last executing test programs: 6m42.698972018s ago: executing program 3 (id=170): r0 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x45) r1 = socket$unix(0x1, 0x1, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) listen(r2, 0x2) connect$unix(r1, &(0x7f0000fce000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000140)) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x4, 0x28}, 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="180000000000b65d00000000feffffff18120080dbab6d19f61dc73d15710f7c4d0ae34af1218173059e439ae8c1d039cf8e3263e91bd58d0a79c5ca9e65548e6d8e15fb0e0d7d0f7d770c3ec5da42df24ea139e7a5b5b7c85c7a019adf942580334b83116ec7c94f48b91851e415becacc21887478cae1fb2563c1db6c8115b85466c851f55a445245a2bd1b06461e1584a375426ce96878124d2b73431b9468f9c7ae89daa3a093df3600edcaa045ab9e2419d07bb825338694be41eb93ae48784fa1887cf7cdcfa48da33ef9f616003938d3976a6ea124474192f93ee202d2356775d2f0178869569fdb2701ee487dd39d201c9cb34e62e", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7000000000000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x18) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x10, 0x1403, 0x1, 0x70bd29, 0x25dfdbff}, 0x10}, 0x1, 0x0, 0x0, 0x8081}, 0x20000010) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x1, &(0x7f0000000000)=0x2, 0x4) r5 = openat(0xffffffffffffff9c, &(0x7f0000000400)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x48241, 0x1e1) setsockopt$MRT6_ADD_MIF(r5, 0x29, 0xca, &(0x7f0000000340)={0x1, 0x1, 0x72, 0x0, 0x7}, 0xc) r6 = socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) ioctl$SNAPSHOT_FREE(r5, 0x3305) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r6) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r6, 0x0, 0x4000054) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="000826bd7000fbdbdf250600000008000300", @ANYRES32=0x0, @ANYBLOB="0f0005000500000008000500020000000a001802030303030303000008000500070000000a00180003030303030300000800050007000000"], 0x54}, 0x1, 0x0, 0x0, 0x4091}, 0x5) r8 = getegid() newfstatat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) lchown(&(0x7f0000000040)='./file1\x00', r9, r8) pwrite64(r5, &(0x7f0000000d80)="f6", 0x1, 0x8000c61) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 6m42.652850182s ago: executing program 3 (id=171): mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff53000000800395032303030"], 0x15) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 6m42.437069909s ago: executing program 3 (id=175): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1, 0x0, 0x88}, 0x18) r2 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r2, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[], 0x10}, 0x0) setsockopt$sock_attach_bpf(r2, 0x110, 0x3, 0x0, 0x0) pipe2(&(0x7f0000001cc0), 0x800) r3 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r3, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r5}, 0x18) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x89a0, &(0x7f0000000040)={'syz_tun\x00'}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000300)={'syzkaller0\x00', 0x0}) bind$packet(r6, &(0x7f0000000080)={0x11, 0x1a, r7, 0x1, 0x1}, 0x14) r8 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x89a1, &(0x7f0000000040)={'syzkaller0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1fff}]}) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 6m41.859056546s ago: executing program 3 (id=177): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x200000, &(0x7f0000000500)={[{@dioread_nolock}, {@stripe={'stripe', 0x3d, 0x3}}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}, {@nogrpid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@nodelalloc}, {@errors_remount}, {@acl}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x343}}, {@jqfmt_vfsold}, {@barrier_val={'barrier', 0x3d, 0x7}}, {@nombcache}]}, 0xfd, 0x573, &(0x7f0000000cc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143441, 0x98) fallocate(r0, 0x10, 0x160483b7, 0x5) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r1, &(0x7f0000000400)='ns\x00') 6m41.728690616s ago: executing program 3 (id=179): socket$inet6_udp(0xa, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000000)={0x18, 0x0, {0x2, @multicast, 'ip_vti0\x00'}}, 0x1e) connect$pppoe(r4, &(0x7f0000000340)={0x18, 0x0, {0x0, @multicast, 'macvlan0\x00'}}, 0x1e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) writev(0xffffffffffffffff, 0x0, 0x0) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, 0x0, &(0x7f0000000240)) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r5, &(0x7f00000009c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000100), r5) writev(r5, &(0x7f0000000200)=[{&(0x7f00000000c0)='X', 0x8030000}], 0x1) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x40, 0x5d, 0x2, 0x8}, {0x6, 0x0, 0x6, 0x1}]}, 0x10) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x4e21, @remote}}, 0x0, 0x0, 0x38, 0x0, "f48dbddca5b77fac51c61af4d246abd60273d37bb8760dd2666b0781e6d698726c94eddafcc50c70a5e217d6d7097a8689558f257de2c404a9f1cbb8dfe7dc84a4db5999a831f995f83087776515cd0c"}, 0xd8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0xfffffffd) futex(&(0x7f000000cffc)=0x3, 0x5, 0xf2, 0x0, &(0x7f0000000000), 0x5000000) write(0xffffffffffffffff, &(0x7f0000000140)="24000000010006", 0x7) 6m41.589525448s ago: executing program 1 (id=183): bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000040)={0x6}, 0x8) r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)=@ipv6_newnexthop={0x28, 0x68, 0x1, 0xfcfd, 0x0, {0x2, 0x0, 0x2, 0x0, 0x4}, [@NHA_ENCAP={0xc, 0x8, 0x0, 0x1, @LWTUNNEL_IP6_TC={0x5}}, @NHA_FDB={0x4}]}, 0x28}}, 0x0) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff53000000800395032303030"], 0x15) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) accept4$inet(r0, 0x0, &(0x7f0000000380), 0x800) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[], 0x15) r3 = dup(r2) write$P9_RLERRORu(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$inet_IP_IPSEC_POLICY(r3, 0x0, 0x10, &(0x7f0000000440)={{{@in6=@dev, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@private2}, 0x0, @in=@remote}}, &(0x7f0000000180)=0xe8) quotactl_fd$Q_QUOTAOFF(0xffffffffffffffff, 0xffffffff80000300, r4, 0x0) write$RDMA_USER_CM_CMD_SET_OPTION(r3, &(0x7f0000000280)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r3, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) 6m41.588762398s ago: executing program 1 (id=184): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)=',\xea\x00', 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaa230180c20000000800450000b00000000000119078000000000000000000004e20009c907801000000000000007b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c003002824251d7d17b5191584bcd4fbe40a23424dbcfd56f1375461caaa2f19935e6996c7096ffeeb0300e6ee000000649a3bfbc1f39cb307b3472eb9cdb042d2643fcbb2c5a57df67d544af6e8dafe09"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0, 0x3}, 0x94) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x20000000000000d5, &(0x7f0000000400)=ANY=[@ANYRES8=r0, @ANYRES16=0x0, @ANYRES16=r4], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, r1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) fcntl$lock(r1, 0x25, &(0x7f0000000000)={0x1}) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000280)={0x2, 0x2, 0x8, 0x5, 0x3, 0x8, 0x7f, 0x3, 0x4, 0x8, 0x5, 0x1, 0x6, 0x5}, 0xe) fcntl$lock(r1, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x80, 0x7}) fcntl$lock(r1, 0x25, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x80000000}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000080)='kmem_cache_free\x00', r6, 0x0, 0x4}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r7 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r7, &(0x7f0000000880)=[{&(0x7f0000000440)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000100)="03", 0x2}], 0x1, 0x0, 0x0, 0x10}], 0x1, 0x0) sendmmsg$inet_sctp(r7, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000240)=[{0x0, 0x300}, {&(0x7f0000000300)="359cb6", 0x3}], 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c000400"/44, @ANYRES32=0x0], 0x30}], 0x1, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0xe, 0x7fff0000}]}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000580)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") unlink(&(0x7f0000000180)='./file1\x00') ftruncate(r0, 0x7000000) dup(r0) 6m41.467170878s ago: executing program 3 (id=187): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='sched_switch\x00', r4, 0x0, 0xa}, 0x18) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') preadv(r5, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0xc002a0, 0x0) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) syz_clone3(&(0x7f00000003c0)={0x44084000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0x3}, &(0x7f0000000180)=""/163, 0xa3, &(0x7f0000000240)=""/9, &(0x7f0000000380)=[r0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x58) 6m41.459299618s ago: executing program 1 (id=188): mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 6m41.422988521s ago: executing program 32 (id=187): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) prctl$PR_SET_MM(0x23, 0xa, &(0x7f00002d5000/0x2000)=nil) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='sched_switch\x00', r4, 0x0, 0xa}, 0x18) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000001c0)='environ\x00') preadv(r5, &(0x7f0000001400)=[{&(0x7f0000000040)=""/113, 0x200000b1}], 0x1, 0xc002a0, 0x0) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) syz_clone3(&(0x7f00000003c0)={0x44084000, &(0x7f00000000c0), &(0x7f0000000100), &(0x7f0000000140), {0x3}, &(0x7f0000000180)=""/163, 0xa3, &(0x7f0000000240)=""/9, &(0x7f0000000380)=[r0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x6}, 0x58) 6m41.329556969s ago: executing program 1 (id=190): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x200000, &(0x7f0000000500)={[{@dioread_nolock}, {@stripe={'stripe', 0x3d, 0x3}}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}, {@nogrpid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@nodelalloc}, {@errors_remount}, {@acl}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x343}}, {@jqfmt_vfsold}, {@barrier_val={'barrier', 0x3d, 0x7}}, {@nombcache}]}, 0xfd, 0x573, &(0x7f0000000cc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143441, 0x98) fallocate(r0, 0x10, 0x160483b7, 0x5) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 6m41.179168201s ago: executing program 1 (id=191): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000e60000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x4f33}, 0x18) r1 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_fanout(r1, 0x107, 0x12, &(0x7f0000000800)={0x2}, 0x4) socket$nl_netfilter(0x10, 0x3, 0xc) mq_open(&(0x7f0000000000)='eth0\x00', 0x42, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r2 = gettid() timer_create(0x8, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) r3 = syz_open_dev$evdev(&(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000100)={'ip6gretap0\x00', 0x400}) readv(r3, &(0x7f0000001140)=[{&(0x7f0000000700)=""/206, 0x18}], 0x1) mremap(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000, 0x0, &(0x7f0000ffa000/0x1000)=nil) timer_settime(0x0, 0x0, &(0x7f0000000380), 0x0) r4 = socket$rds(0x15, 0x5, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b705000008000000"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r6}, 0x10) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) write$cgroup_int(r7, &(0x7f0000000000)=0xffffffffffffeffe, 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r7, 0x401c5820, &(0x7f00000001c0)=0x8) bind$rds(r4, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000800)={{}, &(0x7f0000000580), 0x0}, 0x20) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = syz_genetlink_get_family_id$devlink(&(0x7f0000000400), r7) sendmsg$DEVLINK_CMD_GET(r7, &(0x7f0000000c40)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000c00)={&(0x7f0000000140)={0x14, r9, 0x1, 0x70bd28, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x4011}, 0x44) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21081e, &(0x7f00000002c0), 0x1, 0x4f2, &(0x7f0000000600)="$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") sendmsg$nl_route_sched(r8, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000600)=@newtaction={0x84, 0x30, 0x871a15abc695fb3d, 0x0, 0x25dfdbfd, {}, [{0x70, 0x1, [@m_tunnel_key={0x6c, 0x1, 0x0, 0x0, {{0xf}, {0x3c, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x204, 0x7, 0x0, 0x200000, 0x6}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @empty}, @TCA_TUNNEL_KEY_ENC_IPV4_SRC={0x8, 0x3, @loopback}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}]}, 0x84}, 0x1, 0x0, 0x0, 0x20048840}, 0x4001000) open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) 6m40.751524745s ago: executing program 1 (id=195): symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00') setxattr$security_evm(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000540)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x88, &(0x7f00000005c0)={[{@nogrpid}, {@min_batch_time}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@nobarrier}, {@nodiscard}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000280), 0x0, 0x0) read$hiddev(r0, &(0x7f0000000600)=""/98, 0x62) r1 = socket(0x400000000010, 0x2, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='dlm_bast\x00', r2, 0x0, 0x1fffffffffe}, 0x18) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000380)={0xc, 0x8, 0xfa00, {0x0}}, 0x6b) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500), 0x106}}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x35}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) 6m40.725828078s ago: executing program 33 (id=195): symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00') setxattr$security_evm(&(0x7f0000002080)='./file0\x00', &(0x7f00000020c0), 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000540)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x88, &(0x7f00000005c0)={[{@nogrpid}, {@min_batch_time}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@nobarrier}, {@nodiscard}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000280), 0x0, 0x0) read$hiddev(r0, &(0x7f0000000600)=""/98, 0x62) r1 = socket(0x400000000010, 0x2, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x18, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='dlm_bast\x00', r2, 0x0, 0x1fffffffffe}, 0x18) write$RDMA_USER_CM_CMD_GET_EVENT(0xffffffffffffffff, &(0x7f0000000380)={0xc, 0x8, 0xfa00, {0x0}}, 0x6b) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000500), 0x106}}, 0x20) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x35}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockname$packet(r1, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000008c0)=ANY=[@ANYBLOB="480000001000050700000086d7c0d6c878f064eb", @ANYRES32=r4, @ANYBLOB="0000000000000000280012000c00010076657468"], 0x48}}, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) 6m32.52507767s ago: executing program 6 (id=257): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000006c0f00000a"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xb, &(0x7f0000000040)=@raw=[@map_fd={0x18, 0x5, 0x1, 0x0, r0}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffd}}, @generic={0x7, 0x1, 0x6, 0x8, 0xa}], &(0x7f0000000180)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000280)=""/139, 0x41000, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x3, 0x28000000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000200)=[r0, r0, r0, r0, r0, r0, r0, r0, r0], &(0x7f0000000340)=[{0x0, 0x4, 0x1}, {0x5, 0x5, 0x6, 0x6}, {0x4, 0x2, 0xb}, {0x5, 0x5}, {0x2, 0x1, 0xb, 0x9}, {0x5, 0x5, 0x7, 0x6}], 0x10, 0x7}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x4, 0x0}, 0x8) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x25, 0x0, @val=@tracing={r2, 0x3c73}}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x41100, 0xf, '\x00', 0x0, @fallback=0xeadc9b8140a36693, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff53, r2, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$pppl2tp(r3, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x8, 0x0, 0x1003, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x32) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x180204}], 0x1) 6m32.473460374s ago: executing program 6 (id=258): socket$inet6_udp(0xa, 0x2, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r1, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) r4 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r4, &(0x7f0000000000)={0x18, 0x0, {0x2, @multicast, 'ip_vti0\x00'}}, 0x1e) connect$pppoe(r4, &(0x7f0000000340)={0x18, 0x0, {0x0, @multicast, 'macvlan0\x00'}}, 0x1e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) writev(0xffffffffffffffff, 0x0, 0x0) getsockopt$XDP_STATISTICS(0xffffffffffffffff, 0x11b, 0x7, 0x0, &(0x7f0000000240)) r5 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r5, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) connect$inet(r5, &(0x7f00000009c0)={0x2, 0x4e24, @dev={0xac, 0x14, 0x14, 0x21}}, 0x10) syz_genetlink_get_family_id$devlink(&(0x7f0000000100), r5) writev(r5, &(0x7f0000000200)=[{&(0x7f00000000c0)='X', 0x8030000}], 0x1) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000040)=[{0x40, 0x5d, 0x2, 0x8}, {0x6, 0x0, 0x6, 0x1}]}, 0x10) r6 = socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$inet6_tcp_TCP_MD5SIG(r6, 0x6, 0xe, &(0x7f0000000340)={@in={{0x2, 0x4e21, @remote}}, 0x0, 0x0, 0x38, 0x0, "f48dbddca5b77fac51c61af4d246abd60273d37bb8760dd2666b0781e6d698726c94eddafcc50c70a5e217d6d7097a8689558f257de2c404a9f1cbb8dfe7dc84a4db5999a831f995f83087776515cd0c"}, 0xd8) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) futex(&(0x7f000000cffc)=0x4, 0x0, 0x4, 0x0, 0x0, 0xfffffffd) futex(&(0x7f000000cffc)=0x3, 0x5, 0xf2, 0x0, &(0x7f0000000000), 0x5000000) write(0xffffffffffffffff, &(0x7f0000000140)="24000000010006", 0x7) 6m31.581626576s ago: executing program 6 (id=266): r0 = socket$netlink(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000840)={0x20, r1, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8}, {0x4}}]}, 0x20}, 0x1, 0x1000000, 0x0, 0x24004000}, 0x24040840) 6m31.226991495s ago: executing program 6 (id=273): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x200000, &(0x7f0000000500)={[{@dioread_nolock}, {@stripe={'stripe', 0x3d, 0x3}}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}, {@nogrpid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@nodelalloc}, {@errors_remount}, {@acl}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x343}}, {@jqfmt_vfsold}, {@barrier_val={'barrier', 0x3d, 0x7}}, {@nombcache}]}, 0xfd, 0x573, &(0x7f0000000cc0)="$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") fallocate(0xffffffffffffffff, 0x10, 0x160483b7, 0x5) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000400)='ns\x00') 6m31.130297642s ago: executing program 6 (id=274): r0 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000002c0)={'veth0_to_team\x00', &(0x7f0000000280)=@ethtool_channels={0x3d, 0x0, 0x0, 0x40000, 0x0, 0x2, 0x1}}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000002c0)={'veth0_to_team\x00', &(0x7f0000000000)=@ethtool_cmd={0x2c, 0x6, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0x0, 0x8, 0x0, 0x0, 0x0, 0xff}}) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000040)={'veth0_to_team\x00', 0x3fa1dc947ffe4b82}) 6m30.966637336s ago: executing program 6 (id=275): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0a00000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r0}, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000006c0), 0x48200, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xe) ioctl$TIOCVHANGUP(r2, 0x5437, 0x200000003000000) 6m30.935686388s ago: executing program 34 (id=275): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0a00000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000840)={{r0}, &(0x7f0000000700), &(0x7f0000000740)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, 0x0, &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000006c0), 0x48200, 0x0) ioctl$TIOCSETD(r2, 0x5423, &(0x7f0000000040)=0xe) ioctl$TIOCVHANGUP(r2, 0x5437, 0x200000003000000) 6m22.334852733s ago: executing program 0 (id=329): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000006c0f00000a"], 0x48) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000004c0)={0x6, 0xb, &(0x7f0000000040)=@raw=[@map_fd={0x18, 0x5, 0x1, 0x0, r0}, @printk={@llx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0xfffffffd}}, @generic={0x7, 0x1, 0x6, 0x8, 0xa}], &(0x7f0000000180)='syzkaller\x00', 0x2, 0x8b, &(0x7f0000000280)=""/139, 0x41000, 0x10, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f00000001c0)={0x3, 0xc, 0x3, 0x28000000}, 0x10, 0x0, 0x0, 0x6, &(0x7f0000000200)=[r0, r0, r0, r0, r0, r0, r0, r0, r0], &(0x7f0000000340)=[{0x0, 0x4, 0x1}, {0x5, 0x5, 0x6, 0x6}, {0x4, 0x2, 0xb}, {0x5, 0x5}, {0x2, 0x1, 0xb, 0x9}, {0x5, 0x5, 0x7, 0x6}], 0x10, 0x7}, 0x94) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x4, 0x0}, 0x8) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000680)={0xffffffffffffffff, 0x0, 0x25, 0x0, @val=@tracing={r2, 0x3c73}}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x41100, 0xf, '\x00', 0x0, @fallback=0xeadc9b8140a36693, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffff53, r2, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$pppl2tp(0x18, 0x1, 0x1) r4 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r4, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) connect$pppl2tp(r3, &(0x7f0000000240)=@pppol2tpin6={0x18, 0x1, {0x0, r4, 0x8, 0x0, 0x1003, 0x0, {0xa, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}}}, 0x32) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) writev(r3, &(0x7f0000000180)=[{&(0x7f0000000080)='v', 0x180204}], 0x1) 6m22.232954771s ago: executing program 0 (id=332): syz_usb_connect$cdc_ncm(0x1, 0x8f, &(0x7f00000006c0)={{0x12, 0x1, 0x200, 0x2, 0x0, 0x0, 0x0, 0x525, 0xa4a1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x7d, 0x2, 0x1, 0x5, 0x60, 0x2a, {{0x9, 0x4, 0x0, 0x0, 0x1, 0x2, 0xd, 0x0, 0x0, {{0x9, 0x24, 0x6, 0x0, 0x1, "9366e87b"}, {0x5, 0x24, 0x0, 0xa5c}, {0xd, 0x24, 0xf, 0x1, 0x10, 0x9, 0x5, 0x3}, {0x6, 0x24, 0x1a, 0x7f}, [@mdlm={0x15, 0x24, 0x12, 0x6}, @country_functional={0x8, 0x24, 0x7, 0xcd, 0x65, [0x5]}]}, {{0x9, 0x5, 0x81, 0x3, 0x200, 0x3, 0x0, 0xff}}}, {}, {0x9, 0x4, 0x1, 0x1, 0x2, 0x2, 0xd, 0x0, 0x0, "", {{{0x9, 0x5, 0x82, 0x2, 0x3ff, 0x2, 0x9, 0x7}}, {{0x9, 0x5, 0x3, 0x2, 0x8, 0x1, 0xe, 0x2}}}}}}}]}}, 0x0) r0 = socket(0x10, 0x3, 0x0) r1 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x2}, &(0x7f00000001c0)='@-:${-^.