last executing test programs: 6m23.111886764s ago: executing program 4 (id=142): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ee}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000002380)={r1, 0x0, 0x2d, 0x0, @val=@netfilter={0x2, 0x4, 0x600}}, 0x20) r2 = socket(0x2, 0x3, 0xff) sendmmsg$inet(r2, &(0x7f0000001280)=[{{&(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10, &(0x7f0000001480)=[{&(0x7f0000000040)="f550b36301e9a32630461b1edea61a15dc8e30c9", 0x14}], 0x1, &(0x7f0000001500)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @local, @local}}}], 0x20}}], 0x1, 0x20044000) 6m23.095623264s ago: executing program 4 (id=143): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$packet(0x11, 0xa, 0x300) socket$packet(0x11, 0xa, 0x300) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 6m22.977690346s ago: executing program 4 (id=145): r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000640)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@discard}, {@data_err_ignore}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@bh}, {@errors_remount}]}, 0x11, 0x553, &(0x7f0000001080)="$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") r1 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x143142, 0x40) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYRES8=r0, @ANYRES64=r3, @ANYRESDEC=r0], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) pwritev2(r1, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) ioctl$EXT4_IOC_GET_ES_CACHE(r1, 0xc020662a, &(0x7f0000000dc0)={0x9, 0x1, 0x5, 0x7f}) 6m22.865552488s ago: executing program 4 (id=147): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18020000ffffffff00000000000000001801000011646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000006000000850000007d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000400)='itimer_state\x00', r2}, 0x18) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r3}, 0x10) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f0000000480)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) setitimer(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000410, &(0x7f00000000c0)={[{@debug}]}, 0xc1, 0x7df, &(0x7f00000017c0)="$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") socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x100b28, 0x1, 0x0, 0x1, 0xa, 0x21005, 0x9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r6 = epoll_create1(0x0) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/wakeup_count', 0x141000, 0x20) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f0000000200)={0xa000000a}) finit_module(r7, 0x0, 0x3) 6m22.627440443s ago: executing program 4 (id=153): openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb7030000f9ff0000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') removexattr(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000200)=ANY=[@ANYBLOB='o']) 6m21.885231137s ago: executing program 4 (id=162): r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0xd000, @remote}, 0x10, 0x0}, 0x0) 6m21.856438928s ago: executing program 32 (id=162): r0 = socket$rds(0x15, 0x5, 0x0) bind$rds(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) sendmsg$rds(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0xd000, @remote}, 0x10, 0x0}, 0x0) 4m50.612436732s ago: executing program 2 (id=2537): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) sigaltstack(&(0x7f0000000140)={0x0, 0x80000002}, 0x0) 4m50.579138962s ago: executing program 2 (id=2538): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x1b, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x640ca0b72053fe29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='kfree\x00', r0}, 0x18) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r1, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x10, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1802000000c400000000000000000000850000003e00000095"], &(0x7f00000000c0)='GPL\x00'}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB="1200000004000000080000000b"], 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000540)=ANY=[@ANYRES32=r3, @ANYRES32=r2, @ANYBLOB='\a'], 0x10) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r3, &(0x7f0000000240), &(0x7f0000000140)=@tcp6=r1}, 0x20) r4 = accept4$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c, 0x0) sendmmsg$inet6(r4, &(0x7f0000008c00), 0x0, 0x20004810) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$gtp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$GTP_CMD_NEWPDP(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000fcdb34c65b0b2f83e7198d10", @ANYRES32=0x0, @ANYBLOB="08000800000000000800020001000000"], 0x2c}}, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a00)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0xc94284a3061bb7fe, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000b00)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x1034}, 0x18) truncate(&(0x7f0000000040)='./file1\x00', 0x1000) 4m49.748467598s ago: executing program 2 (id=2561): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000080)={0xfdfffffa, 0x0}, 0xfffffffffffffe50) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000000c0), 0x101000, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x11, 0xd, &(0x7f00000000c0)=ANY=[], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) socket$packet(0x11, 0x2, 0x300) getsockname$packet(r1, &(0x7f00000001c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000240)=0x14) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x1, 0x7ffc1ffb}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000380)='kmem_cache_free\x00', r4}, 0x18) r5 = signalfd4(0xffffffffffffffff, &(0x7f0000000180)={[0x4000000000]}, 0x8, 0x0) faccessat2(r5, &(0x7f0000000040)='\x00', 0x2, 0x1200) r6 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001800), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r6, &(0x7f0000001980)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x78}}, 0x18) r7 = socket$inet6(0xa, 0x800000000000002, 0x0) sendto$inet6(r7, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0xa, 0x4e24, 0x0, @local}, 0x1c) 4m49.421779445s ago: executing program 2 (id=2564): r0 = creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39ddd8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x7, 0x4, 0x208, 0x1}, 0x50) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) ioctl$AUTOFS_DEV_IOCTL_READY(r0, 0xc0189376, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r1, {0x100}}, './file0/../file0\x00'}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000002340)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000002140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3804402, &(0x7f0000000340), 0xfd, 0x564, &(0x7f0000000b00)="$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") r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000007c0), 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0/../file0\x00', &(0x7f0000000000)='tracefs\x00', 0x800, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r5, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x1018, 0xffffffffffffffff, {0x29}}, './file0\x00'}) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000021000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x18) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) write$binfmt_misc(r7, &(0x7f0000000240), 0xfffffecc) ioctl$TIOCSTI(r7, 0x5412, &(0x7f0000000040)=0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={0x0}, 0x18) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0x3000010, &(0x7f0000000100)={[{@resuid}, {@nobh}]}, 0x1, 0x519, &(0x7f00000009c0)="$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") write$vga_arbiter(r0, &(0x7f0000000080)=@target={'target ', {'PCI:', 'b', ':', '3', ':', '14', '.', '4'}}, 0x14) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) 4m48.518786603s ago: executing program 2 (id=2588): r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) socket$netlink(0x10, 0x3, 0xf) r1 = socket$inet(0x2, 0x80001, 0x84) listen(r1, 0x3a5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port1\x00', 0x62, 0x11cfa, 0x0, 0x8000008, 0x3, 0x4, 0x1, 0x0, 0x7cce8c743ee810da}) bpf$BPF_MAP_GET_FD_BY_ID(0xe, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40505330, &(0x7f00000001c0)={0x800000, 0x0, 0xfdfffffd, 0x5, 0x3ffd, 0x7}) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40505330, &(0x7f0000000300)={0x800080, 0x7ff, 0x2, 0xfff, 0xfd, 0x4}) 4m48.245678818s ago: executing program 2 (id=2596): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7fff}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000200), &(0x7f0000000240)=r1}, 0x20) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x543, 0x0, 0x0, 0x0, 0x800, 0x0, 0x10000, 0x0, 0xfffffffffffffffe}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 4m48.221122689s ago: executing program 33 (id=2596): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7fff}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000200), &(0x7f0000000240)=r1}, 0x20) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x543, 0x0, 0x0, 0x0, 0x800, 0x0, 0x10000, 0x0, 0xfffffffffffffffe}, 0x0, 0x1, 0xffffffffffffffff, 0x0) 3m23.741325671s ago: executing program 1 (id=4010): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x80, 0x7}) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000340)=ANY=[@ANYBLOB="7012a6ad2dbb7f7bbf070d214918ee9c53a4457d48cda5ae5bade21019a3bdf8608d20611924c852d63f837ccfd0aacf06e702144f7b90a4703796a5c0561e3433a4c845f3ae3c05d4941c90dde2d73a3f7bba12cfd20669f087bf268deebf5357da5c9c3b127339f370f92611efbffbb7ea136e154418140a92a914d5e6fbac79c23b37c50ca6f2ef41458cf7f2a030cfa9828849bd0191959054931657cfc56c1cc16b"], &(0x7f0000000100)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r1, 0x0, 0x401}, 0x11) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kyber_throttled\x00'}, 0x18) r2 = socket$inet_smc(0x2b, 0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) getsockopt$inet_mreqsrc(r2, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x8) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x2c, 0x0, 0xa, 0x301, 0x0, 0x0, {0x1}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_TABLE_NAME={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0x5c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}, @NFTA_CHAIN_HOOK={0x30, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8}, @NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth1_to_bridge\x00'}, @NFTA_HOOK_HOOKNUM={0x8}]}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x14, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}}], {0x14}}, 0xc4}}, 0x0) fcntl$lock(r0, 0x25, &(0x7f0000000180)={0x1, 0x1, 0x7, 0x1}) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000280)={{r6}, &(0x7f0000000040), &(0x7f0000000180)='%pS \x00'}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) set_mempolicy(0x8006, &(0x7f0000000040)=0xfff, 0x5) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1, 0x0, 0x0, 0x2) open(0x0, 0x145900, 0x28) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) syz_create_resource$binfmt(&(0x7f0000000240)='./file1\x00') r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000079e02200850000006d00000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x88182, 0x0) writev(r9, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}, {&(0x7f0000000080)='0', 0x1}], 0x2) 3m23.667508622s ago: executing program 1 (id=4012): ioctl$RNDCLEARPOOL(0xffffffffffffffff, 0x5206, 0x0) connect$inet(0xffffffffffffffff, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000002100), 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x8, &(0x7f0000000000)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}}]}, &(0x7f0000000640)='syzkaller\x00', 0x7, 0xf9, &(0x7f0000000080)=""/249}, 0x94) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="140000001000010000000000000000000300000a98000000060a0b040000000000000000020000006c000480680001800a000100696e6e65720000005800028008000240000000840800034000000007080004400000000f0800014000000000340005800c0001007061796c6f61640024000280080004400000002708000340000000b9080002400000000608000140000000080900010073797a30000000000900020073797a32"], 0xc0}, 0x1, 0x0, 0x0, 0x8054}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000780)='sys_enter\x00', r5}, 0x18) setpriority(0x1, 0x0, 0x906) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00'}, 0x10) syz_open_dev$evdev(&(0x7f0000000040), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r6 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) ioctl$PPPIOCNEWUNIT(r6, 0xc004743e, &(0x7f0000000140)) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) write$cgroup_subtree(r7, &(0x7f0000000100)=ANY=[], 0x32600) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000001, 0x12, r7, 0x0) ioctl$PPPIOCSPASS(r6, 0x40107447, &(0x7f00000000c0)={0x0, 0x0}) 3m23.24620519s ago: executing program 1 (id=4020): syz_mount_image$msdos(&(0x7f0000000040), &(0x7f0000000000)='./file0\x00', 0x40c2, &(0x7f00000000c0)=ANY=[@ANYRESOCT], 0xfe, 0x25f, &(0x7f0000000500)="$eJzs3cFqE0EYB/AvTZqsBbVn8bDgxZOobxCkghAQqrkbaL20Imwv0VMeQ/ANfByPPkZPvUXaXVy7LSIl6WS7vx+E/dj/DjuTQCaHmeyHx5+ODj6ffFz++hZZlscgYhFnEbuxFf0o9arj1kU9jGHUFgEAtM3+/mycug+sUO/qqaIYz7YjYnQlm/64pV4BAAAAAAAAAACwYjdZ//836/8BoH2s/7/7imI826l+v11m/T8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACQztly+XD5j1fq/gEAq2f+B4DuMf8DQPeY/wGge949qIo8zyJOF/PpfFoey9Ov30z2nucXdutWp/P5dLuqJ3svyjxv5jtV+5fX5sN4+qTMz7NXbyeNfBQH6xw4AAAAAAAAAAAAAAAAAAAAbJBn+R+N/f39Mj+/YBTX5FnE90v/D9DYvz+IR4PbHAkAAAAAAAAAAAAAAAAAAAC018mXr0ez4+PDorPFz35EsrtHr/wYUr8JjeJe3KBVtmmjaFHRj4jDUQxivfd6f///L079zQQAAAAAAAAAAAAAAAAAAN1Tb/pN3RMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAASKd+/v/6itRjBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALrhdwAAAP//UhGHcQ==") syz_read_part_table(0x5e4, &(0x7f0000000000)="$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") mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1000003) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000780)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000006c59850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) creat(&(0x7f0000000040)='./bus\x00', 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) mount(&(0x7f00000000c0), &(0x7f0000000140)='./bus\x00', 0x0, 0x18c7c80, 0x0) creat(&(0x7f0000000000)='./bus\x00', 0x109) openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2241, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000780)='./file0\x00', 0x8000) 3m22.973594036s ago: executing program 1 (id=4027): perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4c094, 0x2, @perf_config_ext={0x9, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x100440c, &(0x7f0000000580), 0x5, 0x4f3, &(0x7f00000005c0)="$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") r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$setopts(0x4200, r0, 0xda4, 0x2) capget(&(0x7f0000000000)={0x20071026, r0}, &(0x7f00000000c0)={0xfff, 0x3, 0x2, 0x1, 0x7, 0x100}) mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) 3m22.638447582s ago: executing program 1 (id=4033): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r1}, 0x10) gettid() futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, &(0x7f0000001100)={0x77359400}, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) setitimer(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000410, &(0x7f00000000c0)={[{@debug}]}, 0xc1, 0x7df, &(0x7f00000017c0)="$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") socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x100b28, 0x1, 0x0, 0x1, 0xa, 0x21005, 0x9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = epoll_create1(0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/wakeup_count', 0x141000, 0x20) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000200)={0xa000000a}) finit_module(r4, 0x0, 0x3) 3m22.23076816s ago: executing program 1 (id=4037): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = io_uring_setup(0xd4d, &(0x7f0000000240)={0x0, 0xdb61, 0x40, 0x0, 0x12f}) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r3, 0xb, &(0x7f0000000480)=[@ioring_restriction_sqe_flags_allowed={0x2, 0x11}], 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000340)='kfree\x00', r4}, 0x18) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYBLOB="3728b5b8f1feab86"], 0x8) write(r5, &(0x7f00000000c0)="8f2a0a65", 0x4) r6 = syz_clone(0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000400), r8, 0x0, 0x3, 0x1}}, 0x20) r9 = syz_pidfd_open(r6, 0x0) r10 = dup(r9) fsetxattr$trusted_overlay_upper(r10, &(0x7f0000000000), 0x0, 0x0, 0x2) 3m22.211558891s ago: executing program 34 (id=4037): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x80000000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000040)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = io_uring_setup(0xd4d, &(0x7f0000000240)={0x0, 0xdb61, 0x40, 0x0, 0x12f}) mmap(&(0x7f0000000000/0x400000)=nil, 0x1400000, 0x0, 0xc3072, 0xffffffffffffffff, 0x0) io_uring_register$IORING_REGISTER_RESTRICTIONS(r3, 0xb, &(0x7f0000000480)=[@ioring_restriction_sqe_flags_allowed={0x2, 0x11}], 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000340)='kfree\x00', r4}, 0x18) r5 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_IPV6_RTHDRDSTOPTS(r5, 0x29, 0x37, &(0x7f0000000200)=ANY=[@ANYBLOB="3728b5b8f1feab86"], 0x8) write(r5, &(0x7f00000000c0)="8f2a0a65", 0x4) r6 = syz_clone(0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f, 0xa}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r7, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_tos={&(0x7f0000000400), r8, 0x0, 0x3, 0x1}}, 0x20) r9 = syz_pidfd_open(r6, 0x0) r10 = dup(r9) fsetxattr$trusted_overlay_upper(r10, &(0x7f0000000000), 0x0, 0x0, 0x2) 36.672194669s ago: executing program 0 (id=6742): sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x0) close(0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x5c}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000000940)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f0200ff000000000000000058000b4824ca945f64009400ff0325010ebc000000000000008000f0fffeffe809005300fff5dd00e40010000200040010000800014004000000", 0x58}, {&(0x7f0000000600)="32828bb777fa9fd98108ddf7a0897b1c860da47190f0e32b9f2e0de2eb434363358cf159234d312718247fda0a532ca40f3e95c255940cc4907fcafbd97e6944319157047b95dc830d2b2f516942f1d6e26e4dda607b08f3a7d0e0d83345d30e0226bf7be26a047a5c658d1f52fffe14afddc0e1ac5df83f3b392edc313aa736ab48a30c60d9e080457671e61dd1be69f181c66bc9575fa6f8426576694564d4e14faab84aad7d8d710aa4d85fc23874b2dc819897ea1f3eccdc54a0784a1d5db06e0a4fa7f8890fd117474e622d8a22d284294d094a11", 0xd7}, {&(0x7f0000000700)="9948cc6063332ba91d6aa9debfba080eccdda4138cd9d6c8899e88026618a035a275e7505e823cc9e415f2242dc8923f943299aaed", 0x35}, {&(0x7f0000000800)="8b69d01cc0b924ac8f9107652fdc4f7b1082a3deb57537e6bed5fd4e55c0852ddcc455196d8e", 0x26}, {&(0x7f0000000840)="daed75a5634c2dd84bf59a691fddbdf34b1fd26d236ac55bff3754d772", 0x1d}, {&(0x7f0000000880)="15665875223d2bfea0f04394a98c614671366d4d3b1a54a8b9410af95a2ef9e24725d0d6895b7a52bfcfa4812256a8912ccfca93a6bfce7b7658a69d0fb7f3e3a41da94b5919e8262275574c54b758660850089e77a308d92e0e5974f4f8ef398c57f82fb78665df14", 0x69}], 0x6) 36.657786359s ago: executing program 0 (id=6744): getpgrp(0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000240)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000c00)='sys_enter\x00', r0}, 0x10) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000bc0)=@newqdisc={0x2a8, 0x24, 0x4ee4e6a52ff56541, 0x70bd24, 0xfff7ffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x8, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x1}}}, @TCA_STAB={0x80, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x7, 0xa, 0x5, 0xffff, 0x2, 0x3, 0x0, 0x8}}, {0x14, 0x2, [0x4, 0x1, 0x6, 0x2, 0x9, 0x401, 0x7, 0x7]}}, {{0x1c, 0x1, {0xff, 0x40, 0xbf8e, 0x4800, 0x1, 0x4db0, 0x3, 0x1}}, {0x6, 0x2, [0x1]}}, {{0x1c, 0x1, {0x16, 0x1, 0x5, 0xc, 0x0, 0x40, 0x5, 0x3}}, {0xa, 0x2, [0xd670, 0x7fff, 0x7]}}]}, @TCA_STAB={0x120, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x6, 0x9, 0x3, 0x6, 0x1, 0xff, 0x8001}}, {0x4}}, {{0x1c, 0x1, {0x9a, 0x9, 0x7ef, 0xdbb, 0x2, 0x97f, 0x3, 0x3}}, {0xa, 0x2, [0x1, 0xa, 0xa123]}}, {{0x1c, 0x1, {0x7, 0x1, 0xfff9, 0x8, 0x2, 0x8, 0x5, 0x1}}, {0x6, 0x2, [0x75]}}, {{0x1c, 0x1, {0x6, 0x6, 0x8000, 0x1, 0x1, 0x4, 0x7, 0x7}}, {0x12, 0x2, [0x0, 0x72a4, 0x19, 0x7f, 0x120, 0x100, 0x9]}}, {{0x1c, 0x1, {0x4, 0x2, 0x9, 0x0, 0x1, 0x2, 0x400, 0x9}}, {0x16, 0x2, [0x6, 0x1, 0x100, 0x4, 0x8, 0x2, 0x7, 0x5, 0x7f]}}, {{0x1c, 0x1, {0x1c, 0x4, 0x2, 0xffffffff, 0x1, 0xa, 0x7, 0x1}}, {0x6, 0x2, [0x5]}}, {{0x1c, 0x1, {0x6, 0xb, 0x9, 0x2, 0x81122c7b2217b50b, 0x1, 0x9, 0x4}}, {0xc, 0x2, [0x53c6, 0x2, 0x9, 0x64]}}]}, @TCA_STAB={0x2c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0x5, 0xd25, 0x5, 0x0, 0x5, 0x1, 0x3}}, {0xa, 0x2, [0x401, 0x7, 0xfffa]}}]}, @TCA_STAB={0x94, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0xa7, 0x9, 0x8, 0x5, 0x2, 0x6, 0x4, 0x2}}, {0x8, 0x2, [0x40, 0x400]}}, {{0x1c, 0x1, {0x4, 0x5, 0x8, 0x9, 0x1, 0x81, 0x1000, 0x2}}, {0x8, 0x2, [0x5, 0x49]}}, {{0x1c, 0x1, {0x6, 0xfe, 0x7, 0xffffff0e, 0x2, 0x5c37abc9, 0x7fffffff, 0x1}}, {0x6, 0x2, [0x0]}}, {{0x1c, 0x1, {0xe3, 0x3, 0xff11, 0xf3, 0x0, 0x6, 0x7, 0x2}}, {0x8, 0x2, [0x3, 0x8]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2}, @TCA_RATE={0x6, 0x5, {0x5, 0x81}}]}, 0x2a8}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', r4, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5875}, 0x94) ioctl$sock_SIOCSIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8983, &(0x7f00000003c0)={0x8, 'xfrm0\x00', {'hsr0\x00'}, 0x5}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r5}, 0x10) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000000)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a310000000014000780050015000c0000000800124000000000050005000a000000050004000000000010000300686173683a69702c6d6163"], 0x5c}}, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r7, 0x0, 0xfffffffffffffffd}, 0x18) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="1c0000000306010200000000000000000a0000010500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x6, 0x0, 0x0, 0x7ffc1ffb}]}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f00000006c0)=""/175}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r9}, 0x10) mlock(&(0x7f0000c00000/0x400000)=nil, 0x400000) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000fff000/0x1000)=nil) 36.615862749s ago: executing program 0 (id=6745): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/timers\x00', 0x0, 0x0) close(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x20040, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file2\x00', 0x2000410, &(0x7f0000000000)={[{@bsdgroups}, {@jqfmt_vfsv1}]}, 0xc1, 0x7da, &(0x7f0000000fc0)="$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") ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r5, 0xc0189374, &(0x7f0000000040)={{0x1, 0x1, 0x1018, 0xffffffffffffffff, {0x1}}, './file0\x00'}) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r6 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r6, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r7, 0x0, 0x0) sendmmsg$unix(r8, 0x0, 0x0, 0x0) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000fd0f0000"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000900)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sched_switch\x00', r10}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r9}, &(0x7f0000000040), &(0x7f0000000080)=r10}, 0x20) bind$inet6(r3, &(0x7f0000d84000)={0xa, 