 comm="syz.0.3686" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 249.786460][ T29] audit: type=1326 audit(1761859903.106:9646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13506 comm="syz.0.3686" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 249.809978][ T29] audit: type=1326 audit(1761859903.106:9647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13506 comm="syz.0.3686" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 249.833858][ T29] audit: type=1326 audit(1761859903.106:9648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13506 comm="syz.0.3686" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 249.857386][ T29] audit: type=1326 audit(1761859903.106:9649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13506 comm="syz.0.3686" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 249.923221][T13515] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(3) [ 249.929878][T13515] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 249.937491][T13515] vhci_hcd vhci_hcd.0: Device attached [ 250.146395][T13541] tipc: Enabled bearer , priority 0 [ 250.164675][T13541] syzkaller0: entered promiscuous mode [ 250.170197][T13541] syzkaller0: entered allmulticast mode [ 250.205301][T13519] vhci_hcd: connection closed [ 250.205547][ T7388] vhci_hcd: stop threads [ 250.207035][T13541] tipc: Resetting bearer [ 250.210262][ T7388] vhci_hcd: release socket [ 250.210279][ T7388] vhci_hcd: disconnect device [ 250.214603][T13541] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 250.237868][T13540] tipc: Resetting bearer [ 250.254748][T13540] tipc: Disabling bearer [ 250.263133][ T3515] usb 11-1: enqueue for inactive port 0 [ 250.268736][ T3420] usb 3-1: enqueue for inactive port 0 [ 250.280341][ T3515] usb 11-1: enqueue for inactive port 0 [ 250.286277][ T3420] usb 3-1: enqueue for inactive port 0 [ 250.373135][ T3515] vhci_hcd: vhci_device speed not set [ 250.383153][ T3420] vhci_hcd: vhci_device speed not set [ 251.224749][T13626] FAULT_INJECTION: forcing a failure. [ 251.224749][T13626] name failslab, interval 1, probability 0, space 0, times 0 [ 251.237534][T13626] CPU: 1 UID: 0 PID: 13626 Comm: syz.0.3737 Not tainted syzkaller #0 PREEMPT(voluntary) [ 251.237565][T13626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 251.237577][T13626] Call Trace: [ 251.237583][T13626] [ 251.237591][T13626] __dump_stack+0x1d/0x30 [ 251.237617][T13626] dump_stack_lvl+0xe8/0x140 [ 251.237715][T13626] dump_stack+0x15/0x1b [ 251.237735][T13626] should_fail_ex+0x265/0x280 [ 251.237808][T13626] should_failslab+0x8c/0xb0 [ 251.237867][T13626] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 251.237904][T13626] ? sidtab_sid2str_get+0xa0/0x130 [ 251.237945][T13626] kmemdup_noprof+0x2b/0x70 [ 251.237998][T13626] sidtab_sid2str_get+0xa0/0x130 [ 251.238033][T13626] security_sid_to_context_core+0x1eb/0x2e0 [ 251.238072][T13626] security_sid_to_context+0x27/0x40 [ 251.238124][T13626] selinux_lsmprop_to_secctx+0x67/0xf0 [ 251.238244][T13626] security_lsmprop_to_secctx+0x1a3/0x1c0 [ 251.238267][T13626] audit_log_subj_ctx+0xa4/0x3e0 [ 251.238292][T13626] ? skb_put+0xa9/0xf0 [ 251.238329][T13626] audit_log_task_context+0x48/0x70 [ 251.238465][T13626] audit_log_task+0xf4/0x250 [ 251.238504][T13626] ? kstrtouint+0x76/0xc0 [ 251.238547][T13626] audit_seccomp+0x61/0x100 [ 251.238611][T13626] ? __seccomp_filter+0x82d/0x1250 [ 251.238642][T13626] __seccomp_filter+0x83e/0x1250 [ 251.238699][T13626] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 251.238742][T13626] ? vfs_write+0x7e8/0x960 [ 251.238772][T13626] __secure_computing+0x82/0x150 [ 251.238799][T13626] syscall_trace_enter+0xcf/0x1e0 [ 251.238893][T13626] do_syscall_64+0xac/0x200 [ 251.238916][T13626] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 251.238950][T13626] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 251.238990][T13626] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 251.239035][T13626] RIP: 0033:0x7fc397a3efc9 [ 251.239053][T13626] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 251.239072][T13626] RSP: 002b:00007fc3964a7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a2 [ 251.239095][T13626] RAX: ffffffffffffffda RBX: 00007fc397c95fa0 RCX: 00007fc397a3efc9 [ 251.239112][T13626] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 251.239127][T13626] RBP: 00007fc3964a7090 R08: 0000000000000000 R09: 0000000000000000 [ 251.239197][T13626] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 251.239274][T13626] R13: 00007fc397c96038 R14: 00007fc397c95fa0 R15: 00007ffce705adb8 [ 251.239299][T13626] [ 251.259497][T13627] netlink: 8 bytes leftover after parsing attributes in process `'. [ 251.259979][T13627] netlink: 8 bytes leftover after parsing attributes in process `'. [ 251.260701][T13627] netlink: 8 bytes leftover after parsing attributes in process `'. [ 251.634904][ T7399] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 251.671282][T13637] lo speed is unknown, defaulting to 1000 [ 251.677495][T13637] lo speed is unknown, defaulting to 1000 [ 251.683743][T13637] lo speed is unknown, defaulting to 1000 [ 251.706302][ T7399] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 251.771952][ T7399] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 251.791627][T13655] lo speed is unknown, defaulting to 1000 [ 251.809949][T13655] lo speed is unknown, defaulting to 1000 [ 251.818007][T13662] netlink: 32 bytes leftover after parsing attributes in process `syz.1.3746'. [ 251.824010][T13655] lo speed is unknown, defaulting to 1000 [ 251.836376][ T7399] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 251.900037][T13637] chnl_net:caif_netlink_parms(): no params data found [ 251.931464][T13670] netlink: 8 bytes leftover after parsing attributes in process `syz.1.3746'. [ 251.983042][T13670] bond1: option active_slave: mode dependency failed, not supported in mode balance-rr(0) [ 251.994192][T13670] bond1 (unregistering): Released all slaves [ 252.012665][ T7399] bridge_slave_1: left allmulticast mode [ 252.018396][ T7399] bridge_slave_1: left promiscuous mode [ 252.024123][ T7399] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.032249][ T7399] bridge_slave_0: left allmulticast mode [ 252.038006][ T7399] bridge_slave_0: left promiscuous mode [ 252.043767][ T7399] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.257966][ T7399] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 252.287394][ T7399] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 252.311038][T13681] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 252.331674][ T7399] bond0 (unregistering): Released all slaves [ 252.360192][T13637] bridge0: port 1(bridge_slave_0) entered blocking state [ 252.367412][T13637] bridge0: port 1(bridge_slave_0) entered disabled state [ 252.404494][T13637] bridge_slave_0: entered allmulticast mode [ 252.426887][T13637] bridge_slave_0: entered promiscuous mode [ 252.449085][ T7399] tipc: Left network mode [ 252.463482][T13637] bridge0: port 2(bridge_slave_1) entered blocking state [ 252.470584][T13637] bridge0: port 2(bridge_slave_1) entered disabled state [ 252.523294][T13637] bridge_slave_1: entered allmulticast mode [ 252.557522][T13637] bridge_slave_1: entered promiscuous mode [ 252.671946][T13637] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 252.690520][ T7399] hsr_slave_0: left promiscuous mode [ 252.724378][ T7399] hsr_slave_1: left promiscuous mode [ 252.743678][ T7399] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 252.751115][ T7399] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 252.799549][ T7399] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 252.807060][ T7399] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 252.833735][T13691] netlink: 'syz.0.3757': attribute type 4 has an invalid length. [ 252.852552][ T7399] veth1_macvtap: left promiscuous mode [ 252.870199][ T7399] veth0_macvtap: left promiscuous mode [ 252.888503][ T7399] veth1_vlan: left promiscuous mode [ 252.904820][ T7399] veth0_vlan: left promiscuous mode [ 253.168930][ T7399] team0 (unregistering): Port device team_slave_1 removed [ 253.195123][ T7399] team0 (unregistering): Port device team_slave_0 removed [ 253.296807][T13637] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 253.389418][T13637] team0: Port device team_slave_0 added [ 253.420099][T13637] team0: Port device team_slave_1 added [ 253.464656][T13702] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 253.471214][T13702] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 253.478737][T13702] vhci_hcd vhci_hcd.0: Device attached [ 253.504598][T13637] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 253.511654][T13637] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 253.537781][T13637] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 253.580911][T13702] block device autoloading is deprecated and will be removed. [ 253.589400][T13637] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 253.596385][T13637] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 253.622476][T13637] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 253.643491][T13710] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 253.699936][T13637] hsr_slave_0: entered promiscuous mode [ 253.717338][T13637] hsr_slave_1: entered promiscuous mode [ 253.823155][T13703] vhci_hcd: connection closed [ 253.823450][ T7393] vhci_hcd: stop threads [ 253.832439][ T7393] vhci_hcd: release socket [ 253.836954][ T7393] vhci_hcd: disconnect device [ 253.846121][T13722] 9pnet_fd: Insufficient options for proto=fd [ 253.903996][T13722] lo speed is unknown, defaulting to 1000 [ 253.918922][T13722] lo speed is unknown, defaulting to 1000 [ 253.930606][T13722] lo speed is unknown, defaulting to 1000 [ 253.956800][T13637] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 253.975094][T13637] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 253.994700][T13637] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 254.009152][T13637] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 255.388934][T13735] syzkaller0: entered promiscuous mode [ 255.394525][T13735] syzkaller0: entered allmulticast mode [ 255.473020][T13637] 8021q: adding VLAN 0 to HW filter on device bond0 [ 255.501253][T13637] 8021q: adding VLAN 0 to HW filter on device team0 [ 255.521932][ T7388] bridge0: port 1(bridge_slave_0) entered blocking state [ 255.529074][ T7388] bridge0: port 1(bridge_slave_0) entered forwarding state [ 255.557054][ T7388] bridge0: port 2(bridge_slave_1) entered blocking state [ 255.564324][ T7388] bridge0: port 2(bridge_slave_1) entered forwarding state [ 255.603849][T13637] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 255.614389][T13637] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 255.758168][T13637] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 256.054065][ T29] kauditd_printk_skb: 171 callbacks suppressed [ 256.054084][ T29] audit: type=1326 audit(1761859909.576:9820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13764 comm="syz.3.3774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 256.084298][ T29] audit: type=1326 audit(1761859909.576:9821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13764 comm="syz.3.3774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 256.134910][ T29] audit: type=1326 audit(1761859909.636:9822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13764 comm="syz.3.3774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=441 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 256.158512][ T29] audit: type=1326 audit(1761859909.636:9823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13764 comm="syz.3.3774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 256.182099][ T29] audit: type=1326 audit(1761859909.636:9824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13764 comm="syz.3.3774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 256.220099][T13637] veth0_vlan: entered promiscuous mode [ 256.235491][T13637] veth1_vlan: entered promiscuous mode [ 256.263403][T13779] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 256.263580][T13637] veth0_macvtap: entered promiscuous mode [ 256.269959][T13779] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 256.283318][T13779] vhci_hcd vhci_hcd.0: Device attached [ 256.295479][T13637] veth1_macvtap: entered promiscuous mode [ 256.307685][T13637] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 256.325350][T13637] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 256.348395][ T7388] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.368909][ T7388] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.372905][ T29] audit: type=1400 audit(1761859909.886:9825): avc: denied { mounton } for pid=13637 comm="syz-executor" path="/root/syzkaller.nW1bqx/syz-tmp" dev="sda1" ino=2057 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 256.402153][ T29] audit: type=1400 audit(1761859909.886:9826): avc: denied { mount } for pid=13637 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 256.414059][T13780] vhci_hcd: connection closed [ 256.427071][ T7388] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.459568][ T7393] vhci_hcd: stop threads [ 256.463891][ T7393] vhci_hcd: release socket [ 256.468396][ T7393] vhci_hcd: disconnect device [ 256.473324][ T3533] vhci_hcd: vhci_device speed not set [ 256.488999][ T7388] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 256.536530][ T29] audit: type=1400 audit(1761859909.946:9827): avc: denied { mount } for pid=13637 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 256.558720][ T29] audit: type=1400 audit(1761859909.946:9828): avc: denied { mounton } for pid=13637 comm="syz-executor" path="/root/syzkaller.nW1bqx/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 256.585743][ T29] audit: type=1400 audit(1761859909.946:9829): avc: denied { mounton } for pid=13637 comm="syz-executor" path="/root/syzkaller.nW1bqx/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=46593 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 256.847075][T13803] tipc: Started in network mode [ 256.852038][T13803] tipc: Node identity a64db70042f1, cluster identity 4711 [ 256.859267][T13803] tipc: Enabled bearer , priority 0 [ 256.868333][T13803] syzkaller0: entered promiscuous mode [ 256.873861][T13803] syzkaller0: entered allmulticast mode [ 256.891140][T13803] tipc: Resetting bearer [ 256.898069][T13802] tipc: Resetting bearer [ 256.908439][T13802] tipc: Disabling bearer [ 257.180055][T13817] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3790'. [ 257.234866][T13818] netlink: 4 bytes leftover after parsing attributes in process `syz.1.3790'. [ 259.049657][T13837] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(3) [ 259.056219][T13837] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 259.063915][T13837] vhci_hcd vhci_hcd.0: Device attached [ 259.136989][T13838] vhci_hcd: connection closed [ 259.137285][ T7383] vhci_hcd: stop threads [ 259.146285][ T7383] vhci_hcd: release socket [ 259.150767][ T7383] vhci_hcd: disconnect device [ 259.330042][T13855] 9pnet_fd: Insufficient options for proto=fd [ 259.472037][T13868] loop1: detected capacity change from 0 to 1024 [ 259.482752][T13868] EXT4-fs (loop1): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 259.493810][T13868] EXT4-fs (loop1): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 259.506947][T13868] JBD2: no valid journal superblock found [ 259.512701][T13868] EXT4-fs (loop1): Could not load journal inode [ 259.534113][T13868] SELinux: security_context_str_to_sid (Ð-šXܘ7.H\¹ÿ %ºu@) failed with errno=-22 [ 259.959469][T13902] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3828'. [ 259.978777][T13904] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 259.993157][T13902] IPVS: Unknown mcast interface: ipvlan1 [ 260.413487][T13917] tipc: Enabled bearer , priority 0 [ 260.421487][T13917] syzkaller0: entered promiscuous mode [ 260.427190][T13917] syzkaller0: entered allmulticast mode [ 260.445014][T13917] tipc: Resetting bearer [ 260.451644][T13916] tipc: Resetting bearer [ 260.460010][T13916] tipc: Disabling bearer [ 260.615735][T13931] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3840'. [ 260.625061][T13931] IPVS: Unknown mcast interface: ipvlan1 [ 260.895814][T13951] tipc: Enabled bearer , priority 0 [ 260.911755][T13951] syzkaller0: entered promiscuous mode [ 260.917525][T13951] syzkaller0: entered allmulticast mode [ 260.955650][T13951] tipc: Resetting bearer [ 260.968628][T13950] tipc: Resetting bearer [ 260.987916][T13950] tipc: Disabling bearer [ 261.198847][ T29] kauditd_printk_skb: 398 callbacks suppressed [ 261.198865][ T29] audit: type=1326 audit(1761859914.716:10228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13961 comm="syz.6.3853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f41ec0befc9 code=0x7ffc0000 [ 261.664750][T13975] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(3) [ 261.671319][T13975] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 261.678904][T13975] vhci_hcd vhci_hcd.0: Device attached [ 261.687216][ T29] audit: type=1326 audit(1761859914.756:10229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13961 comm="syz.6.3853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f41ec0befc9 code=0x7ffc0000 [ 261.710848][ T29] audit: type=1326 audit(1761859914.756:10230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13961 comm="syz.6.3853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f41ec0befc9 code=0x7ffc0000 [ 261.734516][ T29] audit: type=1326 audit(1761859914.756:10231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13961 comm="syz.6.3853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f41ec0befc9 code=0x7ffc0000 [ 261.758139][ T29] audit: type=1326 audit(1761859914.756:10232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13961 comm="syz.6.3853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f41ec0befc9 code=0x7ffc0000 [ 261.781931][ T29] audit: type=1326 audit(1761859914.756:10233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13961 comm="syz.6.3853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f41ec0befc9 code=0x7ffc0000 [ 261.784873][T13978] loop1: detected capacity change from 0 to 2048 [ 261.805585][ T29] audit: type=1326 audit(1761859914.766:10234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13961 comm="syz.6.3853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f41ec0befc9 code=0x7ffc0000 [ 261.835479][ T29] audit: type=1326 audit(1761859914.766:10235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13961 comm="syz.6.3853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f41ec0befc9 code=0x7ffc0000 [ 261.859187][ T29] audit: type=1326 audit(1761859914.776:10236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13961 comm="syz.6.3853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=12 compat=0 ip=0x7f41ec0befc9 code=0x7ffc0000 [ 261.883189][ T29] audit: type=1326 audit(1761859914.776:10237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13961 comm="syz.6.3853" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f41ec0befc9 code=0x7ffc0000 [ 261.943280][ T3487] usb 3-1: new low-speed USB device number 23 using vhci_hcd [ 261.953171][T13978] Alternate GPT is invalid, using primary GPT. [ 261.959563][T13978] loop1: p2 p3 p7 [ 262.011944][T13975] block device autoloading is deprecated and will be removed. [ 262.051094][T13976] vhci_hcd: connection reset by peer [ 262.143386][ T7393] vhci_hcd: stop threads [ 262.147694][ T7393] vhci_hcd: release socket [ 262.152155][ T7393] vhci_hcd: disconnect device [ 262.761554][T14007] netlink: 24 bytes leftover after parsing attributes in process `syz.0.3866'. [ 262.815240][T14008] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3866'. [ 263.481701][T14013] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 263.638593][T14020] batadv_slave_0: entered promiscuous mode [ 263.660997][T14020] FAULT_INJECTION: forcing a failure. [ 263.660997][T14020] name failslab, interval 1, probability 0, space 0, times 0 [ 263.673804][T14020] CPU: 0 UID: 0 PID: 14020 Comm: syz.1.3873 Not tainted syzkaller #0 PREEMPT(voluntary) [ 263.673838][T14020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 263.673854][T14020] Call Trace: [ 263.673862][T14020] [ 263.673871][T14020] __dump_stack+0x1d/0x30 [ 263.673895][T14020] dump_stack_lvl+0xe8/0x140 [ 263.673915][T14020] dump_stack+0x15/0x1b [ 263.673931][T14020] should_fail_ex+0x265/0x280 [ 263.674040][T14020] should_failslab+0x8c/0xb0 [ 263.674084][T14020] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 263.674178][T14020] ? __alloc_skb+0x101/0x320 [ 263.674216][T14020] __alloc_skb+0x101/0x320 [ 263.674253][T14020] rtmsg_ifinfo_build_skb+0x5f/0x1b0 [ 263.674360][T14020] ? __rcu_read_unlock+0x4f/0x70 [ 263.674400][T14020] ? __pfx_rtnetlink_event+0x10/0x10 [ 263.674430][T14020] rtnetlink_event+0x18c/0x200 [ 263.674458][T14020] raw_notifier_call_chain+0x6f/0x1b0 [ 263.674516][T14020] ? call_netdevice_notifiers_info+0x9c/0x100 [ 263.674550][T14020] call_netdevice_notifiers_info+0xae/0x100 [ 263.674583][T14020] netif_set_mac_address+0x204/0x260 [ 263.674669][T14020] dev_set_mac_address_user+0xd7/0x190 [ 263.674735][T14020] dev_ifsioc+0x9b3/0xaa0 [ 263.674758][T14020] ? __rcu_read_unlock+0x4f/0x70 [ 263.674785][T14020] dev_ioctl+0x70a/0x960 [ 263.674855][T14020] sock_do_ioctl+0x197/0x220 [ 263.674897][T14020] sock_ioctl+0x41b/0x610 [ 263.674926][T14020] ? __pfx_sock_ioctl+0x10/0x10 [ 263.674953][T14020] __se_sys_ioctl+0xce/0x140 [ 263.674980][T14020] __x64_sys_ioctl+0x43/0x50 [ 263.675005][T14020] x64_sys_call+0x1816/0x3000 [ 263.675116][T14020] do_syscall_64+0xd2/0x200 [ 263.675286][T14020] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 263.675320][T14020] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 263.675382][T14020] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 263.675432][T14020] RIP: 0033:0x7fedda96efc9 [ 263.675451][T14020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 263.675469][T14020] RSP: 002b:00007fedd93cf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 263.675488][T14020] RAX: ffffffffffffffda RBX: 00007feddabc5fa0 RCX: 00007fedda96efc9 [ 263.675500][T14020] RDX: 0000200000000000 RSI: 0000000000008924 RDI: 000000000000000a [ 263.675511][T14020] RBP: 00007fedd93cf090 R08: 0000000000000000 R09: 0000000000000000 [ 263.675595][T14020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 263.675606][T14020] R13: 00007feddabc6038 R14: 00007feddabc5fa0 R15: 00007ffdb657be58 [ 263.675625][T14020] [ 264.033626][T14019] batadv_slave_0: left promiscuous mode [ 264.545582][T14031] tipc: Enabled bearer , priority 0 [ 264.560517][T14031] syzkaller0: entered promiscuous mode [ 264.566890][T14031] syzkaller0: entered allmulticast mode [ 264.572814][T14033] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 264.579421][T14033] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 264.587023][T14033] vhci_hcd vhci_hcd.0: Device attached [ 264.625676][T14038] tipc: Resetting bearer [ 264.647808][T14030] tipc: Resetting bearer [ 264.664975][T14030] tipc: Disabling bearer [ 264.688372][T14033] block device autoloading is deprecated and will be removed. [ 264.707669][T14034] vhci_hcd: connection closed [ 264.708039][ T7411] vhci_hcd: stop threads [ 264.717046][ T7411] vhci_hcd: release socket [ 264.721475][ T7411] vhci_hcd: disconnect device [ 264.932638][T14048] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 265.059591][T14049] lo speed is unknown, defaulting to 1000 [ 265.066185][T14049] lo speed is unknown, defaulting to 1000 [ 265.072632][T14049] lo speed is unknown, defaulting to 1000 [ 265.383647][ T3651] page_pool_release_retry() stalled pool shutdown: id 52, 1 inflight 60 sec [ 265.723245][T14064] netlink: 24 bytes leftover after parsing attributes in process `syz.5.3888'. [ 265.748585][T14064] netlink: 4 bytes leftover after parsing attributes in process `syz.5.3888'. [ 266.655168][ T29] kauditd_printk_skb: 94 callbacks suppressed [ 266.655185][ T29] audit: type=1326 audit(1761859920.176:10332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14073 comm="syz.0.3892" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 266.768182][ T29] audit: type=1326 audit(1761859920.206:10333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14073 comm="syz.0.3892" exe="/root/syz-executor" sig=0 arch=c000003e syscall=441 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 266.791872][ T29] audit: type=1326 audit(1761859920.206:10334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14073 comm="syz.0.3892" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 266.815540][ T29] audit: type=1326 audit(1761859920.206:10335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14073 comm="syz.0.3892" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 267.063160][ T3487] usb 3-1: enqueue for inactive port 0 [ 267.069066][ T3487] usb 3-1: enqueue for inactive port 0 [ 267.143160][ T3487] vhci_hcd: vhci_device speed not set [ 267.220454][ T29] audit: type=1326 audit(1761859920.736:10336): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14087 comm="syz.5.3897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4b069cefc9 code=0x7ffc0000 [ 267.244232][ T29] audit: type=1326 audit(1761859920.736:10337): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14087 comm="syz.5.3897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4b069cefc9 code=0x7ffc0000 [ 267.278810][ T29] audit: type=1326 audit(1761859920.796:10338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14087 comm="syz.5.3897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4b069cefc9 code=0x7ffc0000 [ 267.302571][ T29] audit: type=1326 audit(1761859920.796:10339): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14087 comm="syz.5.3897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4b069cefc9 