\x00', r1) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000180)=@RTM_GETMDB={0x18, 0x56, 0xf23}, 0x18}}, 0x0) recvmsg$kcm(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x40) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x0) r3 = socket(0x840000000002, 0x3, 0x1) r4 = socket$inet_udp(0x2, 0x2, 0x0) sendto$inet(r4, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) recvmsg$inet_nvme(r3, &(0x7f0000001240)={0x0, 0x0, 0x0}, 0x1) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='projid_map\x00') close_range(r5, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x6, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 6m21.442860395s ago: executing program 0 (id=342): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)=',\xea\x00', 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaa230180c20000000800450000b00000000000119078000000000000000000004e20009c907801000000000000007b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c003002824251d7d17b5191584bcd4fbe40a23424dbcfd56f1375461caaa2f19935e6996c7096ffeeb0300e6ee000000649a3bfbc1f39cb307b3472eb9cdb042d2643fcbb2c5a57df67d544af6e8dafe09"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0, 0x3}, 0x94) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x20000000000000d5, &(0x7f0000000400)=ANY=[@ANYRES8=r0, @ANYRES16=0x0, @ANYRES16=r4], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, r1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) fcntl$lock(r1, 0x25, &(0x7f0000000000)={0x1}) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000280)={0x2, 0x2, 0x8, 0x5, 0x3, 0x8, 0x7f, 0x3, 0x4, 0x8, 0x5, 0x1, 0x6, 0x5}, 0xe) fcntl$lock(r1, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x80, 0x7}) fcntl$lock(r1, 0x25, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x80000000}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000080)='kmem_cache_free\x00', r6, 0x0, 0x4}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r7 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r7, &(0x7f0000000880)=[{&(0x7f0000000440)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000100)="03", 0x2}], 0x1, 0x0, 0x0, 0x10}], 0x1, 0x0) sendmmsg$inet_sctp(r7, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000240)=[{0x0, 0x300}, {&(0x7f0000000300)="359cb6", 0x3}], 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c000400"/44, @ANYRES32=0x0], 0x30}], 0x1, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0xe, 0x7fff0000}]}) unlink(&(0x7f0000000180)='./file1\x00') dup(r0) 6m21.418631977s ago: executing program 0 (id=344): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x200000, &(0x7f0000000500)={[{@dioread_nolock}, {@stripe={'stripe', 0x3d, 0x3}}, {@min_batch_time={'min_batch_time', 0x3d, 0x1}}, {@nogrpid}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@nodelalloc}, {@errors_remount}, {@acl}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x343}}, {@jqfmt_vfsold}, {@barrier_val={'barrier', 0x3d, 0x7}}, {@nombcache}]}, 0xfd, 0x573, &(0x7f0000000cc0)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143441, 0x98) fallocate(r0, 0x10, 0x160483b7, 0x5) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) syz_open_procfs(r1, 0x0) 6m21.327961565s ago: executing program 0 (id=346): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000080)=',\xea\x00', 0x4) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuacct.usage_sys\x00', 0x275a, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaa230180c20000000800450000b00000000000119078000000000000000000004e20009c907801000000000000007b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c003002824251d7d17b5191584bcd4fbe40a23424dbcfd56f1375461caaa2f19935e6996c7096ffeeb0300e6ee000000649a3bfbc1f39cb307b3472eb9cdb042d2643fcbb2c5a57df67d544af6e8dafe09"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0, 0x3}, 0x94) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0x6, 0x20000000000000d5, &(0x7f0000000400)=ANY=[@ANYRES8=r0, @ANYRES16=0x0, @ANYRES16=r4], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x25, r1}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) fcntl$lock(r1, 0x25, &(0x7f0000000000)={0x1}) setsockopt$inet_sctp6_SCTP_EVENTS(r1, 0x84, 0xb, &(0x7f0000000280)={0x2, 0x2, 0x8, 0x5, 0x3, 0x8, 0x7f, 0x3, 0x4, 0x8, 0x5, 0x1, 0x6, 0x5}, 0xe) fcntl$lock(r1, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x80, 0x7}) fcntl$lock(r1, 0x25, &(0x7f0000000180)={0x0, 0x1, 0x0, 0x80000000}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0xb, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000080)='kmem_cache_free\x00', r6, 0x0, 0x4}, 0x18) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r7 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r7, &(0x7f0000000880)=[{&(0x7f0000000440)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f00000004c0)=[{&(0x7f0000000100)="03", 0x2}], 0x1, 0x0, 0x0, 0x10}], 0x1, 0x0) sendmmsg$inet_sctp(r7, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000240)=[{0x0, 0x300}, {&(0x7f0000000300)="359cb6", 0x3}], 0x2, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c000400"/44, @ANYRES32=0x0], 0x30}], 0x1, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000140)=[{0x6, 0x0, 0xe, 0x7fff0000}]}) unlink(&(0x7f0000000180)='./file1\x00') dup(r0) 6m20.996117511s ago: executing program 0 (id=350): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1, 0x0, 0x88}, 0x18) r2 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r2, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[], 0x10}, 0x0) setsockopt$sock_attach_bpf(r2, 0x110, 0x3, 0x0, 0x0) pipe2(&(0x7f0000001cc0), 0x800) r3 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r4}, 0x18) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x89a0, &(0x7f0000000040)={'syz_tun\x00'}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1fff}]}) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 6m20.995915291s ago: executing program 35 (id=350): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000111e6ca5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000020000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1, 0x0, 0x88}, 0x18) r2 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r2, &(0x7f0000001740)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[], 0x10}, 0x0) setsockopt$sock_attach_bpf(r2, 0x110, 0x3, 0x0, 0x0) pipe2(&(0x7f0000001cc0), 0x800) r3 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x14, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='kfree\x00', r4}, 0x18) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x89a0, &(0x7f0000000040)={'syz_tun\x00'}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1fff}]}) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) 5m38.614413275s ago: executing program 7 (id=651): perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffc, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000000)=0x4000000ffb, 0x8) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000100)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='cgroup2\x00', 0x4, 0x0) mount$bpf(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x18420, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) perf_event_open(&(0x7f0000000380)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket(0x10, 0x803, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x275a, 0x0) ustat(0x3, &(0x7f0000000000)) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendfile(r2, r1, &(0x7f00000000c0)=0x8, 0x6f7a) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r7, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x1}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001300)=@newtfilter={0xc8, 0x2c, 0xd2b, 0x70bd2b, 0x35dfdbfb, {0x0, 0x0, 0x0, r7, {0xf}, {}, {0x7, 0xfff3}}, [@filter_kind_options=@f_u32={{0x8}, {0x9c, 0x2, [@TCA_U32_SEL={0x24, 0x5, {0xfe, 0x1, 0x3, 0x1, 0x4, 0x102, 0x6, 0x7ffffffa, [{0x200, 0x500, 0x3, 0x6}]}}, @TCA_U32_SEL={0x74, 0x5, {0x10, 0x9, 0x6, 0x10da, 0xa760, 0x0, 0x10, 0x100, [{0x1000, 0xe, 0xb2a1, 0x9f6}, {0x5, 0x3ff, 0x3, 0x4}, {0x9, 0x7, 0x40, 0x80}, {0x3, 0xde5, 0x1, 0xbd}, {0x9, 0x10, 0x5, 0x5}, {0x49f, 0x7, 0x81, 0xb}]}}]}}]}, 0xc8}}, 0x24040084) 5m38.480468306s ago: executing program 7 (id=653): socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b00000000000000001804", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf9, 0xf9, 0x5, [@var={0xb, 0x0, 0x0, 0xe, 0x4}, @var={0xf, 0x0, 0x0, 0xe, 0x1}, @union={0xe, 0x4, 0x0, 0x5, 0x1, 0x9, [{0xc, 0x1, 0x3}, {0xa, 0x0, 0x100}, {0x2, 0x4, 0x2}, {0x10, 0x3, 0x4}]}, @datasec={0xb, 0x2, 0x0, 0xf, 0x1, [{0x4, 0x0, 0x7}, {0x1, 0xb, 0x7}], "eb"}, @union={0xc, 0x3, 0x0, 0x5, 0x0, 0x0, [{0x8, 0x2, 0x4}, {0x7, 0x5, 0xc0000}, {0x4, 0x2, 0x8}]}, @enum64={0x8, 0x4, 0x0, 0x13, 0x0, 0xa, [{0xa, 0x1, 0x31f4ee8a}, {0xe, 0x6, 0x7ff}, {0x6, 0x7, 0x7}, {0xa, 0xf12f, 0x100}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61, 0x0, 0x5f]}}, &(0x7f0000000880)=""/143, 0x119, 0x8f, 0x1, 0x2}, 0x28) syz_clone(0x20a00000, 0x0, 0x0, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x3, &(0x7f0000000000), 0xbc, 0x55a, &(0x7f0000000900)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xf0667000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18050000000000000000009610000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff0000022752fe60d1398ec54d2d4e0000bfa100000000000007010000f8ffffffbfa400000000002707040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70400000800000085000000950000009500000000000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) keyctl$session_to_parent(0x12) getsockopt(0xffffffffffffffff, 0x111, 0x4, 0x0, &(0x7f0000000080)) r6 = syz_usbip_server_init(0x3) syz_open_dev$tty20(0xc, 0x4, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000ac0), r8) sendmsg$NLBL_CALIPSO_C_ADD(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000340)=ANY=[@ANYBLOB="24cb8a28f224e23018", @ANYRESOCT=0x0, @ANYRES8=r6], 0x24}, 0x1, 0x0, 0x0, 0xc840}, 0x20020000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r7}, 0x10) 5m36.048036422s ago: executing program 7 (id=664): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000001c0)={{{@in=@multicast1, @in=@empty, 0x1, 0x0, 0x0, 0x0, 0x2, 0x20, 0x20}, {0x0, 0x0, 0x0, 0x0, 0x453f, 0x0, 0x200000000}}, {{@in6=@loopback, 0x0, 0x6c}, 0x0, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x4}}, 0xe8) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x4c02}) readv(r1, &(0x7f00000001c0)=[{&(0x7f0000001400)=""/227, 0x10}], 0x4) r2 = socket$kcm(0x2, 0xa, 0x2) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r0, 0x8983, &(0x7f0000000080)={0x0, 'syzkaller1\x00', {0x4}, 0x1}) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f00000001c0)={[{@grpquota}, {@nogrpid}, {@quota}]}, 0x1, 0x4fa, &(0x7f00000005c0)="$eJzs3c9vG1kdAPCvnThx0uwmu+wBEOyW3YWCqjqJuxut9gDLCSFUCdEjSG1I3CiKHUexU5rQQ3rmikQlTnDkD+DcE3cuCG5cygGJHxGoQeLg1YwnqZvaTdQkdhR/PtJo3ps39fe9pvNe/U3iF8DQuhoRuxExFhF3I2I6u57LjvisfST3Pdt7uLS/93ApF63W7X/l0vbkWnT8mcSV7DWLEfGj70X8NPdy3Mb2ztpitVrZzOqzzdrGbGN758ZqbXGlslJZL5cX5hfmPrn5cfnMxvpebSwrffXpH3e/9fOkW1PZlc5xnKX20AuHcRKjEfGD8wg2ACPZeMYG3RFeSz4i3o6I99PnfzpG0q8mAHCZtVrT0ZrurAMAl10+zYHl8qUsFzAV+Xyp1M7hvROT+Wq90bx+r761vtzOlc1EIX9vtVqZy3KFM1HIJfX5tPy8Xj5SvxkRb0XEL8cn0nppqV5dHuR/fABgiF05sv7/d7y9/gMAl1xx0B0AAPrO+g8Aw8f6DwDDx/oPAMOnvf5PDLobAEAfef8PAMPH+g8AQ+WHt24lR2s/+/zr5fvbW2v1+zeWK421Um1rqbRU39wordTrK+ln9tSOe71qvb4x/1FsPZj59kajOdvY3rlTq2+tN++kn+t9p1JI79rtw8gAgF7eeu/JX3LJivzpRHpEx14OhYH2DDhv+UF3ABiYkUF3ABgYu33B8DrFe3zpAbgkumzR+4Jit18QarVarfPrEnDOrn1J/h+GVUf+308Bw5CR/4fhJf8Pw6vVyp10z/846Y0AwMUmxw/0+P7/29n5d9k3B36yfPSOx+fZKwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALjYDvb/LWV7gU9FPl8qRbwRETNRyN1brVbmIuLNiPjzeGE8qc8PuM8AwGnl/57L9v+6Nv3h1AtN7145LI5FxM9+fftXDxabzc0/RYzl/j1+cL35OLte7n/vAYDjHazT6bnjjfyzvYdLB0c/+/OP70ZEsR1/f28s9g/jj8Zoei5GISIm/5PL6m25jtzFaew+iogvdht/LqbSHEh759Oj8ZPYb/Q1fv6F+Pm0rX1O/i6+cAZ9gWHzJJl/Puv2/OXjanru/vwX0xnq9LL5L3mppf10Dnwe/2D+G+kx/109aYyP/vD9dmni5bZHEV8ejTiIvd8x/xzEz/WI/+EJ4//1K+++36ut9ZuIa9E9fmes2WZtY7axvXNjtba4UlmprJfLC/MLc5/c/Lg8m+aoZ3uvBv/89PqbvdqS8U/2iF88ZvxfP+H4f/v/uz/+2ivif/ODbvHz8c4r4idr4jdOGH9x8vfFXm1J/OUe4z/u63/9hPGf/m3npW3DAYDBaWzvrC1Wq5VNBYWLX0j+yV6AbnQtfKdfscaie9MvPmg/00eaWq3XitVrxjiLrBtwERw+9BHxv0F3BgAAAAAAAAAAAAAA6Kofv7E06DECAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABweX0eAAD//19xzyM=") quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f0000000100)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x42, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000340)={{r3, 0xffffffffffffffff}, &(0x7f0000000040), &(0x7f00000002c0)='%ps \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x16, 0x1c, &(0x7f0000000480)=@raw=[@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @map_idx={0x18, 0xb, 0x5, 0x0, 0x9}, @map_fd={0x18, 0x8, 0x1, 0x0, r4}, @map_idx_val={0x18, 0x9, 0x6, 0x0, 0xa, 0x0, 0x0, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}], &(0x7f0000000380)='GPL\x00', 0x27, 0x81, &(0x7f0000000ac0)=""/129, 0x41100, 0x10, '\x00', 0x0, @fallback=0x2f, r3, 0x8, &(0x7f0000000580)={0xa, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, r3, 0x0, &(0x7f0000000e80)=[r3], 0x0, 0x10, 0x6}, 0x94) write$P9_RREADLINK(r3, &(0x7f0000000000)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0xfffffdab) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) r5 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) write$selinux_attr(r5, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) lchown(&(0x7f0000000080)='./file1\x00', 0xee01, 0xffffffffffffffff) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000000)={'syzkaller1\x00', @link_local}) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), 0xffffffffffffffff) 5m35.190112542s ago: executing program 7 (id=672): syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$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") mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb6000) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x100000000003, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa19a, 0x1000}, 0x0, 0x0, 0xffffffff, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) recvmsg(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000600)=""/193, 0xc1}, {&(0x7f0000001600)=""/4096, 0x1000}, {&(0x7f00000007c0)=""/214, 0xd6}, {&(0x7f00000008c0)=""/216, 0xd8}], 0x4, &(0x7f0000002600)=""/4096, 0x1000}, 0x10062) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000004c0)='mm_page_free\x00', r1, 0x0, 0x1d6}, 0x18) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000007000000010001000900000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000001a7600"/28], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, 0x0, &(0x7f00000002c0)}, 0x20) r4 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sys/net/ipv4/vs/drop_packet\x00', 0x2, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000500)={0xb, {'syz0\x00', 'syz1\x00', 'syz0\x00', 0x39, 0xef, 0x7, 0x100, 0xffffffb9, 0x1, "9b3a2010bf84b0570cb4d53e35f2e1f12e82845113fce430525c34920fbfb9e2dc8b64d27eb0333a386ef2ec9a43c7490065e4ea1907f2fd0b"}}, 0x151) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) r5 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r5, &(0x7f00000005c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000580)=0x14) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000200)=@newlink={0x38, 0x10, 0x437, 0x1, 0x25dfdbb8, {0x0, 0x0, 0x0, r6, 0x6cc89}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ipip={{0x9}, {0x8, 0x2, 0x0, 0x1, [@IFLA_IPTUN_COLLECT_METADATA={0x4}]}}}]}, 0x38}}, 0x0) r8 = socket$inet(0x2, 0x2, 0x0) sendmmsg$inet(r8, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @loopback}, 0x10, 0x0, 0x0, &(0x7f00000000c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r6, @empty, @dev={0xac, 0x14, 0x14, 0x30}}}}], 0x20}}], 0x1, 0x4040880) ioctl$PTP_PEROUT_REQUEST2(r2, 0x40383d0c, &(0x7f0000000140)={{0xffffffffffff8000, 0x14bc5f87}, {0xfffffffffffffffd, 0xcaa}, 0x1ff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000b00)='vnet_rx_one\x00', r4, 0x0, 0x4000000000000004}, 0x18) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r9, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r10}, 0x10) statfs(&(0x7f0000000580)='./file0\x00', 0x0) 5m34.578391021s ago: executing program 7 (id=675): r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x100, 0x0) r1 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000000340)=@o_path={&(0x7f0000000280)='./file0\x00', 0x0, 0x10, r0}, 0x18) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000500)=0x0, &(0x7f0000000580)=0x4) r3 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000780)=0xffffffffffffffff, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0x16, 0x8, 0x1, 0x9, 0x60c, r1, 0x4, '\x00', r2, r3, 0x4, 0x2, 0x5}, 0x50) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) r5 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r5, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$IPCTNL_MSG_EXP_DELETE(r5, &(0x7f0000000300)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000800)={0x14, 0x2, 0x2, 0x5, 0x0, 0x0, {0x3, 0x0, 0x8}}, 0x14}}, 0x14) mbind(&(0x7f00005b4000/0x4000)=nil, 0x100000000004000, 0x0, 0x0, 0x0, 0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r6}, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000180)={r5, 0x7fffffff, 0x3, 0x6}) ioctl$HIDIOCGREPORTINFO(r7, 0xc00c4809, &(0x7f0000000240)={0x2, 0x100, 0x3}) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x84) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFT_BATCH(r8, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0500000000000000000002000000300003802c00038014000100776732000000000000000000000000000400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a30"], 0x84}, 0x1, 0x0, 0x0, 0x4d008}, 0x2000c000) 5m34.382390127s ago: executing program 7 (id=679): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000240), &(0x7f0000000180)=@tcp6, 0x4f187d04bb211fc0}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2, 0xffffffffffffffff}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) r5 = gettid() r6 = socket(0x40000000015, 0x5, 0x0) recvmmsg(r6, &(0x7f0000003c40)=[{{0x0, 0x0, 0x0}, 0x80000000}], 0x1, 0x60010002, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r7}, 0x10) 5m34.382132177s ago: executing program 36 (id=679): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000240)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0x0}, 0x48) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000001c0)={r1, &(0x7f0000000240), &(0x7f0000000180)=@tcp6, 0x4f187d04bb211fc0}, 0x20) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r2, 0xffffffffffffffff}, 0x4) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r4}, 0x10) r5 = gettid() r6 = socket(0x40000000015, 0x5, 0x0) recvmmsg(r6, &(0x7f0000003c40)=[{{0x0, 0x0, 0x0}, 0x80000000}], 0x1, 0x60010002, 0x0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000000300)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000cc0)='mmap_lock_acquire_returned\x00', r7}, 0x10) 5.205655969s ago: executing program 9 (id=6360): mkdir(&(0x7f0000000400)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYRES64=r1], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='writeback_bdi_register\x00', r3}, 0x10) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000280)={'\x00', 0x7e, 0x1000, 0x5c8, 0x80000003, 0x6}) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000440)={0x0, r0}, 0x8) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) write(r6, &(0x7f0000000340), 0x11000) poll(&(0x7f0000000100)=[{r6}], 0x1, 0x3ff) vmsplice(r5, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000500)={{r2}, 0x0, &(0x7f00000004c0)='%+9llu \x00'}, 0x20) dup(r1) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000340)=ANY=[], 0x1, 0x140, &(0x7f0000000200)="$eJzs27Fq21AUBuDj2m3ddvFcOgi6dDJtn6CluFAqaEnwkEwJOFnsYIgXJZMfJS8YCJ683ZAo2Imxhwy2IPq+RT/8CO4dpMMV6OjT2XAwnpyO/8+i3WhE60dkMW9EJ15FM0rTAABeknlKcZNSSm+n8e4qUkpVrwgA2DbzHwDqx/wHgPox/wGgfvYPDv/+zPPeXpa1I66nRb/ol9ey//0n733N7nWWd82Kot9c9N/KPnvav473D/33tf2b+PK57O+6X//ylf5DDLa/fQAAAKiFbraw9nzf7W7qy/To+8DK+b0VH1s72wYA8AyTi8vh8Wh0ci4IgrAIVb+ZgG1bPvRVrwQAAAAAAAAAAAAAANhkF78TVb1HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWHUbAAD//0DvUik=") r7 = socket$inet6_sctp(0xa, 0x5, 0x84) socket$can_bcm(0x1d, 0x2, 0x2) r8 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r8, 0x8933, &(0x7f0000000440)={'vxcan1\x00', 0x0}) connect$can_bcm(r8, &(0x7f0000000300)={0x1d, r9}, 0x10) openat2(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000540)={'vxcan0\x00', 0x0}) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newtfilter={0x24, 0x11, 0x1, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x74, r10, {0x10, 0xb}}}, 0x24}, 0x1, 0xf0ffffffffffff}, 0x0) 5.086334629s ago: executing program 5 (id=6364): socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000003000), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000003040)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000003140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002bbd7000fbdbdf25020000000a000900aaaaaaaaaa44000008000300", @ANYRES32=r3, @ANYBLOB='\b\x00\v'], 0x30}, 0x1, 0x0, 0x0, 0x20000050}, 0x20040084) 5.060910021s ago: executing program 5 (id=6365): socket$packet(0x11, 0x3, 0x300) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000840)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x25dfdbff, {{@in=@rand_addr=0x400, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x2}, {0x0, 0x5, 0x0, 0x0, 0x0, 0x4000000000002}, {0x0, 0x0, 0x200000000000}, 0x0, 0x0, 0x1}, [@tmpl={0x44, 0x5, [{{@in=@dev={0xac, 0x14, 0x14, 0x43}, 0x3, 0x2b}, 0xa, @in=@empty, 0x0, 0x4}]}]}, 0xfc}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) syz_emit_ethernet(0x1ef, &(0x7f0000001100)={@local, @multicast, @void, {@mpls_uc={0x8847, {[{0x0, 0x0, 0x1}, {0x5}, {0x34}], @ipv6=@generic={0x5, 0x6, "20029f", 0x1ad, 0x0, 0x1, @rand_addr=' \x01\x00', @loopback, {[@dstopts={0x0, 0xc, '\x00', [@enc_lim={0x4, 0x1, 0x3}, @ra={0x5, 0x2, 0x3}, @ra={0x5, 0x2, 0x1c}, @calipso={0x7, 0x38, {0x2, 0xc, 0x9, 0xffff, [0xfffffffffffffffa, 0xd11b, 0xf29, 0x10000, 0x9f4a, 0x1000]}}, @pad1, @ra={0x5, 0x2, 0xffff}, @generic={0x3, 0x4, "c2b1db4a"}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, @fragment={0x33, 0x0, 0x5, 0x1, 0x0, 0x2, 0x64}, @fragment={0x0, 0x0, 0xfb, 0x1, 0x0, 0x1d, 0x64}, @dstopts={0x2f, 0x0, '\x00', [@jumbo={0xc2, 0x4, 0x6}]}, @srh={0x12, 0x6, 0x4, 0x3, 0x40, 0x8, 0x1, [@mcast1, @ipv4={'\x00', '\xff\xff', @remote}, @private1={0xfc, 0x1, '\x00', 0x1}]}], "4fb798e2c32b9e2c38250d79bdeba1fcb1b1a575a3cdcfcf0142dfb2c5729b25c44f7f162a665d6b7fe01c9f4c1675b3061ac1fa3817944e85202e9c5e8e039ad19946c118781c44336c49888c5f0e5fc7e9cbac333a766d667c05ff715b068476481ec2916c3cd90d8dbeb89f59b365c6e9f46345f2ad6629b425581ccda6c5f8c653d9ee5f3230a57a402aeb2419e78befecd387df1a9c6b5dbb9cc8f23164e3551a8a66f78249b9c29ebf78bf2d03e9e15e899b09be97c22422f615dc918e3340ebfb8706a1681b6c61c907bd3026a9e759d0ccc05f2acc1bcaa75f0aca8c6a69811969"}}}}}}, 0x0) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x0, &(0x7f0000000100), 0xff, 0x4a6, &(0x7f0000000980)="$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") r1 = creat(&(0x7f0000000000)='./file1\x00', 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file1\x00', 0x42, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) ioctl$PPPIOCNEWUNIT(r3, 0xc004743e, &(0x7f0000000000)=0x3) r4 = syz_io_uring_setup(0x1e1e, &(0x7f0000000280)={0x0, 0x86f7, 0x10100}, &(0x7f0000002000)=0x0, &(0x7f0000000000)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000180)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x22}) io_uring_enter(r4, 0x48e9, 0x0, 0x2, 0x0, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000080)={0x10, 0x17, 0x2, {0x7, './file0'}}, 0x10) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000007d000000850000000f00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r7}, 0x10) syz_clone3(&(0x7f00000006c0)={0x102102180, 0x0, 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0x0], 0x1}, 0x58) fcntl$setstatus(r1, 0x4, 0x6000) io_setup(0x200, &(0x7f0000000140)=0x0) io_submit(r8, 0x3b, &(0x7f0000000540)=[&(0x7f00000000c0)={0x25, 0x0, 0x2, 0x1, 0x0, r1, &(0x7f0000000000), 0x4000}]) 4.336939449s ago: executing program 9 (id=6373): bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a000000020000000900000008"], 0x48) r0 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r4) sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8004}, 0x4040000) sendmsg$NLBL_MGMT_C_ADDDEF(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x4c}, 0x1, 0x0, 0x0, 0x24008000}, 0x4040000) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x5, 0x8, &(0x7f0000000240)=ANY=[@ANYRESDEC=r5], &(0x7f0000000100)='GPL\x00', 0x4b7901da, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r7, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) r9 = socket(0x6, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r9, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) r10 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x20300, 0x0) ioctl$SNAPSHOT_ALLOC_SWAP_PAGE(r10, 0x80083314, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000004c0)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb, 0x0, 0xffffffffffffffff, 0x5, 0x3}}, @TCA_CT_MARK={0x8, 0x10}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004000}, 0x10000000) r11 = io_uring_setup(0x1fb8, &(0x7f0000000540)={0x0, 0x1ae0, 0x400, 0x0, 0xea}) io_uring_register$IORING_REGISTER_BUFFERS(r11, 0x0, &(0x7f0000000940)=[{&(0x7f0000000a00)=""/181, 0xb5}, {&(0x7f0000000200)=""/38, 0x26}, {&(0x7f0000000280)=""/20, 0x14}, {&(0x7f0000000380)=""/88, 0x58}, {&(0x7f0000000ac0)=""/173, 0xad}], 0x5) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000400)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r12}, 0x10) io_uring_register$IORING_REGISTER_FILES(r11, 0x1e, &(0x7f0000000000)=[r11], 0x1) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8844) 4.264816295s ago: executing program 9 (id=6376): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x6b, '\x00', 0x0, @fallback, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60e}, 