0x2, 0xfffffffc}, 0x1c) sendto$inet6(r3, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x18115, @rand_addr, 0x983a}, 0x1c) 35.725714047s ago: executing program 0 (id=6766): syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='./file2\x00', 0x1010051, &(0x7f0000000800)={[{@errors_remount}, {@noload}, {@noblock_validity}, {@dioread_lock}, {@nouid32}, {@nomblk_io_submit}]}, 0x1, 0x546, &(0x7f0000000180)="$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") syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x41, &(0x7f0000000880)={[{@nouser_xattr}, {@nodiscard}, {@usrjquota}, {@grpjquota}, {@grpjquota}, {@minixdf}, {@quota}, {@noload}, {@block_validity}]}, 0x64, 0x51c, &(0x7f0000001740)="$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") setfsuid(0xee00) setresuid(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 35.519805361s ago: executing program 0 (id=6770): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014fa0000b7030000000008008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000020000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r2}, 0x10) open_tree(0xffffffffffffff9c, 0x0, 0x100) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000080)=@framed={{}, [@call={0x85, 0x0, 0x0, 0xe}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r4}, 0x18) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x9, 0x7, 0x0, 0x0, 0x0, 0x40008, 0x590, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x4c58, 0x4, 0x0, 0x2, 0x7, 0x4ac, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2000003, 0x13, r5, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0a00000001010000fc7f0000cc", @ANYBLOB], 0x50) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000038000511d25a80698c63940d0124fc602f6e35400c000200001ec00037153e370a00018025581d00d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x39c}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x94) 33.384769803s ago: executing program 0 (id=6795): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb904}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000a00)=@newtaction={0xa0, 0x30, 0x9, 0x0, 0x0, {}, [{0x8c, 0x1, [@m_bpf={0x88, 0x1, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{0x9, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0xffffffff}, {0x3, 0x4, 0x20, 0x1000000}, {0x0, 0x2, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0xfe}, {0x3}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x7, 0x4}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 33.371869663s ago: executing program 35 (id=6795): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x61, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xb904}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) writev(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000a00)=@newtaction={0xa0, 0x30, 0x9, 0x0, 0x0, {}, [{0x8c, 0x1, [@m_bpf={0x88, 0x1, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{0x9, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0xffffffff}, {0x3, 0x4, 0x20, 0x1000000}, {0x0, 0x2, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0xfe}, {0x3}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x7, 0x4}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x2}}}}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) 1.613635438s ago: executing program 8 (id=7336): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/disk', 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/pm_test', 0x131c00, 0xb) sendfile(r1, r0, &(0x7f0000000140)=0x27, 0x1a) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x20, 0x6d, 0x1}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, &(0x7f00000005c0)=[{{0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}], 0x10) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4, 0xffffffffffffffff}, 0x4) r6 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001240)=@newqdisc={0x14c, 0x24, 0x3fe3aa0262d8c583, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}, {0x0, 0xa}}, [@qdisc_kind_options=@q_choke={{0xa}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x8, 0x82, 0x6a6addfb, 0x5, 0x2, 0x18, 0x4}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x80884}, 0x20000000) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r8, 0x0, 0x4}, 0x18) setsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), r1) r9 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="010000000000000000000f000000050030000000000005002f000000000008000300", @ANYRES32=r10], 0x2c}}, 0x0) 1.592981878s ago: executing program 7 (id=7338): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000400)='itimer_state\x00'}, 0x18) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r1}, 0x10) gettid() futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, &(0x7f0000001100)={0x77359400}, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) setitimer(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000410, &(0x7f00000000c0)={[{@debug}]}, 0xc1, 0x7df, &(0x7f00000017c0)="$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") socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x100b28, 0x1, 0x0, 0x1, 0xa, 0x21005, 0x9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = epoll_create1(0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/wakeup_count', 0x141000, 0x20) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000200)={0xa000000a}) finit_module(r4, 0x0, 0x3) 1.592483368s ago: executing program 8 (id=7339): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x7, 0x9) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb}, 0x11000) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) fsetxattr$security_selinux(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, 0x0) r5 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r5, 0x84, 0x64, &(0x7f0000000900)=[@in6={0xa, 0x0, 0x0, @loopback={0xffffff7f00000000}, 0x7ff}], 0x1c) sendmsg$nl_route_sched(r4, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000e00)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0x0, 0xffe0}, {0xffff, 0xffff}, {0xffff, 0x8}}, [@qdisc_kind_options=@q_fq={{0x7}, {0xc, 0x2, [@TCA_FQ_FLOW_REFILL_DELAY={0x8, 0x9, 0xfffffffc}]}}]}, 0x38}}, 0x800) read(r2, &(0x7f0000032440)=""/102364, 0x18fdc) io_uring_setup(0x4d42, &(0x7f0000000240)={0x0, 0xca6a, 0x40, 0x0, 0x3}) 1.088898228s ago: executing program 3 (id=7345): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_rdma(0x10, 0x3, 0x14) syz_io_uring_setup(0x4172, &(0x7f00000002c0)={0x0, 0x2, 0x10100, 0x0, 0x4}, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x4004, @fd, 0x0, &(0x7f0000000040)=[{&(0x7f00000001c0)=""/19, 0x13}], 0x1, 0x0, 0x1}) fsmount(0xffffffffffffffff, 0x0, 0x72) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a40)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x301, 0x0, 0x0, {0x5, 0x0, 0x8}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x5}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz0\x00'}]}, @NFT_MSG_NEWRULE={0x68, 0x6, 0xa, 0x401, 0x0, 0x0, {0x5, 0x0, 0x4000}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x24, 0x1, 0x0, 0x1, @tunnel={{0xb}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_TUNNEL_KEY={0x8}, @NFTA_TUNNEL_DREG={0x8, 0x2, 0x1, 0x0, 0xc}]}}}, {0x18, 0x1, 0x0, 0x1, @fwd={{0x8}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_FWD_SREG_DEV={0x8, 0x1, 0x1, 0x0, 0xa}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xdc}}, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)={0x38, 0x1403, 0x1, 0x70bd2c, 0x25dfdbfc, "", [{{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'lo\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) 1.063700429s ago: executing program 3 (id=7346): socket$nl_rdma(0x10, 0x3, 0x14) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x5, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) pipe2(&(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) listen(r0, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x1b, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000b00)=@base={0x6, 0x4, 0x70be, 0x5c, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x80010000, 0x2}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x8, 0x4}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f00000003c0)=[{0x2, 0x1, 0x2, 0xc}, {0x0, 0x5, 0x10, 0x4}, {0x5, 0x2, 0x0, 0x9}, {0x4, 0x1, 0x1}, {0x5, 0x5, 0xd, 0x6}, {0x4, 0x1, 0xe, 0xb}, {0x0, 0x4, 0x8, 0x8}, {0x0, 0x3, 0xc, 0xc}], 0x10, 0x7}, 0x94) sendmsg$key(r1, 0x0, 0x10) syz_usb_control_io$cdc_ecm(0xffffffffffffffff, 0x0, 0x0) io_uring_setup(0x79bf, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) socket$kcm(0x2, 0x200000000000001, 0x106) openat$nci(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x64004004) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4, 0x0, 0x7}, 0x18) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a94000000060a010400000000000000000a00000154000480500001800b00010074617267657400004000028008000240000000012c0003007339f2f10455afb9fdd672bad09dfb78c7699c74e891a0c70000000000000000000000000000000008000100544545000900020073797a32000000000900010073797a31"], 0xbc}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) recvmsg(r0, &(0x7f00000005c0)={&(0x7f0000000240)=@alg, 0x80, &(0x7f0000000500)=[{&(0x7f0000000840)=""/227, 0xe3}, {&(0x7f0000000300)=""/36, 0x24}, {&(0x7f0000000340)=""/28, 0x1c}], 0x3, &(0x7f0000000580)=""/2, 0x2}, 0x40000000) 703.733966ms ago: executing program 8 (id=7355): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/disk', 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/pm_test', 0x131c00, 0xb) sendfile(r1, r0, &(0x7f0000000140)=0x27, 0x1a) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x20, 0x6d, 0x1}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, &(0x7f00000005c0)=[{{0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}], 0x10) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4, 0xffffffffffffffff}, 0x4) r6 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001240)=@newqdisc={0x14c, 0x24, 0x3fe3aa0262d8c583, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}, {0x0, 0xa}}, [@qdisc_kind_options=@q_choke={{0xa}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x8, 0x82, 0x6a6addfb, 0x5, 0x2, 0x18, 0x4}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x80884}, 0x20000000) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r8, 0x0, 0x4}, 0x18) setsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, 0x0, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r9, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r9, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="010000000000000000000f000000050030000000000005002f000000000008000300", @ANYRES32=r11], 0x2c}}, 0x0) 561.973879ms ago: executing program 8 (id=7357): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x7, 0x9, 0x4, 0x0, 0x0, 0x8, 0x40, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x14, 0xfffffffffffffff7, 0x8, 0x0, 0x2, 0x3, 0x6, 0x0, 0xfffffffe, 0x0, 0x2}, 0x0, 0x6, 0xffffffffffffffff, 0x2) r1 = perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x100, 0xa0b02, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x9}, 0x100002, 0x3, 0x8, 0x0, 0x7f, 0x7, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, r0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r3 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240), 0x80802, 0x0) preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000100)=""/182, 0xb6}], 0x1, 0x7fffffff, 0xb) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r4 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4}, 0x40dd, 0x0, 0x4, 0x9, 0xa, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000000)='cpu~=0||!') 517.32279ms ago: executing program 6 (id=7359): r0 = add_key$keyring(&(0x7f0000000340), &(0x7f00000004c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000980)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000180)=@keyring={'key_or_keyring:', r0}) keyctl$unlink(0x9, r1, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000240)='asymmetric\x00', 0x0) 517.07198ms ago: executing program 6 (id=7360): getpgrp(0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000240)) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x4000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000c00)='sys_enter\x00', r0}, 0x10) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = socket(0x10, 0x803, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000bc0)=@newqdisc={0x2a8, 0x24, 0x4ee4e6a52ff56541, 0x70bd24, 0xfff7ffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x8, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x1}}}, @TCA_STAB={0x80, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x7, 0xa, 0x5, 0xffff, 0x2, 0x3, 0x0, 0x8}}, {0x14, 0x2, [0x4, 0x1, 0x6, 0x2, 0x9, 0x401, 0x7, 0x7]}}, {{0x1c, 0x1, {0xff, 0x40, 0xbf8e, 0x4800, 0x1, 0x4db0, 0x3, 0x1}}, {0x6, 0x2, [0x1]}}, {{0x1c, 0x1, {0x16, 0x1, 0x5, 0xc, 0x0, 0x40, 0x5, 0x3}}, {0xa, 0x2, [0xd670, 0x7fff, 0x7]}}]}, @TCA_STAB={0x120, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x6, 0x9, 0x3, 0x6, 0x1, 0xff, 0x8001}}, {0x4}}, {{0x1c, 0x1, {0x9a, 0x9, 0x7ef, 0xdbb, 0x2, 0x97f, 0x3, 0x3}}, {0xa, 0x2, [0x1, 0xa, 0xa123]}}, {{0x1c, 0x1, {0x7, 0x1, 0xfff9, 0x8, 0x2, 0x8, 0x5, 0x1}}, {0x6, 0x2, [0x75]}}, {{0x1c, 0x1, {0x6, 0x6, 0x8000, 0x1, 0x1, 0x4, 0x7, 0x7}}, {0x12, 0x2, [0x0, 0x72a4, 0x19, 0x7f, 0x120, 0x100, 0x9]}}, {{0x1c, 0x1, {0x4, 0x2, 0x9, 0x0, 0x1, 0x2, 0x400, 0x9}}, {0x16, 0x2, [0x6, 0x1, 0x100, 0x4, 0x8, 0x2, 0x7, 0x5, 0x7f]}}, {{0x1c, 0x1, {0x1c, 0x4, 0x2, 0xffffffff, 0x1, 0xa, 0x7, 0x1}}, {0x6, 0x2, [0x5]}}, {{0x1c, 0x1, {0x6, 0xb, 0x9, 0x2, 0x81122c7b2217b50b, 0x1, 0x9, 0x4}}, {0xc, 0x2, [0x53c6, 0x2, 0x9, 0x64]}}]}, @TCA_STAB={0x2c, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0x5, 0xd25, 0x5, 0x0, 0x5, 0x1, 0x3}}, {0xa, 0x2, [0x401, 0x7, 0xfffa]}}]}, @TCA_STAB={0x94, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0xa7, 0x9, 0x8, 0x5, 0x2, 0x6, 0x4, 0x2}}, {0x8, 0x2, [0x40, 0x400]}}, {{0x1c, 0x1, {0x4, 0x5, 0x8, 0x9, 0x1, 0x81, 0x1000, 0x2}}, {0x8, 0x2, [0x5, 0x49]}}, {{0x1c, 0x1, {0x6, 0xfe, 0x7, 0xffffff0e, 0x2, 0x5c37abc9, 0x7fffffff, 0x1}}, {0x6, 0x2, [0x0]}}, {{0x1c, 0x1, {0xe3, 0x3, 0xff11, 0xf3, 0x0, 0x6, 0x7, 0x2}}, {0x8, 0x2, [0x3, 0x8]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0x2}, @TCA_RATE={0x6, 0x5, {0x5, 0x81}}]}, 0x2a8}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', r4, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5875}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000500)=ANY=[@ANYBLOB="1c0000000306010200000000000000000a0000010500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x4004810}, 0x840) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="0b00000008000000010001000900000001"], 0x50) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={r1, &(0x7f0000000080), &(0x7f00000006c0)=""/175}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x3c, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa000000}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000180)='tlb_flush\x00', r6}, 0x10) mlock(&(0x7f0000c00000/0x400000)=nil, 0x400000) mremap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000fff000/0x1000)=nil) 427.273772ms ago: executing program 3 (id=7361): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000300)='kmem_cache_free\x00'}, 0x18) socket$packet(0x11, 0xa, 0x300) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, 0x0, &(0x7f00000002c0)='syzkaller\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="259a53f271a76d2688ca4c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 412.159412ms ago: executing program 6 (id=7362): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000007c577e1700000000dace", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) flistxattr(r2, &(0x7f0000000240)=""/115, 0x73) 345.778183ms ago: executing program 6 (id=7363): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) close(0x3) socket$inet6_sctp(0xa, 0x801, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)='\a', 0x1}], 0x1, &(0x7f0000001740)=ANY=[@ANYBLOB="300000000000000084000000010000000200000041"], 0x30}, 0x0) r1 = syz_io_uring_setup(0x6d3b, &(0x7f0000000340)={0x0, 0xa7f7, 0x10100, 0x3, 0x3cd}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) syz_io_uring_submit(r2, r3, &(0x7f00000009c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r4, 0x80, &(0x7f0000000100)=@nfc={0x27, 0x0, 0x1, 0x5}, 0x0, 0x0, 0x1}) io_uring_enter(r1, 0x780, 0x0, 0xc, 0x0, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000140)) sendmsg$TIPC_NL_KEY_SET(r5, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={0xfffffffffffffffd}, 0x1, 0x0, 0x0, 0x4000}, 0x891) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r7, 0x28, 0x1, &(0x7f0000000380)=0xffffffff00000041, 0x8) bind$vsock_stream(r7, &(0x7f0000000940), 0x10) listen(r7, 0x0) r8 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r8, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) writev(r8, &(0x7f00000002c0)=[{&(0x7f0000000080)='?', 0x20000081}], 0x1) 292.887464ms ago: executing program 3 (id=7364): creat(&(0x7f00000002c0)='./file0\x00', 0x0) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x800008, &(0x7f00000005c0)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r1, @ANYBLOB=',cache=0']) r2 = socket(0x2b, 0x1, 0x0) listen(r2, 0xd0) syz_genetlink_get_family_id$mptcp(&(0x7f00000001c0), r2) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r4 = socket(0x400000000010, 0x3, 0x0) r5 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000200)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001300)=@newtfilter={0xe8c, 0x2c, 0xd27, 0x70bd25, 0x8000, {0x0, 0x0, 0x0, r6, {0x0, 0x7}, {}, {0x7, 0x2}}, [@filter_kind_options=@f_fw={{0x7}, {0xe58, 0x2, [@TCA_FW_ACT={0xe54, 0x4, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS_EX={0xe20, 0x4, {{{0x4, 0x1ff, 0x20000000, 0xc, 0x6}, 0x7f, 0x5}, [{0x2a9, 0x6, 0x810, 0x4, 0x5}, {0x4a7, 0x1ff, 0x4, 0x1, 0x7, 0xdd}, {0x9, 0x7, 0x3ff, 0x97, 0xfffffffd, 0x4}, {0x8, 0x0, 0x6, 0x2, 0x7fff, 0x3}, {0x4f9a, 0x5, 0x1, 0x1, 0x2, 0x8}, {0x0, 0x5, 0x1437, 0x1, 0xee57, 0x9}, {0x77d, 0x8, 0x9, 0x6, 0x8, 0x1}, {0x5, 0x6, 0x0, 0x2, 0x1, 0x7fff}, {0x0, 0x3, 0x4235da1, 0x9, 0x7ec9, 0x8}, {0x10000, 0x2, 0x0, 0x1, 0x3, 0x40000009}, {0xd, 0xffff0001, 0x0, 0x6, 0x81, 0x4}, {0xfffffffc, 0x4, 0xffff, 0x2, 0xffffffff, 0xfffffffa}, {0x5, 0xd29, 0x101, 0x3, 0x7, 0xc}, {0x0, 0xfffffff7, 0x1, 0x72b2, 0xc874, 0x3}, {0x3, 0xf, 0x5, 0x1, 0x1ff, 0x6}, {0x9b9b, 0xffff, 0x6, 0xb, 0xb3d, 0x812}, {0x5, 0x7, 0x2, 0x5, 0x5, 0x4}, {0x6, 0x0, 0x9, 0x2, 0x82, 0x2}, {0xfffffff7, 0x6, 0x2, 0x9, 0xff}, {0x4, 0x1, 0x371, 0x8, 0x0, 0xeac}, {0x9, 0x2, 0xd77, 0x8, 0x113, 0x8d3f}, {0x7, 0xffffffff, 0x4, 0x92a4, 0x9, 0x10}, {0x1a4a13f0, 0x9, 0xe, 0x3, 0xad47, 0xf83b}, {0x1ff, 0x5, 0x7, 0xfff, 0x9}, {0x100, 0x4, 0x200, 0x9, 0x1, 0x9df}, {0x9, 0x1, 0x65, 0x9, 0x7}, {0x401, 0x10001, 0x9, 0x200, 0x9, 0x1}, {0x6, 0x10, 0xf, 0x2, 0x6, 0x3}, {0xf23, 0x3ff, 0x0, 0x9, 0xfffffffc}, {0x80000000, 0x6, 0x0, 0x6, 0x6, 0xd}, {0x0, 0x9, 0xd, 0x8000, 0x3, 0x2}, {0x800, 0x9, 0x6, 0x3, 0x7, 0x8}, {0x7, 0x8, 0x7358, 0x7, 0x8, 0xffffffff}, {0x4d9, 0x45db8bad, 0xb3dd, 0x1, 0xbc, 0x7ff}, {0x7, 0x1, 0x3, 0x3, 0x3, 0x7a}, {0x5a1b, 0x1, 0x1, 0x7ff, 0x3, 0x4}, {0x3, 0x7, 0x4, 0x4, 0x1c716ddc, 0x8}, {0xffffffa5, 0x7, 0x0, 0x10, 0x3, 0x5}, {0x8219, 0x0, 0x2, 0x6, 0x3, 0x2}, {0x62, 0xf4, 0x5, 0x4, 0x4, 0x67}, {0x5, 0x4, 0x53, 0x8, 0xc0000000, 0x7}, {0x2, 0x5, 0x2, 0xffff, 0x2, 0x2}, {0x80000001, 0x94c, 0x6, 0xfffffe00, 0x5, 0x7b27}, {0x2, 0x6, 0x1000, 0x9, 0x9}, {0xa, 0x0, 0x9, 0x4, 0xe, 0x9}, {0xdf, 0x7fff, 0x8000, 0x81, 0xff, 0xfffffff8}, {0x2, 0x10000, 0x9, 0x2, 0x2}, {0x2, 0x6, 0x9, 0x1, 0x2, 0x40}, {0xfffffe00, 0x3, 0x74d2, 0x3, 0x80000001, 0x6}, {0x2, 0x8, 0xfffffff7, 0x1, 0x6, 0xa}, {0x8, 0x9, 0x8e, 0x33, 0x10001, 0x22cb}, {0x2, 0x31f5, 0x7, 0x5, 0x7fffffff, 0x1}, {0x9, 0x10001, 0x4, 0x8, 0x7, 0x9}, {0xb, 0x1ff, 0xb, 0x3, 0x5, 0x80000001}, {0x7, 0x80, 0x69b, 0x3, 0x8, 0x339}, {0xee, 0x80000000, 0xfba6, 0x101, 0x5, 0xb}, {0x3, 0x458, 0x6, 0xf, 0x7, 0x8000}, {0x9, 0xfffffffa, 0x1000, 0x8, 0xb, 0xce5a}, {0x400, 0xffff, 0x3, 0xbcbb, 0x7, 0xb}, {0x0, 0xe000, 0x8, 0x8, 0x2, 0x1}, {0x1, 0x0, 0x3, 0x9, 0x0, 0x401}, {0xd, 0x1, 0x2, 0xf, 0x81, 0x5}, {0x6, 0xfff, 0x5, 0x5, 0x4, 0x3649}, {0x7, 0x2, 0x80000000, 0x9, 0x1630, 0x9e73}, {0xb, 0x1b6, 0xc4, 0x7, 0x4, 0xca}, {0x4, 0x5, 0x401, 0x4, 0xfffffff8, 0x40}, {0x8, 0x4594, 0x8, 0x4, 0x0, 0xffff}, {0x100, 0xfffffffb, 0x6, 0x0, 0x9, 0x6}, {0x3, 0xf7b, 0x3, 0x8, 0x6, 0x3}, {0x1, 0x5, 0x3, 0xab9, 0x7, 0x9}, {0xffffffff, 0x0, 0xfc, 0x7, 0x6, 0xc}, {0xf, 0x1, 0xa000000, 0x1, 0x101, 0x1f3}, {0x7ff, 0x9, 0xfffff001, 0x8001, 0x2, 0x2}, {0x4, 0xd9, 0x6, 0x1, 0x9, 0xfffffff8}, {0x3, 0x3, 0x7, 0x9, 0x10, 0x1}, {0x8f000000, 0x100, 0xffffffff, 0x963, 0x2, 0xc}, {0x6, 0x50, 0x6, 0xa, 0x0, 0x3}, {0x649, 0x2, 0x80000001, 0x8, 0x0, 0x1}, {0x8, 0xfff, 0x6, 0x80000001, 0x7fffffff, 0x3}, {0xa3, 0x81, 0x9fcb, 0x1, 0x8, 0x7fff}, {0x0, 0x2, 0x750c, 0x0, 0x1, 0xfffffffc}, {0x7ff, 0x7, 0x10000, 0x9, 0x0, 0x88}, {0x5, 0x10001, 0x7fff, 0x81, 0xfffffff4, 0x7}, {0xfce, 0x80000001, 0x5, 0x4, 0x1ff}, {0x3, 0x0, 0x3ff, 0x7fffffff, 0x9, 0x7}, {0xdac, 0x0, 0x4, 0x80000001, 0x3, 0x8}, {0x7, 0xffffffff, 0x6, 0x8, 0x80000001, 0xa}, {0x2, 0x4, 0x4, 0x401, 0xe32}, {0x5, 0x7, 0x6, 0x8, 0x2, 0x2}, {0x10001, 0x100, 0x3, 0x4, 0x9, 0xfffffffa}, {0x2, 0x0, 0x3, 0x6, 0x800, 0x3}, {0x0, 0x0, 0x3, 0x8, 0x1, 0x3}, {0x3, 0x3, 0xffffffff, 0x3, 0x800, 0xde}, {0x5, 0x66, 0x41d0, 0x8001, 0x1, 0x3}, {0x5, 0x7, 0xfffffffc, 0x4, 0x9, 0x92c}, {0x4, 0xffff, 0x0, 0x101, 0x4, 0x1}, {0x9, 0xf667, 0x5, 0x3, 0x5, 0x4}, {0x1731, 0xa, 0x9960, 0x9, 0x1, 0x7}, {0xd, 0xfffffffa, 0x1, 0x3, 0x40, 0x2}, {0x1, 0x4, 0x80000000, 0x80000001, 0x2, 0x6}, {0x7, 0x2, 0xffffff3a, 0x4cf, 0x800, 0x6}, {0x8000, 0x6, 0x1, 0x0, 0x100, 0x80000000}, {0x3b, 0x5562334a, 0x2, 0x2, 0x6, 0x81}, {0x4, 0x96, 0x81, 0x0, 0x101, 0x7}, {0x4, 0xff, 0x9, 0x0, 0x81, 0x29}, {0xa, 0x5, 0x0, 0x9, 0xffffffff, 0xfb4}, {0x80000000, 0x2, 0xffff, 0x39b4, 0x1, 0x6}, {0x61, 0x2d, 0x6, 0x1fe4c5d2, 0x1, 0x3}, {0x1, 0xe2, 0x7ff, 0x7ff, 0x7f, 0x29d0}, {0x0, 0x4, 0xc, 0xd594, 0x9, 0x7}, {0x6, 0x0, 0x7, 0x9, 0x7, 0x9}, {0x80e9, 0x7, 0x9, 0x1, 0x1, 0x18000}, {0x400, 0x9, 0x0, 0x6f}, {0x2, 0x1, 0x6, 0x3, 0xfffff71b, 0xce}, {0x1, 0xff, 0xb, 0x4, 0x800, 0x1}, {0x6, 0x2, 0x8, 0xfff, 0x4, 0x7fff}, {0x0, 0x0, 0x7f, 0x401, 0x7, 0x7fff}, {0x7, 0xb, 0x10000, 0x1, 0x8000, 0xfffff830}, {0x2, 0x4, 0x2, 0x1, 0x6, 0x2b4}, {0x3cd2dbce, 0x929a, 0x9dc, 0x0, 0x8, 0xfffffffc}, {0x6, 0x0, 0xe71, 0xc5c3, 0x3, 0x1}, {0x7, 0x2, 0x197a, 0x7, 0x1, 0x8}, {0xff, 0x2c, 0xfffffc01, 0x1, 0x3, 0x100}, {0x0, 0x6, 0x10001, 0xce7, 0xec, 0x1000}, {0xffffffff, 0x6, 0xffffffff, 0x9, 0x2, 0x6}, {0xfa, 0x9, 0xbf1d, 0x9, 0x80, 0x5}, {0x1c91, 0x5f27, 0x1, 0x0, 0x6, 0x6}, {0x37, 0x622, 0x2, 0x1, 0x7, 0x2}], [{0x5}, {0xccffbfc290ab3baa}, {}, {0x2}, {0x2}, {0x0, 0x1}, {0x3}, {0x4, 0x1}, {}, {0x1, 0x1}, {0x1}, {0x2}, {0x3}, {0x0, 0x1}, {0x5, 0x1}, {0x2}, {0x3, 0x1}, {0x1}, {0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {}, {0x2, 0x1}, {0x2}, {0x2}, {0x2, 0x1}, {0x2, 0x1}, {0x2, 0x1}, {}, {0x3}, {0x3, 0x1}, {0x5, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {}, {0x5, 0x1}, {0x3}, {0x2}, {0x4}, {0x5}, {0x5, 0x1}, {0x2}, {0x1, 0x1}, {0x4}, {0x4, 0x1}, {0x4, 0x1}, {0x2}, {0x4, 0x1}, {0x2}, {0x1, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {}, {0x3, 0x1}, {0x4, 0x1}, {0x4, 0x1}, {0xed3229170eca159, 0x1}, {0x2, 0x1}, {0x1}, {0x3}, {0x3, 0x1}, {}, {0x0, 0x1}, {0x1, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x3, 0x1}, {0x3}, {0x4}, {0x3, 