code=0x7ffc0000 [ 267.326410][ T29] audit: type=1326 audit(1761859920.796:10340): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14087 comm="syz.5.3897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4b069cefc9 code=0x7ffc0000 [ 267.395530][ T29] audit: type=1326 audit(1761859920.906:10341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14087 comm="syz.5.3897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4b069cefc9 code=0x7ffc0000 [ 267.543125][T14098] lo speed is unknown, defaulting to 1000 [ 267.549675][T14098] lo speed is unknown, defaulting to 1000 [ 267.556154][T14098] lo speed is unknown, defaulting to 1000 [ 267.866172][T14105] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 268.059505][T14123] FAULT_INJECTION: forcing a failure. [ 268.059505][T14123] name failslab, interval 1, probability 0, space 0, times 0 [ 268.072265][T14123] CPU: 0 UID: 0 PID: 14123 Comm: syz.0.3912 Not tainted syzkaller #0 PREEMPT(voluntary) [ 268.072353][T14123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 268.072368][T14123] Call Trace: [ 268.072374][T14123] [ 268.072382][T14123] __dump_stack+0x1d/0x30 [ 268.072409][T14123] dump_stack_lvl+0xe8/0x140 [ 268.072429][T14123] dump_stack+0x15/0x1b [ 268.072515][T14123] should_fail_ex+0x265/0x280 [ 268.072534][T14123] should_failslab+0x8c/0xb0 [ 268.072562][T14123] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 268.072610][T14123] ? __alloc_skb+0x101/0x320 [ 268.072683][T14123] __alloc_skb+0x101/0x320 [ 268.072713][T14123] netlink_alloc_large_skb+0xbf/0xf0 [ 268.072784][T14123] netlink_sendmsg+0x3cf/0x6b0 [ 268.072803][T14123] ? __pfx_netlink_sendmsg+0x10/0x10 [ 268.072884][T14123] __sock_sendmsg+0x145/0x180 [ 268.072959][T14123] ____sys_sendmsg+0x31e/0x4e0 [ 268.072994][T14123] ___sys_sendmsg+0x17b/0x1d0 [ 268.073089][T14123] __x64_sys_sendmsg+0xd4/0x160 [ 268.073126][T14123] x64_sys_call+0x191e/0x3000 [ 268.073228][T14123] do_syscall_64+0xd2/0x200 [ 268.073246][T14123] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 268.073274][T14123] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 268.073326][T14123] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 268.073346][T14123] RIP: 0033:0x7fc397a3efc9 [ 268.073361][T14123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 268.073454][T14123] RSP: 002b:00007fc3964a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 268.073473][T14123] RAX: ffffffffffffffda RBX: 00007fc397c95fa0 RCX: 00007fc397a3efc9 [ 268.073485][T14123] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000004 [ 268.073530][T14123] RBP: 00007fc3964a7090 R08: 0000000000000000 R09: 0000000000000000 [ 268.073580][T14123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 268.073591][T14123] R13: 00007fc397c96038 R14: 00007fc397c95fa0 R15: 00007ffce705adb8 [ 268.073609][T14123] [ 268.467286][T14129] netlink: 4 bytes leftover after parsing attributes in process `syz.3.3916'. [ 268.480558][T14131] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 268.499579][T14129] team1: entered promiscuous mode [ 268.504701][T14129] team1: entered allmulticast mode [ 268.517510][T14129] 8021q: adding VLAN 0 to HW filter on device team1 [ 268.727711][T14157] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 269.552617][T14184] netlink: 64 bytes leftover after parsing attributes in process `syz.1.3940'. [ 269.606613][T14186] netlink: 'syz.5.3941': attribute type 4 has an invalid length. [ 269.696772][T14189] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 269.703457][T14189] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 269.711086][T14189] vhci_hcd vhci_hcd.0: Device attached [ 269.834655][T14189] block device autoloading is deprecated and will be removed. [ 269.864669][T14199] 9pnet_fd: Insufficient options for proto=fd [ 269.939071][T14205] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 270.006767][T14215] netlink: 64 bytes leftover after parsing attributes in process `syz.1.3952'. [ 270.021747][T14190] vhci_hcd: connection closed [ 270.022012][ T7411] vhci_hcd: stop threads [ 270.022024][ T7411] vhci_hcd: release socket [ 270.022038][ T7411] vhci_hcd: disconnect device [ 270.088866][T14219] netlink: 'syz.5.3955': attribute type 4 has an invalid length. [ 270.176982][T14224] netlink: 64 bytes leftover after parsing attributes in process `syz.5.3957'. [ 270.349327][T14232] 9pnet_fd: Insufficient options for proto=fd [ 270.530628][T14240] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 270.581517][T14245] netlink: 'syz.1.3966': attribute type 4 has an invalid length. [ 270.655573][T14256] netlink: 7 bytes leftover after parsing attributes in process `syz.1.3971'. [ 270.941919][T14270] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 271.217001][T14280] netlink: 64 bytes leftover after parsing attributes in process `syz.5.3983'. [ 271.567023][T14290] netlink: 'syz.3.3979': attribute type 4 has an invalid length. [ 271.763622][ T29] kauditd_printk_skb: 406 callbacks suppressed [ 271.763638][ T29] audit: type=1326 audit(1761859925.286:10748): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14298 comm="syz.0.3990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 271.819481][ T29] audit: type=1326 audit(1761859925.306:10749): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14298 comm="syz.0.3990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 271.843425][ T29] audit: type=1326 audit(1761859925.306:10750): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14298 comm="syz.0.3990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 271.867283][ T29] audit: type=1326 audit(1761859925.306:10751): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14298 comm="syz.0.3990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 271.890882][ T29] audit: type=1326 audit(1761859925.306:10752): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14298 comm="syz.0.3990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 271.914487][ T29] audit: type=1326 audit(1761859925.306:10753): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14298 comm="syz.0.3990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 271.938168][ T29] audit: type=1326 audit(1761859925.306:10754): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14298 comm="syz.0.3990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 271.961835][ T29] audit: type=1326 audit(1761859925.306:10755): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14298 comm="syz.0.3990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 271.985456][ T29] audit: type=1326 audit(1761859925.306:10756): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14298 comm="syz.0.3990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 272.009130][ T29] audit: type=1326 audit(1761859925.306:10757): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14298 comm="syz.0.3990" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 272.118056][T14301] lo speed is unknown, defaulting to 1000 [ 272.118999][T14301] lo speed is unknown, defaulting to 1000 [ 272.119513][T14301] lo speed is unknown, defaulting to 1000 [ 272.289714][T14307] tipc: Enabled bearer , priority 0 [ 272.296942][T14307] syzkaller0: entered promiscuous mode [ 272.297001][T14307] syzkaller0: entered allmulticast mode [ 272.314670][T14306] tipc: Resetting bearer [ 272.322964][T14306] tipc: Disabling bearer [ 272.354460][T14310] loop1: detected capacity change from 0 to 512 [ 272.361254][T14310] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 272.414096][T14310] EXT4-fs (loop1): 1 truncate cleaned up [ 272.420169][T14310] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 272.468187][T14318] netlink: 'syz.6.3998': attribute type 4 has an invalid length. [ 272.615661][T14340] tipc: Enabled bearer , priority 0 [ 272.622825][T14340] syzkaller0: entered promiscuous mode [ 272.628377][T14340] syzkaller0: entered allmulticast mode [ 272.684727][T14339] tipc: Resetting bearer [ 272.695994][T14339] tipc: Disabling bearer [ 272.728820][T14346] netlink: 'syz.6.4010': attribute type 4 has an invalid length. [ 272.848651][T14347] lo speed is unknown, defaulting to 1000 [ 272.855181][T14347] lo speed is unknown, defaulting to 1000 [ 272.861566][T14347] lo speed is unknown, defaulting to 1000 [ 273.134054][T11542] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 273.152836][T14349] 9pnet_fd: Insufficient options for proto=fd [ 273.286430][T14371] tipc: Enabled bearer , priority 0 [ 273.293730][T14371] syzkaller0: entered promiscuous mode [ 273.299247][T14371] syzkaller0: entered allmulticast mode [ 273.308915][T14370] tipc: Resetting bearer [ 273.331363][T14370] tipc: Disabling bearer [ 273.341846][T14376] netlink: 'syz.1.4024': attribute type 4 has an invalid length. [ 273.354290][T14378] 9pnet_fd: Insufficient options for proto=fd [ 273.585416][T14404] netlink: 'syz.1.4037': attribute type 4 has an invalid length. [ 273.636856][T14408] tipc: Enabled bearer , priority 0 [ 273.649292][T14408] tipc: Resetting bearer [ 273.662416][T14410] 9pnet_fd: Insufficient options for proto=fd [ 273.672229][T14407] tipc: Disabling bearer [ 274.079330][T14427] lo speed is unknown, defaulting to 1000 [ 274.080310][T14427] lo speed is unknown, defaulting to 1000 [ 274.081807][T14427] lo speed is unknown, defaulting to 1000 [ 274.379377][T14431] netlink: 24 bytes leftover after parsing attributes in process `syz.5.4047'. [ 274.401748][T14431] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4047'. [ 274.655343][T14436] netlink: 'syz.6.4050': attribute type 4 has an invalid length. [ 275.889706][T14465] netlink: 'syz.6.4062': attribute type 4 has an invalid length. [ 275.964540][T14471] 9pnet_fd: Insufficient options for proto=fd [ 276.000396][T14474] netlink: 64 bytes leftover after parsing attributes in process `syz.1.4063'. [ 276.266124][T14496] 9pnet_fd: Insufficient options for proto=fd [ 276.317492][T14498] netlink: 24 bytes leftover after parsing attributes in process `syz.1.4072'. [ 276.329962][T14498] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4072'. [ 276.536662][T14504] netlink: 'syz.5.4079': attribute type 4 has an invalid length. [ 276.645752][T14506] netlink: 64 bytes leftover after parsing attributes in process `syz.3.4080'. [ 277.816440][T14519] tipc: Enabled bearer , priority 0 [ 277.823682][T14519] syzkaller0: entered promiscuous mode [ 277.829190][T14519] syzkaller0: entered allmulticast mode [ 277.839219][T14518] tipc: Resetting bearer [ 277.897229][T14518] tipc: Disabling bearer [ 277.923303][ T29] kauditd_printk_skb: 332 callbacks suppressed [ 277.923320][ T29] audit: type=1326 audit(1761859931.436:11090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14527 comm="syz.1.4089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 278.023704][ T29] audit: type=1326 audit(1761859931.476:11091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14527 comm="syz.1.4089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 278.023762][ T29] audit: type=1326 audit(1761859931.476:11092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14527 comm="syz.1.4089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 278.023790][ T29] audit: type=1326 audit(1761859931.476:11093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14527 comm="syz.1.4089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 278.023824][ T29] audit: type=1326 audit(1761859931.476:11094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14527 comm="syz.1.4089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 278.023857][ T29] audit: type=1326 audit(1761859931.476:11095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14527 comm="syz.1.4089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 278.023955][ T29] audit: type=1326 audit(1761859931.476:11096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14527 comm="syz.1.4089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 278.023988][ T29] audit: type=1326 audit(1761859931.476:11097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14527 comm="syz.1.4089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 278.024143][ T29] audit: type=1326 audit(1761859931.476:11098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14527 comm="syz.1.4089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 278.024178][ T29] audit: type=1326 audit(1761859931.476:11099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14527 comm="syz.1.4089" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 278.240188][T14534] netlink: 'syz.3.4091': attribute type 4 has an invalid length. [ 278.252682][T14538] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 278.654139][T14561] 9pnet_fd: Insufficient options for proto=fd [ 278.716344][T14565] netlink: 24 bytes leftover after parsing attributes in process `syz.3.4099'. [ 278.768564][T14565] netlink: 4 bytes leftover after parsing attributes in process `syz.3.4099'. [ 278.801583][T14568] netlink: 'syz.0.4105': attribute type 4 has