0x94) gettid() rt_sigtimedwait(&(0x7f0000000040)={[0xfffffffffffffff8]}, 0x0, 0x0, 0x8) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0xa, [@enum={0x8, 0x1, 0x0, 0x6, 0x4, [{0x4, 0x5}]}]}, {0x0, [0x5f, 0x2e, 0x30, 0x5f, 0x3e, 0x30, 0x2e, 0x2e]}}, 0x0, 0x36, 0x0, 0x1}, 0x28) r2 = socket$inet6(0x10, 0x3, 0x0) syz_open_procfs(0x0, &(0x7f0000000640)='net/mcfilter6\x00') r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r3}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7883153bba9b20a1, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r4}, 0x10) sendto$inet6(r2, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0a80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f00000002c0), &(0x7f0000000040)='./file1\x00', 0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB='check=strict,nodots,usefree,nodots,usefree,dots,dots,dots,nodots,showexec,nodots,dos1xfy,allow_utime=00000000000000000000017,nodots,\x00'], 0x1, 0x23d, &(0x7f0000000a40)="$eJzs3cFq1EAcBvB/220be7Fn8RDw4qmobxBkBTEgrOSgJwPVSytCeome9jF8Bh/Jx+ipt4hN6NZUPUjadJvfD5Z87MfAzGVnDzO77x9+Ojr8fPKx+fEtkiSNWcQyziL2YzO2orXRPTfP805ctgwAYN0sFmU29hwY0MbVt6oqK7cjYvdKU3y/mUkBAAAAAAAAAAAwNOf/AWB6nP+/+6oqK/e672+/c/4fAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGM9Z09xv/vEae34AwPDs/wAwPfZ/AJge+z8ATM+bt+9eZXk+X6RpEnG6rIu6aJ9t/+JlPn+SnttfjTqt62K7y/n8adun/X6vG//sj/1OPH7U9r+656/zXr8bh9e9eAAAAAAAAAAAAAAAAAAAALglDtILvfv9W21/8Le+TZd+H6B3f38WD2Y3tgwAAAAAAAAAAAAAAAAAAABYaydfvh6Vx8cfKkG4CPfiP0YlcTsmLwwSxv5kAgAAAAAAAAAAAAAAAACA6Vld+h17JgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwntX//19fGHuNAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwDT8DAAA//8GmZGk") 4.242990897s ago: executing program 5 (id=6378): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f00000004c0)=[{0x80000006, 0x0, 0x12, 0xf9}]}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r3 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f00000000c0)) syz_extract_tcp_res(&(0x7f0000000100)={0x41424344, 0x41424344}, 0x370, 0x6) write$tun(r2, &(0x7f0000000340)={@void, @val={0x7, 0x0, 0x3, 0x300, 0x34}, @ipv4=@tcp={{0x5, 0x4, 0x0, 0x3c, 0x56, 0x0, 0x0, 0x0, 0x2f, 0x0, @loopback, @local}, {{0xc00, 0x22eb, 0x41424344, r4, 0x0, 0x0, 0xd, 0x0, 0x0, 0x0, 0x0, {[@sack={0x5, 0x6, [0x8]}, @window={0x3, 0x3, 0xff}, @window={0x3, 0x3, 0x9}, @exp_fastopen={0xfe, 0x13, 0xf989, "5011d2a8cf29d773d60dd37eabebe8"}]}}, {"4adcda08f6e83e2aa00e133f88a8"}}}}, 0x60) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r5}, &(0x7f00000005c0), &(0x7f0000000580)=r6}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x18) syz_open_dev$tty1(0xc, 0x4, 0x2) r7 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x10d2, 0x2, 0x8b6}, &(0x7f0000000240)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r8, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r8, r9, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r7, 0x0, &(0x7f0000000040)='./file0\x00', 0x64, 0x183000, 0x23456}) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x10) sendmsg$NFT_BATCH(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={{0x14, 0x10, 0x1, 0x0, 0x0, {0xa}}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @numgen={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_NG_DREG={0x8}, @NFTA_NG_MODULUS={0x8, 0x2, 0x1, 0x0, 0x5373}, @NFTA_NG_TYPE={0x8}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x3}}}, 0x84}, 0x1, 0x0, 0x0, 0x4}, 0x0) syz_emit_ethernet(0x4a, &(0x7f000001f8c0)={@local, @broadcast, @void, {@ipv4={0x8864, @tipc={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x36, 0x21, 0x0, 0x6, 0x0, @multicast2, @initdev={0xac, 0x1e, 0x0, 0x0}}, @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa, 0xb, 0x2, 0x0, 0x500}}}}}}, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x42002) io_uring_enter(r7, 0x47f6, 0x0, 0x0, 0x0, 0x0) 3.908836934s ago: executing program 5 (id=6380): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r2, 0x0, 0xf7}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) membarrier(0x2, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x400c84, &(0x7f0000000340), 0x1, 0x786, &(0x7f0000001900)="$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") bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) msgget(0x1, 0x0) dup(r0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) preadv(r1, &(0x7f00000008c0)=[{&(0x7f00000000c0)=""/150, 0x96}, {&(0x7f00000003c0)=""/245, 0xf5}, {&(0x7f0000000680)=""/159, 0x9f}, {&(0x7f00000004c0)=""/102, 0x66}, {&(0x7f0000000040)=""/47, 0x2f}, {&(0x7f0000000800)=""/140, 0x8c}], 0x6, 0x7ff, 0x5) ioctl$TIOCPKT(0xffffffffffffffff, 0x5420, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={0x0, r5, 0x0, 0x4ab}, 0x18) r6 = bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, 0xb, r6, 0x8, 0x0, 0x0, 0x14}, 0x94) setuid(r4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x1, 0x1, &(0x7f0000000640)=@raw=[@kfunc={0x85, 0x0, 0x2, 0x0, 0x2}], &(0x7f00000002c0)='GPL\x00', 0xf}, 0x94) 3.820342072s ago: executing program 5 (id=6385): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYRESHEX], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) (async) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYRESHEX], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f00000000c0)='netlink_extack\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f00000046c0)=@newtaction={0x48, 0x58, 0x284f, 0x0, 0x0, {}, [{0xe, 0x1, [@m_simple={0x30, 0x18, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x3}}}}]}]}, 0x48}}, 0x0) (async) sendmsg$nl_route_sched(r2, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={&(0x7f00000046c0)=@newtaction={0x48, 0x58, 0x284f, 0x0, 0x0, {}, [{0xe, 0x1, [@m_simple={0x30, 0x18, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x3}}}}]}]}, 0x48}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r0}, 0x10) r3 = socket$igmp(0x2, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) (async) r4 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000012c0), 0xffffffffffffffff) (async) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f00000012c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_DEAUTHENTICATE(r4, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000003c0)={0x24, r5, 0xfc5, 0x0, 0x0, {{0x11}, {@val={0x8}, @void}}, [@NL80211_ATTR_IE={0x8, 0x2a, [@perr={0x84, 0xffffffffffffff21}]}]}, 0x24}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000080000000001c000000000018110000", @ANYRES32=r6], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r7}, 0x18) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x2) (async) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x2) setsockopt$MRT_ADD_VIF(r3, 0x0, 0xca, &(0x7f0000001740)={0x0, 0x4, 0x0, 0x0, @vifc_lcl_ifindex, @loopback}, 0x10) (async) setsockopt$MRT_ADD_VIF(r3, 0x0, 0xca, &(0x7f0000001740)={0x0, 0x4, 0x0, 0x0, @vifc_lcl_ifindex, @loopback}, 0x10) setsockopt$MRT_FLUSH(r3, 0x0, 0xd4, &(0x7f0000000000)=0x9, 0x4) 3.770208126s ago: executing program 5 (id=6387): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, 0x0) unshare(0x62040200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCDELRT(r1, 0x890c, &(0x7f0000000080)={0x0, {}, {0x2, 0xfffd, @remote}, {0x2, 0x0, @empty}, 0xab852ebbeefbd6b1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x1}) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) ioctl$BTRFS_IOC_LOGICAL_INO(r0, 0xc0389424, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000200)='./bus\x00', 0x81440c, &(0x7f0000000680)={[{@test_dummy_encryption}, {@init_itable}, {@noload}]}, 0x3, 0x488, &(0x7f0000002000)="$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") rmdir(&(0x7f0000000400)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 3.243770498s ago: executing program 9 (id=6392): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300), 0xffffffffffffffff) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) sendmsg$TIPC_CMD_SHOW_LINK_STATS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x30, r1, 0x31, 0x70bd29, 0x25dfdbfe, {{}, {}, {0x14, 0x14, 'broadcast-link\x00'}}}, 0x30}, 0x1, 0x0, 0x0, 0x44044}, 0x8040) 3.180501773s ago: executing program 9 (id=6395): socket(0x400000000010, 0x3, 0x0) r0 = syz_open_dev$loop(&(0x7f0000000140), 0x75f, 0xa382) r1 = memfd_create(&(0x7f0000000880)='C\x13\xfc2\x95WD\xaa\xba^\x90\xfd\x8d\xc2\xb1[\x81\xda\xda\xd6\x8c\xc99\xec\x0e*||\xe4\xb3\xc4\xb6\v\xaa\x15\x86,\xac\x8d\x89cu\x10\xdc\x93\x9b\xb4\x93\xafE*:\xe4\xdd\xa5\xa75\xb8\x1e;7\xb7.V\xdcrw[\r\x98\x93j\x9c\xf6\xf8\x99\xefF_\xcd\xdf!b\xc5\xec\ntb\xff\b\xaaF?!\x9f\a\x1a\x03\f\xe94\x1deU\x06zS\xc90\xb9voI\xa5/\xb4\xa7@\xa1\\B\xc2@\r_b\x9a\xeb\b\x81\x00V\xd6/N\xc5\xc6f\xb1\x95Z\xe5w^\xd8\xe7J\x80\xf7\xae\xafuv\x84\x9eG\xd1\xe7\x9b\xf0_9\xc2\x9b\xfd\xc3\xf3\xe4\x95P\xf1m\xcf\xc2\xe1\xe6\xa6\x8c\x11\xfb\xb8S\x8b\x92\\\asW-Ee\x02\x00\x00\x00\xd0;Q\xc1~\x89\xec\xc8\x9b\x88\a\xf2\x93\x82(\x8b\x00\xd8\xb4T\x80\x95\x93\x9c5\xcf\t\x04\x00\x00\x00\x00\x00\x00v\xef\xee+\xab\x9c\x00^R\xb2n?i=\xbe\x16\x8a\xbf\xe3\xcdB\xed\xe14\xe8\xd0\xb7\xff\xfeQ\x1c\x85n8\x1b\xc1\b\x00\x00\x00\x00\x00\x00\x00\x17\x94\xdfW\x92z\xbe\xb2R)\xf1K\xd7\xaf\x99\xf6d\xe8\xec\xb7\xbd+T3\xa6\xa9\xfaY-1qs\x82\xefn*\x96\xc9\x1e\xf4\xd1\x02Dt\xc0\x19\xf7\x89\x96.D [F\xeeYW\x95\x13\xc7;\x94\x13^\x13\xaf\xf0C\x9c\xabf\x1daCS2\x02\xb0\xef\xc7\x8c\x9e\xed\a\n0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0700000004000000080200000100"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) syz_mount_image$ext4(&(0x7f0000000540)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x88, &(0x7f0000000a00)={[{@nogrpid}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@nombcache}, {@nomblk_io_submit}, {@quota}, {@test_dummy_encryption}]}, 0x3, 0x438, &(0x7f0000000580)="$eJzs289rHFUcAPDv7GZT01+Jpf5oWjVaxeCPpElr7cGLouBBQdBDPcYkLbHbRpoItgSNIvUoBe/iUfAv8KQXUU8Fr3oXoUgurZ5WZncm2d1sfnaTrd3PByb5vpm3vPfNzNt9My8bQNcaSn8kEfsj4veI6K8VGysM1X7dXlqY/GdpYTKJSuXtv5NqvVtLC5N51fx1+/JCT0Th8ySOtmh37srVCxPl8vTlrDw6f/GD0bkrV5+fuThxfvr89KXxM2dOnRx78fT4C23JM83r1uDHs8eOvP7u9Tcnz15/75fvkjz/pjzaZGi9g09VKm1urrMO1MVJTwc7wpYUa8M0StXx3x/FWDl5/fHaZx3tHLCjKpVK5cG1Dy9WgHtYEp3uAdAZ+Qd9ev+bb7s09bgr3Hy5dgOU5n0722pHeqKQ1Sk13d+201BEnF389+t0i515DgEA0OCHdP7zXKv5XyHqnwsdzNZQBiLi/og4FBGnI+JwRDwQUa37UEQ8vMX2mxdJVs9/Dm4rr81K538vZWtbjfO/fPYXA8WsdKCafyk5N1OePpH1bDhKe9Ly2Dpt/Pjqb1+2PJA1kc//0i1tP58LZpX+6tnT+LKpifmJO8m53s1PIwZ7WuWfLK8EJBFxJCIGt9nGzDPfHlvr2NCG+a+jDetMlW8inq6d/8Voyj+XrL8+OXpflKdPjOZXxWq/3rj21lrt31H+bZCe/70tr//l/AeS+vXaua23ce2PL9a8p9k4/9bXf2/yTsO+jybm5y+PRfQmb9Q6Xb9/vKne+Er9NP/h463H/6FY+UscjYj0In4kIh6NiMeyvj8eEU9ExPHVqd3ozYKfX3ny/WpQ2k7+OyvNf2pL538l6I3mPa2D4oWfvm9odGAr+afn/1Q1Gs72bOb9bzP92t7VDAAAAP8/hYjYH0lhZDkuFEZGav/Dfzj2Fsqzc/PPnpv98NJU7TsCA1Eq5E+6+uueh45lt/V5ebypfDJ7bvxVsa9aHpmcLU91OnnocvvWGP+pP4ud7h2w43xfC7qX8Q/dy/iH7mX8Q/dqMf77OtEPYPe1+vz/pAP9AHZf0/i37AddxP0/dC/jH7qX8Q9daa4vNv6SvECwKojCXdENwQ4FnX5nAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAaI//AgAA//9Lr+a0") 1.591482012s ago: executing program 2 (id=6406): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000020000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) openat(0xffffffffffffff9c, 0x0, 0x42, 0x1ff) link(&(0x7f0000000200)='./file1\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 1.546365625s ago: executing program 2 (id=6408): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000003000), r1) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000003040)={'batadv0\x00', 0x0}) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r4, &(0x7f00000000c0)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) r5 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f00000004c0)=0x1, 0x4) setsockopt$SO_TIMESTAMP(r4, 0x1, 0x40, &(0x7f0000000200)=0x4, 0x4) write$bt_hci(r4, &(0x7f0000000200)=ANY=[], 0x6) sendmsg$BATADV_CMD_TP_METER(r1, &(0x7f0000003140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002bbd7000fbdbdf25020000000a000900aaaaaaaaaa44000008000300", @ANYRES32=r3, @ANYBLOB='\b\x00\v'], 0x30}, 0x1, 0x0, 0x0, 0x20000050}, 0x20040084) 1.511221258s ago: executing program 2 (id=6410): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x7, 0x8, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone3(&(0x7f0000000280)={0x2004800, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x6}, &(0x7f0000000100)=""/228, 0xe4, &(0x7f0000000200)=""/6, &(0x7f0000000240)=[0x0], 0x1}, 0x58) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000340)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x8, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000200)=ANY=[@ANYBLOB="200000006800e97800000000000000000a0000000000000008000500", @ANYRES8=r3], 0x20}}, 0x0) sendmsg$nl_route(r4, &(0x7f0000004380)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="240000001800090400000000000000000a000000000000030000000008001e0001"], 0x24}}, 0x0) sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=@newlink={0x64, 0x10, 0x437, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x44, 0x12, 0x0, 0x1, @ip6erspan={{0xe}, {0x30, 0x2, 0x0, 0x1, [@IFLA_GRE_LOCAL={0x14, 0x6, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @IFLA_GRE_REMOTE={0x14, 0x7, @private2}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x64}}, 0x0) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000200)='qdisc_reset\x00'}, 0x10) r7 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=@newlink={0x28, 0x10, 0x1, 0x1, 0x0, {0x0, 0x0, 0x0, 0x0, 0x420}, [@IFLA_GROUP={0x8}]}, 0x28}}, 0x0) setsockopt$TIPC_MCAST_BROADCAST(r6, 0x10f, 0x85) mount$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB='mpol=interleave,mpol']) 1.459351062s ago: executing program 2 (id=6412): socket$kcm(0x10, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000180)={'syztnl1\x00', &(0x7f0000000040)={'syztnl0\x00', 0x0, 0x4, 0xd3, 0x0, 0x1, 0x20, @private2, @dev={0xfe, 0x80, '\x00', 0x3f}, 0x7, 0xc0, 0x2, 0x24f1b656}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYRES8=r1], 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, '\x00', r2, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) execveat(0xffffffffffffffff, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 1.372476189s ago: executing program 2 (id=6413): r0 = io_uring_setup(0x3720, &(0x7f0000000ac0)={0x0, 0x22e8, 0x40, 0x2, 0x3b7}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000080000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, &(0x7f0000000040)=[@ioring_restriction_sqe_flags_required={0x3, 0xb}, @ioring_restriction_sqe_flags_allowed={0x2, 0xe}], 0x4f) 1.287876236s ago: executing program 2 (id=6414): socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000600)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf9, 0xf9, 0x5, [@var={0xb, 0x0, 0x0, 0xe, 0x4}, @var={0xf, 0x0, 0x0, 0xe, 0x1}, @union={0xe, 0x4, 0x0, 0x5, 0x1, 0x9, [{0xc, 0x1, 0x3}, {0xa, 0x0, 0x100}, {0x2, 0x4, 0x2}, {0x10, 0x3, 0x4}]}, @datasec={0xb, 0x2, 0x0, 0xf, 0x1, [{0x4, 0x0, 0x7}, {0x1, 0xb, 0x7}], "eb"}, @union={0xc, 0x3, 0x0, 0x5, 0x0, 0x0, [{0x8, 0x2, 0x4}, {0x7, 0x5, 0xc0000}, {0x4, 0x2, 0x8}]}, @enum64={0x8, 0x4, 0x0, 0x13, 0x0, 0xa, [{0xa, 0x1, 0x31f4ee8a}, {0xe, 0x6, 0x7ff}, {0x6, 0x7, 0x7}, {0xa, 0xf12f, 0x100}]}, @volatile={0x3, 0x0, 0x0, 0x9, 0x5}]}, {0x0, [0x61, 0x0, 0x5f]}}, &(0x7f0000000880)=""/143, 0x119, 0x8f, 0x1, 0x2}, 0x28) syz_clone(0x20a00000, 0x0, 0x0, 0x0, 0x0, 0x0) accept(0xffffffffffffffff, 0x0, 0x0) socket$can_bcm(0x1d, 0x2, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x3, &(0x7f0000000000), 0xbc, 0x55a, &(0x7f0000000900)="$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") prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xf0667000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000740)=ANY=[@ANYBLOB="18050000000000000000009610000000b7080000000000007b8af8ff00000000b7080000080000007b8af0ff0000022752fe60d1398ec54d2d4e0000bfa100000000000007010000f8ffffffbfa400000000002707040000f0ffffffb70200000800000018230000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7040000080000008500000095000000"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r5}, 0x10) keyctl$session_to_parent(0x12) getsockopt(0xffffffffffffffff, 0x111, 0x4, 0x0, &(0x7f0000000080)) r6 = syz_usbip_server_init(0x3) syz_open_dev$tty20(0xc, 0x4, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_calipso(&(0x7f0000000ac0), r8) sendmsg$NLBL_CALIPSO_C_ADD(r8, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000340)=ANY=[@ANYBLOB="24cb8a28f224e23018", @ANYRESOCT=0x0, @ANYRES8=r6], 0x24}, 0x1, 0x0, 0x0, 0xc840}, 0x20020000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r7}, 0x10) 1.176551745s ago: executing program 4 (id=6416): r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0xb, 0x8, 0xc, 0xffffbfff, 0x1, 0x1}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x800001d, 0x0) recvmmsg(r0, &(0x7f0000000040), 0x291962b, 0x45833af92e4b39ff, 0x0) 1.036218047s ago: executing program 4 (id=6418): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001180)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000d00000000080000000850000006d00000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$kcm(0x10, 0x400000002, 0x0) write$cgroup_subtree(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="0007000042009103"], 0xfe33) recvmsg(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000140)=""/4125, 0x101d}], 0x1}, 0x40002022) r2 = openat(0xffffffffffffff9c, 0x0, 0x242, 0x0) io_uring_setup(0x3c90, &(0x7f0000000340)={0x0, 0xaee3, 0x7f, 0x3, 0x3eb, 0x0, r2}) sendmsg$AUDIT_TRIM(0xffffffffffffffff, 0x0, 0x4000890) r3 = socket$kcm(0x10, 0x2, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[], 0x0) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080), 0x0, 0x0, 0x0, 0x5865}, 0x0) 922.470886ms ago: executing program 4 (id=6419): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000300)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaabb080047ac1e00010a01010012009078000000020000000000000000000000d5527d92feadadbc10704e7e0df5b2e78d745147c01ae49cca302b1a9ee01730204fae0acf5f2b10c9d9f94842c8ff5d4d76f501fca2ec84ad3d0d752bddd478894c4951347b3b804339975e2816b4a70a58c529986c5e3eb78b8b532a35525bd3bb926de8c7be198260015ceb0fed0dbaf7a7a9e25330fab7bc3533ae38af09e5a6fc113416096a35d29aefb827b431d8599c0f0ba7a49b0043030e0265d41b7201519de197a4727fdd4c432e451aefdcde6dc8fdd89f"], 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x42, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) creat(&(0x7f00000000c0)='./file0\x00', 0xce) perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x1ff, 0xe3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa31b, 0x5}, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xfffffffd, 0x0, 0x9f4}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0xa) write$P9_RVERSION(0xffffffffffffffff, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065fffff53000000800395032303030"], 0x15) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, &(0x7f0000000300)=ANY=[], 0x15) r5 = dup(r4) write$P9_RLERRORu(r5, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r5, &(0x7f0000000340)=ANY=[], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000008082295"], &(0x7f00000002c0)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r6, 0x5, 0x1e9, 0x739, &(0x7f0000000000)="ff", 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe}, 0x48) 869.14219ms ago: executing program 8 (id=6420): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b00)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="300000003e000701fcfffffffddbdf25047c0000100036800c00020007009300000000000c0001"], 0x30}, 0x1, 0x0, 0x0, 0x488c0}, 0xc000) 662.037957ms ago: executing program 8 (id=6421): setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x2d0, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x100, 0x130, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x330) r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000000)={0x2, 0x0, @loopback}, 0x10) bind$inet(r0, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_TIMESTAMP(r0, 0x1, 0x40, &(0x7f00000000c0)=0x3, 0x4) sendto$inet(r0, 0x0, 0x0, 0x0, 0x0, 0x0) recvmmsg(r0, &(0x7f0000000d80), 0x36f, 0x20102, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000080)={{r2}, &(0x7f0000000000), &(0x7f0000000040)='%ps \x00'}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000006c0)='kmem_cache_free\x00', r3, 0x0, 0x2000}, 0x18) r4 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r4, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @local}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000340)=ANY=[@ANYBLOB="500000001000030500"/20, @ANYRES32, @ANYBLOB="15460100ef000000280012800b0001006d61637365630000180002800c0001004057000000000000050003"], 0x50}}, 0x0) 474.357612ms ago: executing program 4 (id=6422): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xb, &(0x7f0000000c80)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) shmget$private(0x0, 0x4000, 0x20, &(0x7f0000ffa000/0x4000)=nil) (fail_nth: 11) 352.019742ms ago: executing program 8 (id=6423): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e85"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x46) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r2}, 0x18) setrlimit(0x9, &(0x7f0000000000)) 195.635515ms ago: executing program 4 (id=6424): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{}, 0x0, &(0x7f0000000280)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = gettid() socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f0000b28000)=0x3) fcntl$setsig(r2, 0xa, 0x12) poll(&(0x7f0000b2c000)=[{r3}], 0x2c, 0xffffffffffbffff8) r4 = dup2(r2, r3) fcntl$setown(r4, 0x8, r1) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}) tkill(r1, 0x13) 168.305347ms ago: executing program 8 (id=6425): r0 = io_uring_setup(0x3720, &(0x7f0000000ac0)={0x0, 0x22e8, 0x40, 0x2, 0x3b7}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000080000000000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) io_uring_register$IORING_REGISTER_RESTRICTIONS(r0, 0xb, &(0x7f0000000040)=[@ioring_restriction_sqe_flags_required={0x3, 0xb}, @ioring_restriction_sqe_flags_allowed={0x2, 0xe}], 0x4f) 82.519504ms ago: executing program 8 (id=6426): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f00000005c0)={[{@lazytime}, {@nomblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@nombcache}, {@journal_dev={'journal_dev', 0x3d, 0x2}}, {@quota}]}, 0xff, 0x443, &(0x7f0000000940)="$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") r0 = bpf$MAP_CREATE(0x1900000000000000, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) r2 = socket(0x2a, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x5, '\x00', 0x0, @fallback=0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe2$9p(&(0x7f0000000000), 0x0) r3 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x800000001fe, 0x82) r4 = dup(r3) ioctl$USBDEVFS_CONTROL(r4, 0xc0185500, &(0x7f0000000080)={0x23, 0x3, 0x17, 0x20e0, 0x0, 0x0, 0x0}) getsockname$packet(r2, 0x0, &(0x7f0000000240)) socket$netlink(0x10, 0x3, 0x0) r5 = socket$inet(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r5, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) setsockopt$inet_opts(r5, 0x0, 0x4, 0x0, 0x0) 52.621076ms ago: executing program 4 (id=6427): r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCNOTTY(r0, 0x5422) ioctl$BTRFS_IOC_RM_DEV(r0, 0x5000940b, &(0x7f0000000000)={{r0}, "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"}) r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000001000), 0x0, 0x0) getsockopt$CAN_RAW_JOIN_FILTERS(r1, 0x65, 0x6, &(0x7f0000001040), &(0x7f0000001080)=0x4) ioctl$TCSETS2(r0, 0x402c542b, &(0x7f00000010c0)={0x0, 0xf, 0x66, 0xa1, 0xe, "49194b5f237bd26c5858bc44a690193fb41fff", 0x7, 0x8}) close(r1) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000001500)={0x2, 0x0, 0x6, 0x13, 0x16f, &(0x7f0000001100)="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"}) semop(0x0, &(0x7f0000001540)=[{0x0, 0x5956, 0x800}, {0x1, 0x400, 0x1000}, {0x4, 0x5, 0x1800}, {0x0, 0x6, 0x1000}, {0x3, 0x0, 0x800}, {0x3, 0xb, 0x800}, {0x1, 0x1ff, 0x2c00}], 0x7) getsockopt$inet6_mreq(r1, 0x29, 0x14, &(0x7f0000001740)={@mcast2, 0x0}, &(0x7f0000001780)=0x14) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000001800)={0x6, 0x0}, 0x8) r4 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000001ac0)=@bpf_lsm={0x1d, 0xa, &(0x7f0000001840)=@raw=[@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3f}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @alu={0x7, 0x1, 0xd, 0xa, 0x9, 0x18, 