last executing test programs: 6m30.051726628s ago: executing program 32 (id=6541): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, 0x0, 0x0) mprotect(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x8) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x5, &(0x7f0000000000)=0x7, 0x4) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8953, &(0x7f0000000180)={{0x2, 0x0, @private=0xa010102}, {0x6, @broadcast}, 0x68, {0x2, 0x4e20, @empty}, 'ip6_vti0\x00'}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x0, 0x7, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000007940)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x33f}, 0x1, 0x0, 0x0, 0xc0d0}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r3, &(0x7f0000000440)=@pppol2tp={0x18, 0x1, {0x0, r2, {0x2, 0x1, @remote}, 0xa}}, 0x26) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmmsg$inet(r3, &(0x7f0000005f80)=[{{0x0, 0x0, &(0x7f0000005dc0)=[{&(0x7f00000010c0)="7d5107673289eeae3f806c5c62db497a0299399ab6101c3b", 0x1}], 0x1}}], 0x4000000000001ce, 0x8040) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x42, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) socket$nl_netfilter(0x10, 0x3, 0xc) syz_io_uring_setup(0xd8, 0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r5}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x1, 0xe, &(0x7f0000000780)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000380), 0xffffffffffffffff) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="20010000120013070000000000000000e0000001000000000000000000000000fc00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="fc020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000072c42572f64a264410b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fbc18c8582fc7800000000000000000000000050019000000000028001a"], 0x120}}, 0x0) 5m14.707247682s ago: executing program 33 (id=7630): bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x11, 0x2, &(0x7f00000001c0)=ANY=[@ANYBLOB="17010000a4fc0a0005"], &(0x7f0000000000)='GPL\x00', 0x6, 0x89, &(0x7f0000003300)=""/137, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000040)={0x0, 0x0}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020f00f8ffffffb703000008000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00'}, 0x10) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f00000002c0)='cgroup.threads\x00', 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0xd, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="06458b0001000000850000004e0000005b2afeff00000009ee2b536bbbe8dc2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000090000008500000006000000"], &(0x7f0000000300)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x26, '\x00', 0x0, @sock_ops, 0xffffffffffffffff, 0x8, &(0x7f0000000340)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000380)={0x0, 0x4, 0x73, 0x7}, 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0xd}, 0x94) syz_clone(0x22023500, 0x0, 0x0, 0x0, 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000180), 0x2, 0x0) 4m52.492777311s ago: executing program 34 (id=7996): bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) timerfd_create(0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) socket$inet6_mptcp(0xa, 0x1, 0x106) socket$packet(0x11, 0x2, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) socket$netlink(0x10, 0x3, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x20000000000001f4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6_mptcp(0xa, 0x1, 0x106) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000300)) r0 = syz_io_uring_setup(0x24f6, &(0x7f00000006c0)={0x0, 0x0, 0x10100, 0x0, 0x1c5}, &(0x7f0000000100)=0x0, &(0x7f0000000180)=0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000040)=ANY=[@ANYRES64=r0], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x11, r3, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_SEND={0x1a, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x24844}) io_uring_enter(r0, 0x2d3e, 0x0, 0x0, 0x0, 0x0) 4m37.532432733s ago: executing program 35 (id=8151): openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x480, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x4, 0xfff, 0x7}, 0x50) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x2, 0x20}]}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @restrict={0x0, 0x0, 0x0, 0x4}]}}, 0x0, 0x4a}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="00000000010000000000000000000000000000000000000000000000ef8afe4b26a6f431e1a986cb7e73274f8b673e53323c44d4288084f5a26c7e28f7fd4f13aeaab35d3af8ddb3641e6c27f563523ca01cb2f1020b8a273f08a7c3ebb93aa4898a1902a47ef769784b5a90100629dae772e1bab2"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020a07b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000700)='kfree\x00', r1}, 0x18) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000280)='./bus\x00', 0x811400, 0x0, 0xff, 0x0, &(0x7f00000007c0)) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000a00)='./bus/file0\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1b, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1004}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3, 0x0, 0x4}, 0x18) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xb}]}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)={0x14, r5, 0x1, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x800) 4m30.487689007s ago: executing program 7 (id=8205): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="080000fa"], 0xdc) 4m30.412753388s ago: executing program 7 (id=8208): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a31000000001400078005001500070000000800124000000000050005000200000005000400000000000d000300686173683a6e6574"], 