an invalid length. [ 278.822468][T14569] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 279.260020][T14579] lo speed is unknown, defaulting to 1000 [ 279.260842][T14579] lo speed is unknown, defaulting to 1000 [ 279.262033][T14579] lo speed is unknown, defaulting to 1000 [ 279.701130][T14592] FAULT_INJECTION: forcing a failure. [ 279.701130][T14592] name failslab, interval 1, probability 0, space 0, times 0 [ 279.714065][T14592] CPU: 0 UID: 0 PID: 14592 Comm: syz.6.4115 Not tainted syzkaller #0 PREEMPT(voluntary) [ 279.714097][T14592] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 279.714113][T14592] Call Trace: [ 279.714120][T14592] [ 279.714135][T14592] __dump_stack+0x1d/0x30 [ 279.714156][T14592] dump_stack_lvl+0xe8/0x140 [ 279.714175][T14592] dump_stack+0x15/0x1b [ 279.714247][T14592] should_fail_ex+0x265/0x280 [ 279.714272][T14592] should_failslab+0x8c/0xb0 [ 279.714303][T14592] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 279.714332][T14592] ? __alloc_skb+0x101/0x320 [ 279.714401][T14592] __alloc_skb+0x101/0x320 [ 279.714501][T14592] netlink_alloc_large_skb+0xbf/0xf0 [ 279.714565][T14592] netlink_sendmsg+0x3cf/0x6b0 [ 279.714590][T14592] ? __pfx_netlink_sendmsg+0x10/0x10 [ 279.714658][T14592] __sock_sendmsg+0x145/0x180 [ 279.714747][T14592] ____sys_sendmsg+0x31e/0x4e0 [ 279.714859][T14592] ___sys_sendmsg+0x17b/0x1d0 [ 279.714909][T14592] __x64_sys_sendmsg+0xd4/0x160 [ 279.714955][T14592] x64_sys_call+0x191e/0x3000 [ 279.715054][T14592] do_syscall_64+0xd2/0x200 [ 279.715077][T14592] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 279.715164][T14592] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.715190][T14592] RIP: 0033:0x7f41ec0befc9 [ 279.715213][T14592] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 279.715235][T14592] RSP: 002b:00007f41eab1f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 279.715254][T14592] RAX: ffffffffffffffda RBX: 00007f41ec315fa0 RCX: 00007f41ec0befc9 [ 279.715265][T14592] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000006 [ 279.715329][T14592] RBP: 00007f41eab1f090 R08: 0000000000000000 R09: 0000000000000000 [ 279.715406][T14592] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 279.715421][T14592] R13: 00007f41ec316038 R14: 00007f41ec315fa0 R15: 00007ffcd50884d8 [ 279.715444][T14592] [ 281.163656][T14616] lo speed is unknown, defaulting to 1000 [ 281.164080][T14616] lo speed is unknown, defaulting to 1000 [ 281.164507][T14616] lo speed is unknown, defaulting to 1000 [ 281.287410][T14619] netlink: 'syz.5.4122': attribute type 4 has an invalid length. [ 281.506067][T14646] netlink: 'syz.1.4135': attribute type 4 has an invalid length. [ 281.644643][T14660] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 281.721628][T14670] 9pnet_fd: Insufficient options for proto=fd [ 281.757156][T14672] netlink: 'syz.3.4149': attribute type 4 has an invalid length. [ 281.990906][T14696] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 282.035756][T14700] netlink: 'syz.5.4161': attribute type 4 has an invalid length. [ 282.093395][T14705] 9pnet_fd: Insufficient options for proto=fd [ 282.249045][T14725] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 282.262260][T14727] netlink: 'syz.6.4174': attribute type 4 has an invalid length. [ 282.312705][T14734] 9pnet_fd: Insufficient options for proto=fd [ 282.488335][T14753] netlink: 'syz.1.4187': attribute type 4 has an invalid length. [ 282.509083][T14755] tipc: Enabled bearer , priority 0 [ 282.522954][T14755] tipc: Resetting bearer [ 282.535259][T14754] tipc: Disabling bearer [ 282.559758][T14759] 9pnet_fd: Insufficient options for proto=fd [ 282.660625][T14774] lo speed is unknown, defaulting to 1000 [ 282.673517][T14774] lo speed is unknown, defaulting to 1000 [ 282.685878][T14774] lo speed is unknown, defaulting to 1000 [ 282.771935][T14781] FAULT_INJECTION: forcing a failure. [ 282.771935][T14781] name failslab, interval 1, probability 0, space 0, times 0 [ 282.784631][T14781] CPU: 1 UID: 0 PID: 14781 Comm: syz.5.4200 Not tainted syzkaller #0 PREEMPT(voluntary) [ 282.784663][T14781] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 282.784738][T14781] Call Trace: [ 282.784744][T14781] [ 282.784751][T14781] __dump_stack+0x1d/0x30 [ 282.784775][T14781] dump_stack_lvl+0xe8/0x140 [ 282.784799][T14781] dump_stack+0x15/0x1b [ 282.784819][T14781] should_fail_ex+0x265/0x280 [ 282.784841][T14781] should_failslab+0x8c/0xb0 [ 282.784886][T14781] __kmalloc_noprof+0xa5/0x570 [ 282.784914][T14781] ? usb_alloc_urb+0x42/0xc0 [ 282.784976][T14781] usb_alloc_urb+0x42/0xc0 [ 282.785077][T14781] do_proc_control+0x1a8/0x8b0 [ 282.785127][T14781] ? should_fail_ex+0xdb/0x280 [ 282.785146][T14781] proc_control_compat+0xae/0xe0 [ 282.785232][T14781] usbdev_ioctl+0xed5/0x1700 [ 282.785289][T14781] ? __pfx_usbdev_ioctl+0x10/0x10 [ 282.785317][T14781] __se_sys_ioctl+0xce/0x140 [ 282.785411][T14781] __x64_sys_ioctl+0x43/0x50 [ 282.785429][T14781] x64_sys_call+0x1816/0x3000 [ 282.785457][T14781] do_syscall_64+0xd2/0x200 [ 282.785478][T14781] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 282.785522][T14781] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 282.785593][T14781] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 282.785705][T14781] RIP: 0033:0x7f4b069cefc9 [ 282.785722][T14781] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 282.785745][T14781] RSP: 002b:00007f4b0542f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 282.785767][T14781] RAX: ffffffffffffffda RBX: 00007f4b06c25fa0 RCX: 00007f4b069cefc9 [ 282.785782][T14781] RDX: 0000200000000140 RSI: 00000000c0105500 RDI: 0000000000000003 [ 282.785798][T14781] RBP: 00007f4b0542f090 R08: 0000000000000000 R09: 0000000000000000 [ 282.785857][T14781] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 282.785869][T14781] R13: 00007f4b06c26038 R14: 00007f4b06c25fa0 R15: 00007ffda5ac2ea8 [ 282.785887][T14781] [ 283.059774][T14788] netlink: 'syz.5.4203': attribute type 4 has an invalid length. [ 283.098257][ T29] kauditd_printk_skb: 193 callbacks suppressed [ 283.098319][ T29] audit: type=1326 audit(1761859936.616:11293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14784 comm="syz.3.4202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 283.138329][T14792] 9pnet_fd: Insufficient options for proto=fd [ 283.164239][ T29] audit: type=1326 audit(1761859936.616:11294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14784 comm="syz.3.4202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 283.188110][ T29] audit: type=1326 audit(1761859936.616:11295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14784 comm="syz.3.4202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=192 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 283.211738][ T29] audit: type=1326 audit(1761859936.616:11296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14784 comm="syz.3.4202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 283.235689][ T29] audit: type=1326 audit(1761859936.616:11297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14784 comm="syz.3.4202" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 283.270071][ T29] audit: type=1326 audit(1761859936.716:11298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14795 comm="syz.1.4207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 283.293789][ T29] audit: type=1326 audit(1761859936.716:11299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14795 comm="syz.1.4207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=69 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 283.317716][ T29] audit: type=1326 audit(1761859936.716:11300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14795 comm="syz.1.4207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 283.341443][ T29] audit: type=1326 audit(1761859936.716:11301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14795 comm="syz.1.4207" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 283.369808][ T29] audit: type=1326 audit(1761859936.866:11302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14793 comm="syz.3.4206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 283.637297][T14808] lo speed is unknown, defaulting to 1000 [ 283.643578][T14808] lo speed is unknown, defaulting to 1000 [ 283.650021][T14808] lo speed is unknown, defaulting to 1000 [ 283.795622][T14807] tipc: Enabled bearer , priority 0 [ 283.817696][T14807] tipc: Resetting bearer [ 283.840216][T14806] tipc: Disabling bearer [ 283.935628][T14816] netlink: 'syz.1.4215': attribute type 4 has an invalid length. [ 284.092462][T14832] 9pnet_fd: Insufficient options for proto=fd [ 284.178882][T14838] tipc: Enabled bearer , priority 0 [ 284.204107][T14842] netlink: 'syz.3.4227': attribute type 4 has an invalid length. [ 284.222100][T14838] tipc: Resetting bearer [ 284.250196][T14837] tipc: Disabling bearer [ 284.532418][T14868] netlink: 'syz.3.4238': attribute type 4 has an invalid length. [ 284.686100][T14873] lo speed is unknown, defaulting to 1000 [ 284.692564][T14873] lo speed is unknown, defaulting to 1000 [ 284.699015][T14873] lo speed is unknown, defaulting to 1000 [ 285.006591][T14879] tipc: Enabled bearer , priority 0 [ 285.025768][T14879] tipc: Resetting bearer [ 285.075138][T14878] tipc: Disabling bearer [ 285.437131][T14932] tipc: Enabled bearer , priority 0 [ 285.445676][T14932] tipc: Resetting bearer [ 285.457257][T14931] tipc: Disabling bearer [ 285.720921][T14943] lo speed is unknown, defaulting to 1000 [ 285.727319][T14943] lo speed is unknown, defaulting to 1000 [ 285.733646][T14943] lo speed is unknown, defaulting to 1000 [ 286.725661][T15004] lo speed is unknown, defaulting to 1000 [ 286.732349][T15004] lo speed is unknown, defaulting to 1000 [ 286.738883][T15004] lo speed is unknown, defaulting to 1000 [ 286.860587][T15018] autofs4:pid:15018:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(951.8), cmd(0xc018937e) [ 286.874061][T15018] autofs4:pid:15018:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc018937e) [ 287.218120][T15038] lo speed is unknown, defaulting to 1000 [ 287.224404][T15038] lo speed is unknown, defaulting to 1000 [ 287.231029][T15038] lo speed is unknown, defaulting to 1000 [ 287.503415][T15040] netlink: 24 bytes leftover after parsing attributes in process `syz.5.4316'. [ 287.523040][T15040] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4316'. [ 288.487734][T15080] lo speed is unknown, defaulting to 1000 [ 288.488429][T15080] lo speed is unknown, defaulting to 1000 [ 288.488904][T15080] lo speed is unknown, defaulting to 1000 [ 289.193280][ T29] kauditd_printk_skb: 173 callbacks suppressed [ 289.193295][ T29] audit: type=1326 audit(1761859942.706:11476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15104 comm="syz.1.4344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 289.223451][ T29] audit: type=1326 audit(1761859942.706:11477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15104 comm="syz.1.4344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 289.249617][ T29] audit: type=1326 audit(1761859942.706:11478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15104 comm="syz.1.4344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 289.273298][ T29] audit: type=1326 audit(1761859942.706:11479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15104 comm="syz.1.4344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 289.309382][ T29] audit: type=1326 audit(1761859942.776:11480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15104 comm="syz.1.4344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 289.333114][ T29] audit: type=1326 audit(1761859942.776:11481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15104 comm="syz.1.4344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 289.356699][ T29] audit: type=1326 audit(1761859942.776:11482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15104 comm="syz.1.4344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 289.380333][ T29] audit: type=1326 audit(1761859942.796:11483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15104 comm="syz.1.4344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 289.404029][ T29] audit: type=1326 audit(1761859942.796:11484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15104 comm="syz.1.4344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 289.427810][ T29] audit: type=1326 audit(1761859942.796:11485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15104 comm="syz.1.4344" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 289.587703][T15131] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 292.199554][T15141] tipc: Enabling of bearer rejected, failed to enable media [ 292.244798][T15134] lo speed is unknown, defaulting to 1000 [ 292.245040][T15134] lo speed is unknown, defaulting to 1000 [ 292.245442][T15134] lo speed is unknown, defaulting to 1000 [ 292.417754][T15164] autofs4:pid:15164:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(951.8), cmd(0xc018937e) [ 