0x1}, {0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x2}, {0x5, 0x1}, {0x4}, {0x5, 0x1}, {0x2, 0x1}, {0x0, 0x1}, {0x3, 0x1}, {0x4}, {0x0, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x5, 0x1}, {0x5}, {0x4, 0x1}, {0x4, 0x1}, {0x4}, {0x5}, {0x54e1b160e6ec45e8, 0x1}, {0x1, 0x1}, {0x2}, {0x3, 0x1}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x4, 0x1}, {0x4}, {0x5}, {0x0, 0x1}, {0x3}, {0x0, 0x1}, {0x2}, {}, {0x2}, {0x5, 0x1}, {0x4}, {0x2}, {0x9baeccaf277094c4, 0x1}, {}, {0x2, 0x1}, {}, {}, {0x8f9fc2e2ef57f2f0}, {0x3, 0x1}, {0x2, 0x1}, {0x2}, {0x3}, {0x3}, {0x2, 0x1}, {0x2, 0x1}, {0x1}, {0x1, 0x1}], 0x1}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}]}]}}, @TCA_CHAIN={0x8, 0xb, 0x4}]}, 0xe8c}, 0x1, 0x0, 0x0, 0x81}, 0x800) 275.709934ms ago: executing program 7 (id=7365): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000003c0)="ae", 0x1, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000000)) keyctl$link(0x8, r2, r1) 269.354335ms ago: executing program 6 (id=7366): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) r0 = socket$inet_sctp(0x2, 0x5, 0x84) close(0x3) socket$inet6_sctp(0xa, 0x801, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000740)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000002c0)='\a', 0x1}], 0x1, &(0x7f0000001740)=ANY=[@ANYBLOB="300000000000000084000000010000000200000041"], 0x30}, 0x0) r1 = syz_io_uring_setup(0x6d3b, &(0x7f0000000340)={0x0, 0xa7f7, 0x10100, 0x3, 0x3cd}, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) r4 = syz_init_net_socket$nfc_llcp(0x27, 0x1, 0x1) syz_io_uring_submit(r2, r3, &(0x7f00000009c0)=@IORING_OP_CONNECT={0x10, 0x0, 0x0, r4, 0x80, &(0x7f0000000100)=@nfc={0x27, 0x0, 0x1, 0x5}, 0x0, 0x0, 0x1}) io_uring_enter(r1, 0x780, 0x0, 0xc, 0x0, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000140)) sendmsg$TIPC_NL_KEY_SET(r5, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000180)={0xfffffffffffffffd}, 0x1, 0x0, 0x0, 0x4000}, 0x891) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x41, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) socket$inet6(0xa, 0x80002, 0x88) r8 = socket$vsock_stream(0x28, 0x1, 0x0) setsockopt$SO_VM_SOCKETS_BUFFER_MIN_SIZE(r8, 0x28, 0x1, &(0x7f0000000380)=0xffffffff00000041, 0x8) bind$vsock_stream(r8, &(0x7f0000000940), 0x10) listen(r8, 0x0) r9 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r9, &(0x7f0000000000)={0x28, 0x0, 0x0, @local}, 0x10) writev(r9, &(0x7f00000002c0)=[{&(0x7f0000000080)='?', 0x20000081}], 0x1) 257.075845ms ago: executing program 5 (id=7367): openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) ioctl$AUTOFS_IOC_FAIL(0xffffffffffffffff, 0x9361, 0x6) bpf$MAP_CREATE(0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000300)="2e00000011008188040f80ec59acbc0413a181004000000004000000000000000e000a000d00000002800200121f", 0x2e}], 0x1}, 0x0) 228.456215ms ago: executing program 8 (id=7368): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000380)={[{@delalloc}, {@nojournal_checksum}, {@barrier_val={'barrier', 0x3d, 0x10002}}, {@dioread_lock}, {@data_err_ignore}, {@mb_optimize_scan}, {@dioread_nolock}, {@nobarrier}, {@abort}, {@nogrpid}, {@norecovery}, {@errors_remount}]}, 0x1, 0x57d, &(0x7f0000000580)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x2000, 0x1) r1 = socket$inet6(0xa, 0x800000000000002, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r2, 0xffffffffffffffff}, &(0x7f0000000200), &(0x7f0000000240)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) sendto$inet6(r1, 0x0, 0x5c4, 0x404c844, &(0x7f0000000540)={0x2, 0x4e24, 0x0, @local, 0x4000000}, 0x1c) pivot_root(0x0, 0x0) mkdirat(r0, &(0x7f0000000300)='./bus\x00', 0x0) r5 = memfd_create(&(0x7f0000000bc0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x00\x00.\xd4`=z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x80\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xadz\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc00x0}) bind$packet(r4, &(0x7f0000000300)={0x11, 0x1b, r5, 0x1, 0xfc, 0x6, @local}, 0x14) bind$packet(r4, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, 0x14) 137.988207ms ago: executing program 5 (id=7371): r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/power/disk', 0x0, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000400)='/sys/power/pm_test', 0x131c00, 0xb) sendfile(r1, r0, &(0x7f0000000140)=0x27, 0x1a) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=@newlink={0x20, 0x6d, 0x1}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r3 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, &(0x7f00000005c0)=[{{0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}, {{0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x1, 0x1}}], 0x10) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4, 0xffffffffffffffff}, 0x4) r6 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001240)=@newqdisc={0x14c, 0x24, 0x3fe3aa0262d8c583, 0x0, 0x25dfdbff, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}, {0x0, 0xa}}, [@qdisc_kind_options=@q_choke={{0xa}, {0x11c, 0x2, [@TCA_CHOKE_STAB={0x104, 0x2, "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"}, @TCA_CHOKE_PARMS={0x14, 0x1, {0x8, 0x82, 0x6a6addfb, 0x5, 0x2, 0x18, 0x4}}]}}]}, 0x14c}, 0x1, 0x0, 0x0, 0x80884}, 0x20000000) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', r7, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r8, 0x0, 0x4}, 0x18) setsockopt$CAN_RAW_FILTER(r3, 0x65, 0x1, 0x0, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r9, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r9, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000140)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="010000000000000000000f000000050030000000000005002f000000000008000300", @ANYRES32=r11], 0x2c}}, 0x0) 133.490817ms ago: executing program 7 (id=7372): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000006c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x64004004) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a94000000060a010400000000000000000a00000154000480500001800b00010074617267657400004000028008000240000000012c0003007339f2f10455afb9fdd672bad09dfb78c7699c74e891a0c70000000000000000000000000000000008000100544545000900020073797a32000000000900010073797a31"], 0xbc}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) 132.760497ms ago: executing program 6 (id=7373): r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x3, 0x0, @loopback}, 0x1c) setsockopt$sock_int(r0, 0x1, 0x9, &(0x7f0000000080), 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x14, 0x8, &(0x7f0000000c00)=ANY=[@ANYRESOCT, @ANYBLOB="9b88fc647b6a92df0b180478a7fece62d5c5fbc6dc3e5c8e676bfc4cc4463a8d118719e177cd650c440b25bf4ba46cfcfeeb40b0c86b48be361ea978e5eebe9c751ca7508e23ec510eb0382666389ce21426260a895496ebca4a184dfbbdc83d717311315032e9e9b97f946eee1a7d72d7f03f0f2fd52aa915386780be6348df8f9d5f860265cf572a448e99781b08df8964a1edcc9e419e76507953d8950b33344ca13b667aaee8b20ecef06d859261d05dcec9b7b5efac2b01f67d837c8eee2671412c76489ccec1737f4c980898490aa1551a79b430b5121fb7a007d13dabf91c04f4301bdd6a4e7e9685b61d8146e2dbf3", @ANYBLOB="0000000000000000b703000000000001850000001b000000b70000000000070095"], &(0x7f0000000780)='GPL\x00', 0x9, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r2}, 0x18) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r3) sendmsg$ETHTOOL_MSG_COALESCE_GET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000300)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000001c000000180001801400020074756e6c30"], 0x2c}, 0x1, 0x0, 0x0, 0x44000}, 0x4000000) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000000ddff00850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000080)='sys_enter\x00', r5, 0x0, 0xdce0}, 0x18) flistxattr(0xffffffffffffffff, 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000800030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0xc4}, 0x890) sendmsg$NFT_BATCH(r6, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="14000000100001e456b8aa00000000000000000a3c000000120a09000000000000000000020000000900020073797a310000000008000440080000000900010073797a3000000000080003400000000114000000110001"], 0x64}}, 0x4004000) r7 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) openat$selinux_policy(0xffffff9c, 0x0, 0x0, 0x0) openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) sendmsg$NFT_MSG_GETOBJ(r6, &(0x7f0000000180)={0x0, 0x34, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="34000000150a03000000000000000000020000000900020073797a310000000008000340000000010900010073797a30"], 0x34}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000008500000022000000180100002020702500000000002020207b0af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x54, '\x00', 0x0, @fallback=0x2e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000d0"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000400)='mm_migrate_pages\x00', r9, 0x0, 0x5}, 0x18) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)) 115.947507ms ago: executing program 5 (id=7374): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x12, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000008850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @cgroup_sock_addr, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sys_enter\x00', r0}, 0x10) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) waitid(0x0, r1, 0x0, 0x2, 0x0) 103.769308ms ago: executing program 3 (id=7375): r0 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00'}) sendmsg$nl_route_sched(r0, 0x0, 0x20000000) 100.523468ms ago: executing program 7 (id=7376): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x17, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000400)='itimer_state\x00'}, 0x18) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r1}, 0x10) gettid() futex_waitv(&(0x7f0000001080)=[{0x3, &(0x7f0000001040)=0x3, 0x82}], 0x1, 0x0, &(0x7f0000001100)={0x77359400}, 0x1) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) setitimer(0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000240)='./file0\x00', 0x2000410, &(0x7f00000000c0)={[{@debug}]}, 0xc1, 0x7df, &(0x7f00000017c0)="$eJzs3ctrG9sdAODfyA/ZTlq7UGiTlaHQGkLkOnWTFrpI6aIUGgi06yZGVkxq2QqWHGJjiLModFNoSxeFdpN1H+mi0G0f2/afKHdxSQj3Oubmri66zEjyU5LtJJId/H0wmnNmzsw5R3PmzJFmkAI4tybTl1zEpYj4dRIx3lyeRMRQFhqMuNlI93pro5hOSdTrP/koydL8/cLuvpLm/EIz8tWI+PcvIq7kDuY62pyXSyvN0HRt6cF0dW396v2luYXSQmn5+szs7LUb375x/fBWb+qT/61ffPGbH37jrzcH4yvPfvWfJG7Gxea67a2N4lvu/pDJmGy+J0PpW7jPD951ZqcsOe0C8EbSU3OgcZbHpRiPgSzUwduegADAmfA4IuoAwDmTuP4DwDnT+h5ge2uj2JpO9xuJ/nr5/YgYadS/dX+zsWawec9uJLsPOrad7LszkkTExDvIfzIi/viPn/05naJH9yEB2tl8EhF3Jya3t/IH+v8k7f+Gj95DvuOab3bbrN7YbvLAYv0f9M8/0/HPdw6P/y7vPNAzkr0eGP+M5Nucu2/i6PM/97zDpsfom46Wjv++t+fZtt3x385DaxMDzdgXsjHfUHLvfrmU9m1fjIipGMqn8ZksafunoKZeffaqU/57x38f//bnf0rzT+e7KXLPB/NRH9+zzfxcbe4dVD3z8knE5cF29U92xr9Jh/Hv7Y573X9ofvTdX/6hU8q0/ml9W9Ph+vdW/WnE19se/91jmXR9PnE6aw7TrUbRxt8++P1Yp/x3j38+m6f5tz4L9EN6/Me6138iDVXX1hfnyuXSSvXkefz36fi/Oq3b2/7b1z9r//uk7X84+WkWbrW0R3O12spMxHDy48PLr+1u24q30qf1n/pa+/O/U/vPNZ+NvbsT627wxfBfmrtqW//MZqf691Za//kTHf8ugXpzmwOrnr1eHOiU//GO/2wWmmouOU7/d0RJ36I1AwAAAAAAAAAAAAAAAAAAAAAAAMDJ5SLiYiS5wk44lysUGv/h/eUYy5Ur1dqVe5XV5fnI/it7IoZyrZ+6HN/ze6gzzd/Db8WvHYh/KyK+FBG/y49m8UKxUp4/7coDAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQNOF/f///zidFQqNdR/mT7t0AEDPjJx2AQCAvnP9B4Dz52TX/9GelQMA6J8Tf/6vJ70pCADQN8e+/t/tbTkAgP5x/x8AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIAeu33rVjrVP93aKKbx+Ydrq4uVh1fnS9XFwtJqsVCsrDwoLFQqC+VSoVhZ6rijzcasXKk8mI3l1UfTtVK1Nl1dW7+zVFldrt25vzS3ULpTGupbzQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADg+Kpr64tz5XJpRaBLYLQ0ehaKcYYCg3EminEosPn/oaxdd00cE+9N4x/ukibptCofJ89r9OCSvb3E6Kn0TQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADvg88DAAD//4rAF2I=") socket$inet(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x100b28, 0x1, 0x0, 0x1, 0xa, 0x21005, 0x9, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = epoll_create1(0x0) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/wakeup_count', 0x141000, 0x20) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f0000000200)={0xa000000a}) finit_module(r4, 0x0, 0x3) 83.269208ms ago: executing program 3 (id=7377): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb70300000800"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00'}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000200)='fdb_delete\x00', r2}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r0}, &(0x7f00000004c0), &(0x7f0000000300)=r4}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) clock_settime(0x0, &(0x7f0000000000)={0x77359400}) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2000002, 0x42032, 0xffffffffffffffff, 0x80000000) r7 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000100)='asymmetric\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='asymmetPic@\xe6u\x18\x8f\x8d\xd0\xb9\xb4d\x97\xee\x9bY\xb3\xa0dI$(\xed\x98S\xdcB\xdf\x99J\x9c&#m\xd0\xb0\x134m\xa7se\x8fvS\x84:\"-\x94\x84\xbd\xf4X\xf2F6\xe44\x1f\xa7f\x82\xd7aLt@%a\x8a\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xbf\xb4\xc6m39\x9e)\xa5\xe7\xdb\xdc\xb3\xb6\x1f\x1d5\x13\xde\xab\x86\xf5`S<\xd5\xc7@-X0\xa9\xe4l\xab\xf0}\xf0\xeaco\x85kM\x8aS\x1bZ\xa1\xba\xb4E\xbc', r7) keyctl$restrict_keyring(0xa, r7, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000000)='id:cb2e') mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a31000000002c0003800800014000000000180003801400010076657468315f746f5f626f6e6400000008000240000000006c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a30000000004000038008000140000000002c0003801400010067656e657665300000000000000000001400010076657468315f746f5f626f6e64000000080002"], 0x10c}}, 0x0) fcntl$lock(r6, 0x7, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x7, &(0x7f0000000540)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r9}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r10}, 0x10) 82.933498ms ago: executing program 5 (id=7378): bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000340)={0x4, 0x80, 0x7, 0x9, 0x4, 0x0, 0x0, 0x8, 0x40, 0xa, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xffffffff, 0x1, @perf_bp={&(0x7f00000002c0)}, 0x14, 0xfffffffffffffff7, 0x8, 0x0, 0x2, 0x3, 0x6, 0x0, 0xfffffffe, 0x0, 0x2}, 0x0, 0x6, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x100, 0xa0b02, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0x9}, 0x100002, 0x3, 0x8, 0x0, 0x7f, 0x7, 0x0, 0x0, 0x20000}, 0x0, 0xffffffffffffffff, r0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240), 0x80802, 0x0) preadv(r2, &(0x7f0000000040)=[{&(0x7f0000000100)=""/182, 0xb6}], 0x1, 0x7fffffff, 0xb) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x26) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) r5 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4}, 0x40dd, 0x0, 0x4, 0x9, 0xa, 0xfc, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000000)='cpu~=0||!') 67.851159ms ago: executing program 8 (id=7379): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x2000008, &(0x7f00000003c0), 0x1, 0x550, &(0x7f0000001780)="$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") perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000000c0)={@initdev, @local, 0x0}, &(0x7f0000000100)=0xc) connect$can_bcm(r0, &(0x7f0000000140)={0x1d, r1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) r2 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) getdents(r2, &(0x7f0000001fc0)=""/184, 0x20002078) sendmsg$IPCTNL_MSG_CT_GET_DYING(r2, &(0x7f0000000240)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, 0x6, 0x1, 0x3, 0x0, 0x0, {0xa, 0x0, 0x8}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x40000000) prlimit64(0x0, 0xe, 0x0, 0x0) r3 = memfd_create(&(0x7f00000008c0)='\x103q}2\x9a\xce\xaf\x03\xdfyR8\xf4\x1c\bi\xe4^\xd5\xfd\xa9\r\xac7R\x94\xaf\xbb\xdcM\x90k\xd6\x05\r\x84\x87\x1e?\x10\x95SWFO{\x1f\x1b!\xd5\x991D\x1c\b\x8c`\xeaSA\x90m\xb6&\xd0\xf1\xb3\xed:\x82\xbd\xe3i|B\xe2ar\x04R%[k\x0f\xfdV\xacL\x1f\x9d\x00\x00\xc5\xb8$\f\xd4s\xb2\x99/\xc0\x9a\xf2O\xdb\x00\x00\x00\x00\r\xd6h\x80\x8fQ|\xf5d\x10\x10\xd7\t\x00\x00\x00\x00\x00\x00\x00<\xfeeS\xb2l\x16}\xa0I\x7f\xb5)l\xbb\x02\xfa\xb7\xb6\xa0]\xda8\xe0~\x1c \x91\t\x8b\xbd\x1f\xb3834d1i\x9b\x94\xa6\\\x0e\xe2\xfaa\xd3\xf1\xfc\xce\xba\xe2\x9f\x05xgL5\x14Y+\xb3\x1axi)<\xf7~x\xb8vo\xe6\x15@\xc9\"CY\x11\xb9u\x98\xc1\xba\xf4|\xe7|\xc4\xd7\x03\x00\x00\x00\x04D4E^7%8\x94y\x90\xf0l\xa0\'L%\xd4\xda\xee\x81\x98\xcc\xfd\xa2\x89$\x9by\xf1\xbb\x01\xb7\xcd\xbf\x99\x1f\x90@b\x03\xb3\xe0CfU\x16{\xbey\xa1cs\x96U\x11\xdb*\xdf\xcdG\xc7z\x85\x8aE\xf7\xd5\x9dAj\xe3\xfb\xc4\xa0\x14\x87\x19\x17\xed\xd1\x185%Q%\x81\xfaK\x82\xec=\xa3\xb8~\xb6O\xbd\x19*\xdb\x1c\x10\xa4\x8dI\xbd\xc1\xceG\xd0h\xa1\xab:dP\xb6\xa0BR\xbe\x03\xac\xd9\x87\x00@\x80\x94\xd88\xc9\x03\x86P\x8d\x12\\\xf9\x00T\x8f\xcc\x7fF\xb5\xea\xa6\xc1\x9d\xac\x89\xc9\xa1tuJw\xee\x1a\xe73\xa8\xadS\xd1\x11#d\xc2\xcfdj\x9ec\x93vw\x85\r|\xf0\xa6\xd5K\x90*_3\x89\v\xab\x04ih\x12\x93\xc5m\x8f~{\xe5\x85\xa5g\x00\x00\x00\xe45Q\xab%\xa8[\xf3\x17\x94\xf8\xdfq\xff\xd2?\xafW\xde\x1bW]\x1f\aaV\xc5\xc82*\xc7\xc5\"C}L\x10e\xc6\x90\xc0\xf9z\xb6+/d\x86\xf2\xbe\xc9:u\t\\e\x05)\xe4\xd2\xc4\x1a\xc9\xac\xdb\x925\x02\x94@\xa2\xe1\xee\x16\xb4\x98\xff\x0f\xbb\xb2\x81\xcf\x13g6l\xcc\xc8\x02\v\xa2\xb2\xf6\xbf@d\xcecC\x9fVz\xf4\x14\xa5\x8b|\xe1\xc0\xfa3X\xf4\xd9L\xe6\x8f\x9dy\x0fX.\xc5EQ\xd1/\xa1\xd0\x03>\xf0\x90\x13B\xe2\x97\x8b\"\xf7\"\xecX\x92\xab\xbc^\xb2\x80@\xcc+\xbbp\xdc|N\xd3[=G\xb2\xe1\x9c\xc5\x81y\x84\xef\xacQ\x01\xdd\xe7<\xb8\xf1Hn\x86\xa6\xe3\x18N\x19\"[-\xdb\xef\xc3\xe0\xa8}9q\x92~}M\xceA\xe1)\a\xf0p\xa3\x8dkCvo\x85N(\xdd%DP\x88FW\xb5\x97\xe7\xb8}\xb6/\x95\xb0\xb9\xc9\xb1=\ac\x91\x1d,\xd2\xf5g\xfd\x97X\x1e[\x84\x7f\bO\x16\x84\xefa\xd1\xb3\xf7\\g`\x026\x1f\x89/\x01l\xc1%\xda\xa1:\x99\xf1,\x86f\xe1\xb6\x83\x06\xdd\x91{x\xa1P\xd7\x1d\xa9c\xde\x7f\x8fJ\xae\xf1\xc3\x81@\x1e\x93\xaed-X\xd2\xa7e\xa0\xb3\x16*\xa5\xb1\xd3\x8d\xa4\xf2\xe5\xa2\xe7A\x19\xf4\xa92ok\xf2\xd2\xc74\t*\xb67{#J\x1b\'\xbb\x9b\x99\xda^\x1e\xf6\x03\x9316\xb5T\xbb\xb2\x93\x1b\xfaj\x00\xe8i\x85\xd2\x05!\x87Q\xe5\xbdZ\xcc\x98\xcbY]0\xf7\fl!\x00<', 0x0) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x4e24, 0x200, @empty, 0x8}, 0x1c) sendmsg$key(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB="0206e9061e0000000e0270f3fadbdf25020013000f000000cea4000005350000170018000500ae0042cde9656eb920798384f92e1776969c2a2a9e95ebc8bcb61de138c83a0df379bdc3791ed02ad8d9c75db86ee12fcb5ecc3f94137b52535a2e5e65eb3b89fa2e366a1f278c55b90b0449c660b28a0cc3c794512748d83768844ade6e591793afabe825810f53cb56ab975aeaf15aa3e44c8c059e1ad3a0ffb26747101d560f11929cfb5df0c0b9cea2c8dc6552e2c3e6392118583408da51979c97a9309dc2b250b0ac8296844131f09afc1a5df400000300060032a0000002004e2200"/240], 0xf0}}, 0x0) ftruncate(r3, 0x800799c) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r4, &(0x7f00000002c0)={0xa, 0x4e20, 0xffffffff, @mcast2, 0x9}, 0x1c) sendfile(r4, r3, 0x0, 0xfeff) sched_setscheduler(0x0, 0x1, 0x0) r5 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f0000000100)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x33}}, 0x10) setsockopt$sock_int(r5, 0x1, 0x6, &(0x7f0000000000)=0x4, 0x4) connect$inet(r5, &(0x7f0000000280)={0x2, 0x0, @broadcast}, 0x10) sendmmsg$inet(r5, &(0x7f0000004d00)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30000}}], 0x300, 0xf00) getpid() bpf$ITER_CREATE(0x21, 0x0, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) writev(r3, &(0x7f0000000400)=[{&(0x7f0000002c80)="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", 0x1000}, {&(0x7f0000003c80)="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", 0x1000}, {&(0x7f0000000c00)="f0c08979c90646ba411874440da72812e9fc3a0b180ac10950f040822c9f9343f87b9da0626f88234378754a138ef36449e870d984660b272ba6d33df4d84a3716ce2362dd14c150cbe71a71e65114440528f9b82acfe89e0b68229fb6a7ad74e4d2e36b3aee35482f6a97a2285c5508111b004f884e6557a7834635d62973056d0d07ee306ed42dc57be3f739e0b51fdc85c3aaaf32207d8efd1115ae48b2dc5cb2317f1b1ceabfdcafe7834d996b03ad816ac5a445dbfb1f4f3d91d833c9cfcb03c47795b9f0888d91ec9476d795a2746cd22b8916b9331be7c3728b5ef84fad3afe467bb180b2b017", 0xea}, {&(0x7f0000000380)="d38d1d867db07fdff75103ceeebc", 0xe}], 0x4) setsockopt$SO_ATTACH_FILTER(r7, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x3, &(0x7f0000000000)=[{0x20, 0x0, 0x0, 0xfffff00c}, {0x20, 0x0, 0x0, 0xfffff010}, {0x6}]}, 0x10) sendmmsg$inet(r6, &(0x7f0000002c40)=[{{0x0, 0x0, &(0x7f0000000e80)=[{&(0x7f0000000a80)="2a73ed35", 0x732a}], 0x1}}], 0x400000000000292, 0x0) 373.67µs ago: executing program 5 (id=7380): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = add_key$keyring(&(0x7f00000000c0), &(0x7f0000000240)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffe) r2 = add_key$user(&(0x7f0000000080), &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000003c0)="ae", 0x1, r1) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f0000000200)='asymmetric\x00', &(0x7f0000000000)) keyctl$link(0x8, r2, r1) 0s ago: executing program 5 (id=7381): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x5, 0x0, 0x1, 0xfffffffd}, 0x50) (async, rerun: 32) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) (rerun: 32) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000280)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r4 = socket$unix(0x1, 0x1, 0x0) capset(&(0x7f0000000040)={0x20080522}, &(0x7f0000000080)) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x48) (async) connect$unix(r4, &(0x7f0000000440)=@file={0x1, './file0\x00'}, 0x6e) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r6}, 0x10) (async) fsetxattr$security_capability(r0, &(0x7f0000000080), &(0x7f0000000180)=@v3={0x3000000, [{0x4, 0x8000}, {0x247f, 0xb7b}], 0xee00}, 0x18, 0x3) (async) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f00000001c0)) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r1}, 0x4) (async) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000340)={r2, 0xffffffffffffffff}, 0x4) (async, rerun: 64) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f00000006c0)={'gre0\x00', &(0x7f00000003c0)={'gretap0\x00', 0x0, 0x8, 0x1, 0x7, 0x1, {{0xa, 0x4, 0x2, 0x35, 0x28, 0x67, 0x0, 0x0, 0x0, 0x0, @broadcast, @multicast1, {[@rr={0x7, 0x13, 0xd7, [@private=0xa010102, @private=0xa010102, @dev={0xac, 0x14, 0x14, 0x2b}, @loopback]}]}}}}}) (async, rerun: 64) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000a40)={r2, 0x20, &(0x7f0000000a00)={&(0x7f0000000840)=""/188, 0xbc, 0x0, &(0x7f0000000900)=""/243, 0xf3}}, 0x10) (async) r10 = openat$incfs(r2, &(0x7f0000000a80)='.pending_reads\x00', 0x14200, 0x6) (async) r11 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000ac0)={0x3, 0x4, 0x4, 0xa, 0x0, r2, 0x7, '\x00', 0x0, 0xffffffffffffffff, 0x4, 0x3, 0x3}, 0x50) (async) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000c40)={0x5, 0x1c, &(0x7f00000004c0)=@raw=[@map_idx_val={0x18, 0x4, 0x6, 0x0, 0xf, 0x0, 0x0, 0x0, 0x2}, @map_fd={0x18, 0x6, 0x1, 0x0, r2}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r5}}, @map_fd={0x18, 0x0, 0x1, 0x0, r1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x4}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x1}, @generic={0x7f, 0x6, 0x1, 0x2b, 0x615a}, @map_idx_val={0x18, 0x2, 0x6, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r7}}], &(0x7f00000005c0)='syzkaller\x00', 0x5, 0x0, 0x0, 0x41000, 0x20, '\x00', r8, @fallback=0x21, 0xffffffffffffffff, 0x8, &(0x7f0000000700)={0x6, 0x2}, 0x8, 0x10, &(0x7f0000000740)={0x5, 0xb, 0x5, 0x4}, 0x10, r9, r10, 0x0, &(0x7f0000000b40)=[r5, 0x1, r11, r2, r12], 0x0, 0x10, 0x6}, 0x94) kernel console output (not intermixed with test programs): 379.312495][T21161] __seccomp_filter+0x69d/0x10d0 [ 