0x1}], &(0x7f00000018c0)='syzkaller\x00', 0x6, 0x84, &(0x7f0000001900)=""/132, 0x40f00, 0x24, '\x00', 0x0, 0x1b, r1, 0x8, &(0x7f00000019c0)={0x9, 0x5}, 0x8, 0x10, &(0x7f0000001a00)={0x1, 0x2, 0xc4, 0x7a2cdd16}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000001a40)=[r1, r1], &(0x7f0000001a80)=[{0x3, 0x3, 0x6, 0x6}, {0x5, 0x3, 0xf, 0x6}], 0x10, 0x3}, 0x94) r5 = bpf$OBJ_GET_MAP(0x7, &(0x7f0000001bc0)=@o_path={&(0x7f0000001b80)='./file0\x00', 0x0, 0x0, r1}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001cc0)={0x20, 0x18, &(0x7f0000001580)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [@cb_func={0x18, 0x9, 0x4, 0x0, 0x4}, @ldst={0x1, 0x0, 0x1, 0x2, 0x4, 0x100, 0xfffffffffffffffc}, @jmp={0x5, 0x0, 0x6, 0x5, 0x4, 0x2, 0x4}, @cb_func={0x18, 0x6, 0x4, 0x0, 0x6}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x2}, @initr0={0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x59}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001640)='GPL\x00', 0x8, 0x82, &(0x7f0000001680)=""/130, 0x41000, 0x58, '\x00', r2, @netfilter, 0xffffffffffffffff, 0x8, &(0x7f00000017c0)={0x2, 0x3}, 0x8, 0x10, 0x0, 0x0, r3, r4, 0x5, &(0x7f0000001c00)=[r5, r1, r1, r1, r1], &(0x7f0000001c40)=[{0x0, 0x5, 0x8, 0x5}, {0x5, 0x3, 0x10, 0x3}, {0x1, 0x3, 0xa, 0x5}, {0x4, 0x4, 0xd, 0xc}, {0x4, 0x2, 0x0, 0x6}], 0x10, 0xf}, 0x94) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001dc0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_SET(r4, &(0x7f0000001ec0)={&(0x7f0000001d80)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000001e80)={&(0x7f0000001e00)={0x4c, r7, 0x10, 0x70bd29, 0x25dfdbfe, {}, [@ETHTOOL_A_LINKINFO_HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_LINKINFO_TP_MDIX_CTRL={0x5, 0x5, 0x2}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040001}, 0x48000) ioctl$VT_DISALLOCATE(r0, 0x5608) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001f40)={&(0x7f0000001f00)='siox_get_data\x00', r1, 0x0, 0x47d}, 0x18) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000001f80)) ioctl$PPPIOCSACTIVE(r1, 0x40107446, &(0x7f0000002000)={0x1, &(0x7f0000001fc0)=[{0x8f, 0x8, 0x7, 0x5}]}) eventfd(0x1) setsockopt$inet_tcp_TLS_TX(r1, 0x6, 0x1, &(0x7f0000002040)=@gcm_128={{0x303}, "e00093e1d3d14803", "182852acec40e62cf6db1e436403b68b", "9ad8c826", "d04eb50448260086"}, 0x28) ioctl$TIOCGSID(r0, 0x5429, &(0x7f0000002080)) ioctl$TUNSETVNETHDRSZ(r1, 0x400454d8, &(0x7f00000020c0)=0x9) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f00000021c0)={&(0x7f0000002100)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000002180)={&(0x7f0000002140)={0x2c, 0x0, 0x400, 0x70bd28, 0x25dfdbfe, {}, [@BATADV_ATTR_FRAGMENTATION_ENABLED={0x5, 0x30, 0x1}, @BATADV_ATTR_BONDING_ENABLED={0x5, 0x2d, 0x1}, @BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x4}]}, 0x2c}, 0x1, 0x0, 0x0, 0x10}, 0x10000) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r6, 0x84009422, &(0x7f0000002200)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}}) ioctl$BTRFS_IOC_DEV_INFO(r6, 0xd000941e, &(0x7f0000002600)={r8, "7860458d3136aa85916c1a2438902001"}) syz_genetlink_get_family_id$tipc2(&(0x7f0000003600), r0) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_KEY(r1, 0x84, 0x17, &(0x7f00000036c0)={0x0, 0x7, 0xd7, "a856499ee97b7d0c4c8304b998b2232fc64146ac011d5b70c4389fec8a7f28f5ce1b8f8a339172991e8db8f8e5dc923df8a85f2d152c94c24429dbaf1228a6010b8a31e09e9d8c3ba6e1577f1f9914c1173152790a5ee03f41108d8a661e5f3212f65d77c0259e63edec89fcd9b82d854c6d0fc4941bc59b73f75ab816c71a4202d5f8dc91560dedcaa838e7725db04ad036e711a11643e59f1715cfd2f67b63eca267042903d6676070dd0140c788edc7b154803f973e15615912c788b80385544a28e72207481d39ffbedd9fb633f5d60573bbfd49f1"}, 0xdf) 0s ago: executing program 8 (id=6428): getsockopt$bt_hci(0xffffffffffffffff, 0x84, 0x7f, 0x0, &(0x7f0000001180)=0x24) connect$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x4e22, 0x89, @local, 0x5}, 0x1c) syz_open_dev$vcsu(&(0x7f0000000000), 0x4, 0x10001) syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x50, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x38}, 0x94) r0 = gettid() bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[], 0x48) mmap$qrtrtun(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x100010, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000057"], 0x0, 0x18, 0x0, 0x0, 0x0, 0x51, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xa, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b000000070000000200000022bf000001"], 0x50) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="4c050000020601080000000000000000000000240500000002000000050005000200000005000400000000000900020073797a310000000011000300686173683a69702c6d61726b00000000807ca87ac811d75d"], 0x4c}}, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000000040000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000440)='kfree\x00', r7, 0x0, 0x5}, 0x18) r8 = socket$rds(0x15, 0x5, 0x0) bind$rds(r8, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$IPSET_CMD_ADD(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x48, 0x9, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0xffff}, [@IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0x2}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x2}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x40c0080) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000300), &(0x7f0000000400), 0x401, r3, 0x0, 0xa002a0}, 0x38) bpf$MAP_LOOKUP_BATCH(0x18, &(0x7f0000000300)={0x0, &(0x7f0000000140)=""/184, &(0x7f0000000200), &(0x7f0000001540), 0x1, r3}, 0x38) timer_create(0x1, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r9, 0x0, r11, 0x0, 0x7, 0x9) write$P9_RWRITE(r10, &(0x7f0000000100)={0xb, 0x77, 0x87, 0xfff}, 0xb) kernel console output (not intermixed with test programs): sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a4cfbeb69 code=0x7ffc0000 [ 393.703085][ T29] audit: type=1326 audit(1754325843.031:23720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18607 comm="syz.4.4952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f7a4cfbeb69 code=0x7ffc0000 [ 393.726682][ T29] audit: type=1326 audit(1754325843.031:23721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18607 comm="syz.4.4952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a4cfbeb69 code=0x7ffc0000 [ 393.750313][ T29] audit: type=1326 audit(1754325843.031:23722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18607 comm="syz.4.4952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=5 compat=0 ip=0x7f7a4cfbeb69 code=0x7ffc0000 [ 393.773905][ T29] audit: type=1326 audit(1754325843.031:23723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18607 comm="syz.4.4952" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a4cfbeb69 code=0x7ffc0000 [ 393.797548][ T29] audit: type=1326 audit(1754325843.031:23724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18575 comm="syz.5.4939" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fc14b405b27 code=0x7ffc0000 [ 393.806610][T18625] netlink: 16 bytes leftover after parsing attributes in process `syz.8.4959'. [ 393.821120][ T29] audit: type=1326 audit(1754325843.031:23725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18575 comm="syz.5.4939" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fc14b3aad69 code=0x7ffc0000 [ 394.073206][T18652] netlink: 'syz.4.4970': attribute type 1 has an invalid length. [ 394.326237][T18682] netlink: 'syz.2.4984': attribute type 27 has an invalid length. [ 394.363797][T18686] netlink: 'syz.2.4986': attribute type 10 has an invalid length. [ 394.371903][T18686] dummy0: entered promiscuous mode [ 394.465137][T18698] netlink: 'syz.5.4990': attribute type 10 has an invalid length. [ 394.492896][T18697] netlink: 'syz.5.4990': attribute type 10 has an invalid length. [ 394.505121][T18698] ipvlan0: entered allmulticast mode [ 394.510636][T18698] veth0_vlan: entered allmulticast mode [ 394.516804][T18698] team0: Device ipvlan0 failed to register rx_handler [ 394.525625][T18697] team0: Device ipvlan0 failed to register rx_handler [ 394.749875][T18710] bridge0: port 1(macsec1) entered blocking state [ 394.756381][T18710] bridge0: port 1(macsec1) entered disabled state [ 394.810356][T18710] macsec1: entered allmulticast mode [ 394.815720][T18710] bridge0: entered allmulticast mode [ 394.854584][T18710] macsec1: left allmulticast mode [ 394.859716][T18710] bridge0: left allmulticast mode [ 395.241899][T18738] Invalid ELF header len 1 [ 395.259411][T18740] ipvlan0: left allmulticast mode [ 395.264492][T18740] veth0_vlan: left allmulticast mode [ 395.384420][T18746] macvtap7: entered allmulticast mode [ 395.389923][T18746] veth0_macvtap: entered allmulticast mode [ 395.400610][T18755] netlink: 'syz.9.5008': attribute type 7 has an invalid length. [ 395.414353][T18756] A link change request failed with some changes committed already. Interface geneve1 may have been left with an inconsistent configuration, please check. [ 395.637433][T18770] dummy0: left promiscuous mode [ 396.149150][T18799] veth0_macvtap: left allmulticast mode [ 396.155195][T18799] macvtap7: left allmulticast mode [ 396.215618][T18805] Invalid ELF header len 1 [ 396.436641][T18818] macvtap4: entered allmulticast mode [ 396.442314][T18818] veth0_macvtap: entered allmulticast mode [ 397.057127][T18856] bridge0: port 1(macsec1) entered blocking state [ 397.063766][T18856] bridge0: port 1(macsec1) entered disabled state [ 397.094717][T18856] macsec1: entered allmulticast mode [ 397.100147][T18856] bridge0: entered allmulticast mode [ 397.114900][T18856] macsec1: left allmulticast mode [ 397.120033][T18856] bridge0: left allmulticast mode [ 397.347303][T18874] __nla_validate_parse: 12 callbacks suppressed [ 397.347325][T18874] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5059'. [ 397.917679][T18903] validate_nla: 1 callbacks suppressed [ 397.917692][T18903] netlink: 'syz.8.5070': attribute type 7 has an invalid length. [ 397.931042][T18903] netlink: 8 bytes leftover after parsing attributes in process `syz.8.5070'. [ 397.995594][T18905] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5071'. [ 398.061227][T18912] netlink: 830 bytes leftover after parsing attributes in process `syz.4.5074'. [ 398.071263][T18914] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5075'. [ 398.526518][T18940] netlink: 830 bytes leftover after parsing attributes in process `syz.2.5086'. [ 398.637593][ T29] kauditd_printk_skb: 501 callbacks suppressed [ 398.637612][ T29] audit: type=1326 audit(1754325848.061:24227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18949 comm="syz.5.5091" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 398.667921][ T29] audit: type=1326 audit(1754325848.061:24228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18949 comm="syz.5.5091" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 398.691980][ T29] audit: type=1326 audit(1754325848.101:24229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18949 comm="syz.5.5091" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 398.715813][ T29] audit: type=1326 audit(1754325848.101:24230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18949 comm="syz.5.5091" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 398.739695][ T29] audit: type=1326 audit(1754325848.101:24231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18949 comm="syz.5.5091" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 398.763516][ T29] audit: type=1326 audit(1754325848.101:24232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18949 comm="syz.5.5091" exe="/root/syz-executor" sig=0 arch=c000003e syscall=328 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 398.787141][ T29] audit: type=1326 audit(1754325848.101:24233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18949 comm="syz.5.5091" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 398.811031][ T29] audit: type=1326 audit(1754325848.101:24234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18949 comm="syz.5.5091" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 398.834765][ T29] audit: type=1326 audit(1754325848.101:24235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18949 comm="syz.5.5091" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 398.858468][ T29] audit: type=1326 audit(1754325848.101:24236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18949 comm="syz.5.5091" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 399.104681][T18963] netlink: 830 bytes leftover after parsing attributes in process `syz.8.5097'. [ 399.135413][T18966] macvtap13: entered allmulticast mode [ 399.140981][T18966] veth0_macvtap: entered allmulticast mode [ 399.224329][T18976] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5101'. [ 399.313049][T18986] netlink: 'syz.2.5104': attribute type 7 has an invalid length. [ 399.320912][T18986] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5104'. [ 399.476934][T18994] wg2: entered promiscuous mode [ 399.481964][T18994] wg2: entered allmulticast mode [ 399.743918][T19002] macvtap10: entered allmulticast mode [ 399.749550][T19002] veth0_macvtap: entered allmulticast mode [ 400.118728][T19015] netlink: 24 bytes leftover after parsing attributes in process `syz.2.5115'. [ 400.374286][T19022] infiniband syz!: set down [ 400.378930][T19022] infiniband syz!: added team_slave_0 [ 400.391329][T19022] RDS/IB: syz!: added [ 400.395473][T19022] smc: adding ib device syz! with port count 1 [ 400.402200][T19022] smc: ib device syz! port 1 has pnetid [ 400.750712][T19036] macvtap9: entered allmulticast mode [ 400.756159][T19036] veth0_macvtap: entered allmulticast mode [ 402.267135][T19078] lo speed is unknown, defaulting to 1000 [ 402.382671][T19079] lo speed is unknown, defaulting to 1000 [ 402.710650][T19082] __nla_validate_parse: 4 callbacks suppressed [ 402.710711][T19082] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5137'. [ 402.923500][T19093] netlink: 148 bytes leftover after parsing attributes in process `syz.5.5139'. [ 403.094604][T19107] syz!: rxe_newlink: already configured on team_slave_0 [ 403.126856][T19113] netlink: 738 bytes leftover after parsing attributes in process `syz.5.5148'. [ 403.647697][ T29] kauditd_printk_skb: 235 callbacks suppressed [ 403.647715][ T29] audit: type=1326 audit(1754325853.071:24472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19140 comm="syz.9.5160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 403.677636][ T29] audit: type=1326 audit(1754325853.071:24473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19140 comm="syz.9.5160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 403.799843][ T29] audit: type=1326 audit(1754325853.111:24474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19130 comm="syz.2.5156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fae1b9ceb69 code=0x7ffc0000 [ 403.823769][ T29] audit: type=1326 audit(1754325853.111:24475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19130 comm="syz.2.5156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fae1b9ceb69 code=0x7ffc0000 [ 403.847422][ T29] audit: type=1326 audit(1754325853.111:24476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19130 comm="syz.2.5156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fae1b9ceb69 code=0x7ffc0000 [ 403.871186][ T29] audit: type=1326 audit(1754325853.111:24477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19130 comm="syz.2.5156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fae1b9ceb69 code=0x7ffc0000 [ 403.894801][ T29] audit: type=1326 audit(1754325853.111:24478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19130 comm="syz.2.5156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fae1b9ceb69 code=0x7ffc0000 [ 403.918493][ T29] audit: type=1326 audit(1754325853.111:24479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19130 comm="syz.2.5156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fae1b9ceb69 code=0x7ffc0000 [ 403.942173][ T29] audit: type=1326 audit(1754325853.111:24480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19130 comm="syz.2.5156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fae1b9ceb69 code=0x7ffc0000 [ 403.965956][ T29] audit: type=1326 audit(1754325853.111:24481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19130 comm="syz.2.5156" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fae1b9ceba3 code=0x7ffc0000 [ 404.148224][T19167] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5165'. [ 404.571178][T19186] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 404.663354][T19194] netlink: 28 bytes leftover after parsing attributes in process `syz.5.5179'. [ 404.730650][T19200] netlink: 196 bytes leftover after parsing attributes in process `syz.8.5182'. [ 404.770956][T19203] netlink: 'syz.5.5181': attribute type 13 has an invalid length. [ 404.778842][T19203] netlink: 'syz.5.5181': attribute type 17 has an invalid length. [ 404.866971][T19203] 8021q: adding VLAN 0 to HW filter on device bond0 [ 404.891424][T19203] 8021q: adding VLAN 0 to HW filter on device team0 [ 404.914019][T19203] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 404.938234][ T3409] lo speed is unknown, defaulting to 1000 [ 404.944072][ T3409] syz0: Port: 1 Link ACTIVE [ 405.019014][T19210] veth0_macvtap: left allmulticast mode [ 405.039608][T19210] macvtap10: left allmulticast mode [ 405.249205][T19224] netlink: 28 bytes leftover after parsing attributes in process `syz.5.5191'. [ 405.516189][T19233] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5195'. [ 405.525172][T19233] netlink: 16 bytes leftover after parsing attributes in process `syz.4.5195'. [ 405.572699][T19233] bridge0: entered promiscuous mode [ 406.166404][T19262] bridge0: entered promiscuous mode [ 406.185585][T19262] bridge0: port 1(macsec1) entered blocking state [ 406.192139][T19262] bridge0: port 1(macsec1) entered disabled state [ 406.200513][T19262] macsec1: entered allmulticast mode [ 406.206056][T19262] bridge0: entered allmulticast mode [ 406.212806][T19262] macsec1: left allmulticast mode [ 406.217967][T19262] bridge0: left allmulticast mode [ 406.238648][T19262] bridge0: left promiscuous mode [ 406.409957][T19274] netlink: 196 bytes leftover after parsing attributes in process `syz.5.5212'. [ 406.512587][T19283] wg2: left promiscuous mode [ 406.517365][T19283] wg2: left allmulticast mode [ 406.559174][ T10] lo speed is unknown, defaulting to 1000 [ 406.564943][ T10] syz0: Port: 1 Link DOWN [ 406.865545][T19301] bridge0: port 1(macsec1) entered blocking state [ 406.872200][T19301] bridge0: port 1(macsec1) entered disabled state [ 406.887252][T19301] macsec1: entered allmulticast mode [ 406.892758][T19301] bridge0: entered allmulticast mode [ 406.909479][T19301] macsec1: left allmulticast mode [ 406.914613][T19301] bridge0: left allmulticast mode [ 407.049089][T19313] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 407.076393][T19319] veth0_macvtap: left allmulticast mode [ 407.082284][T19319] macvtap13: left allmulticast mode [ 407.269267][T19346] x_tables: ip_tables: recent.0 match: invalid size 216 (kernel) != (user) 4096 [ 407.279773][T19341] syz!: rxe_newlink: already configured on team_slave_0 [ 407.345790][T19349] veth0_macvtap: left allmulticast mode [ 407.370911][T19349] macvtap4: left allmulticast mode [ 408.423616][T19422] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 408.461160][T19426] bridge0: port 1(macsec1) entered blocking state [ 408.467693][T19426] bridge0: port 1(macsec1) entered disabled state [ 408.474763][T19426] macsec1: entered allmulticast mode [ 408.480180][T19426] bridge0: entered allmulticast mode [ 408.486202][T19426] macsec1: left allmulticast mode [ 408.491535][T19426] bridge0: left allmulticast mode [ 408.643047][T19437] veth0_macvtap: left allmulticast mode [ 408.649049][T19437] macvtap9: left allmulticast mode [ 408.838150][T19446] __nla_validate_parse: 7 callbacks suppressed [ 408.838170][T19446] netlink: 28 bytes leftover after parsing attributes in process `syz.4.5279'. [ 408.887677][T19443] netlink: 4 bytes leftover after parsing attributes in process `syz.8.5278'. [ 409.608357][ T29] kauditd_printk_skb: 522 callbacks suppressed [ 409.608376][ T29] audit: type=1326 audit(1754325858.941:25004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19461 comm="syz.9.5283" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 409.638576][ T29] audit: type=1326 audit(1754325858.941:25005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19461 comm="syz.9.5283" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 409.662309][ T29] audit: type=1326 audit(1754325858.951:25006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19461 comm="syz.9.5283" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 409.686049][ T29] audit: type=1326 audit(1754325858.951:25007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19461 comm="syz.9.5283" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 409.709734][ T29] audit: type=1326 audit(1754325858.951:25008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19461 comm="syz.9.5283" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 409.733404][ T29] audit: type=1326 audit(1754325858.951:25009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19461 comm="syz.9.5283" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 409.735046][T19462] netlink: 96 bytes leftover after parsing attributes in process `syz.9.5283'. [ 409.757052][ T29] audit: type=1326 audit(1754325858.951:25010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19461 comm="syz.9.5283" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 409.789696][ T29] audit: type=1326 audit(1754325858.951:25011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19461 comm="syz.9.5283" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 409.813733][ T29] audit: type=1326 audit(1754325858.951:25012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19461 comm="syz.9.5283" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 409.814304][T19465] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5284'. [ 409.837332][ T29] audit: type=1326 audit(1754325858.951:25013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19461 comm="syz.9.5283" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 410.157089][T19485] hsr_slave_0: left promiscuous mode [ 410.174202][T19485] hsr_slave_1: left promiscuous mode [ 410.260616][T19488] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 410.311420][T19496] netlink: 'syz.5.5297': attribute type 12 has an invalid length. [ 410.339914][T19498] netlink: 56 bytes leftover after parsing attributes in process `syz.5.5298'. [ 410.476238][T19511] hsr_slave_0: left promiscuous mode [ 410.482406][T19511] hsr_slave_1: left promiscuous mode [ 410.499165][T19514] netlink: 44 bytes leftover after parsing attributes in process `syz.4.5305'. [ 410.662298][T19519] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 410.780743][T19531] netlink: 8 bytes leftover after parsing attributes in process `syz.8.5312'. [ 410.811310][T19538] netlink: 56 bytes leftover after parsing attributes in process `syz.4.5313'. [ 411.022258][T19551] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 411.143993][T19578] hsr_slave_0: left promiscuous mode [ 411.151039][T19578] hsr_slave_1: left promiscuous mode [ 411.344368][T19587] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 411.455036][T19602] netlink: 738 bytes leftover after parsing attributes in process `syz.4.5339'. [ 411.472469][T19606] netlink: 92 bytes leftover after parsing attributes in process `syz.9.5341'. [ 411.486173][T19610] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=258 sclass=netlink_route_socket pid=19610 comm=syz.8.5342 [ 412.044841][T19653] bridge0: port 1(macsec1) entered blocking state [ 412.051670][T19653] bridge0: port 1(macsec1) entered disabled state [ 412.068224][T19653] macsec1: entered allmulticast mode [ 412.073670][T19653] bridge0: entered allmulticast mode [ 412.079692][T19653] macsec1: left allmulticast mode [ 412.084810][T19653] bridge0: left allmulticast mode [ 412.235856][T19667] netlink: 'syz.4.5364': attribute type 7 has an invalid length. [ 412.571105][T19686] macvtap11: entered allmulticast mode [ 412.576624][T19686] veth0_macvtap: entered allmulticast mode [ 412.618495][T19691] bridge0: port 1(macsec1) entered blocking state [ 412.624992][T19691] bridge0: port 1(macsec1) entered disabled state [ 412.665334][T19701] netlink: 