292.431237][T15164] autofs4:pid:15164:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc018937e) [ 292.594686][T15184] validate_nla: 3 callbacks suppressed [ 292.594704][T15184] netlink: 'syz.5.4370': attribute type 4 has an invalid length. [ 292.628767][T15186] tipc: Enabling of bearer rejected, failed to enable media [ 292.668790][T15182] infiniband syz!: set active [ 292.673691][T15182] infiniband syz!: added team_slave_0 [ 292.728176][T15182] RDS/IB: syz!: added [ 292.736979][T15182] smc: adding ib device syz! with port count 1 [ 292.749078][T15182] smc: ib device syz! port 1 has no pnetid [ 293.156261][T15234] netlink: 224 bytes leftover after parsing attributes in process `syz.6.4387'. [ 293.186839][T15234] capability: warning: `syz.6.4387' uses 32-bit capabilities (legacy support in use) [ 293.215175][T15240] syzkaller0: entered promiscuous mode [ 293.220721][T15240] syzkaller0: entered allmulticast mode [ 293.236958][T15234] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=15234 comm=syz.6.4387 [ 293.260954][T15234] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 293.271723][T15243] lo speed is unknown, defaulting to 1000 [ 293.277984][T15243] lo speed is unknown, defaulting to 1000 [ 293.278841][T15234] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 293.286761][T15243] lo speed is unknown, defaulting to 1000 [ 293.325912][ T7387] Bluetooth: hci0: Frame reassembly failed (-84) [ 293.458702][T15251] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 293.484307][T15268] IPVS: set_ctl: invalid protocol: 135 224.0.0.2:20004 [ 293.497577][T15272] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 293.535096][T15276] netlink: 'syz.5.4399': attribute type 4 has an invalid length. [ 293.746420][T15307] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 294.413411][T15419] netlink: 'syz.0.4408': attribute type 4 has an invalid length. [ 294.445279][ T29] kauditd_printk_skb: 160 callbacks suppressed [ 294.445298][ T29] audit: type=1326 audit(1761859947.966:11646): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15420 comm="syz.0.4409" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 294.485081][ T29] audit: type=1326 audit(1761859947.966:11647): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15420 comm="syz.0.4409" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 294.508834][ T29] audit: type=1326 audit(1761859947.966:11648): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15420 comm="syz.0.4409" exe="/root/syz-executor" sig=0 arch=c000003e syscall=69 compat=0 ip=0x7fc397a3efc9 code=0x7ffc0000 [ 294.535434][T15425] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 294.571797][ T29] audit: type=1326 audit(1761859948.086:11649): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15427 comm="syz.1.4412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 294.595515][ T29] audit: type=1326 audit(1761859948.086:11650): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15427 comm="syz.1.4412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 294.637148][ T29] audit: type=1326 audit(1761859948.146:11651): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15427 comm="syz.1.4412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 294.661017][ T29] audit: type=1326 audit(1761859948.146:11652): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15427 comm="syz.1.4412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 294.684787][ T29] audit: type=1326 audit(1761859948.146:11653): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15427 comm="syz.1.4412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 294.708512][ T29] audit: type=1326 audit(1761859948.146:11654): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15427 comm="syz.1.4412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 294.732368][ T29] audit: type=1326 audit(1761859948.146:11655): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15427 comm="syz.1.4412" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 294.896421][T15445] netlink: 'syz.5.4420': attribute type 4 has an invalid length. [ 295.038257][T15464] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 295.393096][ T4060] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 295.539891][T15478] vhci_hcd: default hub control req: 8013 v0000 i0000 l31125 [ 295.592436][T15482] netlink: 224 bytes leftover after parsing attributes in process `syz.0.4436'. [ 295.614064][T15482] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=13772 sclass=netlink_audit_socket pid=15482 comm=syz.0.4436 [ 295.630281][T15482] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 295.639568][T15482] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 295.809330][T15487] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 295.876174][T15487] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 295.938985][T15487] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 296.037183][T15487] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 296.209352][ T7411] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 296.223739][ T7387] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 296.858900][T15508] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4440'. [ 296.911452][T15509] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4440'. [ 297.203888][ T7387] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.212191][ T7387] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.340674][T15535] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 297.360631][T15537] FAULT_INJECTION: forcing a failure. [ 297.360631][T15537] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 297.373782][T15537] CPU: 1 UID: 0 PID: 15537 Comm: syz.3.4454 Not tainted syzkaller #0 PREEMPT(voluntary) [ 297.373809][T15537] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 297.373822][T15537] Call Trace: [ 297.373828][T15537] [ 297.373837][T15537] __dump_stack+0x1d/0x30 [ 297.373902][T15537] dump_stack_lvl+0xe8/0x140 [ 297.373928][T15537] dump_stack+0x15/0x1b [ 297.373950][T15537] should_fail_ex+0x265/0x280 [ 297.373976][T15537] should_fail+0xb/0x20 [ 297.373997][T15537] should_fail_usercopy+0x1a/0x20 [ 297.374017][T15537] strncpy_from_user+0x25/0x230 [ 297.374052][T15537] ? kmem_cache_alloc_noprof+0x242/0x480 [ 297.374090][T15537] ? getname_flags+0x80/0x3b0 [ 297.374233][T15537] getname_flags+0xae/0x3b0 [ 297.374267][T15537] vfs_fstatat+0x43/0x170 [ 297.374305][T15537] __se_sys_newfstatat+0x55/0x260 [ 297.374364][T15537] ? __fget_files+0x184/0x1c0 [ 297.374399][T15537] ? __secure_computing+0x82/0x150 [ 297.374531][T15537] __x64_sys_newfstatat+0x55/0x70 [ 297.374564][T15537] x64_sys_call+0x135a/0x3000 [ 297.374586][T15537] do_syscall_64+0xd2/0x200 [ 297.374603][T15537] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 297.374657][T15537] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 297.374752][T15537] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 297.374772][T15537] RIP: 0033:0x7fc4c7ebefc9 [ 297.374787][T15537] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 297.374879][T15537] RSP: 002b:00007fc4c6927038 EFLAGS: 00000246 ORIG_RAX: 0000000000000106 [ 297.374943][T15537] RAX: ffffffffffffffda RBX: 00007fc4c8115fa0 RCX: 00007fc4c7ebefc9 [ 297.375023][T15537] RDX: 0000200000000100 RSI: 0000200000000080 RDI: ffffffffffffff9c [ 297.375111][T15537] RBP: 00007fc4c6927090 R08: 0000000000000000 R09: 0000000000000000 [ 297.375123][T15537] R10: 0000000000004000 R11: 0000000000000246 R12: 0000000000000001 [ 297.375135][T15537] R13: 00007fc4c8116038 R14: 00007fc4c8115fa0 R15: 00007ffdd3907a18 [ 297.375153][T15537] [ 297.835706][T15551] netdevsim netdevsim6: Firmware load for './cgroup/../file0' refused, path contains '..' component [ 297.933410][T15562] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 298.392392][T15589] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4471'. [ 298.446488][T15590] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4471'. [ 299.970463][ T29] kauditd_printk_skb: 222 callbacks suppressed [ 299.970482][ T29] audit: type=1326 audit(1761859952.696:11878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15595 comm="syz.1.4479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fedda96dc2a code=0x7ffc0000 [ 300.000401][ T29] audit: type=1326 audit(1761859953.486:11879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15595 comm="syz.1.4479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 300.024118][ T29] audit: type=1326 audit(1761859953.486:11880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15595 comm="syz.1.4479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 300.081078][T15596] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=15596 comm=syz.1.4479 [ 300.102205][T15596] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 300.114397][T15596] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 300.220468][ T29] audit: type=1326 audit(1761859953.586:11881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15595 comm="syz.1.4479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 300.244142][ T29] audit: type=1326 audit(1761859953.586:11882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15595 comm="syz.1.4479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 300.267822][ T29] audit: type=1326 audit(1761859953.586:11883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15595 comm="syz.1.4479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 300.291503][ T29] audit: type=1326 audit(1761859953.586:11884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15595 comm="syz.1.4479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fedda90b099 code=0x7ffc0000 [ 300.315005][ T29] audit: type=1326 audit(1761859953.586:11885): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15595 comm="syz.1.4479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 300.338602][ T29] audit: type=1326 audit(1761859953.586:11886): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15595 comm="syz.1.4479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 300.362250][ T29] audit: type=1326 audit(1761859953.586:11887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15595 comm="syz.1.4479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 300.672363][T15635] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4492'. [ 300.725489][T15636] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4492'. [ 301.591986][T15655] netlink: 'syz.5.4498': attribute type 27 has an invalid length. [ 301.604456][T15655] wireguard0: left promiscuous mode [ 301.604497][T15655] wireguard0: left allmulticast mode [ 301.722362][T15665] tipc: Enabling of bearer rejected, failed to enable media [ 302.256344][T15685] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 302.342531][T15693] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4515'. [ 302.479481][T15703] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=40 sclass=netlink_audit_socket pid=15703 comm=syz.0.4520 [ 302.493965][T15703] ref_ctr_offset mismatch. inode: 0x5f0 offset: 0x0 ref_ctr_offset(old): 0x200000000000 ref_ctr_offset(new): 0x2000000001c0 [ 302.552668][T15708] netlink: 'syz.6.4522': attribute type 4 has an invalid length. [ 302.795854][T15727] tipc: Enabling of bearer rejected, failed to enable media [ 302.882952][T15728] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4527'. [ 304.432464][T15744] netlink: 'syz.0.4535': attribute type 4 has an invalid length. [ 304.629992][T15778] ref_ctr_offset mismatch. inode: 0x376 offset: 0x0 ref_ctr_offset(old): 0x2000000003c0 ref_ctr_offset(new): 0x200000000180 [ 304.734827][T15787] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4543'. [ 305.638839][T15790] tipc: Enabled bearer , priority 0 [ 305.658219][T15790] tipc: Resetting bearer [ 305.677751][T15789] tipc: Disabling bearer [ 305.997980][T15796] netlink: 16 bytes leftover after parsing attributes in process `syz.6.4553'. [ 306.239978][ T29] kauditd_printk_skb: 217 callbacks suppressed [ 306.239997][ T29] audit: type=1400 audit(1761859959.756:12105): avc: denied { mounton } for pid=15797 comm="syz.0.4554" path="/295/file0" dev="tmpfs" ino=1556 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 306.328588][ T29] audit: type=1400 audit(1761859959.796:12106): avc: denied { mount } for pid=15797 comm="syz.0.4554" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 306.350866][ T29] audit: type=1400 audit(1761859959.796:12107): avc: denied { name_bind } for pid=15785 comm="syz.3.4550" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=tcp_socket permissive=1 [ 306.372915][ T29] audit: type=1400 audit(1761859959.796:12108): avc: denied { node_bind } for pid=15785 comm="syz.3.4550" saddr=fc01::1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=tcp_socket permissive=1 [ 306.395488][ T29] audit: type=1400 audit(1761859959.796:12109): avc: denied { kexec_image_load } for pid=15785 