379.312518][T21161] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 379.312616][T21161] ? vfs_write+0x7e8/0x960 [ 379.312643][T21161] __secure_computing+0x82/0x150 [ 379.312664][T21161] syscall_trace_enter+0xcf/0x1e0 [ 379.312688][T21161] do_syscall_64+0xac/0x200 [ 379.312747][T21161] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 379.312819][T21161] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 379.312844][T21161] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 379.312868][T21161] RIP: 0033:0x7f1f61e4eec9 [ 379.312956][T21161] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 379.313011][T21161] RSP: 002b:00007f1f608af038 EFLAGS: 00000246 ORIG_RAX: 000000000000006f [ 379.313030][T21161] RAX: ffffffffffffffda RBX: 00007f1f620a5fa0 RCX: 00007f1f61e4eec9 [ 379.313043][T21161] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 379.313055][T21161] RBP: 00007f1f608af090 R08: 0000000000000000 R09: 0000000000000000 [ 379.313078][T21161] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 379.313092][T21161] R13: 00007f1f620a6038 R14: 00007f1f620a5fa0 R15: 00007ffcd931fc48 [ 379.313111][T21161] [ 379.715566][T21189] loop0: detected capacity change from 0 to 2048 [ 379.729653][T21189] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6678'. [ 379.750690][T21189] loop0: detected capacity change from 0 to 1024 [ 379.757980][T21189] EXT4-fs: Ignoring removed bh option [ 379.764167][T21189] EXT4-fs: inline encryption not supported [ 379.770444][T21189] EXT4-fs (loop0): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 379.788272][T21189] EXT4-fs error (device loop0): ext4_map_blocks:778: inode #3: block 2: comm syz.0.6678: lblock 2 mapped to illegal pblock 2 (length 1) [ 379.804195][T21189] EXT4-fs error (device loop0): ext4_map_blocks:778: inode #3: block 48: comm syz.0.6678: lblock 0 mapped to illegal pblock 48 (length 1) [ 379.818404][ T3405] tipc: Node number set to 2886997007 [ 379.824969][T21189] EXT4-fs error (device loop0): ext4_acquire_dquot:6937: comm syz.0.6678: Failed to acquire dquot type 0 [ 379.838220][T21189] EXT4-fs error (device loop0) in ext4_reserve_inode_write:6334: Corrupt filesystem [ 379.847887][T21189] EXT4-fs error (device loop0): ext4_evict_inode:254: inode #11: comm syz.0.6678: mark_inode_dirty error [ 379.861089][T21189] EXT4-fs warning (device loop0): ext4_evict_inode:257: couldn't mark inode dirty (err -117) [ 379.871398][T21189] EXT4-fs (loop0): 1 orphan inode deleted [ 379.877472][T21189] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 379.890501][ T12] EXT4-fs error (device loop0): ext4_map_blocks:778: inode #3: block 1: comm kworker/u8:0: lblock 1 mapped to illegal pblock 1 (length 1) [ 379.905620][ T12] EXT4-fs error (device loop0): ext4_release_dquot:6973: comm kworker/u8:0: Failed to release dquot type 0 [ 379.918516][T21189] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 379.927982][T21189] EXT4-fs error (device loop0): __ext4_get_inode_loc:4861: comm syz.0.6678: Invalid inode table block 1 in block_group 0 [ 379.940882][T21189] EXT4-fs error (device loop0) in ext4_reserve_inode_write:6334: Corrupt filesystem [ 379.950498][T21189] EXT4-fs error (device loop0): ext4_quota_off:7221: inode #3: comm syz.0.6678: mark_inode_dirty error [ 380.144144][T21208] netlink: 20 bytes leftover after parsing attributes in process `syz.5.6686'. [ 380.398353][T21226] loop0: detected capacity change from 0 to 2048 [ 380.414983][T21226] [EXT4 FS bs=2048, gc=1, bpg=262144, ipg=32, mo=a842c018, mo2=0002] [ 380.425917][T21226] System zones: 0-7 [ 380.430217][T21226] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000900 r/w without journal. Quota mode: none. [ 381.427211][T21252] netlink: 'syz.6.6700': attribute type 1 has an invalid length. [ 381.435058][T21252] netlink: 224 bytes leftover after parsing attributes in process `syz.6.6700'. [ 382.648293][T21277] macvlan1: entered promiscuous mode [ 382.656718][T19734] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000900. [ 382.661739][T21277] ipvlan0: entered promiscuous mode [ 382.671850][T21277] ipvlan0: left promiscuous mode [ 382.679265][T21277] macvlan1: left promiscuous mode [ 382.883330][T21309] netlink: 'syz.7.6719': attribute type 1 has an invalid length. [ 382.891206][T21309] netlink: 224 bytes leftover after parsing attributes in process `syz.7.6719'. [ 382.940400][ T3405] kernel write not supported for file /snd/seq (pid: 3405 comm: kworker/1:4) [ 382.993515][ T29] kauditd_printk_skb: 530 callbacks suppressed [ 382.993542][ T29] audit: type=1326 audit(1758712137.170:29087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21318 comm="syz.7.6724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc6803eec9 code=0x7ffc0000 [ 383.043724][ T29] audit: type=1326 audit(1758712137.210:29088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21318 comm="syz.7.6724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc6803eec9 code=0x7ffc0000 [ 383.067549][ T29] audit: type=1326 audit(1758712137.210:29089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21318 comm="syz.7.6724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7fbc6803eec9 code=0x7ffc0000 [ 383.091263][ T29] audit: type=1326 audit(1758712137.210:29090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21318 comm="syz.7.6724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc6803eec9 code=0x7ffc0000 [ 383.114988][ T29] audit: type=1326 audit(1758712137.210:29091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21318 comm="syz.7.6724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc6803eec9 code=0x7ffc0000 [ 383.138670][ T29] audit: type=1326 audit(1758712137.210:29092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21318 comm="syz.7.6724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=222 compat=0 ip=0x7fbc6803eec9 code=0x7ffc0000 [ 383.162266][ T29] audit: type=1326 audit(1758712137.210:29093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21318 comm="syz.7.6724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc6803eec9 code=0x7ffc0000 [ 383.185855][ T29] audit: type=1326 audit(1758712137.210:29094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21318 comm="syz.7.6724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc6803eec9 code=0x7ffc0000 [ 383.209693][ T29] audit: type=1326 audit(1758712137.220:29095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21318 comm="syz.7.6724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=223 compat=0 ip=0x7fbc6803eec9 code=0x7ffc0000 [ 383.233338][ T29] audit: type=1326 audit(1758712137.220:29096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21318 comm="syz.7.6724" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fbc6803eec9 code=0x7ffc0000 [ 383.730676][T21336] macvlan1: entered promiscuous mode [ 383.783426][T21336] ipvlan0: entered promiscuous mode [ 383.808330][T21336] ipvlan0: left promiscuous mode [ 383.830116][T21336] macvlan1: left promiscuous mode [ 383.999362][T21344] netlink: 'syz.0.6732': attribute type 1 has an invalid length. [ 384.007238][T21344] netlink: 224 bytes leftover after parsing attributes in process `syz.0.6732'. [ 384.096980][T21353] netlink: 20 bytes leftover after parsing attributes in process `syz.3.6736'. [ 384.139867][T21355] netlink: 20 bytes leftover after parsing attributes in process `syz.5.6737'. [ 384.176068][T21370] netlink: 'syz.6.6726': attribute type 2 has an invalid length. [ 384.306654][T21383] loop0: detected capacity change from 0 to 2048 [ 384.322922][T21383] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000900 r/w without journal. Quota mode: none. [ 384.336067][T21383] EXT4-fs error (device loop0): ext4_find_inline_data_nolock:169: inode #12: comm syz.0.6745: inline data xattr refers to an external xattr inode [ 384.692668][T21392] macvlan1: entered promiscuous mode [ 384.700486][T21392] ipvlan0: entered promiscuous mode [ 384.707622][T21392] ipvlan0: left promiscuous mode [ 384.713078][T21392] macvlan1: left promiscuous mode [ 384.895033][T21416] netlink: 20 bytes leftover after parsing attributes in process `syz.5.6758'. [ 384.972469][ T1036] Process accounting resumed [ 384.997519][T21426] syzkaller1: entered promiscuous mode [ 385.003253][T21426] syzkaller1: entered allmulticast mode [ 385.105454][T21428] macvlan1: entered promiscuous mode [ 385.115314][T21428] ipvlan0: entered promiscuous mode [ 385.122552][T21428] ipvlan0: left promiscuous mode [ 385.131305][T21428] macvlan1: left promiscuous mode [ 385.185409][T19734] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000900. [ 385.202188][T21435] netlink: 8 bytes leftover after parsing attributes in process `syz.7.6765'. [ 385.223808][T21439] loop0: detected capacity change from 0 to 512 [ 385.230823][T21439] EXT4-fs: Ignoring removed nomblk_io_submit option [ 385.254884][T21439] EXT4-fs (loop0): revision level too high, forcing read-only mode [ 385.262991][T21439] [EXT4 FS bs=4096, gc=1, bpg=32768, ipg=32, mo=c000e128, mo2=0002] [ 385.278823][T21439] EXT4-fs (loop0): orphan cleanup on readonly fs [ 385.292633][T21439] EXT4-fs warning (device loop0): ext4_enable_quotas:7172: Failed to enable quota tracking (type=1, err=-22, ino=4). Please run e2fsck to fix. [ 385.307273][T21439] EXT4-fs (loop0): Cannot turn on quotas: error -22 [ 385.317065][T21444] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=21444 comm=syz.7.6769 [ 385.332093][T21439] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz.0.6766: bg 0: block 40: padding at end of block bitmap is not set [ 385.348399][T21439] EXT4-fs (loop0): Remounting filesystem read-only [ 385.355027][T21439] EXT4-fs (loop0): 1 truncate cleaned up [ 385.361050][T21439] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 385.592634][T21452] syzkaller1: entered promiscuous mode [ 385.598201][T21452] syzkaller1: entered allmulticast mode [ 386.461950][T21466] nfs4: Deprecated parameter 'intr' [ 386.749179][T21476] netlink: 20 bytes leftover after parsing attributes in process `syz.3.6781'. [ 386.821356][T21484] FAULT_INJECTION: forcing a failure. [ 386.821356][T21484] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 386.834522][T21484] CPU: 0 UID: 0 PID: 21484 Comm: syz.5.6784 Not tainted syzkaller #0 PREEMPT(voluntary) [ 386.834550][T21484] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 386.834561][T21484] Call Trace: [ 386.834566][T21484] [ 386.834572][T21484] __dump_stack+0x1d/0x30 [ 386.834591][T21484] dump_stack_lvl+0xe8/0x140 [ 386.834641][T21484] dump_stack+0x15/0x1b [ 386.834657][T21484] should_fail_ex+0x265/0x280 [ 386.834728][T21484] should_fail+0xb/0x20 [ 386.834746][T21484] should_fail_usercopy+0x1a/0x20 [ 386.834805][T21484] copy_fpstate_to_sigframe+0x628/0x7d0 [ 386.834833][T21484] ? copy_fpstate_to_sigframe+0xe6/0x7d0 [ 386.834974][T21484] ? x86_task_fpu+0x36/0x60 [ 386.835000][T21484] get_sigframe+0x34d/0x490 [ 386.835019][T21484] ? get_signal+0xdc8/0xf70 [ 386.835040][T21484] x64_setup_rt_frame+0xa8/0x580 [ 386.835098][T21484] arch_do_signal_or_restart+0x27c/0x480 [ 386.835131][T21484] exit_to_user_mode_loop+0x7a/0x100 [ 386.835153][T21484] do_syscall_64+0x1d6/0x200 [ 386.835232][T21484] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 386.835255][T21484] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 386.835331][T21484] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 386.835349][T21484] RIP: 0033:0x7f7c7529eec7 [ 386.835362][T21484] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 386.835423][T21484] RSP: 002b:00007f7c73cff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 386.835519][T21484] RAX: 0000000000000013 RBX: 00007f7c754f5fa0 RCX: 00007f7c7529eec9 [ 386.835532][T21484] RDX: 0000000000000001 RSI: 00002000000009c0 RDI: 0000000000000005 [ 386.835543][T21484] RBP: 00007f7c73cff090 R08: 0000000000000000 R09: 0000000000000000 [ 386.835555][T21484] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 386.835650][T21484] R13: 00007f7c754f6038 R14: 00007f7c754f5fa0 R15: 00007fffce113f18 [ 386.835667][T21484] [ 387.040046][T21489] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6786'. [ 387.062686][T21489] netlink: 'syz.6.6786': attribute type 21 has an invalid length. [ 387.080336][T21489] netlink: 156 bytes leftover after parsing attributes in process `syz.6.6786'. [ 387.089474][T21489] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6786'. [ 387.192636][T21505] syzkaller1: entered promiscuous mode [ 387.198214][T21505] syzkaller1: entered allmulticast mode [ 387.207031][T21503] FAULT_INJECTION: forcing a failure. [ 387.207031][T21503] name failslab, interval 1, probability 0, space 0, times 0 [ 387.219899][T21503] CPU: 0 UID: 0 PID: 21503 Comm: syz.7.6792 Not tainted syzkaller #0 PREEMPT(voluntary) [ 387.219942][T21503] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 387.219955][T21503] Call Trace: [ 387.219963][T21503] [ 387.220050][T21503] __dump_stack+0x1d/0x30 [ 387.220069][T21503] dump_stack_lvl+0xe8/0x140 [ 387.220086][T21503] dump_stack+0x15/0x1b [ 387.220100][T21503] should_fail_ex+0x265/0x280 [ 387.220123][T21503] should_failslab+0x8c/0xb0 [ 387.220220][T21503] __kmalloc_noprof+0xa5/0x3e0 [ 387.220243][T21503] ? _ib_alloc_device+0x3e/0x460 [ 387.220339][T21503] _ib_alloc_device+0x3e/0x460 [ 387.220362][T21503] rxe_net_add+0x26/0xb0 [ 387.220384][T21503] rxe_newlink+0xc6/0x180 [ 387.220399][T21503] nldev_newlink+0x369/0x3f0 [ 387.220483][T21503] ? __pfx_nldev_newlink+0x10/0x10 [ 387.220552][T21503] rdma_nl_rcv+0x479/0x5a0 [ 387.220573][T21503] ? sysvec_apic_timer_interrupt+0x44/0x80 [ 387.220603][T21503] netlink_unicast+0x5c0/0x690 [ 387.220630][T21503] netlink_sendmsg+0x58b/0x6b0 [ 387.220690][T21503] ? __pfx_netlink_sendmsg+0x10/0x10 [ 387.220711][T21503] __sock_sendmsg+0x145/0x180 [ 387.220847][T21503] ____sys_sendmsg+0x31e/0x4e0 [ 387.220876][T21503] ___sys_sendmsg+0x17b/0x1d0 [ 387.220960][T21503] ? prepare_signal+0x596/0x670 [ 387.221003][T21503] __x64_sys_sendmsg+0xd4/0x160 [ 387.221093][T21503] x64_sys_call+0x191e/0x2ff0 [ 387.221182][T21503] do_syscall_64+0xd2/0x200 [ 387.221207][T21503] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 387.221269][T21503] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 387.221291][T21503] RIP: 0033:0x7fbc6803eec9 [ 387.221307][T21503] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 387.221324][T21503] RSP: 002b:00007fbc66aa7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 387.221341][T21503] RAX: ffffffffffffffda RBX: 00007fbc68295fa0 RCX: 00007fbc6803eec9 [ 387.221418][T21503] RDX: 0000000000000810 RSI: 0000200000000240 RDI: 0000000000000006 [ 387.221431][T21503] RBP: 00007fbc66aa7090 R08: 0000000000000000 R09: 0000000000000000 [ 387.221444][T21503] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 387.221506][T21503] R13: 00007fbc68296038 R14: 00007fbc68295fa0 R15: 00007ffce9ef7ab8 [ 387.221527][T21503] [ 387.449509][T21503] rdma_rxe: rxe_newlink: failed to add lo [ 387.500443][T19734] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 387.620076][T21529] FAULT_INJECTION: forcing a failure. [ 387.620076][T21529] name failslab, interval 1, probability 0, space 0, times 0 [ 387.632827][T21529] CPU: 0 UID: 0 PID: 21529 Comm: syz.6.6802 Not tainted syzkaller #0 PREEMPT(voluntary) [ 387.632914][T21529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 387.632942][T21529] Call Trace: [ 387.632949][T21529] [ 387.632957][T21529] __dump_stack+0x1d/0x30 [ 387.633033][T21529] dump_stack_lvl+0xe8/0x140 [ 387.633054][T21529] dump_stack+0x15/0x1b [ 387.633072][T21529] should_fail_ex+0x265/0x280 [ 387.633170][T21529] should_failslab+0x8c/0xb0 [ 387.633245][T21529] __kvmalloc_node_noprof+0x123/0x4e0 [ 387.633275][T21529] ? rhashtable_init_noprof+0x316/0x4f0 [ 387.633309][T21529] rhashtable_init_noprof+0x316/0x4f0 [ 387.633334][T21529] rhltable_init_noprof+0x1d/0x40 [ 387.633406][T21529] nf_tables_newtable+0x522/0xea0 [ 387.633468][T21529] nfnetlink_rcv+0xb99/0x1690 [ 387.633600][T21529] netlink_unicast+0x5c0/0x690 [ 387.633623][T21529] netlink_sendmsg+0x58b/0x6b0 [ 387.633702][T21529] ? __pfx_netlink_sendmsg+0x10/0x10 [ 387.633729][T21529] __sock_sendmsg+0x145/0x180 [ 387.633762][T21529] ____sys_sendmsg+0x31e/0x4e0 [ 387.633864][T21529] ___sys_sendmsg+0x17b/0x1d0 [ 387.633903][T21529] __x64_sys_sendmsg+0xd4/0x160 [ 387.633967][T21529] x64_sys_call+0x191e/0x2ff0 [ 387.633990][T21529] do_syscall_64+0xd2/0x200 [ 387.634077][T21529] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 387.634104][T21529] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 387.634206][T21529] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 387.634263][T21529] RIP: 0033:0x7fcff11eeec9 [ 387.634280][T21529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 387.634298][T21529] RSP: 002b:00007fcfefc4f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 387.634316][T21529] RAX: ffffffffffffffda RBX: 00007fcff1445fa0 RCX: 00007fcff11eeec9 [ 387.634337][T21529] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000003 [ 387.634348][T21529] RBP: 00007fcfefc4f090 R08: 0000000000000000 R09: 0000000000000000 [ 387.634360][T21529] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 387.634371][T21529] R13: 00007fcff1446038 R14: 00007fcff1445fa0 R15: 00007ffcb4b09e08 [ 387.634393][T21529] [ 387.635983][T21529] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6802'. [ 387.883257][T21522] chnl_net:caif_netlink_parms(): no params data found [ 387.959793][T21545] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6804'. [ 387.979543][T21522] bridge0: port 1(bridge_slave_0) entered blocking state [ 387.986715][T21522] bridge0: port 1(bridge_slave_0) entered disabled state [ 388.015981][T21522] bridge_slave_0: entered allmulticast mode [ 388.031222][T21522] bridge_slave_0: entered promiscuous mode [ 388.044710][T21522] bridge0: port 2(bridge_slave_1) entered blocking state [ 388.052368][T21522] bridge0: port 2(bridge_slave_1) entered disabled state [ 388.064515][T21550] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6806'. [ 388.076996][T21522] bridge_slave_1: entered allmulticast mode [ 388.085939][T21522] bridge_slave_1: entered promiscuous mode [ 388.128040][T21522] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 388.140491][T21553] FAULT_INJECTION: forcing a failure. [ 388.140491][T21553] name failslab, interval 1, probability 0, space 0, times 0 [ 388.150062][T21522] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 388.153306][T21553] CPU: 0 UID: 0 PID: 21553 Comm: syz.6.6807 Not tainted syzkaller #0 PREEMPT(voluntary) [ 388.153333][T21553] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 388.153346][T21553] Call Trace: [ 388.153352][T21553] [ 388.153359][T21553] __dump_stack+0x1d/0x30 [ 388.153455][T21553] dump_stack_lvl+0xe8/0x140 [ 388.153547][T21553] dump_stack+0x15/0x1b [ 388.153563][T21553] should_fail_ex+0x265/0x280 [ 388.153610][T21553] should_failslab+0x8c/0xb0 [ 388.153687][T21553] kmem_cache_alloc_node_noprof+0x57/0x320 [ 388.153733][T21553] ? __alloc_skb+0x101/0x320 [ 388.153837][T21553] __alloc_skb+0x101/0x320 [ 388.153859][T21553] netlink_alloc_large_skb+0xba/0xf0 [ 388.153882][T21553] netlink_sendmsg+0x3cf/0x6b0 [ 388.153909][T21553] ? __pfx_netlink_sendmsg+0x10/0x10 [ 388.153931][T21553] __sock_sendmsg+0x145/0x180 [ 388.153978][T21553] ____sys_sendmsg+0x31e/0x4e0 [ 388.154006][T21553] ___sys_sendmsg+0x17b/0x1d0 [ 388.154120][T21553] __x64_sys_sendmsg+0xd4/0x160 [ 388.154150][T21553] x64_sys_call+0x191e/0x2ff0 [ 388.154171][T21553] do_syscall_64+0xd2/0x200 [ 388.154201][T21553] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 388.154268][T21553] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 388.154296][T21553] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 388.154389][T21553] RIP: 0033:0x7fcff11eeec9 [ 388.154475][T21553] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 388.154492][T21553] RSP: 002b:00007fcfefc4f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 388.154511][T21553] RAX: ffffffffffffffda RBX: 00007fcff1445fa0 RCX: 00007fcff11eeec9 [ 388.154524][T21553] RDX: 0000000000000000 RSI: 0000200000000840 RDI: 0000000000000003 [ 388.154604][T21553] RBP: 00007fcfefc4f090 R08: 0000000000000000 R09: 0000000000000000 [ 388.154616][T21553] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 388.154629][T21553] R13: 00007fcff1446038 R14: 00007fcff1445fa0 R15: 00007ffcb4b09e08 [ 388.154648][T21553] [ 388.367325][ T29] kauditd_printk_skb: 1020 callbacks suppressed [ 388.367339][ T29] audit: type=1400 audit(1758712142.540:30114): avc: denied { append } for pid=21554 comm="syz.6.6808" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 388.413230][T21522] team0: Port device team_slave_0 added [ 388.419980][T21522] team0: Port device team_slave_1 added [ 388.463152][ T29] audit: type=1400 audit(1758712142.540:30115): avc: denied { create } for pid=21554 comm="syz.6.6808" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 388.482824][ T29] audit: type=1326 audit(1758712142.630:30116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21563 comm="syz.6.6812" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcff11eeec9 code=0x7ffc0000 [ 388.506435][ T29] audit: type=1326 audit(1758712142.630:30117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21563 comm="syz.6.6812" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcff11eeec9 code=0x7ffc0000 [ 388.530108][ T29] audit: type=1326 audit(1758712142.630:30118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21563 comm="syz.6.6812" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcff11eeec9 code=0x7ffc0000 [ 388.553793][ T29] audit: type=1326 audit(1758712142.630:30119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21563 comm="syz.6.6812" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcff11eeec9 code=0x7ffc0000 [ 388.577607][ T29] audit: type=1326 audit(1758712142.630:30120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21563 comm="syz.6.6812" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcff11eeec9 code=0x7ffc0000 [ 388.601271][ T29] audit: type=1326 audit(1758712142.630:30121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21563 comm="syz.6.6812" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcff11eeec9 code=0x7ffc0000 [ 388.624920][ T29] audit: type=1326 audit(1758712142.630:30122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21563 comm="syz.6.6812" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcff11eeec9 code=0x7ffc0000 [ 388.648502][ T29] audit: type=1326 audit(1758712142.630:30123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21563 comm="syz.6.6812" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcff11eeec9 code=0x7ffc0000 [ 388.688659][T21522] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 388.695711][T21522] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 388.721836][T21522] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 388.733300][T21522] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 388.740616][T21522] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 388.766705][T21522] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 388.830529][T21522] hsr_slave_0: entered promiscuous mode [ 388.837495][T21522] hsr_slave_1: entered promiscuous mode [ 388.845358][T21522] debugfs: 'hsr0' already exists in 'hsr' [ 388.851121][T21522] Cannot create hsr debugfs directory [ 388.935978][T21522] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 388.946496][T21522] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 388.957894][T21522] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 