'syz.8.5376': attribute type 7 has an invalid length. [ 412.685329][T19691] macsec1: entered allmulticast mode [ 412.690856][T19691] bridge0: entered allmulticast mode [ 412.717155][T19691] macsec1: left allmulticast mode [ 412.722366][T19691] bridge0: left allmulticast mode [ 413.001634][T19733] netlink: 'syz.9.5389': attribute type 7 has an invalid length. [ 413.067748][T19737] bridge0: port 1(macsec1) entered blocking state [ 413.074493][T19737] bridge0: port 1(macsec1) entered disabled state [ 413.086655][T19737] macsec1: entered allmulticast mode [ 413.092066][T19737] bridge0: entered allmulticast mode [ 413.149888][T19737] macsec1: left allmulticast mode [ 413.155127][T19737] bridge0: left allmulticast mode [ 413.431028][T19772] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 413.553600][T19786] bridge0: port 1(macsec1) entered blocking state [ 413.560262][T19786] bridge0: port 1(macsec1) entered disabled state [ 413.567050][T19786] macsec1: entered allmulticast mode [ 413.572461][T19786] bridge0: entered allmulticast mode [ 413.580509][T19786] macsec1: left allmulticast mode [ 413.585592][T19786] bridge0: left allmulticast mode [ 413.674170][T19793] macvtap10: entered allmulticast mode [ 413.679743][T19793] veth0_macvtap: entered allmulticast mode [ 413.744964][T19804] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 413.865080][T19819] tmpfs: Bad value for 'mpol' [ 413.950960][T19827] __nla_validate_parse: 18 callbacks suppressed [ 413.950977][T19827] netlink: 738 bytes leftover after parsing attributes in process `syz.8.5426'. [ 414.011090][T19832] bridge0: port 1(macsec1) entered blocking state [ 414.018063][T19832] bridge0: port 1(macsec1) entered disabled state [ 414.049668][T19832] macsec1: entered allmulticast mode [ 414.055024][T19832] bridge0: entered allmulticast mode [ 414.089202][T19832] macsec1: left allmulticast mode [ 414.094306][T19832] bridge0: left allmulticast mode [ 414.586356][T19871] netlink: 96 bytes leftover after parsing attributes in process `syz.2.5441'. [ 414.889798][T19889] netlink: 8 bytes leftover after parsing attributes in process `syz.9.5447'. [ 414.898959][T19889] netlink: 8 bytes leftover after parsing attributes in process `syz.9.5447'. [ 414.949913][T19891] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 415.095638][ T29] kauditd_printk_skb: 794 callbacks suppressed [ 415.095657][ T29] audit: type=1326 audit(1754325864.521:25808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19852 comm="syz.8.5434" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 415.125685][ T29] audit: type=1326 audit(1754325864.521:25809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19852 comm="syz.8.5434" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 415.303316][T19909] netlink: 16 bytes leftover after parsing attributes in process `syz.8.5453'. [ 415.312383][T19909] netlink: 8 bytes leftover after parsing attributes in process `syz.8.5453'. [ 415.337978][T19911] netlink: 'syz.4.5454': attribute type 7 has an invalid length. [ 415.345887][T19911] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5454'. [ 415.439804][T19922] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5458'. [ 415.448912][T19922] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5458'. [ 415.490898][T19924] bridge0: left promiscuous mode [ 415.497375][T19924] veth0_macvtap: left allmulticast mode [ 415.504227][T19924] macvtap11: left allmulticast mode [ 415.586066][ T29] audit: type=1326 audit(1754325865.011:25810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19935 comm="syz.4.5467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a4cfbeb69 code=0x7ffc0000 [ 415.610121][ T29] audit: type=1326 audit(1754325865.011:25811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19935 comm="syz.4.5467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a4cfbeb69 code=0x7ffc0000 [ 415.658505][T19940] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5468'. [ 415.668862][ T29] audit: type=1326 audit(1754325865.071:25812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19935 comm="syz.4.5467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7a4cfbeb69 code=0x7ffc0000 [ 415.692599][ T29] audit: type=1326 audit(1754325865.071:25813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19935 comm="syz.4.5467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a4cfbeb69 code=0x7ffc0000 [ 415.716396][ T29] audit: type=1326 audit(1754325865.071:25814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19935 comm="syz.4.5467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7a4cfbeb69 code=0x7ffc0000 [ 415.740155][ T29] audit: type=1326 audit(1754325865.071:25815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19935 comm="syz.4.5467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a4cfbeb69 code=0x7ffc0000 [ 415.764171][ T29] audit: type=1326 audit(1754325865.071:25816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19935 comm="syz.4.5467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7a4cfbeb69 code=0x7ffc0000 [ 415.787882][ T29] audit: type=1326 audit(1754325865.071:25817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19935 comm="syz.4.5467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7a4cfbeb69 code=0x7ffc0000 [ 415.972561][T19959] bridge0: port 1(macsec1) entered blocking state [ 415.979357][T19959] bridge0: port 1(macsec1) entered disabled state [ 415.987278][T19959] macsec1: entered allmulticast mode [ 415.992741][T19959] bridge0: entered allmulticast mode [ 416.006195][T19959] macsec1: left allmulticast mode [ 416.011328][T19959] bridge0: left allmulticast mode [ 416.457437][T19993] netlink: 'syz.5.5488': attribute type 7 has an invalid length. [ 416.548653][T20000] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 416.712786][T20023] tipc: Enabling of bearer rejected, failed to enable media [ 416.828891][T20035] netlink: 'syz.2.5504': attribute type 7 has an invalid length. [ 416.921728][T20043] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 417.035170][T20063] netlink: 'syz.9.5517': attribute type 7 has an invalid length. [ 417.287013][T20092] netlink: 'syz.2.5529': attribute type 7 has an invalid length. [ 417.631761][T20118] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 418.117209][T20160] bridge0: port 1(macsec1) entered blocking state [ 418.124426][T20160] bridge0: port 1(macsec1) entered disabled state [ 418.133264][T20160] macsec1: entered allmulticast mode [ 418.138701][T20160] bridge0: entered allmulticast mode [ 418.145341][T20160] macsec1: left allmulticast mode [ 418.150563][T20160] bridge0: left allmulticast mode [ 418.160614][T20162] netlink: 'syz.4.5553': attribute type 1 has an invalid length. [ 418.204790][T20170] 9pnet_fd: Insufficient options for proto=fd [ 418.707840][T20226] macvtap11: entered allmulticast mode [ 419.353548][T20270] __nla_validate_parse: 24 callbacks suppressed [ 419.353569][T20270] netlink: 40 bytes leftover after parsing attributes in process `syz.9.5597'. [ 419.463175][T20276] netlink: 830 bytes leftover after parsing attributes in process `syz.8.5598'. [ 419.562682][T20283] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5602'. [ 419.855545][T20311] netlink: 96 bytes leftover after parsing attributes in process `syz.5.5614'. [ 420.109479][ T29] kauditd_printk_skb: 636 callbacks suppressed [ 420.109496][ T29] audit: type=1326 audit(1754325869.541:26454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20328 comm="syz.5.5622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 420.139490][ T29] audit: type=1326 audit(1754325869.571:26455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20328 comm="syz.5.5622" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 420.253710][T20343] macvtap10: left allmulticast mode [ 420.262426][T20343] veth0_macvtap: left allmulticast mode [ 420.273719][ T29] audit: type=1326 audit(1754325869.701:26456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20345 comm="syz.5.5629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 420.274576][T20343] macvtap11: left allmulticast mode [ 420.297399][ T29] audit: type=1326 audit(1754325869.701:26457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20345 comm="syz.5.5629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 420.297444][ T29] audit: type=1326 audit(1754325869.701:26458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20345 comm="syz.5.5629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 420.349988][ T29] audit: type=1326 audit(1754325869.701:26459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20345 comm="syz.5.5629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 420.373624][ T29] audit: type=1326 audit(1754325869.701:26460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20345 comm="syz.5.5629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 420.397246][ T29] audit: type=1326 audit(1754325869.701:26461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20345 comm="syz.5.5629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 420.415023][T20346] netlink: 96 bytes leftover after parsing attributes in process `syz.5.5629'. [ 420.420883][ T29] audit: type=1326 audit(1754325869.701:26462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20345 comm="syz.5.5629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 420.453699][ T29] audit: type=1326 audit(1754325869.701:26463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20345 comm="syz.5.5629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc14b40eb69 code=0x7ffc0000 [ 420.982531][T20337] syz.9.5625 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=0 [ 420.996464][T20337] CPU: 1 UID: 0 PID: 20337 Comm: syz.9.5625 Not tainted 6.16.0-syzkaller-11489-gd2eedaa3909b #0 PREEMPT(voluntary) [ 420.996622][T20337] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 420.996639][T20337] Call Trace: [ 420.996646][T20337] [ 420.996654][T20337] __dump_stack+0x1d/0x30 [ 420.996676][T20337] dump_stack_lvl+0xe8/0x140 [ 420.996696][T20337] dump_stack+0x15/0x1b [ 420.996740][T20337] dump_header+0x81/0x220 [ 420.996797][T20337] oom_kill_process+0x342/0x400 [ 420.996840][T20337] out_of_memory+0x979/0xb80 [ 420.996884][T20337] try_charge_memcg+0x5e6/0x9e0 [ 420.996992][T20337] obj_cgroup_charge_pages+0xa6/0x150 [ 420.997040][T20337] __memcg_kmem_charge_page+0x9f/0x170 [ 420.997085][T20337] __alloc_frozen_pages_noprof+0x188/0x360 [ 420.997228][T20337] alloc_pages_mpol+0xb3/0x250 [ 420.997270][T20337] alloc_pages_noprof+0x90/0x130 [ 420.997399][T20337] __vmalloc_node_range_noprof+0x6f2/0xe00 [ 420.997460][T20337] __kvmalloc_node_noprof+0x30f/0x4e0 [ 420.997495][T20337] ? ip_set_alloc+0x1f/0x30 [ 420.997549][T20337] ? ip_set_alloc+0x1f/0x30 [ 420.997577][T20337] ? __kmalloc_cache_noprof+0x189/0x320 [ 420.997609][T20337] ip_set_alloc+0x1f/0x30 [ 420.997678][T20337] hash_netiface_create+0x282/0x740 [ 420.997716][T20337] ? __pfx_hash_netiface_create+0x10/0x10 [ 420.997752][T20337] ip_set_create+0x3cc/0x960 [ 420.997855][T20337] ? __nla_parse+0x40/0x60 [ 420.997878][T20337] nfnetlink_rcv_msg+0x4c6/0x590 [ 420.997983][T20337] netlink_rcv_skb+0x120/0x220 [ 420.998017][T20337] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 420.998051][T20337] nfnetlink_rcv+0x16b/0x1690 [ 420.998076][T20337] ? free_frozen_page_commit+0x6f/0x2a0 [ 420.998233][T20337] ? _raw_spin_unlock+0x26/0x50 [ 420.998271][T20337] ? __free_frozen_pages+0x25a/0x4e0 [ 420.998316][T20337] ? free_large_kmalloc+0xb1/0x100 [ 420.998387][T20337] ? bpf_check+0x29d6/0xd9e0 [ 420.998490][T20337] ? __rcu_read_unlock+0x4f/0x70 [ 420.998517][T20337] ? emit_mov_imm64+0x2ca/0x2e0 [ 420.998539][T20337] ? xas_load+0x413/0x430 [ 420.998641][T20337] ? try_charge_memcg+0x200/0x9e0 [ 420.998672][T20337] ? bpf_bprintf_prepare+0xc70/0xd90 [ 420.998714][T20337] ? should_fail_ex+0x30/0x280 [ 420.998750][T20337] ? selinux_nlmsg_lookup+0x99/0x890 [ 420.998781][T20337] ? __rcu_read_unlock+0x34/0x70 [ 420.998805][T20337] ? __netlink_lookup+0x266/0x2a0 [ 420.998883][T20337] netlink_unicast+0x5c0/0x690 [ 420.998927][T20337] netlink_sendmsg+0x58b/0x6b0 [ 420.998976][T20337] ? __pfx_netlink_sendmsg+0x10/0x10 [ 420.999090][T20337] __sock_sendmsg+0x145/0x180 [ 420.999145][T20337] ____sys_sendmsg+0x31e/0x4e0 [ 420.999189][T20337] ___sys_sendmsg+0x17b/0x1d0 [ 420.999255][T20337] __x64_sys_sendmsg+0xd4/0x160 [ 420.999415][T20337] x64_sys_call+0x191e/0x2ff0 [ 420.999499][T20337] do_syscall_64+0xd2/0x200 [ 420.999527][T20337] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 420.999560][T20337] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 420.999586][T20337] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 420.999669][T20337] RIP: 0033:0x7fb2e787eb69 [ 420.999690][T20337] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 420.999717][T20337] RSP: 002b:00007fb2e5edf038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 420.999813][T20337] RAX: ffffffffffffffda RBX: 00007fb2e7aa5fa0 RCX: 00007fb2e787eb69 [ 420.999831][T20337] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 000000000000000a [ 420.999848][T20337] RBP: 00007fb2e7901df1 R08: 0000000000000000 R09: 0000000000000000 [ 420.999865][T20337] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 420.999920][T20337] R13: 0000000000000000 R14: 00007fb2e7aa5fa0 R15: 00007ffe3a4f40c8 [ 420.999944][T20337] [ 421.361743][T20337] memory: usage 307200kB, limit 307200kB, failcnt 83 [ 421.368496][T20337] memory+swap: usage 307472kB, limit 9007199254740988kB, failcnt 0 [ 421.376402][T20337] kmem: usage 307164kB, limit 9007199254740988kB, failcnt 0 [ 421.383783][T20337] Memory cgroup stats for /syz9: [ 421.402813][T20337] cache 0 [ 421.410869][T20337] rss 4096 [ 421.413911][T20337] shmem 0 [ 421.416892][T20337] mapped_file 0 [ 421.420413][T20337] dirty 0 [ 421.423358][T20337] writeback 0 [ 421.426652][T20337] workingset_refault_anon 3 [ 421.431242][T20337] workingset_refault_file 0 [ 421.435791][T20337] swap 278528 [ 421.439194][T20337] swapcached 16384 [ 421.442950][T20337] pgpgin 339471 [ 421.446471][T20337] pgpgout 339462 [ 421.450073][T20337] pgfault 362775 [ 421.453630][T20337] pgmajfault 1 [ 421.457016][T20337] inactive_anon 4096 [ 421.461034][T20337] active_anon 12288 [ 421.464864][T20337] inactive_file 20480 [ 421.468934][T20337] active_file 0 [ 421.472408][T20337] unevictable 0 [ 421.475874][T20337] hierarchical_memory_limit 314572800 [ 421.481308][T20337] hierarchical_memsw_limit 9223372036854771712 [ 421.487901][T20337] total_cache 0 [ 421.491513][T20337] total_rss 4096 [ 421.495203][T20337] total_shmem 0 [ 421.498729][T20337] total_mapped_file 0 [ 421.502891][T20337] total_dirty 0 [ 421.506384][T20337] total_writeback 0 [ 421.510282][T20337] total_workingset_refault_anon 3 [ 421.515323][T20337] total_workingset_refault_file 0 [ 421.520428][T20337] total_swap 278528 [ 421.524247][T20337] total_swapcached 16384 [ 421.528560][T20337] total_pgpgin 339471 [ 421.532552][T20337] total_pgpgout 339462 [ 421.536636][T20337] total_pgfault 362775 [ 421.540748][T20337] total_pgmajfault 1 [ 421.544776][T20337] total_inactive_anon 4096 [ 421.549331][T20337] total_active_anon 12288 [ 421.553678][T20337] total_inactive_file 20480 [ 421.558199][T20337] total_active_file 0 [ 421.562227][T20337] total_unevictable 0 [ 421.566309][T20337] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz9,task_memcg=/syz9,task=syz.9.5625,pid=20336,uid=0 [ 421.581112][T20337] Memory cgroup out of memory: Killed process 20336 (syz.9.5625) total-vm:95944kB, anon-rss:944kB, file-rss:22184kB, shmem-rss:0kB, UID:0 pgtables:124kB oom_score_adj:0 [ 421.636617][T20348] syz.9.5625 (20348) used greatest stack depth: 8984 bytes left [ 421.817053][T20337] syz.9.5625 (20337) used greatest stack depth: 7336 bytes left [ 421.842749][T20400] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5650'. [ 421.851711][T20400] netlink: 16 bytes leftover after parsing attributes in process `syz.5.5650'. [ 421.870555][T20403] netlink: 196 bytes leftover after parsing attributes in process `syz.9.5649'. [ 421.918282][T20407] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 422.287897][T20426] netlink: 196 bytes leftover after parsing attributes in process `syz.9.5660'. [ 422.537353][T20430] netlink: 196 bytes leftover after parsing attributes in process `syz.9.5662'. [ 423.101361][T20451] macvtap8: entered allmulticast mode [ 423.106813][T20451] veth0_macvtap: entered allmulticast mode [ 423.207702][T20467] netlink: 'syz.2.5676': attribute type 7 has an invalid length. [ 423.377218][T20479] macvtap9: entered allmulticast mode [ 423.410938][T20485] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 423.842723][T20501] 9pnet_fd: Insufficient options for proto=fd [ 424.317727][T20522] netlink: 'syz.5.5700': attribute type 7 has an invalid length. [ 424.581789][T20541] __nla_validate_parse: 7 callbacks suppressed [ 424.581809][T20541] netlink: 830 bytes leftover after parsing attributes in process `syz.4.5703'. [ 424.613114][T20545] wireguard0: entered promiscuous mode [ 424.680491][T20550] 9pnet: p9_errstr2errno: server reported unknown error 1844674 [ 424.699727][T20550] macvlan1: entered promiscuous mode [ 424.705764][T20550] ipvlan0: entered promiscuous mode [ 424.724180][T20550] ipvlan0: left promiscuous mode [ 424.729503][T20550] macvlan1: left promiscuous mode [ 424.755720][T20552] netlink: 12 bytes leftover after parsing attributes in process `syz.8.5709'. [ 424.773417][T20552] 8021q: adding VLAN 0 to HW filter on device bond0 [ 424.781073][T20560] netlink: 4 bytes leftover after parsing attributes in process `syz.9.5712'. [ 424.969557][T20569] netlink: 96 bytes leftover after parsing attributes in process `syz.9.5715'. [ 424.987906][T20578] netlink: 'syz.8.5719': attribute type 1 has an invalid length. [ 425.044468][T20586] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 425.073421][T20588] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 425.102296][T20590] netlink: 4 bytes leftover after parsing attributes in process `syz.8.5725'. [ 425.155108][ T29] kauditd_printk_skb: 436 callbacks suppressed [ 425.155138][ T29] audit: type=1326 audit(1754325874.581:26900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20583 comm="syz.9.5723" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 425.196291][ T29] audit: type=1326 audit(1754325874.581:26901): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20583 comm="syz.9.5723" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 425.223886][ T29] audit: type=1326 audit(1754325874.651:26902): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20591 comm="syz.8.5726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 425.224993][T20592] netlink: 196 bytes leftover after parsing attributes in process `syz.8.5726'. [ 425.247797][ T29] audit: type=1326 audit(1754325874.651:26903): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20591 comm="syz.8.5726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 425.280434][ T29] audit: type=1326 audit(1754325874.651:26904): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20591 comm="syz.8.5726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 425.304098][ T29] audit: type=1326 audit(1754325874.651:26905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20591 comm="syz.8.5726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 425.327804][ T29] audit: type=1326 audit(1754325874.651:26906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20591 comm="syz.8.5726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 425.351625][ T29] audit: type=1326 audit(1754325874.651:26907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20591 comm="syz.8.5726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 425.377048][ T29] audit: type=1326 audit(1754325874.801:26908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20591 comm="syz.8.5726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 425.416705][ T29] audit: type=1326 audit(1754325874.801:26909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20591 comm="syz.8.5726" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 425.442314][T20600] netlink: 'syz.8.5730': attribute type 1 has an invalid length. [ 425.443347][T20601] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 425.649730][T20629] netlink: 830 bytes leftover after parsing attributes in process `syz.9.5741'. [ 425.702854][T20633] netlink: 'syz.5.5744': attribute type 1 has an invalid length. [ 425.811576][T20652] macvtap12: entered allmulticast mode [ 425.817169][T20652] veth0_macvtap: entered allmulticast mode [ 425.825041][T20654] macvtap8: left allmulticast mode [ 425.830675][T20654] veth0_macvtap: left allmulticast mode [ 425.836378][T20654] macvtap9: left allmulticast mode [ 425.896146][T20662] netlink: 'syz.8.5757': attribute type 1 has an invalid length. [ 425.929892][T20668] veth0_macvtap: left allmulticast mode [ 425.935658][T20668] macvtap12: left allmulticast mode [ 425.938313][T20661] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5751'. [ 426.115195][T20677] netlink: 'syz.8.5762': attribute type 13 has an invalid length. [ 426.339886][T20698] netlink: 8 bytes leftover after parsing attributes in process `syz.8.5771'. [ 426.736442][T20724] macvtap10: entered allmulticast mode [ 426.742181][T20724] veth0_macvtap: entered allmulticast mode [ 426.804614][T20735] netlink: 'syz.5.5786': attribute type 1 has an invalid length. [ 426.858627][T20740] netlink: 830 bytes leftover after parsing attributes in process `syz.9.5785'. [ 427.322167][T20756] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 427.667662][T20769] netlink: 'syz.8.5798': attribute type 1 has an invalid length. [ 427.732042][T20777] veth0_macvtap: left allmulticast mode [ 427.737880][T20777] macvtap10: left allmulticast mode [ 427.885415][T20794] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 427.940371][T20798] netlink: 'syz.9.5810': attribute type 1 has an invalid length. [ 428.142389][T20820] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 429.198648][T20888] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 429.239760][T20886] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 429.407681][T20922] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 429.465916][T20927] syz!: rxe_newlink: already configured on team_slave_0 [ 429.574939][T20942] netlink: 'syz.8.5869': attribute type 10 has an invalid length. [ 429.584311][T20942] team0: Port device dummy0 added [ 429.697129][T20951] __nla_validate_parse: 5 callbacks suppressed [ 429.697143][T20951] netlink: 96 bytes leftover after parsing attributes in process `syz.8.5872'. [ 429.849302][T20961] netlink: 'syz.4.5876': attribute type 1 has an invalid length. [ 429.909591][T20965] netlink: 8 bytes leftover after parsing attributes in process `syz.2.5878'. [ 430.042487][T20977] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 430.098740][T20985] netlink: 'syz.9.5887': attribute type 1 has an invalid length. [ 430.168415][ T29] kauditd_printk_skb: 677 callbacks suppressed [ 430.168433][ T29] audit: type=1326 audit(1754325879.591:27587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20955 comm="syz.8.5874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 430.214837][ T29] audit: type=1326 audit(1754325879.601:27588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20955 comm="syz.8.5874" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 430.307551][ T29] audit: type=1326 audit(1754325879.731:27589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20995 comm="syz.8.5892" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 430.339009][ T29] audit: type=1326 audit(1754325879.761:27590): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20995 comm="syz.8.5892" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 430.362847][ T29] audit: type=1326 audit(1754325879.761:27591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20995 comm="syz.8.5892" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 430.386459][ T29] audit: type=1326 audit(1754325879.761:27592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20995 comm="syz.8.5892" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 430.410336][ T29] audit: type=1326 audit(1754325879.761:27593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20995 comm="syz.8.5892" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 430.434095][ T29] audit: type=1326 audit(1754325879.761:27594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20995 comm="syz.8.5892" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 430.457730][ T29] audit: type=1326 audit(1754325879.761:27595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20995 comm="syz.8.5892" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 430.481345][ T29] audit: type=1326 audit(1754325879.761:27596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20995 comm="syz.8.5892" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 430.547492][T21005] macvtap0: refused to change device tx_queue_len [ 430.658189][T21026] netlink: 'syz.4.5900': attribute type 7 has an invalid length. [ 430.666032][T21026] netlink: 8 bytes leftover after parsing attributes in process `syz.4.5900'. [ 430.806771][T21044] netlink: 16 bytes leftover after parsing attributes in process `syz.2.5904'. [ 431.164988][T21047] lo speed is unknown, defaulting to 1000 [ 431.918010][T21169] netlink: 12 bytes leftover after parsing attributes in process `syz.2.5914'. [ 432.051205][ T3453] bond0 (unregistering): Released all slaves [ 432.062026][T21146] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 432.072195][T21047] chnl_net:caif_netlink_parms(): no params data found [ 432.190325][ T3453] hsr_slave_0: left promiscuous mode [ 432.200232][ T3453] hsr_slave_1: left promiscuous mode [ 432.303993][T21047] bridge0: port 1(bridge_slave_0) entered blocking state [ 432.311327][T21047] bridge0: port 1(bridge_slave_0) entered disabled state [ 432.321398][T21047] bridge_slave_0: entered allmulticast mode [ 432.328297][T21047] bridge_slave_0: entered promiscuous mode [ 432.335366][T21183] netlink: 96 bytes leftover after parsing attributes in process `syz.5.5919'. [ 432.353402][T21047] bridge0: port 2(bridge_slave_1) entered blocking state [ 432.360545][T21047] bridge0: port 2(bridge_slave_1) entered disabled state [ 432.388115][T21047] bridge_slave_1: entered allmulticast mode [ 432.412860][T21047] bridge_slave_1: entered promiscuous mode [ 432.471469][T21047] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 432.482925][T21047] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 432.504399][T21191] macvtap14: entered allmulticast mode [ 432.510012][T21191] veth0_macvtap: entered allmulticast mode [ 432.548740][T21047] team0: Port device team_slave_0 added [ 432.566800][T21047] team0: Port device team_slave_1 added [ 432.599538][T21047] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 432.607070][T21047] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 432.633113][T21047] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 432.672215][T21047] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 432.679263][T21047] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 432.705361][T21047] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 432.757451][T21202] netlink: 'syz.5.5927': attribute type 7 has an invalid length. [ 432.765781][T21202] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5927'. [ 432.789736][T21047] hsr_slave_0: entered promiscuous mode [ 432.808900][T21047] hsr_slave_1: entered promiscuous mode [ 432.839859][T21207] macvtap11: entered allmulticast mode [ 432.845386][T21207] veth0_macvtap: entered allmulticast mode [ 432.931933][T21219] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 432.956043][T21221] 9pnet: p9_errstr2errno: server reported unknown error 1844674 [ 433.055270][T21226] netlink: 'syz.5.5937': attribute type 1 has an invalid length. [ 433.105371][T21047] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 433.116288][T21047] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 433.126379][T21047] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 433.137178][T21047] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 433.205237][T21237] netlink: 'syz.5.5939': attribute type 7 has an invalid length. [ 433.213081][T21237] netlink: 8 bytes leftover after parsing attributes in process `syz.5.5939'. [ 433.253188][T21047] 8021q: adding VLAN 0 to HW filter on device bond0 [ 433.268670][T21047] 8021q: adding VLAN 0 to HW filter on device team0 [ 433.279963][ T3453] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.287088][ T3453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 433.312290][ T3453] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.319421][ T3453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 433.355202][T21242] netlink: 8 bytes leftover after parsing attributes in process `syz.9.5941'. [ 433.437075][T21047] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 433.494862][T21255] team0: Port device dummy0 removed [ 433.534761][T21267] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 433.579920][T21276] netlink: 'syz.9.5949': attribute type 7 has an invalid length. [ 433.587763][T21276] netlink: 8 bytes leftover after parsing attributes in process `syz.9.5949'. [ 433.588675][T21275] 9pnet: p9_errstr2errno: server reported unknown error 1844674 [ 433.659636][T21047] veth0_vlan: entered promiscuous mode [ 433.669445][T21047] veth1_vlan: entered promiscuous mode [ 433.689280][T21047] veth0_macvtap: entered promiscuous mode [ 433.697254][T21047] veth1_macvtap: entered promiscuous mode [ 433.722614][T21047] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 433.741328][T21047] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 433.756870][ T3453] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 433.777358][ T3453] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 433.793626][ T3453] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 433.804154][T12150] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 433.839055][T21297] netlink: 'syz.4.5902': attribute type 7 has an invalid length. [ 433.877746][T21305] 9pnet: p9_errstr2errno: server reported unknown error 1844674 [ 434.107770][T21331] netlink: 'syz.9.5971': attribute type 1 has an invalid length. [ 434.151968][T21335] 9pnet: p9_errstr2errno: server reported unknown error 1844674 [ 434.555737][T21360] 9pnet: p9_errstr2errno: server reported unknown error 1844674 [ 434.887274][T21380] __nla_validate_parse: 5 callbacks suppressed [ 434.887362][T21380] netlink: 830 bytes leftover after parsing attributes in process `syz.8.5990'. [ 434.913681][T21384] 9pnet: p9_errstr2errno: server reported unknown error 1844674 [ 435.256061][ T29] kauditd_printk_skb: 197 callbacks suppressed [ 435.256077][ T29] audit: type=1326 audit(1754325884.681:27794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21407 comm="syz.9.6005" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 435.302669][ T29] audit: type=1326 audit(1754325884.711:27795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21407 comm="syz.9.6005" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 435.326584][ T29] audit: type=1326 audit(1754325884.711:27796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21407 comm="syz.9.6005" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 435.350194][ T29] audit: type=1326 audit(1754325884.711:27797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21407 comm="syz.9.6005" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 435.373866][ T29] audit: type=1326 audit(1754325884.711:27798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21407 comm="syz.9.6005" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 435.397512][ T29] audit: type=1326 audit(1754325884.711:27799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21407 comm="syz.9.6005" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 435.421321][ T29] audit: type=1326 audit(1754325884.711:27800): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21407 comm="syz.9.6005" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 435.444927][ T29] audit: type=1326 audit(1754325884.711:27801): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21407 comm="syz.9.6005" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 435.468537][ T29] audit: type=1326 audit(1754325884.711:27802): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21407 comm="syz.9.6005" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 435.492130][ T29] audit: type=1326 audit(1754325884.711:27803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21407 comm="syz.9.6005" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 435.668035][T21423] 9pnet: p9_errstr2errno: server reported unknown error 1844674 [ 435.698740][T21427] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 435.932938][T21450] macvtap15: entered allmulticast mode [ 436.073804][T21459] netlink: 96 bytes leftover after parsing attributes in process `syz.4.6023'. [ 436.084314][T21461] netlink: 20 bytes leftover after parsing attributes in process `syz.2.6024'. [ 436.120928][T21461] Process accounting resumed [ 436.140167][T21464] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 436.159833][T21464] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 436.385198][T21488] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 436.438543][T21492] netlink: 8 bytes leftover after parsing attributes in process `syz.9.6035'. [ 436.469207][T21496] netem: incorrect ge model size [ 436.474300][T21496] netem: change failed [ 436.525245][T21501] netlink: 96 bytes leftover after parsing attributes in process `syz.2.6036'. [ 436.864418][T21514] lo speed is unknown, defaulting to 1000 [ 436.980627][T21514] chnl_net:caif_netlink_parms(): no params data found [ 437.031143][T21514] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.038402][T21514] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.045571][T21514] bridge_slave_0: entered allmulticast mode [ 437.052239][T21514] bridge_slave_0: entered promiscuous mode [ 437.059515][T21514] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.066741][T21514] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.075387][T21514] bridge_slave_1: entered allmulticast mode [ 437.082006][T21514] bridge_slave_1: entered promiscuous mode [ 437.105000][T21514] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 437.123137][T21514] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 437.166219][T21538] netlink: 32 bytes leftover after parsing attributes in process `syz.8.6047'. [ 437.510417][T12150] bond0 (unregistering): Released all slaves [ 437.523089][T21514] team0: Port device team_slave_0 added [ 437.530495][T21514] team0: Port device team_slave_1 added [ 437.571519][T21514] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 437.578592][T21514] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 437.604655][T21514] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 437.627529][T21557] netem: change failed [ 437.635367][T21557] netlink: 24 bytes leftover after parsing attributes in process `syz.4.6053'. [ 437.651066][T21557] bridge0: port 3(batadv1) entered blocking state [ 437.657617][T21557] bridge0: port 3(batadv1) entered disabled state [ 437.666427][T21557] batadv1: entered allmulticast mode [ 437.672596][T21557] batadv1: entered promiscuous mode [ 437.685620][T12150] veth0_macvtap: left allmulticast mode [ 437.734369][T21562] netlink: 196 bytes leftover after parsing attributes in process `syz.4.6055'. [ 437.960098][T21514] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 437.967130][T21514] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 437.993294][T21514] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 438.021449][T21540] lo speed is unknown, defaulting to 1000 [ 438.117976][T21514] hsr_slave_0: entered promiscuous mode [ 438.139416][T21514] hsr_slave_1: entered promiscuous mode [ 438.145584][T21514] debugfs: 'hsr0' already exists in 'hsr' [ 438.151400][T21514] Cannot create hsr debugfs directory [ 438.160531][ T417] batman_adv: batadv1: No IGMP Querier present - multicast optimizations disabled [ 438.169811][ T417] batman_adv: batadv1: No MLD Querier present - multicast optimizations disabled [ 438.319128][T21571] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 438.339732][T21588] netlink: 4 bytes leftover after parsing attributes in process `syz.9.6063'. [ 438.372680][T21592] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6064'. [ 438.516972][T21598] ieee802154 phy0 wpan0: encryption failed: -22 [ 438.605746][T21603] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 438.634547][T21603] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 438.785919][T21514] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 438.808805][T21514] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 438.836437][T21514] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 438.856825][T21514] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 438.985705][T21514] 8021q: adding VLAN 0 to HW filter on device bond0 [ 439.013193][T21514] 8021q: adding VLAN 0 to HW filter on device team0 [ 439.035339][ T417] bridge0: port 1(bridge_slave_0) entered blocking state [ 439.042462][ T417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 439.054699][ T3453] bridge0: port 2(bridge_slave_1) entered blocking state [ 439.061803][ T3453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 439.141628][T21633] syz!: rxe_newlink: already configured on team_slave_0 [ 439.182334][T21514] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 439.422135][T21514] veth0_vlan: entered promiscuous mode [ 439.439127][T21514] veth1_vlan: entered promiscuous mode [ 439.457018][T21514] veth0_macvtap: entered promiscuous mode [ 439.472877][T21514] veth1_macvtap: entered promiscuous mode [ 439.488902][T21514] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 439.502366][T21514] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 439.518932][ T51] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.541463][ T51] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.555864][ T51] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.585332][ T51] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 439.588100][T21662] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 439.588100][T21662] program syz.5.6043 not setting count and/or reply_len properly [ 439.716468][T21665] loop5: detected capacity change from 0 to 512 [ 439.750874][T21665] EXT4-fs: Ignoring removed i_version option [ 439.757075][T21665] EXT4-fs: Ignoring removed nobh option [ 439.796305][T21665] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 439.847046][T21665] EXT4-fs (loop5): 1 truncate cleaned up [ 439.853297][T21665] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 439.992977][T21686] netlink: 196 bytes leftover after parsing attributes in process `syz.4.6092'. [ 440.164284][T21514] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 440.212297][T21697] netlink: 830 bytes leftover after parsing attributes in process `syz.5.6096'. [ 440.280978][T21699] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 440.308592][T21699] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 440.582152][T21706] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 440.611758][ T29] kauditd_printk_skb: 207 callbacks suppressed [ 440.611783][ T29] audit: type=1326 audit(1754325890.041:28011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21709 comm="syz.8.6100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 440.642840][ T29] audit: type=1326 audit(1754325890.071:28012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21709 comm="syz.8.6100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 440.666560][ T29] audit: type=1326 audit(1754325890.071:28013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21709 comm="syz.8.6100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 440.690179][ T29] audit: type=1326 audit(1754325890.071:28014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21709 comm="syz.8.6100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 440.714650][T21712] FAULT_INJECTION: forcing a failure. [ 440.714650][T21712] name failslab, interval 1, probability 0, space 0, times 0 [ 440.727366][T21712] CPU: 1 UID: 0 PID: 21712 Comm: syz.4.6101 Not tainted 6.16.0-syzkaller-11489-gd2eedaa3909b #0 PREEMPT(voluntary) [ 440.727423][T21712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 440.727503][T21712] Call Trace: [ 440.727512][T21712] [ 440.727522][T21712] __dump_stack+0x1d/0x30 [ 440.727549][T21712] dump_stack_lvl+0xe8/0x140 [ 440.727582][T21712] dump_stack+0x15/0x1b [ 440.727599][T21712] should_fail_ex+0x265/0x280 [ 440.727638][T21712] should_failslab+0x8c/0xb0 [ 440.727675][T21712] kmem_cache_alloc_noprof+0x50/0x310 [ 440.727771][T21712] ? getname_flags+0x80/0x3b0 [ 440.727806][T21712] getname_flags+0x80/0x3b0 [ 440.727840][T21712] do_sys_openat2+0x60/0x110 [ 440.727940][T21712] __x64_sys_openat+0xf2/0x120 [ 440.727984][T21712] x64_sys_call+0x2e9c/0x2ff0 [ 440.728013][T21712] do_syscall_64+0xd2/0x200 [ 440.728082][T21712] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 440.728113][T21712] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 440.728142][T21712] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 440.728169][T21712] RIP: 0033:0x7f38b516eb69 [ 440.728188][T21712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 440.728250][T21712] RSP: 002b:00007f38b37d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 440.728275][T21712] RAX: ffffffffffffffda RBX: 00007f38b5395fa0 RCX: 00007f38b516eb69 [ 440.728291][T21712] RDX: 0000000000006040 RSI: 0000200000001440 RDI: ffffffffffffff9c [ 440.728308][T21712] RBP: 00007f38b37d7090 R08: 0000000000000000 R09: 0000000000000000 [ 440.728320][T21712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 440.728332][T21712] R13: 0000000000000001 R14: 00007f38b5395fa0 R15: 00007ffe6fe7fc48 [ 440.728357][T21712] [ 440.738051][ T29] audit: type=1326 audit(1754325890.081:28015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21709 comm="syz.8.6100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 440.930193][ T29] audit: type=1326 audit(1754325890.081:28016): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21709 comm="syz.8.6100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 440.953827][ T29] audit: type=1326 audit(1754325890.081:28017): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21709 comm="syz.8.6100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 440.977440][ T29] audit: type=1326 audit(1754325890.081:28018): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21709 comm="syz.8.6100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 441.001384][ T29] audit: type=1326 audit(1754325890.081:28019): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21709 comm="syz.8.6100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 441.025371][ T29] audit: type=1326 audit(1754325890.081:28020): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21709 comm="syz.8.6100" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef53c8eb69 code=0x7ffc0000 [ 441.055907][T21721] netlink: 96 bytes leftover after parsing attributes in process `syz.8.6100'. [ 441.077975][T21725] netlink: 196 bytes leftover after parsing attributes in process `syz.5.6104'. [ 441.125610][T21722] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.133037][T21722] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.146079][T21731] loop5: detected capacity change from 0 to 512 [ 441.154070][T21731] EXT4-fs: Ignoring removed i_version option [ 441.160306][T21731] EXT4-fs: Ignoring removed nobh option [ 441.166323][T21731] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 441.177468][T21731] EXT4-fs (loop5): 1 truncate cleaned up [ 441.184073][T21731] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 441.201029][T21733] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 441.226624][T21722] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 441.238161][T21722] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 441.331290][T21121] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 441.349108][T21701] chnl_net:caif_netlink_parms(): no params data found [ 441.416982][T21514] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 441.417071][T21738] netlink: 830 bytes leftover after parsing attributes in process `syz.4.6107'. [ 441.436514][T21121] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 441.501782][T21121] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 441.514231][T21756] netlink: 300 bytes leftover after parsing attributes in process `syz.4.6112'. [ 441.533565][T21701] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.540693][T21701] bridge0: port 1(bridge_slave_0) entered disabled state [ 441.561143][T21701] bridge_slave_0: entered allmulticast mode [ 441.567794][T21701] bridge_slave_0: entered promiscuous mode [ 441.592445][T21121] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 441.602729][T21701] bridge0: port 2(bridge_slave_1) entered blocking state [ 441.609908][T21701] bridge0: port 2(bridge_slave_1) entered disabled state [ 441.618013][T21701] bridge_slave_1: entered allmulticast mode [ 441.624814][T21701] bridge_slave_1: entered promiscuous mode [ 441.661689][T21701] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 441.665245][T21759] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 441.665245][T21759] program syz.4.6114 not setting count and/or reply_len properly [ 441.692459][T21763] netlink: 196 bytes leftover after parsing attributes in process `syz.8.6115'. [ 441.770277][T21757] loop5: detected capacity change from 0 to 512 [ 441.777059][T21757] ext2: Unknown parameter 'lazytime"errors' [ 442.175124][T21773] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 442.200268][ T3453] bond0 (unregistering): Released all slaves [ 442.209763][T21701] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 442.254699][T21701] team0: Port device team_slave_0 added [ 442.262952][T21701] team0: Port device team_slave_1 added [ 442.276555][ T3453] tipc: Left network mode [ 442.312998][T21701] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 442.320086][T21701] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.346851][T21701] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 442.374359][T21701] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 442.381597][T21701] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.408031][T21701] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 442.436183][T21789] netlink: 96 bytes leftover after parsing attributes in process `syz.5.6122'. [ 442.445700][T21786] netlink: 'syz.4.6123': attribute type 7 has an invalid length. [ 442.453594][T21786] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6123'. [ 442.462667][T21790] netlink: 830 bytes leftover after parsing attributes in process `syz.8.6121'. [ 442.475012][T21789] loop5: detected capacity change from 0 to 512 [ 442.483314][T21789] msdos: Unknown parameter 'dos1xfy' [ 442.507074][ T3453] veth0_macvtap: left allmulticast mode [ 442.660081][T21701] hsr_slave_0: entered promiscuous mode [ 442.678014][T21701] hsr_slave_1: entered promiscuous mode [ 442.685776][T21701] debugfs: 'hsr0' already exists in 'hsr' [ 442.691597][T21701] Cannot create hsr debugfs directory [ 443.284978][T21701] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 443.307493][T21701] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 443.319645][T21701] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 443.329020][T21701] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 443.369216][T21701] 8021q: adding VLAN 0 to HW filter on device bond0 [ 443.380015][T21701] 8021q: adding VLAN 0 to HW filter on device team0 [ 443.402743][T21821] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 443.403296][ T3453] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.416467][ T3453] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.431784][ T3453] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.438988][ T3453] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.756013][T21837] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 443.786645][T21837] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 443.799259][T21839] netlink: 'syz.4.6136': attribute type 1 has an invalid length. [ 443.816645][T21837] blktrace: Concurrent blktraces are not allowed on sg0 [ 444.544827][T21861] netlink: 'syz.5.6146': attribute type 1 has an invalid length. [ 444.981739][T21701] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 445.074580][T21879] __nla_validate_parse: 3 callbacks suppressed [ 445.074600][T21879] netlink: 