0x5c}}, 0x8c0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000001340)=ANY=[@ANYBLOB="44000000090601020000000000000000000000000900020073797a310000000005000100ebff00001c0007800c00018008000140ffffffff0c000280080001407f"], 0x44}, 0x1, 0x0, 0x0, 0x10040047}, 0x240008c4) 4m29.806261688s ago: executing program 7 (id=8221): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = epoll_create1(0x0) r1 = epoll_create1(0x0) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000800000000bf91000000000000b702000043e7b5538500000085000000b700000000000000"], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000500)='kmem_cache_free\x00', r3}, 0x18) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000100)={0xa000000d}) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000400)={0xa}) syz_usb_connect(0x4, 0x24, 0x0, 0x0) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x4c6, 0x0, 0x0) 4m28.034800016s ago: executing program 7 (id=8242): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket(0x10, 0x803, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x0, &(0x7f00000004c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@noload}, {@acl}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}]}, 0x1, 0x783, &(0x7f0000001000)="$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") r2 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffd}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000000c0)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="73686f72746e616d653d77696e39352c756e695f786c6174653d312c636865636b3d7374726963742c646f733178666c6f7070792c757466383d312c757466383d312c757466383d302c696f636861727365743d6370313235de26302c696f636861727365743d69736f383835392d342c696f636861727365743d64656661756c742c73686f72746e616d653d6d69786564", @ANYRES8=0x0], 0xfe, 0x19c, &(0x7f0000000200)="$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") truncate(&(0x7f0000000000)='./file1\x00', 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[], 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c40)={'veth0_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000046c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x8000000, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x2, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x40000000, 0x1000, 0x2, 0x0, 0x0, 0x8000002, 0x0, 0x7e150a0b, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x10000, 0x5d2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x1007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x3, 0x0, 0x1, 0x8, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x9, 0x0, 0x0, 0x7, 0xfbfffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7, 0x4fd, 0x2000, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffe, 0x0, 0x7e98263b, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x9, 0x9, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2d1, 0x0, 0x0, 0xb2e, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xff, 0x1000, 0x0, 0x0, 0x0, 0x4000, 0xfffffffe, 0x6, 0xc3f3, 0x1, 0x0, 0x800, 0x9, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0xfffffffe, 0xc, 0x0, 0x0, 0x80, 0x0, 0x40000000, 0x0, 0x8000, 0x0, 0xfffffffd, 0x0, 0x0, 0xd819ac9, 0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x2, 0x0, 0x80000001, 0x0, 0x10, 0x20, 0x4, 0x400000b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1000, 0x100, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x1, 0x4, 0xfffffffe, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0x20000040, 0xffffffff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0xaaf0]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x3, 0x0, 0x0, 0xfffc, 0xc0000001}, {0x3, 0x0, 0xb, 0x0, 0x0, 0xffffffff}, 0x7, 0x10, 0x2000000}}]}}]}, 0x45c}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r2, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0), 0x0, 0x3c, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000740), &(0x7f0000000840), 0x8, 0x8d, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) r9 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$cgroup_subtree(r9, &(0x7f0000000240)=ANY=[@ANYBLOB="2b68756765a565e9"], 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x20, 0x2, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x4}], &(0x7f0000000100)='syzkaller\x00', 0x8, 0xbc, &(0x7f0000000380)=""/188, 0x41000, 0x28, '\x00', r7, @netfilter, r2, 0x8, &(0x7f0000000300)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x3, 0xc, 0x200, 0xe}, 0x10, r8, 0xffffffffffffffff, 0x0, &(0x7f0000000b40)=[r2, r2, r2, r6, r2, r2, r9], 0x0, 0x10, 0x101}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000009c0)=@nat={'nat\x00', 0x19, 0x0, 0xc0, [0x200000000500, 0x0, 0x0, 0x200000000530, 0x200000000560], 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000001000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000"]}, 0x138) r11 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r11, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x4800000, 0x8005, 0x0, 0x0, 0x9, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d10a00966d61fdcf335263bd9bffbcc2542ded71038259ca0400e1a311efec32d71e14ef3dc177b5b48b00", "f2fdffffffffffffff810000000000d300e6d602000000000000000000000001", [0xca4e]}) open(&(0x7f00000001c0)='./file1\x00', 0x14927e, 0x20) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001400b59500000000000000000a000000", @ANYRES32, @ANYBLOB="14000b00fe8000000000000000000000000000aa080009003f0c0000140001"], 0x48}}, 0x0) dup(r0) 4m27.058380973s ago: executing program 7 (id=8254): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_GET_BTF_INFO(0xf, 0x0, 0x0) io_cancel(0x0, 0x0, &(0x7f0000000340)) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=@base={0x7, 