388.967310][T21522] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 389.013624][T21522] 8021q: adding VLAN 0 to HW filter on device bond0 [ 389.029351][T21522] 8021q: adding VLAN 0 to HW filter on device team0 [ 389.041748][T10701] bridge0: port 1(bridge_slave_0) entered blocking state [ 389.048930][T10701] bridge0: port 1(bridge_slave_0) entered forwarding state [ 389.075040][T10701] bridge0: port 2(bridge_slave_1) entered blocking state [ 389.082224][T10701] bridge0: port 2(bridge_slave_1) entered forwarding state [ 389.160337][T21522] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 389.295123][T21522] veth0_vlan: entered promiscuous mode [ 389.304021][T21522] veth1_vlan: entered promiscuous mode [ 389.330376][T21522] veth0_macvtap: entered promiscuous mode [ 389.340230][T21522] veth1_macvtap: entered promiscuous mode [ 389.358435][T21522] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 389.369969][T21522] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 389.381206][T10583] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 389.390646][T10583] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 389.400000][T10583] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 389.421208][T10583] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 389.647663][T21637] netlink: 'syz.7.6825': attribute type 1 has an invalid length. [ 389.655516][T21637] netlink: 224 bytes leftover after parsing attributes in process `syz.7.6825'. [ 389.692606][T21656] FAULT_INJECTION: forcing a failure. [ 389.692606][T21656] name failslab, interval 1, probability 0, space 0, times 0 [ 389.705437][T21656] CPU: 1 UID: 0 PID: 21656 Comm: syz.5.6828 Not tainted syzkaller #0 PREEMPT(voluntary) [ 389.705516][T21656] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 389.705528][T21656] Call Trace: [ 389.705534][T21656] [ 389.705543][T21656] __dump_stack+0x1d/0x30 [ 389.705565][T21656] dump_stack_lvl+0xe8/0x140 [ 389.705633][T21656] dump_stack+0x15/0x1b [ 389.705651][T21656] should_fail_ex+0x265/0x280 [ 389.705675][T21656] should_failslab+0x8c/0xb0 [ 389.705715][T21656] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 389.705765][T21656] ? __d_alloc+0x3d/0x340 [ 389.705792][T21656] __d_alloc+0x3d/0x340 [ 389.705833][T21656] ? mpol_shared_policy_init+0xbd/0x4c0 [ 389.705931][T21656] d_alloc_pseudo+0x1e/0x80 [ 389.705959][T21656] alloc_file_pseudo+0x71/0x160 [ 389.706065][T21656] __shmem_file_setup+0x1de/0x210 [ 389.706097][T21656] shmem_file_setup+0x3b/0x50 [ 389.706172][T21656] __se_sys_memfd_create+0x2c3/0x590 [ 389.706195][T21656] __x64_sys_memfd_create+0x31/0x40 [ 389.706216][T21656] x64_sys_call+0x2abe/0x2ff0 [ 389.706236][T21656] do_syscall_64+0xd2/0x200 [ 389.706285][T21656] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 389.706305][T21656] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 389.706331][T21656] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 389.706357][T21656] RIP: 0033:0x7f7c7529eec9 [ 389.706372][T21656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 389.706391][T21656] RSP: 002b:00007f7c73cfed68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 389.706410][T21656] RAX: ffffffffffffffda RBX: 00000000000005d6 RCX: 00007f7c7529eec9 [ 389.706422][T21656] RDX: 00007f7c73cfedec RSI: 0000000000000000 RDI: 00007f7c75322960 [ 389.706435][T21656] RBP: 0000200000000600 R08: 00007f7c73cfeb07 R09: 0000000000000000 [ 389.706448][T21656] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 [ 389.706460][T21656] R13: 00007f7c73cfedec R14: 00007f7c73cfedf0 R15: 00007fffce113f18 [ 389.706479][T21656] [ 390.736157][T21798] syz_tun: entered allmulticast mode [ 390.753035][T21798] lo: entered allmulticast mode [ 390.777709][T21797] syz_tun: left allmulticast mode [ 390.905358][T21814] FAULT_INJECTION: forcing a failure. [ 390.905358][T21814] name failslab, interval 1, probability 0, space 0, times 0 [ 390.918351][T21814] CPU: 0 UID: 0 PID: 21814 Comm: syz.7.6859 Not tainted syzkaller #0 PREEMPT(voluntary) [ 390.918417][T21814] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 390.918428][T21814] Call Trace: [ 390.918433][T21814] [ 390.918440][T21814] __dump_stack+0x1d/0x30 [ 390.918462][T21814] dump_stack_lvl+0xe8/0x140 [ 390.918483][T21814] dump_stack+0x15/0x1b [ 390.918585][T21814] should_fail_ex+0x265/0x280 [ 390.918681][T21814] ? tcf_pedit_init+0x448/0x9a0 [ 390.918721][T21814] should_failslab+0x8c/0xb0 [ 390.918747][T21814] __kmalloc_cache_noprof+0x4c/0x320 [ 390.918778][T21814] tcf_pedit_init+0x448/0x9a0 [ 390.918805][T21814] ? should_fail_ex+0xdb/0x280 [ 390.918854][T21814] tcf_action_init_1+0x36a/0x4a0 [ 390.918890][T21814] tcf_action_init+0x267/0x6d0 [ 390.918919][T21814] ? mark_reg_read+0x233/0x340 [ 390.918978][T21814] tc_ctl_action+0x291/0x830 [ 390.919022][T21814] ? __pfx_tc_ctl_action+0x10/0x10 [ 390.919053][T21814] rtnetlink_rcv_msg+0x65a/0x6d0 [ 390.919104][T21814] ? avc_has_perm_noaudit+0x1b1/0x200 [ 390.919127][T21814] netlink_rcv_skb+0x120/0x220 [ 390.919208][T21814] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 390.919241][T21814] rtnetlink_rcv+0x1c/0x30 [ 390.919265][T21814] netlink_unicast+0x5c0/0x690 [ 390.919367][T21814] netlink_sendmsg+0x58b/0x6b0 [ 390.919390][T21814] ? __pfx_netlink_sendmsg+0x10/0x10 [ 390.919454][T21814] __sock_sendmsg+0x145/0x180 [ 390.919513][T21814] ____sys_sendmsg+0x31e/0x4e0 [ 390.919576][T21814] ___sys_sendmsg+0x17b/0x1d0 [ 390.919617][T21814] __x64_sys_sendmsg+0xd4/0x160 [ 390.919704][T21814] x64_sys_call+0x191e/0x2ff0 [ 390.919724][T21814] do_syscall_64+0xd2/0x200 [ 390.919764][T21814] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 390.919790][T21814] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 390.919815][T21814] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 390.919833][T21814] RIP: 0033:0x7fbc6803eec9 [ 390.919846][T21814] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 390.919920][T21814] RSP: 002b:00007fbc66aa7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 390.919941][T21814] RAX: ffffffffffffffda RBX: 00007fbc68295fa0 RCX: 00007fbc6803eec9 [ 390.919952][T21814] RDX: 0000000000000000 RSI: 0000200000000300 RDI: 0000000000000003 [ 390.919963][T21814] RBP: 00007fbc66aa7090 R08: 0000000000000000 R09: 0000000000000000 [ 390.920046][T21814] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 390.920057][T21814] R13: 00007fbc68296038 R14: 00007fbc68295fa0 R15: 00007ffce9ef7ab8 [ 390.920077][T21814] [ 391.466685][T21831] usb usb2: Requested nonsensical USBDEVFS_URB_ZERO_PACKET. [ 391.494377][T21831] vhci_hcd: default hub control req: 2314 v0008 i0002 l0 [ 391.606210][T21842] netlink: 'syz.3.6867': attribute type 1 has an invalid length. [ 391.614054][T21842] netlink: 224 bytes leftover after parsing attributes in process `syz.3.6867'. [ 391.901661][T21856] macvlan1: entered promiscuous mode [ 391.918342][T21856] ipvlan0: entered promiscuous mode [ 391.936367][T21856] ipvlan0: left promiscuous mode [ 391.952580][T21856] macvlan1: left promiscuous mode [ 392.100084][T21868] FAULT_INJECTION: forcing a failure. [ 392.100084][T21868] name failslab, interval 1, probability 0, space 0, times 0 [ 392.112829][T21868] CPU: 1 UID: 0 PID: 21868 Comm: syz.3.6878 Not tainted syzkaller #0 PREEMPT(voluntary) [ 392.112856][T21868] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 392.112896][T21868] Call Trace: [ 392.112904][T21868] [ 392.112911][T21868] __dump_stack+0x1d/0x30 [ 392.112931][T21868] dump_stack_lvl+0xe8/0x140 [ 392.112951][T21868] dump_stack+0x15/0x1b [ 392.112968][T21868] should_fail_ex+0x265/0x280 [ 392.113059][T21868] should_failslab+0x8c/0xb0 [ 392.113083][T21868] kmem_cache_alloc_noprof+0x50/0x310 [ 392.113121][T21868] ? audit_log_start+0x365/0x6c0 [ 392.113152][T21868] audit_log_start+0x365/0x6c0 [ 392.113184][T21868] audit_seccomp+0x48/0x100 [ 392.113210][T21868] ? __seccomp_filter+0x68c/0x10d0 [ 392.113279][T21868] __seccomp_filter+0x69d/0x10d0 [ 392.113302][T21868] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 392.113396][T21868] ? vfs_write+0x7e8/0x960 [ 392.113467][T21868] __secure_computing+0x82/0x150 [ 392.113490][T21868] syscall_trace_enter+0xcf/0x1e0 [ 392.113510][T21868] do_syscall_64+0xac/0x200 [ 392.113594][T21868] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 392.113617][T21868] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 392.113644][T21868] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 392.113736][T21868] RIP: 0033:0x7f1f61e4eec9 [ 392.113749][T21868] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 392.113767][T21868] RSP: 002b:00007f1f608af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 392.113830][T21868] RAX: ffffffffffffffda RBX: 00007f1f620a5fa0 RCX: 00007f1f61e4eec9 [ 392.113842][T21868] RDX: 0000000000000001 RSI: 0000200000000300 RDI: 0000000000000006 [ 392.113852][T21868] RBP: 00007f1f608af090 R08: 0000000000000000 R09: 0000000000000000 [ 392.113865][T21868] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 392.113878][T21868] R13: 00007f1f620a6038 R14: 00007f1f620a5fa0 R15: 00007ffcd931fc48 [ 392.113933][T21868] [ 392.366242][T21870] netlink: 'syz.7.6879': attribute type 1 has an invalid length. [ 392.374342][T21870] netlink: 224 bytes leftover after parsing attributes in process `syz.7.6879'. [ 392.385539][ T3405] Process accounting resumed [ 392.628431][T21889] macvlan1: entered promiscuous mode [ 392.639320][T21889] ipvlan0: entered promiscuous mode [ 392.645814][T21889] ipvlan0: left promiscuous mode [ 392.653621][T21889] macvlan1: left promiscuous mode [ 392.732836][T21900] FAULT_INJECTION: forcing a failure. [ 392.732836][T21900] name failslab, interval 1, probability 0, space 0, times 0 [ 392.745558][T21900] CPU: 0 UID: 0 PID: 21900 Comm: syz.5.6890 Not tainted syzkaller #0 PREEMPT(voluntary) [ 392.745582][T21900] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 392.745594][T21900] Call Trace: [ 392.745600][T21900] [ 392.745609][T21900] __dump_stack+0x1d/0x30 [ 392.745676][T21900] dump_stack_lvl+0xe8/0x140 [ 392.745694][T21900] dump_stack+0x15/0x1b [ 392.745711][T21900] should_fail_ex+0x265/0x280 [ 392.745735][T21900] should_failslab+0x8c/0xb0 [ 392.745768][T21900] kmem_cache_alloc_noprof+0x50/0x310 [ 392.745861][T21900] ? xfrm_state_alloc+0x2c/0x190 [ 392.745884][T21900] xfrm_state_alloc+0x2c/0x190 [ 392.745895][T21900] pfkey_add+0x3e5/0x12e0 [ 392.745986][T21900] pfkey_sendmsg+0x715/0x900 [ 392.746082][T21900] ? __pfx_pfkey_sendmsg+0x10/0x10 [ 392.746097][T21900] __sock_sendmsg+0x145/0x180 [ 392.746116][T21900] ____sys_sendmsg+0x345/0x4e0 [ 392.746150][T21900] ___sys_sendmsg+0x17b/0x1d0 [ 392.746172][T21900] __sys_sendmmsg+0x178/0x300 [ 392.746192][T21900] __x64_sys_sendmmsg+0x57/0x70 [ 392.746229][T21900] x64_sys_call+0x1c4a/0x2ff0 [ 392.746249][T21900] do_syscall_64+0xd2/0x200 [ 392.746277][T21900] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 392.746334][T21900] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 392.746350][T21900] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 392.746389][T21900] RIP: 0033:0x7f7c7529eec9 [ 392.746398][T21900] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 392.746408][T21900] RSP: 002b:00007f7c73cff038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 392.746460][T21900] RAX: ffffffffffffffda RBX: 00007f7c754f5fa0 RCX: 00007f7c7529eec9 [ 392.746467][T21900] RDX: 000000000400008a RSI: 0000200000000180 RDI: 0000000000000003 [ 392.746475][T21900] RBP: 00007f7c73cff090 R08: 0000000000000000 R09: 0000000000000000 [ 392.746482][T21900] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 392.746489][T21900] R13: 00007f7c754f6038 R14: 00007f7c754f5fa0 R15: 00007fffce113f18 [ 392.746501][T21900] [ 392.978412][T21902] FAULT_INJECTION: forcing a failure. [ 392.978412][T21902] name failslab, interval 1, probability 0, space 0, times 0 [ 392.991144][T21902] CPU: 0 UID: 0 PID: 21902 Comm: syz.3.6891 Not tainted syzkaller #0 PREEMPT(voluntary) [ 392.991181][T21902] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 392.991191][T21902] Call Trace: [ 392.991196][T21902] [ 392.991204][T21902] __dump_stack+0x1d/0x30 [ 392.991224][T21902] dump_stack_lvl+0xe8/0x140 [ 392.991245][T21902] dump_stack+0x15/0x1b [ 392.991262][T21902] should_fail_ex+0x265/0x280 [ 392.991288][T21902] should_failslab+0x8c/0xb0 [ 392.991335][T21902] kmem_cache_alloc_node_noprof+0x57/0x320 [ 392.991409][T21902] ? __alloc_skb+0x101/0x320 [ 392.991429][T21902] __alloc_skb+0x101/0x320 [ 392.991453][T21902] netlink_alloc_large_skb+0xba/0xf0 [ 392.991509][T21902] netlink_sendmsg+0x3cf/0x6b0 [ 392.991538][T21902] ? __pfx_netlink_sendmsg+0x10/0x10 [ 392.991565][T21902] __sock_sendmsg+0x145/0x180 [ 392.991608][T21902] ____sys_sendmsg+0x31e/0x4e0 [ 392.991632][T21902] ___sys_sendmsg+0x17b/0x1d0 [ 392.991664][T21902] __x64_sys_sendmsg+0xd4/0x160 [ 392.991764][T21902] x64_sys_call+0x191e/0x2ff0 [ 392.991786][T21902] do_syscall_64+0xd2/0x200 [ 392.991824][T21902] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 392.991939][T21902] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 392.991969][T21902] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 392.991990][T21902] RIP: 0033:0x7f1f61e4eec9 [ 392.992007][T21902] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 392.992048][T21902] RSP: 002b:00007f1f608af038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 392.992068][T21902] RAX: ffffffffffffffda RBX: 00007f1f620a5fa0 RCX: 00007f1f61e4eec9 [ 392.992082][T21902] RDX: 0000000000000000 RSI: 0000200000000440 RDI: 0000000000000005 [ 392.992093][T21902] RBP: 00007f1f608af090 R08: 0000000000000000 R09: 0000000000000000 [ 392.992105][T21902] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 392.992118][T21902] R13: 00007f1f620a6038 R14: 00007f1f620a5fa0 R15: 00007ffcd931fc48 [ 392.992198][T21902] [ 393.276838][T21906] netlink: 'syz.8.6892': attribute type 1 has an invalid length. [ 393.284736][T21906] netlink: 224 bytes leftover after parsing attributes in process `syz.8.6892'. [ 393.430243][ T29] kauditd_printk_skb: 714 callbacks suppressed [ 393.430259][ T29] audit: type=1326 audit(1758712147.600:30836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21925 comm="syz.6.6900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcff11eeec9 code=0x7ffc0000 [ 393.498670][ T29] audit: type=1326 audit(1758712147.620:30837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21925 comm="syz.6.6900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcff11eeec9 code=0x7ffc0000 [ 393.522599][ T29] audit: type=1326 audit(1758712147.620:30838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21925 comm="syz.6.6900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fcff11eeec9 code=0x7ffc0000 [ 393.546304][ T29] audit: type=1326 audit(1758712147.620:30839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21925 comm="syz.6.6900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7fcff11eef03 code=0x7ffc0000 [ 393.569821][ T29] audit: type=1326 audit(1758712147.620:30840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21925 comm="syz.6.6900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fcff11ed97f code=0x7ffc0000 [ 393.593513][ T29] audit: type=1326 audit(1758712147.620:30841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21925 comm="syz.6.6900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7fcff11eef57 code=0x7ffc0000 [ 393.617539][ T29] audit: type=1326 audit(1758712147.640:30842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21925 comm="syz.6.6900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fcff11ed710 code=0x7ffc0000 [ 393.641605][ T29] audit: type=1326 audit(1758712147.640:30843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21925 comm="syz.6.6900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7fcff11edb2a code=0x7ffc0000 [ 393.705220][ T29] audit: type=1326 audit(1758712147.800:30844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21936 comm="syz.8.6905" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe6f599eec9 code=0x7ffc0000 [ 393.729713][ T29] audit: type=1326 audit(1758712147.800:30845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21936 comm="syz.8.6905" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe6f599eec9 code=0x7ffc0000 [ 393.780138][T21940] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6906'. [ 393.915228][T21960] mmap: syz.3.6911 (21960): VmData 29016064 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. [ 393.956511][T21964] FAULT_INJECTION: forcing a failure. [ 393.956511][T21964] name failslab, interval 1, probability 0, space 0, times 0 [ 393.968823][T21932] chnl_net:caif_netlink_parms(): no params data found [ 393.969446][T21964] CPU: 1 UID: 0 PID: 21964 Comm: syz.3.6912 Not tainted syzkaller #0 PREEMPT(voluntary) [ 393.969473][T21964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 393.969485][T21964] Call Trace: [ 393.969494][T21964] [ 393.969502][T21964] __dump_stack+0x1d/0x30 [ 393.969523][T21964] dump_stack_lvl+0xe8/0x140 [ 393.969543][T21964] dump_stack+0x15/0x1b [ 393.969559][T21964] should_fail_ex+0x265/0x280 [ 393.969648][T21964] should_failslab+0x8c/0xb0 [ 393.969673][T21964] kmem_cache_alloc_noprof+0x50/0x310 [ 393.969699][T21964] ? audit_log_start+0x365/0x6c0 [ 393.969835][T21964] audit_log_start+0x365/0x6c0 [ 393.969866][T21964] audit_seccomp+0x48/0x100 [ 393.969948][T21964] ? __seccomp_filter+0x68c/0x10d0 [ 393.969969][T21964] __seccomp_filter+0x69d/0x10d0 [ 393.969991][T21964] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 393.970018][T21964] ? vfs_write+0x7e8/0x960 [ 393.970063][T21964] ? __rcu_read_unlock+0x4f/0x70 [ 393.970084][T21964] ? __fget_files+0x184/0x1c0 [ 393.970111][T21964] __secure_computing+0x82/0x150 [ 393.970132][T21964] syscall_trace_enter+0xcf/0x1e0 [ 393.970162][T21964] do_syscall_64+0xac/0x200 [ 393.970191][T21964] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 393.970214][T21964] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 393.970295][T21964] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 393.970315][T21964] RIP: 0033:0x7f1f61e4eec9 [ 393.970382][T21964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 393.970398][T21964] RSP: 002b:00007f1f608af038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f1 [ 393.970417][T21964] RAX: ffffffffffffffda RBX: 00007f1f620a5fa0 RCX: 00007f1f61e4eec9 [ 393.970437][T21964] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 393.970514][T21964] RBP: 00007f1f608af090 R08: 0000000000000000 R09: 0000000000000000 [ 393.970572][T21964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 393.970585][T21964] R13: 00007f1f620a6038 R14: 00007f1f620a5fa0 R15: 00007ffcd931fc48 [ 393.970604][T21964] [ 394.015977][T21969] FAULT_INJECTION: forcing a failure. [ 394.015977][T21969] name failslab, interval 1, probability 0, space 0, times 0 [ 394.129104][T21973] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6915'. [ 394.131372][T21969] CPU: 1 UID: 0 PID: 21969 Comm: syz.3.6914 Not tainted syzkaller #0 PREEMPT(voluntary) [ 394.131396][T21969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 394.131408][T21969] Call Trace: [ 394.131415][T21969] [ 394.131423][T21969] __dump_stack+0x1d/0x30 [ 394.131488][T21969] dump_stack_lvl+0xe8/0x140 [ 394.131612][T21969] dump_stack+0x15/0x1b [ 394.131628][T21969] should_fail_ex+0x265/0x280 [ 394.131730][T21969] should_failslab+0x8c/0xb0 [ 394.131754][T21969] kmem_cache_alloc_node_noprof+0x57/0x320 [ 394.131782][T21969] ? __alloc_skb+0x101/0x320 [ 394.131805][T21969] __alloc_skb+0x101/0x320 [ 394.131827][T21969] ? pfkey_broadcast+0x223/0x240 [ 394.131854][T21969] pfkey_sendmsg+0x7e4/0x900 [ 394.131891][T21969] ? __pfx_pfkey_sendmsg+0x10/0x10 [ 394.131958][T21969] __sock_sendmsg+0x145/0x180 [ 394.132005][T21969] ____sys_sendmsg+0x345/0x4e0 [ 394.132033][T21969] ___sys_sendmsg+0x17b/0x1d0 [ 394.132075][T21969] __sys_sendmmsg+0x178/0x300 [ 394.132110][T21969] __x64_sys_sendmmsg+0x57/0x70 [ 394.132205][T21969] x64_sys_call+0x1c4a/0x2ff0 [ 394.132226][T21969] do_syscall_64+0xd2/0x200 [ 394.132298][T21969] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 394.132321][T21969] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 394.132349][T21969] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 394.132376][T21969] RIP: 0033:0x7f1f61e4eec9 [ 394.132440][T21969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 394.132454][T21969] RSP: 002b:00007f1f608af038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 394.132470][T21969] RAX: ffffffffffffffda RBX: 00007f1f620a5fa0 RCX: 00007f1f61e4eec9 [ 394.132482][T21969] RDX: 000000000400008a RSI: 0000200000000180 RDI: 0000000000000005 [ 394.132494][T21969] RBP: 00007f1f608af090 R08: 0000000000000000 R09: 0000000000000000 [ 394.132507][T21969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 394.132519][T21969] R13: 00007f1f620a6038 R14: 00007f1f620a5fa0 R15: 00007ffcd931fc48 [ 394.132593][T21969] [ 394.410038][T21972] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6915'. [ 394.522385][T21932] bridge0: port 1(bridge_slave_0) entered blocking state [ 394.522417][T21932] bridge0: port 1(bridge_slave_0) entered disabled state [ 394.522551][T21932] bridge_slave_0: entered allmulticast mode [ 394.523042][T21932] bridge_slave_0: entered promiscuous mode [ 394.524414][T21932] bridge0: port 2(bridge_slave_1) entered blocking state [ 394.524447][T21932] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.536088][T21932] bridge_slave_1: entered allmulticast mode [ 394.536632][T21932] bridge_slave_1: entered promiscuous mode [ 394.574365][T21932] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 394.575586][T21932] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 394.614799][T21932] team0: Port device team_slave_0 added [ 394.637906][T21932] team0: Port device team_slave_1 added [ 394.701325][T21932] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 394.705177][T21997] netlink: 20 bytes leftover after parsing attributes in process `syz.8.6921'. [ 394.708387][T21932] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 394.743997][T21932] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 394.758802][T21932] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 394.765912][T21932] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 394.792057][T21932] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 394.839429][T21932] hsr_slave_0: entered promiscuous mode [ 394.850778][T21932] hsr_slave_1: entered promiscuous mode [ 394.859731][T21932] debugfs: 'hsr0' already exists in 'hsr' [ 394.865528][T21932] Cannot create hsr debugfs directory [ 394.897467][T14186] bridge_slave_1: left allmulticast mode [ 394.903332][T14186] bridge_slave_1: left promiscuous mode [ 394.909000][T14186] bridge0: port 2(bridge_slave_1) entered disabled state [ 394.917820][T14186] bridge_slave_0: left allmulticast mode [ 394.923530][T14186] bridge_slave_0: left promiscuous mode [ 394.929406][T14186] bridge0: port 1(bridge_slave_0) entered disabled state [ 395.003941][T14186] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 395.014609][T14186] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 395.023765][T14186] bond0 (unregistering): Released all slaves [ 395.031859][T14186] bond1 (unregistering): Released all slaves [ 395.100975][T14186] tipc: Disabling bearer [ 395.105965][T14186] tipc: Left network mode [ 395.208797][T14186] hsr_slave_0: left promiscuous mode [ 395.215972][T14186] hsr_slave_1: left promiscuous mode [ 395.221960][T14186] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 395.272474][T14186] team0 (unregistering): Port