comm="syz.3.4550" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 306.415837][ T29] audit: type=1400 audit(1761859959.816:12110): avc: denied { unmount } for pid=11054 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 306.436085][ T29] audit: type=1400 audit(1761859959.836:12111): avc: denied { create } for pid=15801 comm="syz.6.4556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 306.458175][ T29] audit: type=1400 audit(1761859959.976:12112): avc: denied { shutdown } for pid=15801 comm="syz.6.4556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 306.483655][ T29] audit: type=1400 audit(1761859959.996:12113): avc: denied { create } for pid=15801 comm="syz.6.4556" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 306.503638][ T29] audit: type=1326 audit(1761859959.996:12114): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15801 comm="syz.6.4556" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f41ec0befc9 code=0x7ffc0000 [ 306.639642][T15819] netlink: 'syz.3.4564': attribute type 4 has an invalid length. [ 307.441850][T15871] ref_ctr_offset mismatch. inode: 0x68c offset: 0x0 ref_ctr_offset(old): 0x200000000000 ref_ctr_offset(new): 0x2000000001c0 [ 307.762174][T15893] ref_ctr_offset mismatch. inode: 0x792 offset: 0x0 ref_ctr_offset(old): 0x200000000000 ref_ctr_offset(new): 0x2000000001c0 [ 307.832293][T15903] netlink: 'syz.3.4602': attribute type 4 has an invalid length. [ 308.432942][T15936] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 308.463755][T15936] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 308.608151][T15942] netlink: 'syz.0.4617': attribute type 4 has an invalid length. [ 308.911691][T15953] atomic_op ffff88810c461d28 conn xmit_atomic 0000000000000000 [ 309.237879][T15957] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4622'. [ 311.071697][T15972] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4630'. [ 311.142720][T15976] syzkaller0: entered promiscuous mode [ 311.148414][T15976] syzkaller0: entered allmulticast mode [ 311.245304][ T29] kauditd_printk_skb: 179 callbacks suppressed [ 311.245321][ T29] audit: type=1326 audit(1761859964.766:12294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15993 comm="syz.3.4640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 311.285565][ T29] audit: type=1326 audit(1761859964.766:12295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15993 comm="syz.3.4640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=69 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 311.309265][ T29] audit: type=1326 audit(1761859964.766:12296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15993 comm="syz.3.4640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 311.332867][ T29] audit: type=1326 audit(1761859964.766:12297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15993 comm="syz.3.4640" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 311.939889][T15997] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4637'. [ 312.328214][ T29] audit: type=1400 audit(1761859965.846:12298): avc: denied { append } for pid=16002 comm="syz.5.4644" name="sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 312.352237][ T29] audit: type=1400 audit(1761859965.846:12299): avc: denied { open } for pid=16002 comm="syz.5.4644" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 312.376387][ T29] audit: type=1326 audit(1761859965.846:12300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15998 comm="syz.3.4641" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 312.400069][ T29] audit: type=1326 audit(1761859965.846:12301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15998 comm="syz.3.4641" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 312.427666][T16003] program syz.5.4644 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 312.447268][T16003] FAULT_INJECTION: forcing a failure. [ 312.447268][T16003] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 312.460403][T16003] CPU: 1 UID: 0 PID: 16003 Comm: syz.5.4644 Not tainted syzkaller #0 PREEMPT(voluntary) [ 312.460457][T16003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 312.460470][T16003] Call Trace: [ 312.460476][T16003] [ 312.460484][T16003] __dump_stack+0x1d/0x30 [ 312.460590][T16003] dump_stack_lvl+0xe8/0x140 [ 312.460616][T16003] dump_stack+0x15/0x1b [ 312.460635][T16003] should_fail_ex+0x265/0x280 [ 312.460708][T16003] should_fail+0xb/0x20 [ 312.460728][T16003] should_fail_usercopy+0x1a/0x20 [ 312.460761][T16003] _copy_to_user+0x20/0xa0 [ 312.460794][T16003] scsi_ioctl+0x13c8/0x14d0 [ 312.460816][T16003] ? avc_has_perm+0xf7/0x180 [ 312.460867][T16003] ? file_has_perm+0x35c/0x3a0 [ 312.460945][T16003] ? do_vfs_ioctl+0x866/0xe10 [ 312.460973][T16003] sg_ioctl+0xdf6/0x1360 [ 312.461008][T16003] ? __pfx_sg_ioctl+0x10/0x10 [ 312.461071][T16003] __se_sys_ioctl+0xce/0x140 [ 312.461096][T16003] __x64_sys_ioctl+0x43/0x50 [ 312.461182][T16003] x64_sys_call+0x1816/0x3000 [ 312.461211][T16003] do_syscall_64+0xd2/0x200 [ 312.461233][T16003] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 312.461269][T16003] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 312.461312][T16003] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 312.461335][T16003] RIP: 0033:0x7f4b069cefc9 [ 312.461350][T16003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 312.461370][T16003] RSP: 002b:00007f4b0542f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 312.461389][T16003] RAX: ffffffffffffffda RBX: 00007f4b06c25fa0 RCX: 00007f4b069cefc9 [ 312.461401][T16003] RDX: 00002000000000c0 RSI: 0000000000000001 RDI: 0000000000000004 [ 312.461436][T16003] RBP: 00007f4b0542f090 R08: 0000000000000000 R09: 0000000000000000 [ 312.461451][T16003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 312.461466][T16003] R13: 00007f4b06c26038 R14: 00007f4b06c25fa0 R15: 00007ffda5ac2ea8 [ 312.461490][T16003] [ 312.673464][ T29] audit: type=1326 audit(1761859965.946:12302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15998 comm="syz.3.4641" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 312.697138][ T29] audit: type=1326 audit(1761859965.946:12303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15998 comm="syz.3.4641" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc4c7ebefc9 code=0x7ffc0000 [ 312.819953][T16014] program syz.3.4648 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 312.967432][T16032] x_tables: ip_tables: DNAT target: used from hooks POSTROUTING, but only usable from PREROUTING/OUTPUT [ 313.001484][T16032] xt_CT: No such helper "pptp" [ 313.095590][T16025] lo speed is unknown, defaulting to 1000 [ 313.095969][T16025] lo speed is unknown, defaulting to 1000 [ 313.096467][T16025] lo speed is unknown, defaulting to 1000 [ 313.304132][ T7387] bridge_slave_1: left allmulticast mode [ 313.309852][ T7387] bridge_slave_1: left promiscuous mode [ 313.315865][ T7387] bridge0: port 2(bridge_slave_1) entered disabled state [ 313.377005][T16068] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4660'. [ 313.422367][ T7387] bridge_slave_0: left allmulticast mode [ 313.428198][ T7387] bridge_slave_0: left promiscuous mode [ 313.433932][ T7387] bridge0: port 1(bridge_slave_0) entered disabled state [ 313.537956][ T7387] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 313.569401][ T7387] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 313.603735][ T7387] bond0 (unregistering): Released all slaves [ 313.858702][ T7387] tipc: Disabling bearer [ 313.864060][ T7387] tipc: Left network mode [ 314.060267][T16025] chnl_net:caif_netlink_parms(): no params data found [ 314.147693][ T7387] hsr_slave_0: left promiscuous mode [ 314.167545][ T7387] hsr_slave_1: left promiscuous mode [ 314.174668][ T7387] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 314.189218][ T7387] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 314.245688][ T7387] team0 (unregistering): Port device team_slave_1 removed [ 314.267067][ T7387] team0 (unregistering): Port device team_slave_0 removed [ 314.300815][T16047] netlink: 20 bytes leftover after parsing attributes in process `syz.6.4649'. [ 314.391751][T16090] netlink: 20 bytes leftover after parsing attributes in process `syz.1.4670'. [ 314.439850][T16090] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4670'. [ 314.459473][T16025] bridge0: port 1(bridge_slave_0) entered blocking state [ 314.466698][T16025] bridge0: port 1(bridge_slave_0) entered disabled state [ 314.502092][T16025] bridge_slave_0: entered allmulticast mode [ 314.519201][T16025] bridge_slave_0: entered promiscuous mode [ 314.536200][T16025] bridge0: port 2(bridge_slave_1) entered blocking state [ 314.543571][T16025] bridge0: port 2(bridge_slave_1) entered disabled state [ 314.560081][T16025] bridge_slave_1: entered allmulticast mode [ 314.611645][T16025] bridge_slave_1: entered promiscuous mode [ 314.680190][T16025] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 314.804422][T16025] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 314.828438][T16025] team0: Port device team_slave_0 added [ 314.835476][T16025] team0: Port device team_slave_1 added [ 314.904435][T16105] lo speed is unknown, defaulting to 1000 [ 314.910473][T16105] lo speed is unknown, defaulting to 1000 [ 314.916601][T16105] lo speed is unknown, defaulting to 1000 [ 315.004850][T16025] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 315.011855][T16025] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 315.037912][T16025] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 315.052624][T16025] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 315.059661][T16025] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 315.085666][T16025] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 315.107640][T16111] ref_ctr_offset mismatch. inode: 0x68d offset: 0x0 ref_ctr_offset(old): 0x200000000000 ref_ctr_offset(new): 0x2000000001c0 [ 315.127582][ T7387] IPVS: stop unused estimator thread 0... [ 315.128863][T16025] hsr_slave_0: entered promiscuous mode [ 315.139899][T16025] hsr_slave_1: entered promiscuous mode [ 315.146311][T16025] debugfs: 'hsr0' already exists in 'hsr' [ 315.152462][T16025] Cannot create hsr debugfs directory [ 315.361515][T16122] x_tables: ip_tables: DNAT target: used from hooks POSTROUTING, but only usable from PREROUTING/OUTPUT [ 315.508063][T16025] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 315.518895][T16025] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 315.528434][T16025] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 315.551172][T16025] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 315.625360][T16025] 8021q: adding VLAN 0 to HW filter on device bond0 [ 315.645918][T16025] 8021q: adding VLAN 0 to HW filter on device team0 [ 315.678623][T16141] vcan0 speed is unknown, defaulting to 1000 [ 315.763913][ T7381] bridge0: port 1(bridge_slave_0) entered blocking state [ 315.771183][ T7381] bridge0: port 1(bridge_slave_0) entered forwarding state [ 315.804931][T16141] vcan0 speed is unknown, defaulting to 1000 [ 315.818003][ T7381] bridge0: port 2(bridge_slave_1) entered blocking state [ 315.825136][ T7381] bridge0: port 2(bridge_slave_1) entered forwarding state [ 315.870324][T16141] vcan0 speed is unknown, defaulting to 1000 [ 315.873350][T16150] IPv6: NLM_F_CREATE should be specified when creating new route [ 315.989029][T16141] infiniband syz1: set active [ 315.993814][T16141] infiniband syz1: added vcan0 [ 316.006242][T16162] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4692'. [ 316.008791][ T3515] vcan0 speed is unknown, defaulting to 1000 [ 316.022791][T16025] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 316.039812][T16141] RDS/IB: syz1: added [ 316.054793][T16141] smc: adding ib device syz1 with port count 1 [ 316.079866][T16168] netlink: 'syz.1.4693': attribute type 1 has an invalid length. [ 316.098066][T16141] smc: ib device syz1 port 1 has no pnetid [ 316.116634][T16168] 8021q: adding VLAN 0 to HW filter on device bond1 [ 316.125927][ T3515] vcan0 speed is unknown, defaulting to 1000 [ 316.132287][T16141] vcan0 speed is unknown, defaulting to 1000 [ 316.157750][T16168] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4693'. [ 316.181928][T16168] bond1 (unregistering): Released all slaves [ 316.199067][T16141] vcan0 speed is unknown, defaulting to 1000 [ 316.236040][T16146] lo speed is unknown, defaulting to 1000 [ 316.249325][T16168] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=35 sclass=netlink_route_socket pid=16168 comm=syz.1.4693 [ 316.262901][T16141] vcan0 speed is unknown, defaulting to 1000 [ 316.264026][T16146] lo speed is unknown, defaulting to 1000 [ 316.275375][T16146] lo speed is unknown, defaulting to 1000 [ 316.354455][T16141] vcan0 speed is unknown, defaulting to 1000 [ 316.369750][T16025] veth0_vlan: entered promiscuous mode [ 316.385193][T16025] veth1_vlan: entered promiscuous mode [ 316.409178][T16025] veth0_macvtap: entered promiscuous mode [ 