0x4, 0x8, 0x1}, 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=@framed={{}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x18) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) timer_create(0xfffffffc, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) syz_clone3(&(0x7f0000000680)={0x40004000, 0x0, 0x0, 0x0, {0x21}, 0x0, 0x0, 0x0, 0x0}, 0x58) setsockopt(r0, 0x84, 0x81, &(0x7f00000002c0)="1a00000002000000", 0x8) setsockopt$inet_sctp6_SCTP_HMAC_IDENT(r0, 0x84, 0x16, &(0x7f0000000280)=ANY=[], 0x8) 4m26.278835295s ago: executing program 7 (id=8258): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x15) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400d00, 0x0, 0x0, 0x0) (fail_nth: 12) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000c40), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000580)={&(0x7f0000000c80)={0x9c, r2, 0x200, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}, @HEADER={0x4}]}, 0x9c}, 0x1, 0x0, 0x0, 0x880}, 0x4040000) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) prctl$PR_SET_NAME(0xf, &(0x7f0000000700)=',&#^%\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000040000001801000020786c2500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) io_getevents(0x0, 0x80, 0x1, &(0x7f0000000b80)=[{}], &(0x7f0000000bc0)) 4m26.245945246s ago: executing program 36 (id=8258): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.bfq.io_serviced_recursive\x00', 0x275a, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000000), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x60000b, 0x15) remap_file_pages(&(0x7f000051c000/0x400000)=nil, 0x400d00, 0x0, 0x0, 0x0) (fail_nth: 12) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r1, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x36, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000c40), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PRIVFLAGS_GET(0xffffffffffffffff, &(0x7f0000000dc0)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000580)={&(0x7f0000000c80)={0x9c, r2, 0x200, 0x70bd27, 0x25dfdbff, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'nr0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'erspan0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}]}, @HEADER={0x4}]}, 0x9c}, 0x1, 0x0, 0x0, 0x880}, 0x4040000) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) prctl$PR_SET_NAME(0xf, &(0x7f0000000700)=',&#^%\x00') bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000e40)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000040000001801000020786c2500000000002020207b1af8ff00000000bfa1000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) io_getevents(0x0, 0x80, 0x1, &(0x7f0000000b80)=[{}], &(0x7f0000000bc0)) 4m22.86443145s ago: executing program 9 (id=8288): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0x3, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f00000003c0)=ANY=[@ANYBLOB="080000fa"], 0xdc) 4m22.634282474s ago: executing program 9 (id=8291): r0 = socket$inet(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00f6ffff05000000000000000008000000619385a5fbfdb5a500000fb71300000000be164540be07b000"], 0x48) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) fremovexattr(r2, &(0x7f0000000040)=@known='system.posix_acl_default\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r5}, 0x10) r6 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_TX_RING(r6, 0x11b, 0x3, &(0x7f0000000380)=0x20000, 0x4) setsockopt$XDP_UMEM_REG(r6, 0x11b, 0x4, &(0x7f0000000100)={&(0x7f0000000000)=""/5, 0x204000, 0x1000}, 0x20) writev(r4, &(0x7f0000000340)=[{&(0x7f0000000680)="94309138190e094b9a31876ee2e22c0edfb16a4759844df09e8b21130aee9976ebba5d2230ba9d2df83ecda22b9ab43732661ff15b96b77c889b67e74be8e7c9debcb243ea04a2029bd9fd4090c87f4fe048a636339b14cfe3600bc836df819e3b642f2b84eb81eb01c7f74be51b2bd859f8b7893e023e1d0262ac05a2400ed230ab40de724678cf6cde75eefdf16177e116", 0x92}, {&(0x7f0000000280)="882e3510fe2df1257158d22c49632565356cdd5754ad3184a9374ccc1c5605658b11dd5ff9ac67a7c74febc0b2e1e416106df0bab9b61e", 0x37}], 0x2) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) setsockopt$XDP_UMEM_COMPLETION_RING(r6, 0x11b, 0x6, &(0x7f0000000180)=0x20, 0x4) setsockopt$XDP_UMEM_FILL_RING(r6, 0x11b, 0x5, &(0x7f0000000040)=0x4000, 0x4) bind$xdp(r6, &(0x7f00000002c0)={0x2c, 0x4, r8, 0x2000}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r3}, 0x10) r9 = socket$phonet_pipe(0x23, 0x5, 0x2) listen(r9, 0xffffffff) ioctl$SIOCPNENABLEPIPE(r9, 0x89ed, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'bond0\x00'}) socket$netlink(0x10, 0x3, 0x0) r10 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r10, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) recvmmsg(r10, &(0x7f0000005380)=[{{0x0, 0x0, 0x0}, 0x6}], 0x1, 0x10001, 0x0) 4m21.764876218s ago: executing program 9 (id=8304): openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x480, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x4, 0xfff, 0x7}, 0x50) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x2, 0x20}]}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @restrict={0x0, 0x0, 0x0, 0x4}]}}, 0x0, 0x4a}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="00000000010000000000000000000000000000000000000000000000ef8afe4b26a6f431e1a986cb7e73274f8b673e53323c44d4288084f5a26c7e28f7fd4f13aeaab35d3af8ddb3641e6c27f563523ca01cb2f1020b8a273f08a7c3ebb93aa4898a1902a47ef769784b5a90100629dae772e1bab2"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020a07b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000700)='kfree\x00', r1}, 0x18) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000280)='./bus\x00', 0x811400, 0x0, 0xff, 