830 bytes leftover after parsing attributes in process `syz.8.6152'. [ 445.178382][T21701] veth0_vlan: entered promiscuous mode [ 445.205263][T21701] veth1_vlan: entered promiscuous mode [ 445.217916][T21701] veth0_macvtap: entered promiscuous mode [ 445.225246][T21701] veth1_macvtap: entered promiscuous mode [ 445.235803][T21701] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 445.250123][T21701] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 445.262516][ T51] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.275621][ T51] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.284745][ T51] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.296188][ T51] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 445.327862][T21893] netlink: 830 bytes leftover after parsing attributes in process `syz.8.6155'. [ 445.440749][T21895] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(8) [ 445.447464][T21895] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 445.455161][T21895] vhci_hcd vhci_hcd.0: Device attached [ 445.585243][T21905] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 445.585243][T21905] program syz.5.6157 not setting count and/or reply_len properly [ 445.629876][T21907] loop2: detected capacity change from 0 to 1024 [ 445.638030][T21907] EXT4-fs (loop2): stripe (3) is not aligned with cluster size (16), stripe is disabled [ 445.672972][T21907] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 445.708455][ T3409] usb 9-1: new high-speed USB device number 6 using vhci_hcd [ 445.853431][ T29] kauditd_printk_skb: 247 callbacks suppressed [ 445.853448][ T29] audit: type=1326 audit(1754325895.281:28268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.9.6160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 445.883523][ T29] audit: type=1326 audit(1754325895.281:28269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.9.6160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 445.907457][ T29] audit: type=1326 audit(1754325895.281:28270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.9.6160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 445.931176][ T29] audit: type=1326 audit(1754325895.281:28271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.9.6160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 445.954802][ T29] audit: type=1326 audit(1754325895.281:28272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.9.6160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 445.978512][ T29] audit: type=1326 audit(1754325895.281:28273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.9.6160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 446.002371][ T29] audit: type=1326 audit(1754325895.281:28274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.9.6160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 446.026228][ T29] audit: type=1326 audit(1754325895.281:28275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.9.6160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 446.050535][ T29] audit: type=1326 audit(1754325895.281:28276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.9.6160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 446.074308][ T29] audit: type=1326 audit(1754325895.281:28277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21916 comm="syz.9.6160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=26 compat=0 ip=0x7fb2e787eb69 code=0x7ffc0000 [ 446.140340][T21899] vhci_hcd: connection reset by peer [ 446.159242][ T3453] vhci_hcd: stop threads [ 446.163559][ T3453] vhci_hcd: release socket [ 446.168008][ T3453] vhci_hcd: disconnect device [ 446.240608][T21927] netlink: 830 bytes leftover after parsing attributes in process `syz.9.6164'. [ 446.303897][T21933] netlink: 300 bytes leftover after parsing attributes in process `syz.9.6167'. [ 446.554051][T21701] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 446.576330][T21952] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 446.576330][T21952] program syz.2.6176 not setting count and/or reply_len properly [ 446.737713][T21965] blktrace: Concurrent blktraces are not allowed on sg0 [ 446.822932][T21972] loop2: detected capacity change from 0 to 8192 [ 446.832223][T21963] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6180'. [ 447.196103][T21983] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 447.358006][T21996] macvtap5: entered allmulticast mode [ 447.363589][T21996] veth0_macvtap: entered allmulticast mode [ 447.373657][T21976] chnl_net:caif_netlink_parms(): no params data found [ 447.420004][T21976] bridge0: port 1(bridge_slave_0) entered blocking state [ 447.427120][T21976] bridge0: port 1(bridge_slave_0) entered disabled state [ 447.434695][T21976] bridge_slave_0: entered allmulticast mode [ 447.441402][T21976] bridge_slave_0: entered promiscuous mode [ 447.448418][T21976] bridge0: port 2(bridge_slave_1) entered blocking state [ 447.455589][T21976] bridge0: port 2(bridge_slave_1) entered disabled state [ 447.466667][T21976] bridge_slave_1: entered allmulticast mode [ 447.473548][T21976] bridge_slave_1: entered promiscuous mode [ 447.494509][T21976] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 447.508062][T21976] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 447.531129][T21976] team0: Port device team_slave_0 added [ 447.538080][T21976] team0: Port device team_slave_1 added [ 447.559922][T22011] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 447.583418][T21976] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 447.586179][T22011] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 447.590551][T21976] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 447.624102][T21976] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 447.636884][T21976] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 447.643954][T21976] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 447.654962][T22016] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 447.669952][T21976] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 447.747918][T22024] A link change request failed with some changes committed already. Interface team_slave_1 may have been left with an inconsistent configuration, please check. [ 447.781226][T22022] macvtap6: entered allmulticast mode [ 447.795289][T21976] hsr_slave_0: entered promiscuous mode [ 447.805897][T21976] hsr_slave_1: entered promiscuous mode [ 447.813864][T21976] debugfs: 'hsr0' already exists in 'hsr' [ 447.819738][T21976] Cannot create hsr debugfs directory [ 447.840580][T22028] netlink: 738 bytes leftover after parsing attributes in process `syz.4.6204'. [ 447.918050][T22041] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6209'. [ 447.937435][T22034] FAULT_INJECTION: forcing a failure. [ 447.937435][T22034] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 447.950741][T22034] CPU: 1 UID: 0 PID: 22034 Comm: syz.2.6206 Not tainted 6.16.0-syzkaller-11489-gd2eedaa3909b #0 PREEMPT(voluntary) [ 447.950771][T22034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 447.950785][T22034] Call Trace: [ 447.950792][T22034] [ 447.950800][T22034] __dump_stack+0x1d/0x30 [ 447.950821][T22034] dump_stack_lvl+0xe8/0x140 [ 447.950844][T22034] dump_stack+0x15/0x1b [ 447.950952][T22034] should_fail_ex+0x265/0x280 [ 447.951048][T22034] should_fail+0xb/0x20 [ 447.951085][T22034] should_fail_usercopy+0x1a/0x20 [ 447.951104][T22034] copy_fpstate_to_sigframe+0x628/0x7d0 [ 447.951187][T22034] ? copy_fpstate_to_sigframe+0xe6/0x7d0 [ 447.951251][T22034] ? x86_task_fpu+0x36/0x60 [ 447.951287][T22034] get_sigframe+0x34d/0x490 [ 447.951310][T22034] ? get_signal+0xdc8/0xf70 [ 447.951373][T22034] x64_setup_rt_frame+0xa8/0x580 [ 447.951399][T22034] arch_do_signal_or_restart+0x27c/0x480 [ 447.951430][T22034] exit_to_user_mode_loop+0x7a/0x100 [ 447.951456][T22034] do_syscall_64+0x1d6/0x200 [ 447.951480][T22034] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 447.951503][T22034] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 447.951594][T22034] RIP: 0033:0x7f62e587eb67 [ 447.951609][T22034] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 447.951630][T22034] RSP: 002b:00007f62e3ee7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 447.951681][T22034] RAX: 0000000000000000 RBX: 00007f62e5aa5fa0 RCX: 00007f62e587eb69 [ 447.951695][T22034] RDX: 0000000000000026 RSI: 0000200000000440 RDI: 0000000000000004 [ 447.951707][T22034] RBP: 00007f62e3ee7090 R08: 0000000000000000 R09: 0000000000000000 [ 447.951719][T22034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 447.951780][T22034] R13: 0000000000000000 R14: 00007f62e5aa5fa0 R15: 00007ffed3185ae8 [ 447.951798][T22034] [ 447.956036][T22043] can: request_module (can-proto-0) failed. [ 448.189067][T22055] macvtap1: entered allmulticast mode [ 448.194492][T22055] veth0_macvtap: entered allmulticast mode [ 448.204282][T22055] serio: Serial port pts0 [ 448.225698][T22052] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 448.225698][T22052] program syz.4.6213 not setting count and/or reply_len properly [ 448.304778][T21976] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 448.313830][T21976] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 448.324813][T22062] netlink: 738 bytes leftover after parsing attributes in process `syz.5.6216'. [ 448.334401][T21976] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 448.343849][T21976] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 448.384874][T22072] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6219'. [ 448.392592][T22076] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 448.416105][T21976] 8021q: adding VLAN 0 to HW filter on device bond0 [ 448.423290][T22076] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 448.435817][T21976] 8021q: adding VLAN 0 to HW filter on device team0 [ 448.452878][ T417] bridge0: port 1(bridge_slave_0) entered blocking state [ 448.460011][ T417] bridge0: port 1(bridge_slave_0) entered forwarding state [ 448.485968][T21119] bridge0: port 2(bridge_slave_1) entered blocking state [ 448.493092][T21119] bridge0: port 2(bridge_slave_1) entered forwarding state [ 448.521644][T21976] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 448.584996][T22092] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6227'. [ 448.598176][T22092] bridge0: entered promiscuous mode [ 448.606638][T22092] bridge0: port 3(macvlan2) entered blocking state [ 448.613267][T22092] bridge0: port 3(macvlan2) entered disabled state [ 448.621930][T22092] macvlan2: entered allmulticast mode [ 448.627374][T22092] bridge0: entered allmulticast mode [ 448.633384][T22092] macvlan2: left allmulticast mode [ 448.638704][T22092] bridge0: left allmulticast mode [ 448.644339][T22092] bridge0: left promiscuous mode [ 448.656292][T22096] serio: Serial port pts0 [ 448.661198][T21976] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 448.768771][T22113] netlink: 'syz.2.6233': attribute type 1 has an invalid length. [ 448.881596][T22125] bridge0: port 2(bridge_slave_1) entered disabled state [ 448.889064][T22125] bridge0: port 1(bridge_slave_0) entered disabled state [ 448.932132][T22125] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 448.942277][T22125] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 448.981966][T21119] netdevsim netdevsim5 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 448.991690][T22139] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 449.012408][T21119] netdevsim netdevsim5 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 449.023174][T21119] netdevsim netdevsim5 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 449.035146][T21119] netdevsim netdevsim5 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 449.052162][T21976] veth0_vlan: entered promiscuous mode [ 449.067413][T21976] veth1_vlan: entered promiscuous mode [ 449.096512][T21976] veth0_macvtap: entered promiscuous mode [ 449.107929][T21976] veth1_macvtap: entered promiscuous mode [ 449.124402][T21976] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 449.146171][T22145] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 449.154490][T21976] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 449.170777][ T417] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 449.190611][ T417] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 449.195330][T22155] netlink: 'syz.5.6248': attribute type 1 has an invalid length. [ 449.213127][ T417] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 449.253012][ T417] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 449.269810][T22166] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 449.280878][T22166] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 449.328471][T22162] loop7: detected capacity change from 1024 to 0 [ 449.342720][T22168] bridge0: port 2(bridge_slave_1) entered disabled state [ 449.350095][T22168] bridge0: port 1(bridge_slave_0) entered disabled state [ 449.409149][T22168] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 449.420332][T22168] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 449.462453][T22168] veth0_macvtap: left allmulticast mode [ 449.468180][T22168] macvtap1: left allmulticast mode [ 449.483116][T21124] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 449.492902][T21124] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 449.503270][T21124] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 449.512660][T21124] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 449.540122][T22182] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 449.549377][T22180] loop5: detected capacity change from 0 to 512 [ 449.591525][T22187] netlink: 'syz.2.6261': attribute type 1 has an invalid length. [ 449.644845][T22193] FAULT_INJECTION: forcing a failure. [ 449.644845][T22193] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 449.658781][T22193] CPU: 1 UID: 0 PID: 22193 Comm: syz.8.6264 Not tainted 6.16.0-syzkaller-11489-gd2eedaa3909b #0 PREEMPT(voluntary) [ 449.658815][T22193] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 449.658829][T22193] Call Trace: [ 449.658836][T22193] [ 449.658922][T22193] __dump_stack+0x1d/0x30 [ 449.658951][T22193] dump_stack_lvl+0xe8/0x140 [ 449.658977][T22193] dump_stack+0x15/0x1b [ 449.659025][T22193] should_fail_ex+0x265/0x280 [ 449.659060][T22193] should_fail+0xb/0x20 [ 449.659098][T22193] should_fail_usercopy+0x1a/0x20 [ 449.659120][T22193] _copy_from_user+0x1c/0xb0 [ 449.659212][T22193] ___sys_sendmsg+0xc1/0x1d0 [ 449.659275][T22193] __x64_sys_sendmsg+0xd4/0x160 [ 449.659313][T22193] x64_sys_call+0x191e/0x2ff0 [ 449.659355][T22193] do_syscall_64+0xd2/0x200 [ 449.659385][T22193] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 449.659451][T22193] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 449.659479][T22193] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 449.659502][T22193] RIP: 0033:0x7f6b542beb69 [ 449.659517][T22193] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 449.659572][T22193] RSP: 002b:00007f6b52927038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 449.659597][T22193] RAX: ffffffffffffffda RBX: 00007f6b544e5fa0 RCX: 00007f6b542beb69 [ 449.659614][T22193] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000005 [ 449.659630][T22193] RBP: 00007f6b52927090 R08: 0000000000000000 R09: 0000000000000000 [ 449.659673][T22193] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 449.659734][T22193] R13: 0000000000000000 R14: 00007f6b544e5fa0 R15: 00007ffd215c0ed8 [ 449.659759][T22193] [ 449.857378][T22197] FAULT_INJECTION: forcing a failure. [ 449.857378][T22197] name failslab, interval 1, probability 0, space 0, times 0 [ 449.870933][T22197] CPU: 1 UID: 0 PID: 22197 Comm: syz.5.6265 Not tainted 6.16.0-syzkaller-11489-gd2eedaa3909b #0 PREEMPT(voluntary) [ 449.870963][T22197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 449.870976][T22197] Call Trace: [ 449.870984][T22197] [ 449.870994][T22197] __dump_stack+0x1d/0x30 [ 449.871081][T22197] dump_stack_lvl+0xe8/0x140 [ 449.871108][T22197] dump_stack+0x15/0x1b [ 449.871262][T22197] should_fail_ex+0x265/0x280 [ 449.871308][T22197] should_failslab+0x8c/0xb0 [ 449.871334][T22197] kmem_cache_alloc_node_noprof+0x57/0x320 [ 449.871364][T22197] ? __alloc_skb+0x101/0x320 [ 449.871417][T22197] __alloc_skb+0x101/0x320 [ 449.871454][T22197] netlink_ack+0xfd/0x500 [ 449.871491][T22197] ? avc_has_perm_noaudit+0x1b1/0x200 [ 449.871522][T22197] netlink_rcv_skb+0x192/0x220 [ 449.871567][T22197] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 449.871604][T22197] rtnetlink_rcv+0x1c/0x30 [ 449.871631][T22197] netlink_unicast+0x5c0/0x690 [ 449.871817][T22197] netlink_sendmsg+0x58b/0x6b0 [ 449.871925][T22197] ? __pfx_netlink_sendmsg+0x10/0x10 [ 449.871971][T22197] __sock_sendmsg+0x145/0x180 [ 449.872002][T22197] ____sys_sendmsg+0x31e/0x4e0 [ 449.872048][T22197] ___sys_sendmsg+0x17b/0x1d0 [ 449.872152][T22197] __x64_sys_sendmsg+0xd4/0x160 [ 449.872203][T22197] x64_sys_call+0x191e/0x2ff0 [ 449.872227][T22197] do_syscall_64+0xd2/0x200 [ 449.872282][T22197] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 449.872315][T22197] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 449.872344][T22197] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 449.872373][T22197] RIP: 0033:0x7f765d61eb69 [ 449.872446][T22197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 449.872488][T22197] RSP: 002b:00007f765bc7f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 449.872577][T22197] RAX: ffffffffffffffda RBX: 00007f765d845fa0 RCX: 00007f765d61eb69 [ 449.872596][T22197] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000005 [ 449.872612][T22197] RBP: 00007f765bc7f090 R08: 0000000000000000 R09: 0000000000000000 [ 449.872629][T22197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 449.872645][T22197] R13: 0000000000000000 R14: 00007f765d845fa0 R15: 00007ffe297b8308 [ 449.872682][T22197] [ 450.132878][T22199] macvtap5: left allmulticast mode [ 450.138921][T22199] veth0_macvtap: left allmulticast mode [ 450.144663][T22199] macvtap6: left allmulticast mode [ 450.161849][T22196] loop8: detected capacity change from 0 to 128 [ 450.171806][T22196] __nla_validate_parse: 6 callbacks suppressed [ 450.171829][T22196] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6266'. [ 450.187621][T22209] netlink: 196 bytes leftover after parsing attributes in process `syz.2.6271'. [ 450.218123][T22211] netlink: 300 bytes leftover after parsing attributes in process `syz.9.6272'. [ 450.380109][T22228] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 450.440403][T22230] 9pnet_fd: Insufficient options for proto=fd [ 450.450024][T22230] loop5: detected capacity change from 0 to 128 [ 450.569563][T22239] netlink: 196 bytes leftover after parsing attributes in process `syz.5.6284'. [ 450.628166][T22226] loop2: detected capacity change from 0 to 512 [ 450.658107][T22243] tmpfs: Bad value for 'mpol' [ 450.673540][T22226] ext2: Unknown parameter 'lazytime"errors' [ 450.820942][ T3409] vhci_hcd: vhci_device speed not set [ 450.878642][ T29] kauditd_printk_skb: 512 callbacks suppressed [ 450.878741][ T29] audit: type=1326 audit(1754325900.311:28790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22250 comm="syz.5.6289" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f765d61eb69 code=0x7ffc0000 [ 450.908721][ T29] audit: type=1326 audit(1754325900.311:28791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22250 comm="syz.5.6289" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f765d61eb69 code=0x7ffc0000 [ 450.933060][ T29] audit: type=1326 audit(1754325900.311:28792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22240 comm="syz.4.6285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f38b516eb69 code=0x7ffc0000 [ 450.956806][ T29] audit: type=1326 audit(1754325900.311:28793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22240 comm="syz.4.6285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b516eb69 code=0x7ffc0000 [ 450.980596][ T29] audit: type=1326 audit(1754325900.311:28794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22240 comm="syz.4.6285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f38b516eb69 code=0x7ffc0000 [ 451.004164][ T29] audit: type=1326 audit(1754325900.311:28795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22240 comm="syz.4.6285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b516eb69 code=0x7ffc0000 [ 451.027844][ T29] audit: type=1326 audit(1754325900.311:28796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22240 comm="syz.4.6285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f38b516eb69 code=0x7ffc0000 [ 451.051781][ T29] audit: type=1326 audit(1754325900.311:28797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22240 comm="syz.4.6285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f38b516eba3 code=0x7ffc0000 [ 451.075440][ T29] audit: type=1326 audit(1754325900.341:28798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22240 comm="syz.4.6285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f38b516d61f code=0x7ffc0000 [ 451.099218][ T29] audit: type=1326 audit(1754325900.341:28799): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22240 comm="syz.4.6285" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f38b516ebf7 code=0x7ffc0000 [ 451.210190][T22261] serio: Serial port pts0 [ 451.224077][T22267] netlink: 'syz.4.6296': attribute type 1 has an invalid length. [ 451.271503][T22272] netlink: 'syz.4.6299': attribute type 12 has an invalid length. [ 451.373759][T22284] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 451.382744][T22283] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=22283 comm=syz.4.6303 [ 451.396238][T22283] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=22283 comm=syz.4.6303 [ 451.440101][T22283] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(8) [ 451.446661][T22283] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 451.454378][T22283] vhci_hcd vhci_hcd.0: Device attached [ 451.472617][T22274] loop2: detected capacity change from 0 to 512 [ 451.479667][T22274] ext2: Unknown parameter 'lazytime"errors' [ 451.493552][T22283] netlink: 24 bytes leftover after parsing attributes in process `syz.4.6303'. [ 451.525935][T22289] vhci_hcd: connection closed [ 451.528166][T21124] vhci_hcd: stop threads [ 451.537532][T21124] vhci_hcd: release socket [ 451.542036][T21124] vhci_hcd: disconnect device [ 451.788395][T22297] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6309'. [ 451.798043][T22297] FAULT_INJECTION: forcing a failure. [ 451.798043][T22297] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 451.811164][T22297] CPU: 0 UID: 0 PID: 22297 Comm: syz.8.6309 Not tainted 6.16.0-syzkaller-11489-gd2eedaa3909b #0 PREEMPT(voluntary) [ 451.811199][T22297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 451.811214][T22297] Call Trace: [ 451.811220][T22297] [ 451.811304][T22297] __dump_stack+0x1d/0x30 [ 451.811331][T22297] dump_stack_lvl+0xe8/0x140 [ 451.811358][T22297] dump_stack+0x15/0x1b [ 451.811380][T22297] should_fail_ex+0x265/0x280 [ 451.811429][T22297] should_fail+0xb/0x20 [ 451.811461][T22297] should_fail_usercopy+0x1a/0x20 [ 451.811559][T22297] _copy_to_user+0x20/0xa0 [ 451.811593][T22297] simple_read_from_buffer+0xb5/0x130 [ 451.811629][T22297] proc_fail_nth_read+0x10e/0x150 [ 451.811661][T22297] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 451.811690][T22297] vfs_read+0x19d/0x6f0 [ 451.811714][T22297] ? __rcu_read_unlock+0x4f/0x70 [ 451.811743][T22297] ? __fget_files+0x184/0x1c0 [ 451.811779][T22297] ksys_read+0xda/0x1a0 [ 451.811806][T22297] __x64_sys_read+0x40/0x50 [ 451.811834][T22297] x64_sys_call+0x27bc/0x2ff0 [ 451.811863][T22297] do_syscall_64+0xd2/0x200 [ 451.811959][T22297] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 451.811992][T22297] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 451.812020][T22297] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 451.812043][T22297] RIP: 0033:0x7f6b542bd57c [ 451.812063][T22297] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 451.812166][T22297] RSP: 002b:00007f6b52927030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 451.812193][T22297] RAX: ffffffffffffffda RBX: 00007f6b544e5fa0 RCX: 00007f6b542bd57c [ 451.812224][T22297] RDX: 000000000000000f RSI: 00007f6b529270a0 RDI: 0000000000000005 [ 451.812239][T22297] RBP: 00007f6b52927090 R08: 0000000000000000 R09: 0000000000000000 [ 