316.417139][T16025] veth1_macvtap: entered promiscuous mode [ 316.423640][T16141] vcan0 speed is unknown, defaulting to 1000 [ 316.429895][T16025] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 316.442178][T16025] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 316.453798][ T7388] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 316.464131][ T7388] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 316.520175][T16146] vcan0 speed is unknown, defaulting to 1000 [ 316.526515][ T7393] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 316.592084][ T29] kauditd_printk_skb: 172 callbacks suppressed [ 316.592158][ T29] audit: type=1400 audit(1761859970.106:12476): avc: denied { mounton } for pid=16025 comm="syz-executor" path="/root/syzkaller.g1nGJM/syz-tmp" dev="sda1" ino=2059 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 316.628982][ T7393] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 316.691692][ T29] audit: type=1400 audit(1761859970.166:12477): avc: denied { mount } for pid=16025 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 316.713944][ T29] audit: type=1400 audit(1761859970.166:12478): avc: denied { mounton } for pid=16025 comm="syz-executor" path="/root/syzkaller.g1nGJM/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 316.741160][ T29] audit: type=1400 audit(1761859970.166:12479): avc: denied { mounton } for pid=16025 comm="syz-executor" path="/root/syzkaller.g1nGJM/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=55966 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 316.769024][ T29] audit: type=1400 audit(1761859970.166:12480): avc: denied { unmount } for pid=16025 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 316.818720][ T29] audit: type=1400 audit(1761859970.336:12481): avc: denied { mounton } for pid=16025 comm="syz-executor" path="/dev/gadgetfs" dev="devtmpfs" ino=536 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:device_t tclass=dir permissive=1 [ 316.842035][ T29] audit: type=1400 audit(1761859970.336:12482): avc: denied { mount } for pid=16025 comm="syz-executor" name="/" dev="gadgetfs" ino=3681 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nfs_t tclass=filesystem permissive=1 [ 316.891360][ T29] audit: type=1326 audit(1761859970.396:12483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16187 comm="syz.6.4695" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f41ec0befc9 code=0x7ffc0000 [ 316.915139][ T29] audit: type=1326 audit(1761859970.396:12484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16187 comm="syz.6.4695" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f41ec0befc9 code=0x7ffc0000 [ 316.939236][ T29] audit: type=1326 audit(1761859970.396:12485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16187 comm="syz.6.4695" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f41ec0befc9 code=0x7ffc0000 [ 318.003303][T16215] tipc: Enabled bearer , priority 0 [ 318.010646][T16215] syzkaller0: entered promiscuous mode [ 318.016595][T16215] syzkaller0: entered allmulticast mode [ 318.094681][T16214] tipc: Resetting bearer [ 318.131487][T16214] tipc: Disabling bearer [ 318.210777][T16219] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4709'. [ 318.240148][T16230] x_tables: ip_tables: DNAT target: used from hooks POSTROUTING, but only usable from PREROUTING/OUTPUT [ 318.256176][T16232] syzkaller0: entered promiscuous mode [ 318.261698][T16232] syzkaller0: entered allmulticast mode [ 318.297753][T16234] netlink: 'syz.5.4716': attribute type 4 has an invalid length. [ 318.378709][T16240] x_tables: ip_tables: DNAT target: used from hooks POSTROUTING, but only usable from PREROUTING/OUTPUT [ 318.652589][T16261] netlink: 'syz.5.4726': attribute type 4 has an invalid length. [ 318.767898][T16269] netlink: 'syz.0.4729': attribute type 4 has an invalid length. [ 318.810804][T16271] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4731'. [ 318.885698][T16275] xt_CT: You must specify a L4 protocol and not use inversions on it [ 318.903023][T16275] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4733'. [ 319.270671][T16289] bridge0: port 2(bridge_slave_1) entered disabled state [ 319.277966][T16289] bridge0: port 1(bridge_slave_0) entered disabled state [ 319.371151][T16298] FAULT_INJECTION: forcing a failure. [ 319.371151][T16298] name failslab, interval 1, probability 0, space 0, times 0 [ 319.384020][T16298] CPU: 0 UID: 0 PID: 16298 Comm: syz.6.4742 Not tainted syzkaller #0 PREEMPT(voluntary) [ 319.384065][T16298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 319.384081][T16298] Call Trace: [ 319.384086][T16298] [ 319.384093][T16298] __dump_stack+0x1d/0x30 [ 319.384115][T16298] dump_stack_lvl+0xe8/0x140 [ 319.384141][T16298] dump_stack+0x15/0x1b [ 319.384161][T16298] should_fail_ex+0x265/0x280 [ 319.384186][T16298] should_failslab+0x8c/0xb0 [ 319.384221][T16298] __kmalloc_noprof+0xa5/0x570 [ 319.384297][T16298] ? sock_kmalloc+0x85/0xc0 [ 319.384317][T16298] sock_kmalloc+0x85/0xc0 [ 319.384340][T16298] ____sys_sendmsg+0xf8/0x4e0 [ 319.384385][T16298] ___sys_sendmsg+0x17b/0x1d0 [ 319.384505][T16298] __x64_sys_sendmsg+0xd4/0x160 [ 319.384577][T16298] x64_sys_call+0x191e/0x3000 [ 319.384598][T16298] do_syscall_64+0xd2/0x200 [ 319.384660][T16298] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 319.384695][T16298] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 319.384727][T16298] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 319.384747][T16298] RIP: 0033:0x7f41ec0befc9 [ 319.384829][T16298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 319.384852][T16298] RSP: 002b:00007f41eab1f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 319.384870][T16298] RAX: ffffffffffffffda RBX: 00007f41ec315fa0 RCX: 00007f41ec0befc9 [ 319.384884][T16298] RDX: 0000000004004881 RSI: 0000200000000600 RDI: 0000000000000004 [ 319.384899][T16298] RBP: 00007f41eab1f090 R08: 0000000000000000 R09: 0000000000000000 [ 319.384934][T16298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 319.385020][T16298] R13: 00007f41ec316038 R14: 00007f41ec315fa0 R15: 00007ffcd50884d8 [ 319.385043][T16298] [ 319.599855][T16289] bridge0: left allmulticast mode [ 319.605200][T16289] macvtap1: left promiscuous mode [ 319.611094][T16289] team1: left promiscuous mode [ 319.618260][ T7396] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 319.629682][ T7396] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 319.638821][ T7396] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 319.648225][ T7396] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 319.710191][T16309] netlink: 'syz.3.4745': attribute type 4 has an invalid length. [ 319.864902][T16320] vhci_hcd: default hub control req: 8013 v0000 i0000 l31125 [ 319.956718][ C0] vcan0: j1939_tp_rxtimer: 0xffff888125412a00: rx timeout, send abort [ 319.965044][ C0] vcan0: j1939_tp_rxtimer: 0xffff888125413600: rx timeout, send abort [ 319.973360][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff888125412a00: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 319.987791][ C0] vcan0: j1939_xtp_rx_abort_one: 0xffff888125413600: 0x00000: (3) A timeout occurred and this is the connection abort to close the session. [ 320.018083][T16331] netlink: 84 bytes leftover after parsing attributes in process `syz.3.4752'. [ 320.050200][T16335] FAULT_INJECTION: forcing a failure. [ 320.050200][T16335] name failslab, interval 1, probability 0, space 0, times 0 [ 320.050286][T16337] netlink: 'syz.0.4757': attribute type 4 has an invalid length. [ 320.063035][T16335] CPU: 1 UID: 0 PID: 16335 Comm: syz.1.4756 Not tainted syzkaller #0 PREEMPT(voluntary) [ 320.063091][T16335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 320.063109][T16335] Call Trace: [ 320.063118][T16335] [ 320.063140][T16335] __dump_stack+0x1d/0x30 [ 320.063222][T16335] dump_stack_lvl+0xe8/0x140 [ 320.063251][T16335] dump_stack+0x15/0x1b [ 320.063275][T16335] should_fail_ex+0x265/0x280 [ 320.063377][T16335] should_failslab+0x8c/0xb0 [ 320.063494][T16335] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 320.063536][T16335] ? __alloc_skb+0x101/0x320 [ 320.063575][T16335] __alloc_skb+0x101/0x320 [ 320.063610][T16335] ? audit_log_start+0x342/0x720 [ 320.063694][T16335] audit_log_start+0x3a0/0x720 [ 320.063737][T16335] ? kstrtouint+0x76/0xc0 [ 320.063800][T16335] audit_seccomp+0x48/0x100 [ 320.063867][T16335] ? __seccomp_filter+0x82d/0x1250 [ 320.063904][T16335] __seccomp_filter+0x83e/0x1250 [ 320.063948][T16335] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 320.064070][T16335] ? vfs_write+0x7e8/0x960 [ 320.064112][T16335] __secure_computing+0x82/0x150 [ 320.064162][T16335] syscall_trace_enter+0xcf/0x1e0 [ 320.064202][T16335] do_syscall_64+0xac/0x200 [ 320.064226][T16335] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 320.064305][T16335] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 320.064347][T16335] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 320.064448][T16335] RIP: 0033:0x7fedda96efc9 [ 320.064476][T16335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 320.064501][T16335] RSP: 002b:00007fedd93cf038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b4 [ 320.064526][T16335] RAX: ffffffffffffffda RBX: 00007feddabc5fa0 RCX: 00007fedda96efc9 [ 320.064543][T16335] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000004 [ 320.064560][T16335] RBP: 00007fedd93cf090 R08: 0000000000000000 R09: 0000000000000000 [ 320.064577][T16335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 320.064655][T16335] R13: 00007feddabc6038 R14: 00007feddabc5fa0 R15: 00007ffdb657be58 [ 320.064681][T16335] [ 320.525170][T16351] lo speed is unknown, defaulting to 1000 [ 320.531353][T16351] lo speed is unknown, defaulting to 1000 [ 320.531657][T16351] lo speed is unknown, defaulting to 1000 [ 320.591780][T16351] vcan0 speed is unknown, defaulting to 1000 [ 320.645816][T16360] vhci_hcd: default hub control req: a00d v0321 i0003 l0 [ 320.655494][T16360] netlink: 8 bytes leftover after parsing attributes in process `syz.0.4765'. [ 320.690374][T16364] netlink: 'syz.1.4768': attribute type 4 has an invalid length. [ 321.169746][T16384] FAULT_INJECTION: forcing a failure. [ 321.169746][T16384] name failslab, interval 1, probability 0, space 0, times 0 [ 321.182426][T16384] CPU: 0 UID: 0 PID: 16384 Comm: syz.5.4775 Not tainted syzkaller #0 PREEMPT(voluntary) [ 321.182500][T16384] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 321.182512][T16384] Call Trace: [ 321.182519][T16384] [ 321.182527][T16384] __dump_stack+0x1d/0x30 [ 321.182547][T16384] dump_stack_lvl+0xe8/0x140 [ 321.182587][T16384] dump_stack+0x15/0x1b [ 321.182607][T16384] should_fail_ex+0x265/0x280 [ 321.182624][T16384] should_failslab+0x8c/0xb0 [ 321.182651][T16384] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 321.182694][T16384] ? __alloc_skb+0x101/0x320 [ 321.182719][T16384] __alloc_skb+0x101/0x320 [ 321.182806][T16384] netlink_alloc_large_skb+0xbf/0xf0 [ 321.182832][T16384] netlink_sendmsg+0x3cf/0x6b0 [ 321.182863][T16384] ? __pfx_netlink_sendmsg+0x10/0x10 [ 321.182880][T16384] __sock_sendmsg+0x145/0x180 [ 321.182910][T16384] ____sys_sendmsg+0x31e/0x4e0 [ 321.182989][T16384] ___sys_sendmsg+0x17b/0x1d0 [ 321.183092][T16384] __x64_sys_sendmsg+0xd4/0x160 [ 321.183163][T16384] x64_sys_call+0x191e/0x3000 [ 321.183255][T16384] do_syscall_64+0xd2/0x200 [ 321.183271][T16384] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 321.183301][T16384] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 321.183322][T16384] RIP: 0033:0x7f8c61e7efc9 [ 321.183335][T16384] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 321.183385][T16384] RSP: 002b:00007f8c608e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 321.183402][T16384] RAX: ffffffffffffffda RBX: 00007f8c620d5fa0 RCX: 00007f8c61e7efc9 [ 321.183413][T16384] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000006 [ 321.183424][T16384] RBP: 00007f8c608e7090 R08: 0000000000000000 R09: 0000000000000000 [ 321.183434][T16384] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 321.183445][T16384] R13: 00007f8c620d6038 R14: 00007f8c620d5fa0 R15: 00007fff219ee568 [ 321.183462][T16384] [ 321.405313][T16386] netlink: 'syz.5.4776': attribute type 6 has an invalid length. [ 321.457642][T16386] SELinux: failed to load policy [ 321.621558][T16400] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4783'. [ 321.648890][T16406] FAULT_INJECTION: forcing a failure. [ 321.648890][T16406] name failslab, interval 1, probability 0, space 0, times 0 [ 321.661592][T16406] CPU: 1 UID: 0 PID: 16406 Comm: syz.0.4785 Not tainted syzkaller #0 PREEMPT(voluntary) [ 321.661625][T16406] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 321.661641][T16406] Call Trace: [ 321.661650][T16406] [ 321.661660][T16406] __dump_stack+0x1d/0x30 [ 321.661707][T16406] dump_stack_lvl+0xe8/0x140 [ 321.661732][T16406] dump_stack+0x15/0x1b [ 321.661752][T16406] should_fail_ex+0x265/0x280 [ 321.661782][T16406] should_failslab+0x8c/0xb0 [ 321.661845][T16406] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 321.661880][T16406] ? __alloc_skb+0x101/0x320 [ 321.661926][T16406] __alloc_skb+0x101/0x320 [ 321.661961][T16406] netlink_alloc_large_skb+0xbf/0xf0 [ 321.662021][T16406] netlink_sendmsg+0x3cf/0x6b0 [ 321.662047][T16406] ? __pfx_netlink_sendmsg+0x10/0x10 [ 321.662093][T16406] __sock_sendmsg+0x145/0x180 [ 321.662123][T16406] ____sys_sendmsg+0x31e/0x4e0 [ 321.662167][T16406] ___sys_sendmsg+0x17b/0x1d0 [ 321.662255][T16406] __x64_sys_sendmsg+0xd4/0x160 [ 321.662315][T16406] x64_sys_call+0x191e/0x3000 [ 321.662420][T16406] do_syscall_64+0xd2/0x200 [ 321.662442][T16406] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 321.662477][T16406] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 321.662576][T16406] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 321.662602][T16406] RIP: 0033:0x7fc397a3efc9 [ 321.662621][T16406] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 321.662642][T16406] RSP: 002b:00007fc3964a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 321.662704][T16406] RAX: ffffffffffffffda RBX: 00007fc397c95fa0 RCX: 00007fc397a3efc9 [ 321.662719][T16406] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000006 [ 321.662733][T16406] RBP: 00007fc3964a7090 R08: 0000000000000000 R09: 0000000000000000 [ 321.662747][T16406] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 321.662837][T16406] R13: 00007fc397c96038 R14: 00007fc397c95fa0 R15: 00007ffce705adb8 [ 321.662856][T16406] [ 321.862870][ T29] kauditd_printk_skb: 378 callbacks suppressed [ 321.862885][ T29] audit: type=1400 audit(1761859975.186:12862): avc: denied { name_bind } for pid=16409 comm="syz.1.4787" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 321.901180][ T29] audit: type=1400 audit(1761859975.416:12863): avc: denied { setopt } for pid=16407 comm="syz.6.4786" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 321.949901][T16408] netlink: 4 bytes leftover after parsing attributes in process `syz.6.4786'. [ 321.961620][ T7388] smc: removing ib device syz1 [ 321.976220][ T3420] vcan0 speed is unknown, defaulting to 1000 [ 321.982289][ T3420] syz1: Port: 1 Link DOWN [ 321.988816][T16416] sctp: [Deprecated]: GPL (pid 16416) Use of int in maxseg socket option. [ 321.988816][T16416] Use struct sctp_assoc_value instead [ 322.049359][ T29] audit: type=1400 audit(1761859975.566:12864): avc: denied { write } for pid=16409 comm="GPL" name="file0" dev="tmpfs" ino=1920 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 322.052444][T16416] block device autoloading is deprecated and will be removed. [ 322.071527][ T29] audit: type=1400 audit(1761859975.566:12865): avc: denied { open } for pid=16409 comm="GPL" path="/370/file0" dev="tmpfs" ino=1920 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 322.096638][T16420] netlink: 56 bytes leftover after parsing attributes in process `syz.5.4790'. [ 322.101638][ T29] audit: type=1400 audit(1761859975.616:12866): avc: denied { execute } for pid=16419 comm="syz.5.4790" dev="tmpfs" ino=528 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 322.132146][ T29] audit: type=1400 audit(1761859975.616:12867): avc: denied { execute_no_trans } for pid=16419 comm="syz.5.4790" path=2F6D656D66643A5B0BDB58AE5B35A990FF631F1AA9FDFAADD16D64E7E27F9BD55210F3B6FF54BFD1C8854858A9250C1A65E0202864656C6574656429 dev="tmpfs" ino=528 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 322.206102][T16418] lo speed is unknown, defaulting to 1000 [ 322.212424][T16418] lo speed is unknown, defaulting to 1000 [ 322.218861][T16418] lo speed is unknown, defaulting to 1000 [ 322.250815][ T29] audit: type=1326 audit(1761859975.766:12868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16409 comm="GPL" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 322.274277][ T29] audit: type=1326 audit(1761859975.766:12869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16409 comm="GPL" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 322.297667][ T29] audit: type=1326 audit(1761859975.796:12870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16409 comm="GPL" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 322.297778][ T29] audit: type=1326 audit(1761859975.796:12871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16409 comm="GPL" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fedda96efc9 code=0x7ffc0000 [ 322.639477][T16456] FAULT_INJECTION: forcing a failure. [ 322.639477][T16456] name failslab, interval 1, probability 0, space 0, times 0 [ 322.652244][T16456] CPU: 0 UID: 0 PID: 16456 Comm: syz.1.4803 Not tainted syzkaller #0 PREEMPT(voluntary) [ 322.652279][T16456] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 322.652292][T16456] Call Trace: [ 322.652298][T16456] [ 322.652307][T16456] __dump_stack+0x1d/0x30 [ 322.652332][T16456] dump_stack_lvl+0xe8/0x140 [ 322.652435][T16456] dump_stack+0x15/0x1b [ 322.652467][T16456] should_fail_ex+0x265/0x280 [ 322.652486][T16456] should_failslab+0x8c/0xb0 [ 322.652514][T16456] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 322.652549][T16456] ? __alloc_skb+0x101/0x320 [ 322.652605][T16456] __alloc_skb+0x101/0x320 [ 322.652662][T16456] netlink_alloc_large_skb+0xbf/0xf0 [ 322.652690][T16456] netlink_sendmsg+0x3cf/0x6b0 [ 322.652730][T16456] ? __pfx_netlink_sendmsg+0x10/0x10 [ 322.652746][T16456] __sock_sendmsg+0x145/0x180 [ 322.652768][T16456] ____sys_sendmsg+0x31e/0x4e0 [ 322.652800][T16456] ___sys_sendmsg+0x17b/0x1d0 [ 322.652879][T16456] __x64_sys_sendmsg+0xd4/0x160 [ 322.652947][T16456] x64_sys_call+0x191e/0x3000 [ 322.652974][T16456] do_syscall_64+0xd2/0x200 [ 322.653041][T16456] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 322.653082][T16456] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 322.653110][T16456] RIP: 0033:0x7fedda96efc9 [ 322.653141][T16456] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 322.653161][T16456] RSP: 002b:00007fedd93cf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 322.653180][T16456] RAX: ffffffffffffffda RBX: 00007feddabc5fa0 RCX: 00007fedda96efc9 [ 322.653251][T16456] RDX: 0000000020000050 RSI: 00002000000002c0 RDI: 0000000000000003 [ 322.653306][T16456] RBP: 00007fedd93cf090 R08: 0000000000000000 R09: 0000000000000000 [ 322.653322][T16456] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 322.653338][T16456] R13: 00007feddabc6038 R14: 00007feddabc5fa0 R15: 00007ffdb657be58 [ 322.653363][T16456] [ 322.872445][ C0] vcan0: j1939_tp_rxtimer: 0xffff88815abc0600: rx timeout, send abort [ 322.906386][T16462] FAULT_INJECTION: forcing a failure. [ 322.906386][T16462] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 322.919546][T16462] CPU: 0 UID: 0 PID: 16462 Comm: syz.0.4805 Not tainted syzkaller #0 PREEMPT(voluntary) [ 322.919596][T16462] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 322.919612][T16462] Call Trace: [ 322.919620][T16462] [ 322.919629][T16462] __dump_stack+0x1d/0x30 [ 322.919689][T16462] dump_stack_lvl+0xe8/0x140 [ 322.919710][T16462] dump_stack+0x15/0x1b [ 322.919728][T16462] should_fail_ex+0x265/0x280 [ 322.919748][T16462] should_fail+0xb/0x20 [ 322.919768][T16462] should_fail_usercopy+0x1a/0x20 [ 322.919859][T16462] _copy_from_user+0x1c/0xb0 [ 322.919891][T16462] memdup_user+0x5e/0xd0 [ 322.919924][T16462] nvram_misc_write+0x78/0xd0 [ 322.920004][T16462] vfs_writev+0x406/0x8b0 [ 322.920046][T16462] ? __pfx_nvram_misc_write+0x10/0x10 [ 322.920087][T16462] __x64_sys_pwritev+0xfd/0x1c0 [ 322.920195][T16462] x64_sys_call+0x14f8/0x3000 [ 322.920223][T16462] do_syscall_64+0xd2/0x200 [ 322.920245][T16462] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 322.920280][T16462] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 322.920359][T16462] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 322.920380][T16462] RIP: 0033:0x7fc397a3efc9 [ 322.920395][T16462] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 322.920414][T16462] RSP: 002b:00007fc3964a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 322.920437][T16462] RAX: ffffffffffffffda RBX: 00007fc397c95fa0 RCX: 00007fc397a3efc9 [ 322.920452][T16462] RDX: 0000000000000002 RSI: 0000200000000100 RDI: 0000000000000006 [ 322.920539][T16462] RBP: 00007fc3964a7090 R08: 0000000000000000 R09: 0000000000000000 [ 322.920555][T16462] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 322.920571][T16462] R13: 00007fc397c96038 R14: 00007fc397c95fa0 R15: 00007ffce705adb8 [ 322.920666][T16462] [ 323.116752][T16464] syzkaller0: entered promiscuous mode [ 323.122259][T16464] syzkaller0: entered allmulticast mode [ 323.232134][T16484] loop3: detected capacity change from 0 to 1024 [ 323.324956][T16490] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4818'. [ 323.333929][T16490] netlink: 312 bytes leftover after parsing attributes in process `syz.3.4818'. [ 323.343144][T16490] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4818'. [ 323.372480][ C0] vcan0: j1939_tp_rxtimer: 0xffff88815abc1000: rx timeout, send abort [ 323.380792][ C0] vcan0: j1939_tp_rxtimer: 0xffff88815abc0600: abort rx timeout. Force session deactivation [ 323.398333][T16495] bridge0: entered promiscuous mode [ 323.403714][T16495] macsec1: entered promiscuous mode [ 323.409987][T16495] bridge0: port 3(macsec1) entered blocking state [ 323.416963][T16495] bridge0: port 3(macsec1) entered disabled state [ 323.423508][T16495] macsec1: entered allmulticast mode [ 323.428894][T16495] bridge0: entered allmulticast mode [ 323.443398][T16495] macsec1: left allmulticast mode [ 323.448507][T16495] bridge0: left allmulticast mode [ 323.463324][T16495] bridge0: left promiscuous mode [ 323.566191][T16502] lo speed is unknown, defaulting to 1000 [ 323.572351][T16502] lo speed is unknown, defaulting to 1000 [ 323.578543][T16502] lo speed is unknown, defaulting to 1000 [ 323.798613][T16515] loop3: detected capacity change from 0 to 2048 [ 323.819912][T16506] ================================================================== [ 323.828054][T16506] BUG: KCSAN: data-race in selinux_inode_permission / selinux_inode_permission [ 323.829007][T16518] netlink: 'syz.1.4829': attribute type 6 has an invalid length. [ 323.837024][T16506] [ 323.837034][T16506] read to 0xffff888101ffa820 of 4 bytes by task 16516 on cpu 0: [ 323.837054][T16506] selinux_inode_permission+0x334/0x740 [ 323.845339][T16514] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=28949 sclass=netlink_route_socket pid=16514 comm=syz.0.4824 [ 323.847150][T16506] security_inode_permission+0x6d/0xb0 [ 323.863843][T16514] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4824'. [ 323.873093][T16506] inode_permission+0x106/0x310 [ 323.873138][T16506] link_path_walk+0x162/0x900 [ 323.873173][T16506] path_openat+0x1de/0x2170 [ 323.880759][ C0] vcan0: j1939_tp_rxtimer: 0xffff88815abc1000: abort rx timeout. Force session deactivation [ 323.887491][T16506] do_filp_open+0x109/0x230 [ 323.887522][T16506] io_openat2+0x272/0x390 [ 323.920397][T16506] io_openat+0x1b/0x30 [ 323.924483][T16506] __io_issue_sqe+0xfe/0x2e0 [ 323.929096][T16506] io_issue_sqe+0x56/0xa80 [ 323.933538][T16506] io_wq_submit_work+0x3f7/0x5f0 [ 323.939020][T16506] io_worker_handle_work+0x44e/0x9b0 [ 323.944330][T16506] io_wq_worker+0x22e/0x860 [ 323.948856][T16506] ret_from_fork+0x122/0x1b0 [ 323.953463][T16506] ret_from_fork_asm+0x1a/0x30 [ 323.958241][T16506] [ 323.960566][T16506] write to 0xffff888101ffa820 of 4 bytes by task 16506 on cpu 1: [ 323.968289][T16506] selinux_inode_permission+0x3ac/0x740 [ 323.973855][T16506] security_inode_permission+0x6d/0xb0 [ 323.979334][T16506] inode_permission+0x106/0x310 [ 323.984204][T16506] link_path_walk+0x162/0x900 [ 323.988900][T16506] path_openat+0x1de/0x2170 [ 323.993437][T16506] do_filp_open+0x109/0x230 [ 323.997982][T16506] io_openat2+0x272/0x390 [ 324.002344][T16506] io_openat+0x1b/0x30 [ 324.006427][T16506] __io_issue_sqe+0xfe/0x2e0 [ 324.011038][T16506] io_issue_sqe+0x56/0xa80 [ 324.015491][T16506] io_submit_sqes+0x675/0x1060 [ 324.020292][T16506] __se_sys_io_uring_enter+0x1c1/0x1b70 [ 324.025862][T16506] __x64_sys_io_uring_enter+0x78/0x90 [ 324.031259][T16506] x64_sys_call+0x2df0/0x3000 [ 324.035947][T16506] do_syscall_64+0xd2/0x200 [ 324.040456][T16506] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 324.046361][T16506] [ 324.048691][T16506] value changed: 0x00000000 -> 0x00000001 [ 324.054421][T16506] [ 324.056753][T16506] Reported by Kernel Concurrency Sanitizer on: [ 324.062913][T16506] CPU: 1 UID: 0 PID: 16506 Comm: syz.0.4824 Not tainted syzkaller #0 PREEMPT(voluntary) [ 324.072761][T16506] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 324.082824][T16506] ================================================================== [ 324.094697][T16515] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 324.193950][T16518] SELinux: failed to load policy [ 324.276379][T11321] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.