device team_slave_1 removed [ 395.282832][T14186] team0 (unregistering): Port device team_slave_0 removed [ 395.405188][T22036] pim6reg1: entered promiscuous mode [ 395.410505][T22036] pim6reg1: entered allmulticast mode [ 395.563227][T21932] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 395.576178][T21932] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 395.586195][T21932] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 395.595564][T21932] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 395.636292][T21932] 8021q: adding VLAN 0 to HW filter on device bond0 [ 395.649764][T21932] 8021q: adding VLAN 0 to HW filter on device team0 [ 395.660167][ T8301] bridge0: port 1(bridge_slave_0) entered blocking state [ 395.667275][ T8301] bridge0: port 1(bridge_slave_0) entered forwarding state [ 395.680132][ T8301] bridge0: port 2(bridge_slave_1) entered blocking state [ 395.687310][ T8301] bridge0: port 2(bridge_slave_1) entered forwarding state [ 395.796833][T21932] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 395.971985][T21932] veth0_vlan: entered promiscuous mode [ 395.980060][T21932] veth1_vlan: entered promiscuous mode [ 395.998383][T21932] veth0_macvtap: entered promiscuous mode [ 396.005785][T21932] veth1_macvtap: entered promiscuous mode [ 396.017535][T21932] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 396.030783][T21932] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 396.043860][T14186] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 396.063849][T14186] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 396.087964][T14186] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 396.111942][T14186] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 396.177735][T22074] FAULT_INJECTION: forcing a failure. [ 396.177735][T22074] name failslab, interval 1, probability 0, space 0, times 0 [ 396.190506][T22074] CPU: 1 UID: 0 PID: 22074 Comm: syz.5.6937 Not tainted syzkaller #0 PREEMPT(voluntary) [ 396.190534][T22074] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 396.190626][T22074] Call Trace: [ 396.190634][T22074] [ 396.190643][T22074] __dump_stack+0x1d/0x30 [ 396.190663][T22074] dump_stack_lvl+0xe8/0x140 [ 396.190681][T22074] dump_stack+0x15/0x1b [ 396.190699][T22074] should_fail_ex+0x265/0x280 [ 396.190725][T22074] should_failslab+0x8c/0xb0 [ 396.190790][T22074] kmem_cache_alloc_node_noprof+0x57/0x320 [ 396.190877][T22074] ? __alloc_skb+0x101/0x320 [ 396.190902][T22074] __alloc_skb+0x101/0x320 [ 396.190925][T22074] netlink_alloc_large_skb+0xba/0xf0 [ 396.190998][T22074] netlink_sendmsg+0x3cf/0x6b0 [ 396.191050][T22074] ? __pfx_netlink_sendmsg+0x10/0x10 [ 396.191075][T22074] __sock_sendmsg+0x145/0x180 [ 396.191107][T22074] ____sys_sendmsg+0x31e/0x4e0 [ 396.191142][T22074] ___sys_sendmsg+0x17b/0x1d0 [ 396.191218][T22074] __x64_sys_sendmsg+0xd4/0x160 [ 396.191243][T22074] x64_sys_call+0x191e/0x2ff0 [ 396.191261][T22074] do_syscall_64+0xd2/0x200 [ 396.191290][T22074] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 396.191397][T22074] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 396.191424][T22074] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 396.191443][T22074] RIP: 0033:0x7f7c7529eec9 [ 396.191455][T22074] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 396.191537][T22074] RSP: 002b:00007f7c73cff038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 396.191554][T22074] RAX: ffffffffffffffda RBX: 00007f7c754f5fa0 RCX: 00007f7c7529eec9 [ 396.191567][T22074] RDX: 0000000000000000 RSI: 0000200000000580 RDI: 0000000000000003 [ 396.191581][T22074] RBP: 00007f7c73cff090 R08: 0000000000000000 R09: 0000000000000000 [ 396.191594][T22074] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 396.191616][T22074] R13: 00007f7c754f6038 R14: 00007f7c754f5fa0 R15: 00007fffce113f18 [ 396.191712][T22074] [ 396.478633][T12750] Process accounting resumed [ 396.547103][T22090] netlink: 20 bytes leftover after parsing attributes in process `syz.8.6941'. [ 397.045680][T22109] netlink: 'syz.3.6947': attribute type 1 has an invalid length. [ 397.053711][T22109] netlink: 224 bytes leftover after parsing attributes in process `syz.3.6947'. [ 397.106468][T22114] netlink: 16 bytes leftover after parsing attributes in process `syz.8.6949'. [ 397.485862][T22138] netlink: 'syz.6.6959': attribute type 1 has an invalid length. [ 397.493737][T22138] netlink: 224 bytes leftover after parsing attributes in process `syz.6.6959'. [ 397.592347][T22155] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6966'. [ 397.605414][T22155] €Â: renamed from ip6_vti0 (while UP) [ 397.956797][T22175] FAULT_INJECTION: forcing a failure. [ 397.956797][T22175] name failslab, interval 1, probability 0, space 0, times 0 [ 397.969660][T22175] CPU: 1 UID: 0 PID: 22175 Comm: syz.7.6974 Not tainted syzkaller #0 PREEMPT(voluntary) [ 397.969688][T22175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 397.969701][T22175] Call Trace: [ 397.969707][T22175] [ 397.969717][T22175] __dump_stack+0x1d/0x30 [ 397.969757][T22175] dump_stack_lvl+0xe8/0x140 [ 397.969842][T22175] dump_stack+0x15/0x1b [ 397.969859][T22175] should_fail_ex+0x265/0x280 [ 397.969946][T22175] should_failslab+0x8c/0xb0 [ 397.970031][T22175] __kmalloc_cache_node_noprof+0x54/0x320 [ 397.970061][T22175] ? __get_vm_area_node+0x106/0x1d0 [ 397.970091][T22175] __get_vm_area_node+0x106/0x1d0 [ 397.970173][T22175] __vmalloc_node_range_noprof+0x273/0xe00 [ 397.970204][T22175] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 397.970236][T22175] ? avc_has_perm_noaudit+0x1b1/0x200 [ 397.970331][T22175] ? cred_has_capability+0x210/0x280 [ 397.970458][T22175] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 397.970485][T22175] __vmalloc_noprof+0x83/0xc0 [ 397.970511][T22175] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 397.970618][T22175] bpf_prog_alloc_no_stats+0x47/0x3a0 [ 397.970644][T22175] ? bpf_prog_alloc+0x2a/0x150 [ 397.970669][T22175] bpf_prog_alloc+0x3c/0x150 [ 397.970757][T22175] bpf_prog_load+0x514/0x1070 [ 397.970794][T22175] ? security_bpf+0x2b/0x90 [ 397.970810][T22175] __sys_bpf+0x462/0x7b0 [ 397.970843][T22175] __x64_sys_bpf+0x41/0x50 [ 397.970879][T22175] x64_sys_call+0x2aea/0x2ff0 [ 397.970918][T22175] do_syscall_64+0xd2/0x200 [ 397.970947][T22175] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 397.971028][T22175] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 397.971128][T22175] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 397.971146][T22175] RIP: 0033:0x7ff0d136eec9 [ 397.971199][T22175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 397.971216][T22175] RSP: 002b:00007ff0cfdd7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 397.971235][T22175] RAX: ffffffffffffffda RBX: 00007ff0d15c5fa0 RCX: 00007ff0d136eec9 [ 397.971249][T22175] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 397.971312][T22175] RBP: 00007ff0cfdd7090 R08: 0000000000000000 R09: 0000000000000000 [ 397.971325][T22175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 397.971383][T22175] R13: 00007ff0d15c6038 R14: 00007ff0d15c5fa0 R15: 00007fffaa44a008 [ 397.971402][T22175] [ 398.208975][T22175] syz.7.6974: vmalloc error: size 4096, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0 [ 398.225397][T22175] CPU: 1 UID: 0 PID: 22175 Comm: syz.7.6974 Not tainted syzkaller #0 PREEMPT(voluntary) [ 398.225465][T22175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 398.225475][T22175] Call Trace: [ 398.225481][T22175] [ 398.225489][T22175] __dump_stack+0x1d/0x30 [ 398.225508][T22175] dump_stack_lvl+0xe8/0x140 [ 398.225528][T22175] dump_stack+0x15/0x1b [ 398.225545][T22175] warn_alloc+0x12b/0x1a0 [ 398.225618][T22175] __vmalloc_node_range_noprof+0x297/0xe00 [ 398.225648][T22175] ? avc_has_perm_noaudit+0x1b1/0x200 [ 398.225671][T22175] ? cred_has_capability+0x210/0x280 [ 398.225691][T22175] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 398.225718][T22175] __vmalloc_noprof+0x83/0xc0 [ 398.225844][T22175] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 398.225869][T22175] bpf_prog_alloc_no_stats+0x47/0x3a0 [ 398.225891][T22175] ? bpf_prog_alloc+0x2a/0x150 [ 398.226020][T22175] bpf_prog_alloc+0x3c/0x150 [ 398.226042][T22175] bpf_prog_load+0x514/0x1070 [ 398.226075][T22175] ? security_bpf+0x2b/0x90 [ 398.226094][T22175] __sys_bpf+0x462/0x7b0 [ 398.226133][T22175] __x64_sys_bpf+0x41/0x50 [ 398.226211][T22175] x64_sys_call+0x2aea/0x2ff0 [ 398.226254][T22175] do_syscall_64+0xd2/0x200 [ 398.226280][T22175] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 398.226300][T22175] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 398.226362][T22175] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 398.226380][T22175] RIP: 0033:0x7ff0d136eec9 [ 398.226393][T22175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 398.226408][T22175] RSP: 002b:00007ff0cfdd7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 398.226424][T22175] RAX: ffffffffffffffda RBX: 00007ff0d15c5fa0 RCX: 00007ff0d136eec9 [ 398.226438][T22175] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 398.226451][T22175] RBP: 00007ff0cfdd7090 R08: 0000000000000000 R09: 0000000000000000 [ 398.226464][T22175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 398.226525][T22175] R13: 00007ff0d15c6038 R14: 00007ff0d15c5fa0 R15: 00007fffaa44a008 [ 398.226545][T22175] [ 398.226679][T22175] Mem-Info: [ 398.444042][T22175] active_anon:3992 inactive_anon:11 isolated_anon:0 [ 398.444042][T22175] active_file:27855 inactive_file:2714 isolated_file:0 [ 398.444042][T22175] unevictable:0 dirty:543 writeback:0 [ 398.444042][T22175] slab_reclaimable:3630 slab_unreclaimable:19207 [ 398.444042][T22175] mapped:29872 shmem:702 pagetables:1770 [ 398.444042][T22175] sec_pagetables:0 bounce:0 [ 398.444042][T22175] kernel_misc_reclaimable:0 [ 398.444042][T22175] free:1859968 free_pcp:15757 free_cma:0 [ 398.489080][T22175] Node 0 active_anon:15968kB inactive_anon:44kB active_file:111420kB inactive_file:10856kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:119488kB dirty:2172kB writeback:0kB shmem:2808kB kernel_stack:4368kB pagetables:7080kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 398.516639][T22175] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 398.545383][T22175] lowmem_reserve[]: 0 2883 7862 7862 [ 398.550718][T22175] Node 0 DMA32 free:2949188kB boost:0kB min:4132kB low:7064kB high:9996kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2952820kB mlocked:0kB bounce:0kB free_pcp:3632kB local_pcp:3532kB free_cma:0kB [ 398.581095][T22175] lowmem_reserve[]: 0 0 4978 4978 [ 398.586144][T22175] Node 0 Normal free:4478216kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB free_highatomic:0KB active_anon:15840kB inactive_anon:44kB active_file:111420kB inactive_file:10856kB unevictable:0kB writepending:2184kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:56660kB local_pcp:20512kB free_cma:0kB [ 398.618563][T22175] lowmem_reserve[]: 0 0 0 0 [ 398.623146][T22175] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 398.636223][T22175] Node 0 DMA32: 3*4kB (M) 1*8kB (M) 3*16kB (M) 2*32kB (M) 3*64kB (M) 4*128kB (M) 3*256kB (M) 3*512kB (M) 3*1024kB (M) 3*2048kB (M) 717*4096kB (M) = 2949188kB [ 398.637849][T22186] FAULT_INJECTION: forcing a failure. [ 398.637849][T22186] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 398.652420][T22175] Node 0 Normal: 958*4kB (M) 2028*8kB (UM) 1881*16kB (UME) 1094*32kB (UME) 1105*64kB (UME) 421*128kB (UM) [ 398.665483][T22186] CPU: 0 UID: 0 PID: 22186 Comm: syz.5.6979 Not tainted syzkaller #0 PREEMPT(voluntary) [ 398.665567][T22175] 603*256kB [ 398.665582][T22186] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 398.665674][T22186] Call Trace: [ 398.665682][T22186] [ 398.665691][T22186] __dump_stack+0x1d/0x30 [ 398.665713][T22186] dump_stack_lvl+0xe8/0x140 [ 398.665733][T22186] dump_stack+0x15/0x1b [ 398.665749][T22186] should_fail_ex+0x265/0x280 [ 398.665834][T22186] should_fail+0xb/0x20 [ 398.665854][T22186] should_fail_usercopy+0x1a/0x20 [ 398.665879][T22186] _copy_from_user+0x1c/0xb0 [ 398.665908][T22186] kstrtouint_from_user+0x69/0xf0 [ 398.665965][T22186] ? 0xffffffff81000000 [ 398.665979][T22186] ? selinux_file_permission+0x1e4/0x320 [ 398.666023][T22186] proc_fail_nth_write+0x50/0x160 [ 398.666050][T22186] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 398.666174][T22186] vfs_write+0x266/0x960 [ 398.666195][T22186] ? vfs_read+0x4e6/0x770 [ 398.666215][T22186] ? __rcu_read_unlock+0x4f/0x70 [ 398.666236][T22186] ? __fget_files+0x184/0x1c0 [ 398.666264][T22186] ksys_write+0xda/0x1a0 [ 398.666342][T22186] __x64_sys_write+0x40/0x50 [ 398.666376][T22186] x64_sys_call+0x27fe/0x2ff0 [ 398.666397][T22186] do_syscall_64+0xd2/0x200 [ 398.666427][T22186] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 398.666518][T22186] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 398.666555][T22186] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 398.666608][T22186] RIP: 0033:0x7f7c7529d97f [ 398.666623][T22186] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 398.666639][T22186] RSP: 002b:00007f7c73cde030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 398.666726][T22186] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f7c7529d97f [ 398.666767][T22186] RDX: 0000000000000001 RSI: 00007f7c73cde0a0 RDI: 0000000000000007 [ 398.666779][T22186] RBP: 00007f7c73cde090 R08: 0000000000000000 R09: 0000000000000000 [ 398.666791][T22186] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 398.666869][T22186] R13: 00007f7c754f6128 R14: 00007f7c754f6090 R15: 00007fffce113f18 [ 398.666889][T22186] [ 398.893853][T22175] (UM) 347*512kB (UME) 140*1024kB (UM) 70*2048kB (UME) 891*4096kB (UM) = 4478056kB [ 398.903283][T22175] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 398.912642][T22175] 34135 total pagecache pages [ 398.917318][T22175] 53 pages in swap cache [ 398.921792][T22175] Free swap = 124484kB [ 398.925997][T22175] Total swap = 124996kB [ 398.930126][T22175] 2097051 pages RAM [ 398.933965][T22175] 0 pages HighMem/MovableOnly [ 398.938628][T22175] 80446 pages reserved [ 398.977851][T22195] netlink: 'syz.3.6978': attribute type 21 has an invalid length. [ 398.986489][T22198] FAULT_INJECTION: forcing a failure. [ 398.986489][T22198] name failslab, interval 1, probability 0, space 0, times 0 [ 398.999208][T22198] CPU: 1 UID: 0 PID: 22198 Comm: syz.8.6981 Not tainted syzkaller #0 PREEMPT(voluntary) [ 398.999258][T22198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 398.999270][T22198] Call Trace: [ 398.999277][T22198] [ 398.999285][T22198] __dump_stack+0x1d/0x30 [ 398.999382][T22198] dump_stack_lvl+0xe8/0x140 [ 398.999398][T22198] dump_stack+0x15/0x1b [ 398.999415][T22198] should_fail_ex+0x265/0x280 [ 398.999491][T22198] ? ip_set_create+0x1ec/0x960 [ 398.999515][T22198] should_failslab+0x8c/0xb0 [ 398.999567][T22198] __kmalloc_cache_noprof+0x4c/0x320 [ 398.999659][T22198] ip_set_create+0x1ec/0x960 [ 398.999688][T22198] ? __nla_parse+0x40/0x60 [ 398.999710][T22198] nfnetlink_rcv_msg+0x4c6/0x590 [ 398.999783][T22198] netlink_rcv_skb+0x120/0x220 [ 398.999878][T22198] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 398.999901][T22198] nfnetlink_rcv+0x16b/0x1690 [ 398.999971][T22198] ? nlmon_xmit+0x4f/0x60 [ 398.999997][T22198] ? consume_skb+0x49/0x150 [ 399.000019][T22198] ? nlmon_xmit+0x4f/0x60 [ 399.000113][T22198] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 399.000174][T22198] ? __dev_queue_xmit+0x1200/0x2000 [ 399.000197][T22198] ? __dev_queue_xmit+0x182/0x2000 [ 399.000220][T22198] ? ref_tracker_free+0x37d/0x3e0 [ 399.000263][T22198] ? __netlink_deliver_tap+0x4dc/0x500 [ 399.000293][T22198] netlink_unicast+0x5c0/0x690 [ 399.000314][T22198] netlink_sendmsg+0x58b/0x6b0 [ 399.000396][T22198] ? __pfx_netlink_sendmsg+0x10/0x10 [ 399.000467][T22198] __sock_sendmsg+0x145/0x180 [ 399.000515][T22198] ____sys_sendmsg+0x31e/0x4e0 [ 399.000539][T22198] ___sys_sendmsg+0x17b/0x1d0 [ 399.000578][T22198] __x64_sys_sendmsg+0xd4/0x160 [ 399.000683][T22198] x64_sys_call+0x191e/0x2ff0 [ 399.000702][T22198] do_syscall_64+0xd2/0x200 [ 399.000727][T22198] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 399.000749][T22198] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 399.000812][T22198] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 399.000834][T22198] RIP: 0033:0x7fe6f599eec9 [ 399.000850][T22198] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 399.000865][T22198] RSP: 002b:00007fe6f4407038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 399.000905][T22198] RAX: ffffffffffffffda RBX: 00007fe6f5bf5fa0 RCX: 00007fe6f599eec9 [ 399.000918][T22198] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000003 [ 399.000930][T22198] RBP: 00007fe6f4407090 R08: 0000000000000000 R09: 0000000000000000 [ 399.000971][T22198] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 399.000985][T22198] R13: 00007fe6f5bf6038 R14: 00007fe6f5bf5fa0 R15: 00007ffc77084f48 [ 399.001002][T22198] [ 399.268205][T22195] netlink: 132 bytes leftover after parsing attributes in process `syz.3.6978'. [ 399.297418][T22200] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 399.363342][T22210] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6987'. [ 399.406685][ T29] kauditd_printk_skb: 310 callbacks suppressed [ 399.406701][ T29] audit: type=1326 audit(1758712153.530:31154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22191 comm="syz.3.6978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 399.436974][ T29] audit: type=1326 audit(1758712153.530:31155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22191 comm="syz.3.6978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 399.437017][ T29] audit: type=1326 audit(1758712153.530:31156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22191 comm="syz.3.6978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 399.437153][ T29] audit: type=1326 audit(1758712153.530:31157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22191 comm="syz.3.6978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 399.437184][ T29] audit: type=1326 audit(1758712153.530:31158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22191 comm="syz.3.6978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 399.437311][ T29] audit: type=1326 audit(1758712153.540:31159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22191 comm="syz.3.6978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 399.437343][ T29] audit: type=1326 audit(1758712153.550:31160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22191 comm="syz.3.6978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 399.437373][ T29] audit: type=1326 audit(1758712153.550:31161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22191 comm="syz.3.6978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 399.437404][ T29] audit: type=1326 audit(1758712153.550:31162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22191 comm="syz.3.6978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=286 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 399.437441][ T29] audit: type=1326 audit(1758712153.550:31163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22191 comm="syz.3.6978" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 399.738160][T22215] block device autoloading is deprecated and will be removed. [ 399.743594][T22219] netlink: 'syz.7.6986': attribute type 1 has an invalid length. [ 399.743658][T22219] netlink: 224 bytes leftover after parsing attributes in process `syz.7.6986'. [ 400.354685][T22226] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6989'. [ 400.585224][T22248] pim6reg: entered allmulticast mode [ 400.597646][T22248] pim6reg: left allmulticast mode [ 400.609092][T22252] lo speed is unknown, defaulting to 1000 [ 400.624693][T22252] lo speed is unknown, defaulting to 1000 [ 400.635701][T22252] lo speed is unknown, defaulting to 1000 [ 400.643917][T22252] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 400.679802][T22252] lo speed is unknown, defaulting to 1000 [ 400.696711][T22252] lo speed is unknown, defaulting to 1000 [ 400.709951][T22252] lo speed is unknown, defaulting to 1000 [ 400.719153][T22252] lo speed is unknown, defaulting to 1000 [ 400.726818][T22252] lo speed is unknown, defaulting to 1000 [ 400.733277][T22252] lo speed is unknown, defaulting to 1000 [ 400.777454][T22254] netlink: 'syz.8.7001': attribute type 1 has an invalid length. [ 400.785313][T22254] netlink: 224 bytes leftover after parsing attributes in process `syz.8.7001'. [ 401.251463][T22290] pim6reg1: entered promiscuous mode [ 401.257004][T22290] pim6reg1: entered allmulticast mode [ 401.427908][T22295] lo speed is unknown, defaulting to 1000 [ 401.699145][T22294] lo speed is unknown, defaulting to 1000 [ 402.164839][T22324] lo speed is unknown, defaulting to 1000 [ 402.289306][T22336] lo speed is unknown, defaulting to 1000 [ 402.434691][T22348] lo speed is unknown, defaulting to 1000 [ 402.643377][T22358] lo speed is unknown, defaulting to 1000 [ 402.794389][T22363] lo speed is unknown, defaulting to 1000 [ 402.841862][T22368] netlink: 12 bytes leftover after parsing attributes in process `syz.6.7043'. [ 402.893983][T22375] smc: net device bond0 erased user defined pnetid SYZ0 [ 402.902812][T22377] netlink: 12 bytes leftover after parsing attributes in process `syz.5.7047'. [ 403.118421][T22397] lo speed is unknown, defaulting to 1000 [ 403.143489][T22398] lo speed is unknown, defaulting to 1000 [ 403.374494][T22426] FAULT_INJECTION: forcing a failure. [ 403.374494][T22426] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 403.387707][T22426] CPU: 0 UID: 0 PID: 22426 Comm: syz.8.7063 Not tainted syzkaller #0 PREEMPT(voluntary) [ 403.387737][T22426] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 403.387748][T22426] Call Trace: [ 403.387755][T22426] [ 403.387763][T22426] __dump_stack+0x1d/0x30 [ 403.387788][T22426] dump_stack_lvl+0xe8/0x140 [ 403.387806][T22426] dump_stack+0x15/0x1b [ 403.387823][T22426] should_fail_ex+0x265/0x280 [ 403.387877][T22426] should_fail+0xb/0x20 [ 403.387898][T22426] should_fail_usercopy+0x1a/0x20 [ 403.387938][T22426] _copy_from_user+0x1c/0xb0 [ 403.387969][T22426] memdup_user+0x5e/0xd0 [ 403.387999][T22426] con_font_op+0x6c3/0x930 [ 403.388018][T22426] ? selinux_capable+0x31/0x40 [ 403.388042][T22426] ? should_fail_ex+0xdb/0x280 [ 403.388079][T22426] vt_ioctl+0x153c/0x1880 [ 403.388113][T22426] tty_ioctl+0x7de/0xb80 [ 403.388133][T22426] ? __pfx_tty_ioctl+0x10/0x10 [ 403.388153][T22426] __se_sys_ioctl+0xce/0x140 [ 403.388172][T22426] __x64_sys_ioctl+0x43/0x50 [ 403.388243][T22426] x64_sys_call+0x1816/0x2ff0 [ 403.388288][T22426] do_syscall_64+0xd2/0x200 [ 403.388316][T22426] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 403.388341][T22426] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 403.388434][T22426] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 403.388457][T22426] RIP: 0033:0x7fe6f599eec9 [ 403.388474][T22426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 403.388559][T22426] RSP: 002b:00007fe6f4407038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 403.388623][T22426] RAX: ffffffffffffffda RBX: 00007fe6f5bf5fa0 RCX: 00007fe6f599eec9 [ 403.388634][T22426] RDX: 0000200000000080 RSI: 0000000000004b72 RDI: 0000000000000006 [ 403.388646][T22426] RBP: 00007fe6f4407090 R08: 0000000000000000 R09: 0000000000000000 [ 403.388658][T22426] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 403.388669][T22426] R13: 00007fe6f5bf6038 R14: 00007fe6f5bf5fa0 R15: 00007ffc77084f48 [ 403.388686][T22426] [ 