451.812253][T22297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 451.812265][T22297] R13: 0000000000000000 R14: 00007f6b544e5fa0 R15: 00007ffd215c0ed8 [ 451.812284][T22297] [ 452.029462][T22298] netlink: 96 bytes leftover after parsing attributes in process `syz.2.6308'. [ 452.032452][T22300] netlink: 'syz.8.6310': attribute type 1 has an invalid length. [ 452.046761][T22298] loop2: detected capacity change from 0 to 512 [ 452.053834][T22298] msdos: Unknown parameter 'dos1xfy' [ 452.266350][T22315] netlink: 'syz.4.6315': attribute type 21 has an invalid length. [ 452.275068][T22315] netlink: 132 bytes leftover after parsing attributes in process `syz.4.6315'. [ 452.284303][T22315] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6315'. [ 452.297033][T22315] netlink: 188 bytes leftover after parsing attributes in process `syz.4.6315'. [ 452.506146][T22323] loop5: detected capacity change from 0 to 128 [ 452.636641][T22395] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 453.020615][T22435] loop8: detected capacity change from 0 to 512 [ 453.041256][T22435] EXT4-fs warning (device loop8): ext4_enable_quotas:7168: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 453.056167][T22435] EXT4-fs (loop8): mount failed [ 453.120178][ T10] kernel write not supported for file /34/attr/exec (pid: 10 comm: kworker/0:1) [ 453.257509][T22446] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=22446 comm=syz.5.6350 [ 453.276122][T22443] futex_wake_op: syz.8.6349 tries to shift op by -1; fix this program [ 453.407775][T22460] netlink: 'syz.9.6354': attribute type 10 has an invalid length. [ 453.417282][T22460] team0: Port device hsr_slave_0 added [ 453.604133][T22479] netlink: 'syz.5.6363': attribute type 1 has an invalid length. [ 453.664760][T22489] loop5: detected capacity change from 0 to 512 [ 453.672811][T22491] FAULT_INJECTION: forcing a failure. [ 453.672811][T22491] name failslab, interval 1, probability 0, space 0, times 0 [ 453.674260][T22489] EXT4-fs error (device loop5): ext4_orphan_get:1392: inode #15: comm syz.5.6365: casefold flag without casefold feature [ 453.685625][T22491] CPU: 0 UID: 0 PID: 22491 Comm: syz.4.6366 Not tainted 6.16.0-syzkaller-11489-gd2eedaa3909b #0 PREEMPT(voluntary) [ 453.685743][T22491] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 453.685761][T22491] Call Trace: [ 453.685771][T22491] [ 453.685782][T22491] __dump_stack+0x1d/0x30 [ 453.685813][T22491] dump_stack_lvl+0xe8/0x140 [ 453.685841][T22491] dump_stack+0x15/0x1b [ 453.685865][T22491] should_fail_ex+0x265/0x280 [ 453.685963][T22491] should_failslab+0x8c/0xb0 [ 453.685999][T22491] kmem_cache_alloc_noprof+0x50/0x310 [ 453.686095][T22491] ? security_file_alloc+0x32/0x100 [ 453.686141][T22491] security_file_alloc+0x32/0x100 [ 453.686185][T22491] init_file+0x5c/0x1d0 [ 453.686255][T22491] alloc_empty_file+0x8b/0x200 [ 453.686297][T22491] alloc_file_pseudo+0xc6/0x160 [ 453.686346][T22491] __shmem_file_setup+0x1de/0x210 [ 453.686472][T22491] shmem_file_setup+0x3b/0x50 [ 453.686521][T22491] __se_sys_memfd_create+0x2c3/0x590 [ 453.686553][T22491] __x64_sys_memfd_create+0x31/0x40 [ 453.686623][T22491] x64_sys_call+0x2abe/0x2ff0 [ 453.686708][T22491] do_syscall_64+0xd2/0x200 [ 453.686742][T22491] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 453.686776][T22491] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 453.686808][T22491] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 453.686851][T22491] RIP: 0033:0x7f38b516eb69 [ 453.686873][T22491] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 453.686949][T22491] RSP: 002b:00007f38b37d6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 453.686976][T22491] RAX: ffffffffffffffda RBX: 0000000000000531 RCX: 00007f38b516eb69 [ 453.686995][T22491] RDX: 00007f38b37d6ef0 RSI: 0000000000000000 RDI: 00007f38b51f2784 [ 453.687013][T22491] RBP: 0000200000000640 R08: 00007f38b37d6bb7 R09: 00007f38b37d6e40 [ 453.687034][T22491] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 453.687052][T22491] R13: 00007f38b37d6ef0 R14: 00007f38b37d6eb0 R15: 00002000000001c0 [ 453.687081][T22491] [ 453.691642][T22491] lo: entered promiscuous mode [ 453.699767][T22489] EXT4-fs error (device loop5): ext4_orphan_get:1397: comm syz.5.6365: couldn't read orphan inode 15 (err -117) [ 453.710632][T22491] tunl0: entered promiscuous mode [ 453.724690][T22489] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 453.726974][T22491] gre0: entered promiscuous mode [ 453.790875][ T3409] kernel write not supported for file /210/attr/exec (pid: 3409 comm: kworker/1:4) [ 453.794380][T22491] gretap0: entered promiscuous mode [ 453.956089][T22491] erspan0: entered promiscuous mode [ 453.961408][T22491] ip_vti0: entered promiscuous mode [ 453.966688][T22491] ip6_vti0: entered promiscuous mode [ 453.972160][T22491] sit0: entered promiscuous mode [ 453.977237][T22491] ip6tnl0: entered promiscuous mode [ 453.982532][T22491] ip6gre0: entered promiscuous mode [ 453.987862][T22491] syz_tun: entered promiscuous mode [ 453.993169][T22491] ip6gretap0: entered promiscuous mode [ 453.998861][T22491] bridge0: entered promiscuous mode [ 454.004115][T22491] vcan0: entered promiscuous mode [ 454.009226][T22491] bond0: entered promiscuous mode [ 454.014265][T22491] bond_slave_0: entered promiscuous mode [ 454.019984][T22491] bond_slave_1: entered promiscuous mode [ 454.025860][T22491] team0: entered promiscuous mode [ 454.031034][T22491] team_slave_0: entered promiscuous mode [ 454.036775][T22491] team_slave_1: entered promiscuous mode [ 454.042826][T22491] dummy0: entered promiscuous mode [ 454.048065][T22491] nlmon0: entered promiscuous mode [ 454.053977][T22491] caif0: entered promiscuous mode [ 454.059215][T22491] batadv0: entered promiscuous mode [ 454.064565][T22491] veth0: entered promiscuous mode [ 454.069761][T22491] veth1: entered promiscuous mode [ 454.074912][T22491] wg0: entered promiscuous mode [ 454.080437][T22491] wg1: entered promiscuous mode [ 454.085415][T22491] wg2: entered promiscuous mode [ 454.090461][T22491] veth0_to_bridge: entered promiscuous mode [ 454.096566][T22491] veth1_to_bridge: entered promiscuous mode [ 454.102681][T22491] veth0_to_bond: entered promiscuous mode [ 454.109395][T22491] veth1_to_bond: entered promiscuous mode [ 454.115369][T22491] veth0_to_team: entered promiscuous mode [ 454.121269][T22491] veth1_to_team: entered promiscuous mode [ 454.127345][T22491] veth0_to_batadv: entered promiscuous mode [ 454.133396][T22491] batadv_slave_0: entered promiscuous mode [ 454.140004][T22491] veth1_to_batadv: entered promiscuous mode [ 454.146039][T22491] batadv_slave_1: entered promiscuous mode [ 454.151992][T22491] xfrm0: entered promiscuous mode [ 454.157188][T22491] veth0_to_hsr: entered promiscuous mode [ 454.163105][T22491] veth1_to_hsr: entered promiscuous mode [ 454.169600][T22491] hsr0: entered promiscuous mode [ 454.174621][T22491] veth1_virt_wifi: entered promiscuous mode [ 454.180654][T22491] veth0_virt_wifi: entered promiscuous mode [ 454.186825][T22491] vlan0: entered promiscuous mode [ 454.192155][T22491] vlan1: entered promiscuous mode [ 454.197334][T22491] macvlan0: entered promiscuous mode [ 454.203384][T22491] macvlan1: entered promiscuous mode [ 454.208769][T22491] ipvlan0: entered promiscuous mode [ 454.214085][T22491] ipvlan1: entered promiscuous mode [ 454.219549][T22491] macvtap0: entered promiscuous mode [ 454.224897][T22491] macsec0: entered promiscuous mode [ 454.230808][T22491] geneve0: entered promiscuous mode [ 454.236208][T22491] geneve1: entered promiscuous mode [ 454.241556][T22491] netdevsim netdevsim4 netdevsim0: entered promiscuous mode [ 454.250291][T22491] netdevsim netdevsim4 netdevsim1: entered promiscuous mode [ 454.257759][T22491] netdevsim netdevsim4 netdevsim2: entered promiscuous mode [ 454.265895][T22491] netdevsim netdevsim4 netdevsim3: entered promiscuous mode [ 454.273707][T22491] erspan1: entered promiscuous mode [ 454.279219][T22491] ip6erspan0: entered promiscuous mode [ 454.284873][T22491] bridge1: entered promiscuous mode [ 454.290753][T22491] veth2: entered promiscuous mode [ 454.295900][T22491] veth3: entered promiscuous mode [ 454.359985][T22504] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 454.376297][T22504] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 454.391040][T22504] blktrace: Concurrent blktraces are not allowed on sg0 [ 454.408764][T22511] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 454.425814][T22508] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 454.467699][T21514] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 454.502901][T22522] syzkaller1: entered promiscuous mode [ 454.508663][T22522] syzkaller1: entered allmulticast mode [ 454.822325][T22530] loop5: detected capacity change from 0 to 2048 [ 454.840867][T22530] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 454.882185][T21514] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 454.906905][T22547] netlink: 'syz.5.6385': attribute type 1 has an invalid length. [ 454.915050][T22546] netlink: 'syz.5.6385': attribute type 1 has an invalid length. [ 454.955379][T22543] rdma_rxe: rxe_newlink: failed to add team_slave_0 [ 454.987628][T22556] lo: left promiscuous mode [ 454.992488][T22556] tunl0: left promiscuous mode [ 454.997525][T22556] gre0: left promiscuous mode [ 455.003055][T22556] gretap0: left promiscuous mode [ 455.008144][T22556] erspan0: left promiscuous mode [ 455.013311][T22556] ip_vti0: left promiscuous mode [ 455.018555][T22556] ip6_vti0: left promiscuous mode [ 455.023693][T22556] sit0: left promiscuous mode [ 455.029292][T22556] ip6tnl0: left promiscuous mode [ 455.034451][T22556] ip6gre0: left promiscuous mode [ 455.039502][T22556] syz_tun: left promiscuous mode [ 455.040315][T22558] tmpfs: Bad value for 'mpol' [ 455.044659][T22556] ip6gretap0: left promiscuous mode [ 455.054531][T22556] bridge0: left promiscuous mode [ 455.060260][T22556] vcan0: left promiscuous mode [ 455.065095][T22556] bond0: left promiscuous mode [ 455.070177][T22556] team0: left promiscuous mode [ 455.081627][T22556] dummy0: left promiscuous mode [ 455.086756][T22556] nlmon0: left promiscuous mode [ 455.092199][T22556] caif0: left promiscuous mode [ 455.097268][T22556] batadv0: left promiscuous mode [ 455.102340][T22556] veth0: left promiscuous mode [ 455.107346][T22556] veth1: left promiscuous mode [ 455.112303][T22556] wg0: left promiscuous mode [ 455.116991][T22556] wg1: left promiscuous mode [ 455.121770][T22556] wg2: left promiscuous mode [ 455.126565][T22556] veth0_to_bridge: left promiscuous mode [ 455.133086][T22556] veth1_to_bridge: left promiscuous mode [ 455.139045][T22556] veth0_to_bond: left promiscuous mode [ 455.144690][T22556] bond_slave_0: left promiscuous mode [ 455.150317][T22556] veth1_to_bond: left promiscuous mode [ 455.155875][T22556] bond_slave_1: left promiscuous mode [ 455.161508][T22556] veth0_to_team: left promiscuous mode [ 455.167214][T22556] team_slave_0: left promiscuous mode [ 455.172855][T22556] veth1_to_team: left promiscuous mode [ 455.178429][T22556] team_slave_1: left promiscuous mode [ 455.183898][T22556] veth0_to_batadv: left promiscuous mode [ 455.189704][T22556] batadv_slave_0: left promiscuous mode [ 455.195547][T22556] veth1_to_batadv: left promiscuous mode [ 455.201314][T22556] batadv_slave_1: left promiscuous mode [ 455.207075][T22556] xfrm0: left promiscuous mode [ 455.212118][T22556] veth0_to_hsr: left promiscuous mode [ 455.217888][T22556] veth1_to_hsr: left promiscuous mode [ 455.223518][T22556] hsr0: left promiscuous mode [ 455.228376][T22556] veth1_virt_wifi: left promiscuous mode [ 455.234210][T22556] veth0_virt_wifi: left promiscuous mode [ 455.240443][T22556] vlan0: left promiscuous mode [ 455.245693][T22556] vlan1: left promiscuous mode [ 455.250806][T22556] macvlan0: left promiscuous mode [ 455.256013][T22556] macvlan1: left promiscuous mode [ 455.261224][T22556] ipvlan0: left promiscuous mode [ 455.266251][T22556] ipvlan1: left promiscuous mode [ 455.271655][T22556] macvtap0: left promiscuous mode [ 455.276783][T22556] macsec0: left promiscuous mode [ 455.281952][T22556] geneve0: left promiscuous mode [ 455.286991][T22556] geneve1: left promiscuous mode [ 455.292356][T22556] netdevsim netdevsim4 netdevsim0: left promiscuous mode [ 455.299557][T22556] netdevsim netdevsim4 netdevsim1: left promiscuous mode [ 455.306895][T22556] netdevsim netdevsim4 netdevsim2: left promiscuous mode [ 455.343382][T22563] loop5: detected capacity change from 0 to 512 [ 455.354456][T22556] netdevsim netdevsim4 netdevsim3: left promiscuous mode [ 455.361811][T22556] erspan1: left promiscuous mode [ 455.364550][T22563] EXT4-fs: test_dummy_encryption option not supported [ 455.367212][T22556] ip6erspan0: left promiscuous mode [ 455.378939][T22556] bridge1: left promiscuous mode [ 455.384031][T22556] veth2: left promiscuous mode [ 455.388889][T22556] veth3: left promiscuous mode [ 455.485678][T22566] loop2: detected capacity change from 0 to 512 [ 455.511486][T22566] EXT4-fs: Ignoring removed i_version option [ 455.517657][T22566] EXT4-fs: Ignoring removed nobh option [ 455.576174][T22566] EXT4-fs (loop2): encrypted files will use data=ordered instead of data journaling mode [ 455.783097][T22583] __nla_validate_parse: 13 callbacks suppressed [ 455.783114][T22583] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6397'. [ 455.829552][T22583] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6397'. [ 455.902995][T22566] EXT4-fs (loop2): 1 truncate cleaned up [ 455.910312][T22566] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 456.015867][T22585] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(8) [ 456.022426][T22585] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 456.030104][T22585] vhci_hcd vhci_hcd.0: Device attached [ 456.040159][T22583] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6397'. [ 456.144529][T22583] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6397'. [ 456.220560][T22583] vhci_hcd: invalid port number 96 [ 456.225732][T22583] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 456.271517][T22583] loop8: detected capacity change from 0 to 512 [ 456.294980][T22583] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 [ 456.304008][ T36] usb 9-1: new high-speed USB device number 7 using vhci_hcd [ 456.332372][ T29] kauditd_printk_skb: 402 callbacks suppressed [ 456.332390][ T29] audit: type=1326 audit(1754325905.761:29201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22577 comm="syz.8.6397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b542beb69 code=0x7ffc0000 [ 456.367202][ T29] audit: type=1326 audit(1754325905.791:29202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22577 comm="syz.8.6397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6b542beb69 code=0x7ffc0000 [ 456.391646][ T29] audit: type=1326 audit(1754325905.791:29203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22577 comm="syz.8.6397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b542beb69 code=0x7ffc0000 [ 456.415315][ T29] audit: type=1326 audit(1754325905.791:29204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22577 comm="syz.8.6397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b542beb69 code=0x7ffc0000 [ 456.444615][T22589] loop8: detected capacity change from 0 to 512 [ 456.450988][T22586] vhci_hcd: connection reset by peer [ 456.478446][T22382] vhci_hcd: stop threads [ 456.482777][T22382] vhci_hcd: release socket [ 456.487227][T22382] vhci_hcd: disconnect device [ 456.511830][T22589] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 456.512156][ T29] audit: type=1326 audit(1754325905.871:29205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22577 comm="syz.8.6397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f6b542beb69 code=0x7ffc0000 [ 456.530049][T22589] ext4 filesystem being mounted at /25/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 456.548760][ T29] audit: type=1326 audit(1754325905.871:29206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22577 comm="syz.8.6397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b542beb69 code=0x7ffc0000 [ 456.582597][ T29] audit: type=1326 audit(1754325905.871:29207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22577 comm="syz.8.6397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b542beb69 code=0x7ffc0000 [ 456.615473][T21701] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 456.642736][ T29] audit: type=1326 audit(1754325906.071:29208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22577 comm="syz.8.6397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=108 compat=0 ip=0x7f6b542beb69 code=0x7ffc0000 [ 456.667025][ T29] audit: type=1326 audit(1754325906.071:29209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22577 comm="syz.8.6397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b542beb69 code=0x7ffc0000 [ 456.691543][ T29] audit: type=1326 audit(1754325906.071:29210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22577 comm="syz.8.6397" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6b542beb69 code=0x7ffc0000 [ 456.760584][T21976] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 456.865448][T22601] macvtap2: entered allmulticast mode [ 456.870959][T22601] veth0_macvtap: entered allmulticast mode [ 456.880597][T22601] serio: Serial port pts0 [ 457.068883][T22605] veth0_macvtap: left allmulticast mode [ 457.077854][T22605] macvtap2: left allmulticast mode [ 457.093927][T22610] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 457.296364][T22624] macvtap1: entered allmulticast mode [ 457.301838][T22624] veth0_macvtap: entered allmulticast mode [ 457.335083][T22624] serio: Serial port pts0 [ 457.416812][T22629] loop2: detected capacity change from 0 to 512 [ 457.439394][T22629] EXT4-fs (loop2): mounting ext2 file system using the ext4 subsystem [ 457.466697][T22633] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6415'. [ 457.477467][T22629] EXT4-fs (loop2): orphan cleanup on readonly fs [ 457.497114][T22629] EXT4-fs error (device loop2): ext4_orphan_get:1418: comm syz.2.6414: bad orphan inode 15 [ 457.546189][T22629] ext4_test_bit(bit=14, block=18) = 1 [ 457.551828][T22629] is_bad_inode(inode)=0 [ 457.556027][T22629] NEXT_ORPHAN(inode)=1023 [ 457.560405][T22629] max_ino=32 [ 457.563702][T22629] i_nlink=0 [ 457.603190][T22629] EXT4-fs error (device loop2): ext4_xattr_delete_inode:2962: inode #15: comm syz.2.6414: corrupted xattr block 19: e_value size too large [ 457.668397][T22629] EXT4-fs warning (device loop2): ext4_evict_inode:274: xattr delete (err -117) [ 457.690822][T22629] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 457.709695][T22639] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 457.851092][T22646] netlink: 'syz.8.6420': attribute type 1 has an invalid length. [ 458.057090][T22647] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(9) [ 458.063688][T22647] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 458.072048][T22647] vhci_hcd vhci_hcd.0: Device attached [ 458.115065][T22652] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6421'. [ 458.255890][T22648] vhci_hcd: connection closed [ 458.256812][T22381] vhci_hcd: stop threads [ 458.266537][T22381] vhci_hcd: release socket [ 458.271017][T22381] vhci_hcd: disconnect device [ 458.275718][ T3395] vhci_hcd: vhci_device speed not set [ 458.291286][T22654] FAULT_INJECTION: forcing a failure. [ 458.291286][T22654] name failslab, interval 1, probability 0, space 0, times 0 [ 458.303981][T22654] CPU: 0 UID: 0 PID: 22654 Comm: syz.4.6422 Not tainted 6.16.0-syzkaller-11489-gd2eedaa3909b #0 PREEMPT(voluntary) [ 458.304064][T22654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 458.304077][T22654] Call Trace: [ 458.304084][T22654] [ 458.304108][T22654] __dump_stack+0x1d/0x30 [ 458.304132][T22654] dump_stack_lvl+0xe8/0x140 [ 458.304156][T22654] dump_stack+0x15/0x1b [ 458.304175][T22654] should_fail_ex+0x265/0x280 [ 458.304225][T22654] should_failslab+0x8c/0xb0 [ 458.304277][T22654] kmem_cache_alloc_noprof+0x50/0x310 [ 458.304306][T22654] ? alloc_empty_file+0x76/0x200 [ 458.304400][T22654] alloc_empty_file+0x76/0x200 [ 458.304471][T22654] alloc_file_pseudo+0xc6/0x160 [ 458.304514][T22654] __shmem_file_setup+0x1de/0x210 [ 458.304571][T22654] shmem_kernel_file_setup+0x3e/0x50 [ 458.304615][T22654] newseg+0x2ce/0x670 [ 458.304656][T22654] ipcget+0x33d/0x4f0 [ 458.304698][T22654] __x64_sys_shmget+0xa5/0xd0 [ 458.304734][T22654] x64_sys_call+0x2cef/0x2ff0 [ 458.304773][T22654] do_syscall_64+0xd2/0x200 [ 458.304805][T22654] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 458.304835][T22654] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 458.304857][T22654] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 458.304944][T22654] RIP: 0033:0x7f38b516eb69 [ 458.305006][T22654] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 458.305032][T22654] RSP: 002b:00007f38b37d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000001d [ 458.305057][T22654] RAX: ffffffffffffffda RBX: 00007f38b5395fa0 RCX: 00007f38b516eb69 [ 458.305076][T22654] RDX: 0000000000000020 RSI: 0000000000004000 RDI: 0000000000000000 [ 458.305133][T22654] RBP: 00007f38b37d7090 R08: 0000000000000000 R09: 0000000000000000 [ 458.305150][T22654] R10: 0000200000ffa000 R11: 0000000000000246 R12: 0000000000000002 [ 458.305167][T22654] R13: 0000000000000000 R14: 00007f38b5395fa0 R15: 00007ffe6fe7fc48 [ 458.305193][T22654] [ 458.595883][T22662] loop8: detected capacity change from 0 to 512 [ 458.608609][T22662] EXT4-fs: Ignoring removed nomblk_io_submit option [ 458.631888][T22662] EXT4-fs (loop8): encrypted files will use data=ordered instead of data journaling mode [ 458.668267][T22662] EXT4-fs error (device loop8): ext4_mb_generate_buddy:1289: group 0, block bitmap and bg descriptor inconsistent: 191 vs 220 free clusters [ 458.670510][T22662] EXT4-fs (loop8): 1 truncate cleaned up [ 458.671486][T22662] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 458.699272][T22662] vhci_hcd: invalid port number 224 [ 458.712039][T21976] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 458.748775][T22590] ================================================================== [ 458.748820][T22590] BUG: KCSAN: data-race in __bpf_get_stackid / __bpf_get_stackid [ 458.748872][T22590] [ 458.748881][T22590] write to 0xffff8881195e0c98 of 4 bytes by task 2955 on cpu 1: [ 458.748903][T22590] __bpf_get_stackid+0x76b/0x800 [ 458.748937][T22590] bpf_get_stackid+0xee/0x120 [ 458.748968][T22590] bpf_get_stackid_raw_tp+0xf6/0x120 [ 458.748992][T22590] bpf_prog_e6fc920cfeff8120+0x2a/0x32 [ 458.749010][T22590] bpf_trace_run2+0x107/0x1c0 [ 458.749038][T22590] kfree+0x27b/0x320 [ 458.749069][T22590] security_sb_free+0x38/0x80 [ 458.749097][T22590] destroy_super_work+0x29/0x100 [ 458.749129][T22590] process_scheduled_works+0x4ce/0x9d0 [ 458.749160][T22590] worker_thread+0x582/0x770 [ 458.749197][T22590] kthread+0x486/0x510 [ 458.749221][T22590] ret_from_fork+0xdd/0x150 [ 458.749246][T22590] ret_from_fork_asm+0x1a/0x30 [ 458.749268][T22590] [ 458.749273][T22590] read to 0xffff8881195e0c98 of 4 bytes by task 22590 on cpu 0: [ 458.749289][T22590] __bpf_get_stackid+0x287/0x800 [ 458.749317][T22590] bpf_get_stackid+0xee/0x120 [ 458.749341][T22590] bpf_get_stackid_raw_tp+0xf6/0x120 [ 458.749365][T22590] bpf_prog_e6fc920cfeff8120+0x2a/0x32 [ 458.749389][T22590] bpf_trace_run2+0x107/0x1c0 [ 458.749416][T22590] kfree+0x27b/0x320 [ 458.749448][T22590] ___sys_recvmsg+0x135/0x370 [ 458.749471][T22590] do_recvmmsg+0x1ef/0x540 [ 458.749488][T22590] __x64_sys_recvmmsg+0xe5/0x170 [ 458.749510][T22590] x64_sys_call+0x27a6/0x2ff0 [ 458.749539][T22590] do_syscall_64+0xd2/0x200 [ 458.749570][T22590] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 458.749597][T22590] [ 458.749600][T22590] value changed: 0x6acdd85a -> 0x5b70c76d [ 458.749611][T22590] [ 458.749615][T22590] Reported by Kernel Concurrency Sanitizer on: [ 458.749627][T22590] CPU: 0 UID: 0 PID: 22590 Comm: syz.9.6398 Not tainted 6.16.0-syzkaller-11489-gd2eedaa3909b #0 PREEMPT(voluntary) [ 458.749654][T22590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 458.749668][T22590] ================================================================== [ 458.962761][T21701] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 461.458342][ T36] vhci_hcd: vhci_device speed not set