403.657095][T22434] siw: device registration error -23 [ 403.761264][T22441] macvlan1: entered promiscuous mode [ 403.768405][T22441] ipvlan0: entered promiscuous mode [ 403.776092][T22441] ipvlan0: left promiscuous mode [ 403.781412][T22441] macvlan1: left promiscuous mode [ 403.847236][T22446] netlink: 'syz.3.7071': attribute type 21 has an invalid length. [ 403.855575][T22446] netlink: 132 bytes leftover after parsing attributes in process `syz.3.7071'. [ 403.972194][T22448] lo speed is unknown, defaulting to 1000 [ 404.126545][T22458] netlink: 24 bytes leftover after parsing attributes in process `syz.6.7074'. [ 404.824279][ T29] kauditd_printk_skb: 866 callbacks suppressed [ 404.824291][ T29] audit: type=1326 audit(1758712159.000:32028): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22466 comm="syz.5.7080" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7529eec9 code=0x7ffc0000 [ 404.876448][T10111] Process accounting resumed [ 404.901050][ T29] audit: type=1326 audit(1758712159.030:32029): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22466 comm="syz.5.7080" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7c7529eec9 code=0x7ffc0000 [ 404.924834][ T29] audit: type=1326 audit(1758712159.030:32030): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22466 comm="syz.5.7080" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7529eec9 code=0x7ffc0000 [ 404.948516][ T29] audit: type=1326 audit(1758712159.030:32031): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22466 comm="syz.5.7080" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7529eec9 code=0x7ffc0000 [ 404.972231][ T29] audit: type=1326 audit(1758712159.030:32032): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22466 comm="syz.5.7080" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7c7529eec9 code=0x7ffc0000 [ 404.996217][ T29] audit: type=1326 audit(1758712159.030:32033): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22466 comm="syz.5.7080" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7529eec9 code=0x7ffc0000 [ 405.020098][ T29] audit: type=1326 audit(1758712159.030:32034): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22466 comm="syz.5.7080" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7529eec9 code=0x7ffc0000 [ 405.025998][T22471] macvlan1: entered promiscuous mode [ 405.043745][ T29] audit: type=1326 audit(1758712159.030:32035): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22466 comm="syz.5.7080" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f7c7529eec9 code=0x7ffc0000 [ 405.072746][ T29] audit: type=1326 audit(1758712159.030:32036): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22466 comm="syz.5.7080" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7529eec9 code=0x7ffc0000 [ 405.096449][ T29] audit: type=1326 audit(1758712159.030:32037): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22466 comm="syz.5.7080" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7c7529eec9 code=0x7ffc0000 [ 405.123793][T22471] ipvlan0: entered promiscuous mode [ 405.129688][T22471] ipvlan0: left promiscuous mode [ 405.164593][T22471] macvlan1: left promiscuous mode [ 405.246321][T22474] netlink: 'syz.5.7082': attribute type 1 has an invalid length. [ 405.254114][T22474] netlink: 224 bytes leftover after parsing attributes in process `syz.5.7082'. [ 405.556223][T22504] netlink: 'syz.6.7097': attribute type 1 has an invalid length. [ 405.564103][T22504] netlink: 224 bytes leftover after parsing attributes in process `syz.6.7097'. [ 405.665593][T22512] siw: device registration error -23 [ 405.706029][T22516] FAULT_INJECTION: forcing a failure. [ 405.706029][T22516] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 405.719342][T22516] CPU: 0 UID: 0 PID: 22516 Comm: syz.6.7101 Not tainted syzkaller #0 PREEMPT(voluntary) [ 405.719405][T22516] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 405.719417][T22516] Call Trace: [ 405.719424][T22516] [ 405.719431][T22516] __dump_stack+0x1d/0x30 [ 405.719453][T22516] dump_stack_lvl+0xe8/0x140 [ 405.719474][T22516] dump_stack+0x15/0x1b [ 405.719489][T22516] should_fail_ex+0x265/0x280 [ 405.719578][T22516] should_fail+0xb/0x20 [ 405.719598][T22516] should_fail_usercopy+0x1a/0x20 [ 405.719623][T22516] _copy_to_user+0x20/0xa0 [ 405.719653][T22516] simple_read_from_buffer+0xb5/0x130 [ 405.719724][T22516] proc_fail_nth_read+0x10e/0x150 [ 405.719748][T22516] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 405.719769][T22516] vfs_read+0x1a5/0x770 [ 405.719862][T22516] ? __rcu_read_unlock+0x4f/0x70 [ 405.719911][T22516] ? __fget_files+0x184/0x1c0 [ 405.719934][T22516] ksys_read+0xda/0x1a0 [ 405.719953][T22516] __x64_sys_read+0x40/0x50 [ 405.719971][T22516] x64_sys_call+0x27bc/0x2ff0 [ 405.719989][T22516] do_syscall_64+0xd2/0x200 [ 405.720058][T22516] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 405.720088][T22516] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 405.720116][T22516] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 405.720145][T22516] RIP: 0033:0x7fcff11ed8dc [ 405.720181][T22516] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 405.720198][T22516] RSP: 002b:00007fcfefc4f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 405.720218][T22516] RAX: ffffffffffffffda RBX: 00007fcff1445fa0 RCX: 00007fcff11ed8dc [ 405.720231][T22516] RDX: 000000000000000f RSI: 00007fcfefc4f0a0 RDI: 0000000000000005 [ 405.720243][T22516] RBP: 00007fcfefc4f090 R08: 0000000000000000 R09: 0000000000000000 [ 405.720255][T22516] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 405.720268][T22516] R13: 00007fcff1446038 R14: 00007fcff1445fa0 R15: 00007ffcb4b09e08 [ 405.720352][T22516] [ 406.074660][ T3405] Process accounting resumed [ 406.385125][T22544] netlink: 'syz.8.7112': attribute type 1 has an invalid length. [ 406.389893][T22548] netlink: 12 bytes leftover after parsing attributes in process `syz.5.7114'. [ 406.392962][T22544] netlink: 224 bytes leftover after parsing attributes in process `syz.8.7112'. [ 406.411534][T22548] 8021q: adding VLAN 0 to HW filter on device bond1 [ 406.419999][T22548] netlink: 56 bytes leftover after parsing attributes in process `syz.5.7114'. [ 406.804773][T22569] lo speed is unknown, defaulting to 1000 [ 407.254226][T22584] netlink: 'syz.7.7126': attribute type 1 has an invalid length. [ 407.262291][T22584] netlink: 224 bytes leftover after parsing attributes in process `syz.7.7126'. [ 407.322844][T22591] FAULT_INJECTION: forcing a failure. [ 407.322844][T22591] name failslab, interval 1, probability 0, space 0, times 0 [ 407.335924][T22591] CPU: 1 UID: 0 PID: 22591 Comm: syz.7.7129 Not tainted syzkaller #0 PREEMPT(voluntary) [ 407.335952][T22591] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 407.335965][T22591] Call Trace: [ 407.335972][T22591] [ 407.335988][T22591] __dump_stack+0x1d/0x30 [ 407.336010][T22591] dump_stack_lvl+0xe8/0x140 [ 407.336081][T22591] dump_stack+0x15/0x1b [ 407.336102][T22591] should_fail_ex+0x265/0x280 [ 407.336126][T22591] ? __se_sys_mount+0xef/0x2e0 [ 407.336214][T22591] should_failslab+0x8c/0xb0 [ 407.336398][T22591] __kmalloc_cache_noprof+0x4c/0x320 [ 407.336423][T22591] ? memdup_user+0x99/0xd0 [ 407.336524][T22591] __se_sys_mount+0xef/0x2e0 [ 407.336544][T22591] ? fput+0x8f/0xc0 [ 407.336567][T22591] ? ksys_write+0x192/0x1a0 [ 407.336649][T22591] __x64_sys_mount+0x67/0x80 [ 407.336742][T22591] x64_sys_call+0x2b4d/0x2ff0 [ 407.336763][T22591] do_syscall_64+0xd2/0x200 [ 407.336791][T22591] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 407.336885][T22591] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 407.336910][T22591] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 407.337001][T22591] RIP: 0033:0x7ff0d136eec9 [ 407.337084][T22591] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.337102][T22591] RSP: 002b:00007ff0cfdd7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 407.337122][T22591] RAX: ffffffffffffffda RBX: 00007ff0d15c5fa0 RCX: 00007ff0d136eec9 [ 407.337135][T22591] RDX: 00002000000002c0 RSI: 0000200000000080 RDI: 0000000000000000 [ 407.337149][T22591] RBP: 00007ff0cfdd7090 R08: 0000200000000240 R09: 0000000000000000 [ 407.337163][T22591] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.337192][T22591] R13: 00007ff0d15c6038 R14: 00007ff0d15c5fa0 R15: 00007fffaa44a008 [ 407.337284][T22591] [ 407.709383][T22594] macvlan1: entered promiscuous mode [ 407.730546][T22594] ipvlan0: entered promiscuous mode [ 407.743248][T22594] ipvlan0: left promiscuous mode [ 407.755909][T22594] macvlan1: left promiscuous mode [ 407.816661][ T3389] Process accounting resumed [ 407.920838][T22599] lo speed is unknown, defaulting to 1000 [ 408.054851][T22612] netlink: 'syz.8.7138': attribute type 1 has an invalid length. [ 408.062667][T22612] __nla_validate_parse: 1 callbacks suppressed [ 408.062684][T22612] netlink: 224 bytes leftover after parsing attributes in process `syz.8.7138'. [ 408.093604][T22617] netlink: 'syz.3.7140': attribute type 21 has an invalid length. [ 408.131257][T22617] netlink: 132 bytes leftover after parsing attributes in process `syz.3.7140'. [ 408.227820][T22625] macvlan1: entered promiscuous mode [ 408.242378][T22625] ipvlan0: entered promiscuous mode [ 408.254675][T22625] ipvlan0: left promiscuous mode [ 408.260309][T22625] macvlan1: left promiscuous mode [ 408.273045][T22630] netlink: 4 bytes leftover after parsing attributes in process `syz.3.7144'. [ 408.293121][T22632] siw: device registration error -23 [ 408.457069][T22642] FAULT_INJECTION: forcing a failure. [ 408.457069][T22642] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 408.470213][T22642] CPU: 0 UID: 0 PID: 22642 Comm: syz.6.7132 Not tainted syzkaller #0 PREEMPT(voluntary) [ 408.470242][T22642] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 408.470255][T22642] Call Trace: [ 408.470371][T22642] [ 408.470380][T22642] __dump_stack+0x1d/0x30 [ 408.470403][T22642] dump_stack_lvl+0xe8/0x140 [ 408.470424][T22642] dump_stack+0x15/0x1b [ 408.470442][T22642] should_fail_ex+0x265/0x280 [ 408.470467][T22642] should_fail+0xb/0x20 [ 408.470564][T22642] should_fail_usercopy+0x1a/0x20 [ 408.470585][T22642] _copy_from_user+0x1c/0xb0 [ 408.470668][T22642] ___sys_sendmsg+0xc1/0x1d0 [ 408.470703][T22642] __x64_sys_sendmsg+0xd4/0x160 [ 408.470760][T22642] x64_sys_call+0x191e/0x2ff0 [ 408.470782][T22642] do_syscall_64+0xd2/0x200 [ 408.470809][T22642] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 408.470842][T22642] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 408.470935][T22642] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 408.470956][T22642] RIP: 0033:0x7fcff11eeec9 [ 408.470973][T22642] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 408.470991][T22642] RSP: 002b:00007fcfefc2e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 408.471010][T22642] RAX: ffffffffffffffda RBX: 00007fcff1446090 RCX: 00007fcff11eeec9 [ 408.471063][T22642] RDX: 0000000000000800 RSI: 0000200000000200 RDI: 0000000000000003 [ 408.471075][T22642] RBP: 00007fcfefc2e090 R08: 0000000000000000 R09: 0000000000000000 [ 408.471088][T22642] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 408.471100][T22642] R13: 00007fcff1446128 R14: 00007fcff1446090 R15: 00007ffcb4b09e08 [ 408.471118][T22642] [ 408.835098][T22644] lo speed is unknown, defaulting to 1000 [ 408.968938][T22644] block device autoloading is deprecated and will be removed. [ 409.301724][T22649] netlink: 'syz.6.7152': attribute type 1 has an invalid length. [ 409.309475][T22649] netlink: 224 bytes leftover after parsing attributes in process `syz.6.7152'. [ 409.377285][T22669] siw: device registration error -23 [ 410.087634][T22704] lo speed is unknown, defaulting to 1000 [ 410.152971][T22715] netlink: 'syz.3.7175': attribute type 1 has an invalid length. [ 410.160813][T22715] netlink: 224 bytes leftover after parsing attributes in process `syz.3.7175'. [ 410.212568][T22713] lo speed is unknown, defaulting to 1000 [ 410.218624][ T29] kauditd_printk_skb: 555 callbacks suppressed [ 410.218637][ T29] audit: type=1326 audit(1758712164.390:32591): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22720 comm="syz.3.7177" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 410.248627][ T29] audit: type=1326 audit(1758712164.390:32592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22720 comm="syz.3.7177" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 410.321479][ T29] audit: type=1326 audit(1758712164.390:32593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22720 comm="syz.3.7177" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 410.345232][ T29] audit: type=1326 audit(1758712164.390:32594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22720 comm="syz.3.7177" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 410.368840][ T29] audit: type=1326 audit(1758712164.390:32595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22720 comm="syz.3.7177" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 410.392688][ T29] audit: type=1326 audit(1758712164.390:32596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22720 comm="syz.3.7177" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 410.416343][ T29] audit: type=1326 audit(1758712164.390:32597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22720 comm="syz.3.7177" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 410.440091][ T29] audit: type=1326 audit(1758712164.390:32598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22720 comm="syz.3.7177" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 410.463752][ T29] audit: type=1326 audit(1758712164.390:32599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22720 comm="syz.3.7177" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 410.487499][ T29] audit: type=1326 audit(1758712164.390:32600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22720 comm="syz.3.7177" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1f61e4eec9 code=0x7ffc0000 [ 411.005644][T22789] FAULT_INJECTION: forcing a failure. [ 411.005644][T22789] name failslab, interval 1, probability 0, space 0, times 0 [ 411.018366][T22789] CPU: 1 UID: 0 PID: 22789 Comm: syz.5.7202 Not tainted syzkaller #0 PREEMPT(voluntary) [ 411.018450][T22789] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 411.018463][T22789] Call Trace: [ 411.018470][T22789] [ 411.018479][T22789] __dump_stack+0x1d/0x30 [ 411.018498][T22789] dump_stack_lvl+0xe8/0x140 [ 411.018514][T22789] dump_stack+0x15/0x1b [ 411.018531][T22789] should_fail_ex+0x265/0x280 [ 411.018558][T22789] should_failslab+0x8c/0xb0 [ 411.018647][T22789] kmem_cache_alloc_node_noprof+0x57/0x320 [ 411.018677][T22789] ? __alloc_skb+0x101/0x320 [ 411.018701][T22789] __alloc_skb+0x101/0x320 [ 411.018757][T22789] netlink_alloc_large_skb+0xba/0xf0 [ 411.018779][T22789] netlink_sendmsg+0x3cf/0x6b0 [ 411.018818][T22789] ? __pfx_netlink_sendmsg+0x10/0x10 [ 411.018895][T22789] __sock_sendmsg+0x145/0x180 [ 411.018964][T22789] ____sys_sendmsg+0x31e/0x4e0 [ 411.019021][T22789] ___sys_sendmsg+0x17b/0x1d0 [ 411.019062][T22789] __x64_sys_sendmsg+0xd4/0x160 [ 411.019088][T22789] x64_sys_call+0x191e/0x2ff0 [ 411.019105][T22789] do_syscall_64+0xd2/0x200 [ 411.019134][T22789] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 411.019159][T22789] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 411.019228][T22789] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 411.019248][T22789] RIP: 0033:0x7f7c7529eec9 [ 411.019264][T22789] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 411.019279][T22789] RSP: 002b:00007f7c73cff038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 411.019296][T22789] RAX: ffffffffffffffda RBX: 00007f7c754f5fa0 RCX: 00007f7c7529eec9 [ 411.019354][T22789] RDX: 0000000000000000 RSI: 0000200000001f80 RDI: 0000000000000003 [ 411.019367][T22789] RBP: 00007f7c73cff090 R08: 0000000000000000 R09: 0000000000000000 [ 411.019381][T22789] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 411.019394][T22789] R13: 00007f7c754f6038 R14: 00007f7c754f5fa0 R15: 00007fffce113f18 [ 411.019416][T22789] [ 411.328538][T22790] lo speed is unknown, defaulting to 1000 [ 411.533689][T22794] netlink: 'syz.5.7203': attribute type 1 has an invalid length. [ 411.541549][T22794] netlink: 224 bytes leftover after parsing attributes in process `syz.5.7203'. [ 411.720746][T22811] netlink: 'syz.6.7210': attribute type 1 has an invalid length. [ 411.728585][T22811] netlink: 224 bytes leftover after parsing attributes in process `syz.6.7210'. [ 411.784486][T22817] FAULT_INJECTION: forcing a failure. [ 411.784486][T22817] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 411.797799][T22817] CPU: 0 UID: 0 PID: 22817 Comm: syz.8.7213 Not tainted syzkaller #0 PREEMPT(voluntary) [ 411.797881][T22817] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 411.797894][T22817] Call Trace: [ 411.797900][T22817] [ 411.797907][T22817] __dump_stack+0x1d/0x30 [ 411.797929][T22817] dump_stack_lvl+0xe8/0x140 [ 411.798017][T22817] dump_stack+0x15/0x1b [ 411.798034][T22817] should_fail_ex+0x265/0x280 [ 411.798057][T22817] should_fail+0xb/0x20 [ 411.798080][T22817] should_fail_usercopy+0x1a/0x20 [ 411.798105][T22817] strncpy_from_user+0x25/0x230 [ 411.798169][T22817] ? __kmalloc_cache_noprof+0x189/0x320 [ 411.798247][T22817] __se_sys_memfd_create+0x1ff/0x590 [ 411.798270][T22817] __x64_sys_memfd_create+0x31/0x40 [ 411.798304][T22817] x64_sys_call+0x2abe/0x2ff0 [ 411.798324][T22817] do_syscall_64+0xd2/0x200 [ 411.798364][T22817] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 411.798388][T22817] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 411.798425][T22817] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 411.798446][T22817] RIP: 0033:0x7fe6f599eec9 [ 411.798462][T22817] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 411.798478][T22817] RSP: 002b:00007fe6f4406e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 411.798504][T22817] RAX: ffffffffffffffda RBX: 00000000000004c4 RCX: 00007fe6f599eec9 [ 411.798523][T22817] RDX: 00007fe6f4406ef0 RSI: 0000000000000000 RDI: 00007fe6f5a22960 [ 411.798604][T22817] RBP: 0000200000000f40 R08: 00007fe6f4406bb7 R09: 00007fe6f4406e40 [ 411.798617][T22817] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000280 [ 411.798630][T22817] R13: 00007fe6f4406ef0 R14: 00007fe6f4406eb0 R15: 0000200000000100 [ 411.798700][T22817] [ 412.071461][T22832] netlink: 8 bytes leftover after parsing attributes in process `syz.7.7219'. [ 412.106621][ T3405] Process accounting resumed [ 412.619801][T22836] netlink: 'syz.5.7220': attribute type 1 has an invalid length. [ 412.627586][T22836] netlink: 224 bytes leftover after parsing attributes in process `syz.5.7220'. [ 412.996479][T22843] lo speed is unknown, defaulting to 1000 [ 413.061633][T22846] tipc: Enabling of bearer rejected, failed to enable media [ 413.525809][T22857] FAULT_INJECTION: forcing a failure. [ 413.525809][T22857] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 413.539103][T22857] CPU: 0 UID: 0 PID: 22857 Comm: syz.8.7225 Not tainted syzkaller #0 PREEMPT(voluntary) [ 413.539128][T22857] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 413.539140][T22857] Call Trace: [ 413.539146][T22857] [ 413.539155][T22857] __dump_stack+0x1d/0x30 [ 413.539178][T22857] dump_stack_lvl+0xe8/0x140 [ 413.539241][T22857] dump_stack+0x15/0x1b [ 413.539257][T22857] should_fail_ex+0x265/0x280 [ 413.539278][T22857] should_fail+0xb/0x20 [ 413.539295][T22857] should_fail_usercopy+0x1a/0x20 [ 413.539346][T22857] strncpy_from_user+0x25/0x230 [ 413.539377][T22857] ? __kmalloc_cache_noprof+0x189/0x320 [ 413.539403][T22857] __se_sys_memfd_create+0x1ff/0x590 [ 413.539426][T22857] __x64_sys_memfd_create+0x31/0x40 [ 413.539486][T22857] x64_sys_call+0x2abe/0x2ff0 [ 413.539505][T22857] do_syscall_64+0xd2/0x200 [ 413.539530][T22857] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 413.539552][T22857] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 413.539588][T22857] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 413.539609][T22857] RIP: 0033:0x7fe6f599eec9 [ 413.539623][T22857] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 413.539640][T22857] RSP: 002b:00007fe6f4406e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 413.539660][T22857] RAX: ffffffffffffffda RBX: 0000000000000512 RCX: 00007fe6f599eec9 [ 413.539758][T22857] RDX: 00007fe6f4406ef0 RSI: 0000000000000000 RDI: 00007fe6f5a22960 [ 413.539770][T22857] RBP: 0000200000000380 R08: 00007fe6f4406bb7 R09: 00007fe6f4406e40 [ 413.539781][T22857] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000080 [ 413.539792][T22857] R13: 00007fe6f4406ef0 R14: 00007fe6f4406eb0 R15: 0000200000000340 [ 413.539808][T22857] [ 413.971135][T22871] netlink: 'syz.7.7231': attribute type 1 has an invalid length. [ 413.978935][T22871] netlink: 224 bytes leftover after parsing attributes in process `syz.7.7231'. [ 414.234794][ T3405] Process accounting resumed [ 414.386332][T22894] netlink: 'syz.7.7240': attribute type 2 has an invalid length. [ 414.767857][T22903] netlink: 'syz.8.7244': attribute type 1 has an invalid length. [ 414.775793][T22903] netlink: 224 bytes leftover after parsing attributes in process `syz.8.7244'. [ 414.816564][T22909] FAULT_INJECTION: forcing a failure. [ 414.816564][T22909] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 414.829832][T22909] CPU: 1 UID: 0 PID: 22909 Comm: syz.6.7246 Not tainted syzkaller #0 PREEMPT(voluntary) [ 414.829900][T22909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 414.829910][T22909] Call Trace: [ 414.829917][T22909] [ 414.829925][T22909] __dump_stack+0x1d/0x30 [ 414.829948][T22909] dump_stack_lvl+0xe8/0x140 [ 414.829968][T22909] dump_stack+0x15/0x1b [ 414.829984][T22909] should_fail_ex+0x265/0x280 [ 414.830075][T22909] should_fail+0xb/0x20 [ 414.830102][T22909] should_fail_usercopy+0x1a/0x20 [ 414.830138][T22909] _copy_from_iter+0xd2/0xe80 [ 414.830164][T22909] ? __build_skb_around+0x1a0/0x200 [ 414.830192][T22909] ? __alloc_skb+0x223/0x320 [ 414.830213][T22909] netlink_sendmsg+0x471/0x6b0 [ 414.830243][T22909] ? __pfx_netlink_sendmsg+0x10/0x10 [ 414.830319][T22909] __sock_sendmsg+0x145/0x180 [ 414.830414][T22909] ____sys_sendmsg+0x31e/0x4e0 [ 414.830507][T22909] ___sys_sendmsg+0x17b/0x1d0 [ 414.830557][T22909] __x64_sys_sendmsg+0xd4/0x160 [ 414.830594][T22909] x64_sys_call+0x191e/0x2ff0 [ 414.830612][T22909] do_syscall_64+0xd2/0x200 [ 414.830638][T22909] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 414.830659][T22909] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 414.830739][T22909] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 414.830760][T22909] RIP: 0033:0x7fcff11eeec9 [ 414.830826][T22909] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 414.830843][T22909] RSP: 002b:00007fcfefc4f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 414.830859][T22909] RAX: ffffffffffffffda RBX: 00007fcff1445fa0 RCX: 00007fcff11eeec9 [ 414.830870][T22909] RDX: 0000000004000010 RSI: 0000200000000840 RDI: 0000000000000003 [ 414.830918][T22909] RBP: 00007fcfefc4f090 R08: 0000000000000000 R09: 0000000000000000 [ 414.830962][T22909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 414.830973][T22909] R13: 00007fcff1446038 R14: 00007fcff1445fa0 R15: 00007ffcb4b09e08 [ 414.831006][T22909] [ 415.048621][T22911] siw: device registration error -23 [ 415.112902][T22918] macvlan1: entered promiscuous mode [ 415.127175][T22918] ipvlan0: entered promiscuous mode [ 415.140351][T22918] ipvlan0: left promiscuous mode [ 415.153671][ T29] kauditd_printk_skb: 684 callbacks suppressed [ 415.153687][ T29] audit: type=1326 audit(1758712169.401:33285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22917 comm="syz.5.7251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f7c75295d67 code=0x7ffc0000 [ 415.154424][T22924] netlink: 4 bytes leftover after parsing attributes in process `syz.8.7250'. [ 415.160075][ T29] audit: type=1326 audit(1758712169.401:33286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22917 comm="syz.5.7251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f7c7523af79 code=0x7ffc0000 [ 415.215946][ T29] audit: type=1326 audit(1758712169.401:33287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22917 comm="syz.5.7251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7f7c7529eec9 code=0x7ffc0000 [ 415.242242][T22918] macvlan1: left promiscuous mode [ 415.266085][ T29] audit: type=1326 audit(1758712169.442:33288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22917 comm="syz.5.7251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f7c75295d67 code=0x7ffc0000 [ 415.290075][ T29] audit: type=1326 audit(1758712169.442:33289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22917 comm="syz.5.7251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f7c7523af79 code=0x7ffc0000 [ 415.313724][ T29] audit: type=1326 audit(1758712169.442:33290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22917 comm="syz.5.7251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7f7c7529eec9 code=0x7ffc0000 [ 415.337482][ T29] audit: type=1326 audit(1758712169.442:33291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22917 comm="syz.5.7251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f7c75295d67 code=0x7ffc0000 [ 415.361176][ T29] audit: type=1326 audit(1758712169.442:33292): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22917 comm="syz.5.7251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f7c7523af79 code=0x7ffc0000 [ 415.385368][ T29] audit: type=1326 audit(1758712169.442:33293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22917 comm="syz.5.7251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7f7c7529eec9 code=0x7ffc0000 [ 415.409010][ T29] audit: type=1326 audit(1758712169.463:33294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22917 comm="syz.5.7251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f7c75295d67 code=0x7ffc0000 [ 415.524668][T22936] netlink: 'syz.6.7257': attribute type 1 has an invalid length. [ 415.532483][T22936] netlink: 224 bytes leftover after parsing attributes in process `syz.6.7257'. [ 416.049531][T22964] lo speed is unknown, defaulting to 1000 [ 416.377578][T22967] macvlan1: entered promiscuous mode [ 416.390001][T22967] ipvlan0: entered promiscuous mode [ 416.395831][T22967] ipvlan0: left promiscuous mode [ 416.403145][T22967] macvlan1: left promiscuous mode [ 416.434594][T22972] netlink: 4 bytes leftover after parsing attributes in process `syz.3.7269'. [ 416.621337][T22988] netlink: 'syz.8.7273': attribute type 1 has an invalid length. [ 416.629157][T22988] netlink: 224 bytes leftover after parsing attributes in process `syz.8.7273'. [ 416.636756][T22983] bridge0: port 1(bridge_slave_0) entered disabled state [ 416.650070][T22983] bridge0: port 2(bridge_slave_1) entered disabled state [ 416.679681][T22985] netlink: 'syz.3.7277': attribute type 1 has an invalid length. [ 416.687590][T22985] netlink: 224 bytes leftover after parsing attributes in process `syz.3.7277'. [ 416.697721][T22997] (unnamed net_device) (uninitialized): option fail_over_mac: invalid value (15) [ 416.794656][T23012] macvlan1: entered promiscuous mode [ 416.802328][T23012] ipvlan0: entered promiscuous mode [ 416.808457][T23012] ipvlan0: left promiscuous mode [ 416.813983][T23012] macvlan1: left promiscuous mode [ 416.845620][T23015] netlink: 4 bytes leftover after parsing attributes in process `syz.8.7285'. [ 416.902320][T23002] netlink: 'syz.7.7281': attribute type 4 has an invalid length. [ 416.910133][T23002] netlink: 152 bytes leftover after parsing attributes in process `syz.7.7281'. [ 416.922572][T23002] A link change request failed with some changes committed already. Interface hsr_slave_1 may have been left with an inconsistent configuration, please check. [ 416.940712][T23002] netlink: 24 bytes leftover after parsing attributes in process `syz.7.7281'. [ 417.006103][T23028] SELinux: failed to load policy [ 417.057788][T23034] netlink: 'syz.8.7293': attribute type 1 has an invalid length. [ 417.182601][T23048] FAULT_INJECTION: forcing a failure. [ 417.182601][T23048] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 417.195927][T23048] CPU: 1 UID: 0 PID: 23048 Comm: syz.8.7299 Not tainted syzkaller #0 PREEMPT(voluntary) [ 417.195992][T23048] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 417.196007][T23048] Call Trace: [ 417.196016][T23048] [ 417.196024][T23048] __dump_stack+0x1d/0x30 [ 417.196046][T23048] dump_stack_lvl+0xe8/0x140 [ 417.196121][T23048] dump_stack+0x15/0x1b [ 417.196136][T23048] should_fail_ex+0x265/0x280 [ 417.196159][T23048] should_fail+0xb/0x20 [ 417.196225][T23048] should_fail_usercopy+0x1a/0x20 [ 417.196239][T23048] _copy_to_user+0x20/0xa0 [ 417.196257][T23048] simple_read_from_buffer+0xb5/0x130 [ 417.196367][T23048] proc_pid_attr_read+0x134/0x1a0 [ 417.196383][T23048] ? __pfx_proc_pid_attr_read+0x10/0x10 [ 417.196396][T23048] vfs_read+0x1a5/0x770 [ 417.196408][T23048] ? __rcu_read_unlock+0x4f/0x70 [ 417.196492][T23048] ? __fget_files+0x184/0x1c0 [ 417.196508][T23048] ksys_read+0xda/0x1a0 [ 417.196521][T23048] __x64_sys_read+0x40/0x50 [ 417.196533][T23048] x64_sys_call+0x27bc/0x2ff0 [ 417.196606][T23048] do_syscall_64+0xd2/0x200 [ 417.196624][T23048] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 417.196746][T23048] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 417.196763][T23048] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 417.196775][T23048] RIP: 0033:0x7fe6f599eec9 [ 417.196785][T23048] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 417.196810][T23048] RSP: 002b:00007fe6f4407038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 417.196822][T23048] RAX: ffffffffffffffda RBX: 00007fe6f5bf5fa0 RCX: 00007fe6f599eec9 [ 417.196829][T23048] RDX: 0000000000001000 RSI: 00002000000005c0 RDI: 0000000000000003 [ 417.196836][T23048] RBP: 00007fe6f4407090 R08: 0000000000000000 R09: 0000000000000000 [ 417.196848][T23048] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 417.196865][T23048] R13: 00007fe6f5bf6038 R14: 00007fe6f5bf5fa0 R15: 00007ffc77084f48 [ 417.196911][T23048] [ 417.525717][T23060] netlink: 'syz.5.7304': attribute type 1 has an invalid length. [ 417.590569][T23073] FAULT_INJECTION: forcing a failure. [ 417.590569][T23073] name failslab, interval 1, probability 0, space 0, times 0 [ 417.603331][T23073] CPU: 0 UID: 0 PID: 23073 Comm: syz.3.7310 Not tainted syzkaller #0 PREEMPT(voluntary) [ 417.603410][T23073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 417.603420][T23073] Call Trace: [ 417.603428][T23073] [ 417.603437][T23073] __dump_stack+0x1d/0x30 [ 417.603459][T23073] dump_stack_lvl+0xe8/0x140 [ 417.603479][T23073] dump_stack+0x15/0x1b [ 417.603497][T23073] should_fail_ex+0x265/0x280 [ 417.603541][T23073] should_failslab+0x8c/0xb0 [ 417.603562][T23073] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 417.603587][T23073] ? sidtab_sid2str_get+0xa0/0x130 [ 417.603608][T23073] kmemdup_noprof+0x2b/0x70 [ 417.603682][T23073] sidtab_sid2str_get+0xa0/0x130 [ 417.603705][T23073] security_sid_to_context_core+0x1eb/0x2e0 [ 417.603724][T23073] security_sid_to_context+0x27/0x40 [ 417.603813][T23073] selinux_lsmprop_to_secctx+0x67/0xf0 [ 417.603837][T23073] security_lsmprop_to_secctx+0x43/0x80 [ 417.603865][T23073] audit_log_task_context+0x77/0x190 [ 417.603998][T23073] audit_log_task+0xf4/0x250 [ 417.604022][T23073] audit_seccomp+0x61/0x100 [ 417.604045][T23073] ? __seccomp_filter+0x68c/0x10d0 [ 417.604068][T23073] __seccomp_filter+0x69d/0x10d0 [ 417.604203][T23073] ? __se_sys_keyctl+0x7ed/0xb80 [ 417.604232][T23073] ? __rcu_read_unlock+0x4f/0x70 [ 417.604254][T23073] ? __fget_files+0x184/0x1c0 [ 417.604282][T23073] __secure_computing+0x82/0x150 [ 417.604371][T23073] syscall_trace_enter+0xcf/0x1e0 [ 417.604413][T23073] do_syscall_64+0xac/0x200 [ 417.604502][T23073] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 417.604569][T23073] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 417.604670][T23073] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 417.604692][T23073] RIP: 0033:0x7f1f61e4d8dc [ 417.604708][T23073] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 417.604855][T23073] RSP: 002b:00007f1f608af030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 417.604876][T23073] RAX: ffffffffffffffda RBX: 00007f1f620a5fa0 RCX: 00007f1f61e4d8dc [ 417.604890][T23073] RDX: 000000000000000f RSI: 00007f1f608af0a0 RDI: 0000000000000006 [ 417.604902][T23073] RBP: 00007f1f608af090 R08: 0000000000000000 R09: 0000000000000000 [ 417.604949][T23073] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 417.604961][T23073] R13: 00007f1f620a6038 R14: 00007f1f620a5fa0 R15: 00007ffcd931fc48 [ 417.604982][T23073] [ 418.032746][T23098] netlink: 'syz.8.7318': attribute type 10 has an invalid length. [ 418.054014][T23098] team0: entered promiscuous mode [ 418.059729][T23098] team_slave_0: entered promiscuous mode [ 418.086249][T23099] netlink: 'syz.6.7317': attribute type 1 has an invalid length. [ 418.093184][T23098] team_slave_1: entered promiscuous mode [ 418.109551][T23098] team0: entered allmulticast mode [ 418.116653][T23098] team_slave_0: entered allmulticast mode [ 418.124115][T23098] team_slave_1: entered allmulticast mode [ 418.190824][T23102] FAULT_INJECTION: forcing a failure. [ 418.190824][T23102] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 418.204157][T23102] CPU: 0 UID: 0 PID: 23102 Comm: syz.3.7320 Not tainted syzkaller #0 PREEMPT(voluntary) [ 418.204193][T23102] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 418.204205][T23102] Call Trace: [ 418.204213][T23102] [ 418.204221][T23102] __dump_stack+0x1d/0x30 [ 418.204241][T23102] dump_stack_lvl+0xe8/0x140 [ 418.204286][T23102] dump_stack+0x15/0x1b [ 418.204305][T23102] should_fail_ex+0x265/0x280 [ 418.204391][T23102] should_fail+0xb/0x20 [ 418.204408][T23102] should_fail_usercopy+0x1a/0x20 [ 418.204429][T23102] _copy_to_user+0x20/0xa0 [ 418.204458][T23102] simple_read_from_buffer+0xb5/0x130 [ 418.204626][T23102] proc_fail_nth_read+0x10e/0x150 [ 418.204655][T23102] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 418.204799][T23102] vfs_read+0x1a5/0x770 [ 418.204820][T23102] ? __rcu_read_unlock+0x4f/0x70 [ 418.204843][T23102] ? __fget_files+0x184/0x1c0 [ 418.204877][T23102] ksys_read+0xda/0x1a0 [ 418.204943][T23102] __x64_sys_read+0x40/0x50 [ 418.204966][T23102] x64_sys_call+0x27bc/0x2ff0 [ 418.204989][T23102] do_syscall_64+0xd2/0x200 [ 418.205019][T23102] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 418.205109][T23102] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 418.205137][T23102] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 418.205216][T23102] RIP: 0033:0x7f1f61e4d8dc [ 418.205230][T23102] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 418.205245][T23102] RSP: 002b:00007f1f608af030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 418.205344][T23102] RAX: ffffffffffffffda RBX: 00007f1f620a5fa0 RCX: 00007f1f61e4d8dc [ 418.205356][T23102] RDX: 000000000000000f RSI: 00007f1f608af0a0 RDI: 0000000000000007 [ 418.205369][T23102] RBP: 00007f1f608af090 R08: 0000000000000000 R09: 0000000000000000 [ 418.205383][T23102] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 418.205396][T23102] R13: 00007f1f620a6038 R14: 00007f1f620a5fa0 R15: 00007ffcd931fc48 [ 418.205453][T23102] [ 418.421159][T23098] bridge0: port 3(team0) entered blocking state [ 418.427966][T23098] bridge0: port 3(team0) entered disabled state [ 418.457396][T23098] bridge0: port 3(team0) entered blocking state [ 418.464880][T23098] bridge0: port 3(team0) entered forwarding state [ 418.616550][T23109] FAULT_INJECTION: forcing a failure. [ 418.616550][T23109] name failslab, interval 1, probability 0, space 0, times 0 [ 418.629249][T23109] CPU: 0 UID: 0 PID: 23109 Comm: syz.6.7321 Not tainted syzkaller #0 PREEMPT(voluntary) [ 418.629282][T23109] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 418.629295][T23109] Call Trace: [ 418.629302][T23109] [ 418.629309][T23109] __dump_stack+0x1d/0x30 [ 418.629328][T23109] dump_stack_lvl+0xe8/0x140 [ 418.629361][T23109] dump_stack+0x15/0x1b [ 418.629378][T23109] should_fail_ex+0x265/0x280 [ 418.629450][T23109] should_failslab+0x8c/0xb0 [ 418.629476][T23109] kmem_cache_alloc_node_noprof+0x57/0x320 [ 418.629503][T23109] ? __alloc_skb+0x101/0x320 [ 418.629523][T23109] __alloc_skb+0x101/0x320 [ 418.629586][T23109] netlink_alloc_large_skb+0xba/0xf0 [ 418.629608][T23109] netlink_sendmsg+0x3cf/0x6b0 [ 418.629636][T23109] ? __pfx_netlink_sendmsg+0x10/0x10 [ 418.629663][T23109] __sock_sendmsg+0x145/0x180 [ 418.629769][T23109] ____sys_sendmsg+0x31e/0x4e0 [ 418.629805][T23109] ___sys_sendmsg+0x17b/0x1d0 [ 418.629854][T23109] __x64_sys_sendmsg+0xd4/0x160 [ 418.629882][T23109] x64_sys_call+0x191e/0x2ff0 [ 418.629940][T23109] do_syscall_64+0xd2/0x200 [ 418.629971][T23109] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 418.629992][T23109] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 418.630016][T23109] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 418.630058][T23109] RIP: 0033:0x7fcff11eeec9 [ 418.630074][T23109] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 418.630092][T23109] RSP: 002b:00007fcfefc2e038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 418.630112][T23109] RAX: ffffffffffffffda RBX: 00007fcff1446090 RCX: 00007fcff11eeec9 [ 418.630126][T23109] RDX: 00000000240008c4 RSI: 0000200000000000 RDI: 0000000000000007 [ 418.630142][T23109] RBP: 00007fcfefc2e090 R08: 0000000000000000 R09: 0000000000000000 [ 418.630153][T23109] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 418.630164][T23109] R13: 00007fcff1446128 R14: 00007fcff1446090 R15: 00007ffcb4b09e08 [ 418.630180][T23109] [ 418.902275][T23123] FAULT_INJECTION: forcing a failure. [ 418.902275][T23123] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 418.915456][T23123] CPU: 0 UID: 0 PID: 23123 Comm: syz.7.7327 Not tainted syzkaller #0 PREEMPT(voluntary) [ 418.915484][T23123] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 418.915527][T23123] Call Trace: [ 418.915533][T23123] [ 418.915540][T23123] __dump_stack+0x1d/0x30 [ 418.915560][T23123] dump_stack_lvl+0xe8/0x140 [ 418.915579][T23123] dump_stack+0x15/0x1b [ 418.915600][T23123] should_fail_ex+0x265/0x280 [ 418.915624][T23123] should_fail+0xb/0x20 [ 418.915652][T23123] should_fail_usercopy+0x1a/0x20 [ 418.915677][T23123] _copy_from_user+0x1c/0xb0 [ 418.915723][T23123] ___sys_sendmsg+0xc1/0x1d0 [ 418.915760][T23123] __x64_sys_sendmsg+0xd4/0x160 [ 418.915799][T23123] x64_sys_call+0x191e/0x2ff0 [ 418.915820][T23123] do_syscall_64+0xd2/0x200 [ 418.915863][T23123] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 418.915938][T23123] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 418.915966][T23123] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 418.915987][T23123] RIP: 0033:0x7ff0d136eec9 [ 418.916012][T23123] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 418.916085][T23123] RSP: 002b:00007ff0cfdd7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 418.916102][T23123] RAX: ffffffffffffffda RBX: 00007ff0d15c5fa0 RCX: 00007ff0d136eec9 [ 418.916114][T23123] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000005 [ 418.916125][T23123] RBP: 00007ff0cfdd7090 R08: 0000000000000000 R09: 0000000000000000 [ 418.916138][T23123] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 418.916150][T23123] R13: 00007ff0d15c6038 R14: 00007ff0d15c5fa0 R15: 00007fffaa44a008 [ 418.916171][T23123] [ 419.110479][T23131] Invalid ELF header magic: != ELF [ 419.422392][T23157] __nla_validate_parse: 6 callbacks suppressed [ 419.422405][T23157] netlink: 20 bytes leftover after parsing attributes in process `syz.5.7341'. [ 419.460452][ T3405] Process accounting resumed [ 419.828206][T23170] siw: device registration error -23 [ 419.871901][T23172] netlink: 20 bytes leftover after parsing attributes in process `syz.3.7346'. [ 420.054701][ T29] kauditd_printk_skb: 928 callbacks suppressed [ 420.054715][ T29] audit: type=1326 audit(1758712174.407:34222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23148 comm="syz.8.7339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe6f5995d67 code=0x7ffc0000 [ 420.086423][ T29] audit: type=1326 audit(1758712174.437:34223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23148 comm="syz.8.7339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe6f593af79 code=0x7ffc0000 [ 420.109991][ T29] audit: type=1326 audit(1758712174.437:34224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23148 comm="syz.8.7339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe6f5995d67 code=0x7ffc0000 [ 420.134298][ T29] audit: type=1326 audit(1758712174.437:34225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23148 comm="syz.8.7339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe6f593af79 code=0x7ffc0000 [ 420.158016][ T29] audit: type=1326 audit(1758712174.437:34226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23148 comm="syz.8.7339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7fe6f599eec9 code=0x7ffc0000 [ 420.158824][T23191] netlink: 156 bytes leftover after parsing attributes in process `syz.5.7354'. [ 420.181592][ T29] audit: type=1326 audit(1758712174.488:34227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23148 comm="syz.8.7339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe6f5995d67 code=0x7ffc0000 [ 420.181621][ T29] audit: type=1326 audit(1758712174.488:34228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23148 comm="syz.8.7339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe6f593af79 code=0x7ffc0000 [ 420.216474][T23192] netlink: 224 bytes leftover after parsing attributes in process `syz.5.7354'. [ 420.237876][ T29] audit: type=1326 audit(1758712174.488:34229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23148 comm="syz.8.7339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=275 compat=0 ip=0x7fe6f599eec9 code=0x7ffc0000 [ 420.248232][T23192] netlink: 48 bytes leftover after parsing attributes in process `syz.5.7354'. [ 420.270721][ T29] audit: type=1326 audit(1758712174.488:34230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23148 comm="syz.8.7339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fe6f5995d67 code=0x7ffc0000 [ 420.270750][ T29] audit: type=1326 audit(1758712174.488:34231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23148 comm="syz.8.7339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fe6f593af79 code=0x7ffc0000 [ 420.350830][T23197] FAULT_INJECTION: forcing a failure. [ 420.350830][T23197] name failslab, interval 1, probability 0, space 0, times 0 [ 420.363499][T23197] CPU: 0 UID: 0 PID: 23197 Comm: syz.6.7356 Not tainted syzkaller #0 PREEMPT(voluntary) [ 420.363525][T23197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 420.363536][T23197] Call Trace: [ 420.363542][T23197] [ 420.363550][T23197] __dump_stack+0x1d/0x30 [ 420.363570][T23197] dump_stack_lvl+0xe8/0x140 [ 420.363589][T23197] dump_stack+0x15/0x1b [ 420.363605][T23197] should_fail_ex+0x265/0x280 [ 420.363632][T23197] should_failslab+0x8c/0xb0 [ 420.363655][T23197] kmem_cache_alloc_noprof+0x50/0x310 [ 420.363676][T23197] ? mas_dup_build+0x1f6/0xd30 [ 420.363693][T23197] mas_dup_build+0x1f6/0xd30 [ 420.363712][T23197] ? css_rstat_updated+0xb7/0x240 [ 420.363740][T23197] ? mod_memcg_state+0x1db/0x2b0 [ 420.363760][T23197] __mt_dup+0xc6/0x180 [ 420.363779][T23197] dup_mmap+0x266/0xf20 [ 420.363797][T23197] ? __list_add_valid_or_report+0x38/0xe0 [ 420.363833][T23197] copy_mm+0x11a/0x370 [ 420.363856][T23197] copy_process+0xd08/0x2000 [ 420.363882][T23197] kernel_clone+0x16c/0x5c0 [ 420.363902][T23197] ? vfs_write+0x7e8/0x960 [ 420.363926][T23197] __x64_sys_clone+0xe6/0x120 [ 420.363958][T23197] x64_sys_call+0x119c/0x2ff0 [ 420.363978][T23197] do_syscall_64+0xd2/0x200 [ 420.364002][T23197] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 420.364025][T23197] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 420.364052][T23197] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 420.364073][T23197] RIP: 0033:0x7fcff11eeec9 [ 420.364088][T23197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 420.364103][T23197] RSP: 002b:00007fcfefc4efe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 420.364120][T23197] RAX: ffffffffffffffda RBX: 00007fcff1445fa0 RCX: 00007fcff11eeec9 [ 420.364131][T23197] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000040000000 [ 420.364142][T23197] RBP: 00007fcfefc4f090 R08: 0000000000000000 R09: 0000000000000000 [ 420.364152][T23197] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 420.364162][T23197] R13: 00007fcff1446038 R14: 00007fcff1445fa0 R15: 00007ffcb4b09e08 [ 420.364177][T23197] [ 420.368121][T23201] netlink: 8 bytes leftover after parsing attributes in process `syz.5.7358'. [ 420.661188][T23222] validate_nla: 1 callbacks suppressed [ 420.661236][T23222] netlink: 'syz.5.7367': attribute type 10 has an invalid length. [ 420.739263][T23224] syzkaller1: entered promiscuous mode [ 420.744997][T23224] syzkaller1: entered allmulticast mode [ 420.780303][T23233] netlink: 20 bytes leftover after parsing attributes in process `syz.7.7372'. [ 420.845267][T23247] netlink: 4 bytes leftover after parsing attributes in process `syz.6.7373'. [ 420.856330][T23247] netlink: 4 bytes leftover after parsing attributes in process `syz.6.7373'. [ 420.917613][T23257] ================================================================== [ 420.925705][T23257] BUG: KCSAN: data-race in mas_state_walk / mas_wr_store_entry [ 420.933274][T23257] [ 420.935584][T23257] write to 0xffff8881046d3608 of 8 bytes by task 23255 on cpu 1: [ 420.943283][T23257] mas_wr_store_entry+0x1581/0x2b50 [ 420.948471][T23257] mas_store_prealloc+0x74d/0x9e0 [ 420.953493][T23257] commit_merge+0x6a5/0x730 [ 420.957990][T23257] vma_expand+0x220/0x320 [ 420.962308][T23257] vma_merge_new_range+0x296/0x310 [ 420.967419][T23257] mmap_region+0xa59/0x1630 [ 420.971937][T23257] do_mmap+0x9b3/0xbe0 [ 420.976003][T23257] vm_mmap_pgoff+0x17a/0x2e0 [ 420.980590][T23257] ksys_mmap_pgoff+0xc2/0x310 [ 420.985260][T23257] x64_sys_call+0x14a3/0x2ff0 [ 420.989927][T23257] do_syscall_64+0xd2/0x200 [ 420.994514][T23257] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 421.000405][T23257] [ 421.002717][T23257] read to 0xffff8881046d3608 of 8 bytes by task 23257 on cpu 0: [ 421.010325][T23257] mas_state_walk+0x28f/0x650 [ 421.014993][T23257] mas_walk+0x60/0x150 [ 421.019067][T23257] lock_vma_under_rcu+0x8d/0x160 [ 421.023996][T23257] do_user_addr_fault+0x233/0x1090 [ 421.029105][T23257] exc_page_fault+0x62/0xa0 [ 421.033597][T23257] asm_exc_page_fault+0x26/0x30 [ 421.038434][T23257] [ 421.040736][T23257] value changed: 0x00007f7c73c9cfff -> 0x0000000000000000 [ 421.047820][T23257] [ 421.050124][T23257] Reported by Kernel Concurrency Sanitizer on: [ 421.056260][T23257] CPU: 0 UID: 0 PID: 23257 Comm: syz.5.7381 Not tainted syzkaller #0 PREEMPT(voluntary) [ 421.066136][T23257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/18/2025 [ 421.076174][T23257] ==================================================================