0x0, &(0x7f00000007c0)) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000a00)='./bus/file0\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1b, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1004}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3, 0x0, 0x4}, 0x18) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)={0x14, r6, 0x1, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x800) 4m21.555800311s ago: executing program 9 (id=8309): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r1 = socket(0x10, 0x803, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x0, &(0x7f00000004c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@noload}, {@acl}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}]}, 0x1, 0x783, &(0x7f0000001000)="$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") r2 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffd}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r4}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000000c0)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="73686f72746e616d653d77696e39352c756e695f786c6174653d312c636865636b3d7374726963742c646f733178666c6f7070792c757466383d312c757466383d312c757466383d302c696f636861727365743d6370313235de26302c696f636861727365743d69736f383835392d342c696f636861727365743d64656661756c742c73686f72746e616d653d6d69786564", @ANYRES8=0x0], 0xfe, 0x19c, &(0x7f0000000200)="$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") truncate(&(0x7f0000000000)='./file1\x00', 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[], 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c40)={'veth0_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000046c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x8000000, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x2, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x40000000, 0x1000, 0x2, 0x0, 0x0, 0x8000002, 0x0, 0x7e150a0b, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x10000, 0x5d2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x1007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x3, 0x0, 0x1, 0x8, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x9, 0x0, 0x0, 0x7, 0xfbfffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7, 0x4fd, 0x2000, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffe, 0x0, 0x7e98263b, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x9, 0x9, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2d1, 0x0, 0x0, 0xb2e, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xff, 0x1000, 0x0, 0x0, 0x0, 0x4000, 0xfffffffe, 0x6, 0xc3f3, 0x1, 0x0, 0x800, 0x9, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0xfffffffe, 0xc, 0x0, 0x0, 0x80, 0x0, 0x40000000, 0x0, 0x8000, 0x0, 0xfffffffd, 0x0, 0x0, 0xd819ac9, 0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x2, 0x0, 0x80000001, 0x0, 0x10, 0x20, 0x4, 0x400000b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1000, 0x100, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x1, 0x4, 0xfffffffe, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0x20000040, 0xffffffff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0xaaf0]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x3, 0x0, 0x0, 0xfffc, 0xc0000001}, {0x3, 0x0, 0xb, 0x0, 0x0, 0xffffffff}, 0x7, 0x10, 0x2000000}}]}}]}, 0x45c}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r2, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0), 0x0, 0x3c, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000740), &(0x7f0000000840), 0x8, 0x8d, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) r9 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$cgroup_subtree(r9, &(0x7f0000000240)=ANY=[@ANYBLOB="2b68756765a565e9"], 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x20, 0x2, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x4}], &(0x7f0000000100)='syzkaller\x00', 0x8, 0xbc, &(0x7f0000000380)=""/188, 0x41000, 0x28, '\x00', r7, @netfilter, r2, 0x8, &(0x7f0000000300)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x3, 0xc, 0x200, 0xe}, 0x10, r8, 0xffffffffffffffff, 0x0, &(0x7f0000000b40)=[r2, r2, r2, r6, r2, r2, r9], 0x0, 0x10, 0x101}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) r10 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r10, 0x0, 0x80, &(0x7f00000009c0)=@nat={'nat\x00', 0x19, 0x0, 0xc0, [0x200000000500, 0x0, 0x0, 0x200000000530, 0x200000000560], 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000001000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000"]}, 0x138) r11 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r11, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x4800000, 0x8005, 0x0, 0x0, 0x9, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d10a00966d61fdcf335263bd9bffbcc2542ded71038259ca0400e1a311efec32d71e14ef3dc177b5b48b00", "f2fdffffffffffffff810000000000d300e6d602000000000000000000000001", [0xca4e]}) open(&(0x7f00000001c0)='./file1\x00', 0x14927e, 0x20) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000080)=ANY=[@ANYBLOB="480000001400b59500000000000000000a000000", @ANYRES32, @ANYBLOB="14000b00fe8000000000000000000000000000aa080009003f0c0000140001"], 0x48}}, 0x0) socket(0x10, 0x3, 0x0) 4m21.081663929s ago: executing program 9 (id=8320): openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x480, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x5, 0x4, 0xfff, 0x7}, 0x50) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x2, 0x20}]}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @restrict={0x0, 0x0, 0x0, 0x4}]}}, 0x0, 0x4a}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="00000000010000000000000000000000000000000000000000000000ef8afe4b26a6f431e1a986cb7e73274f8b673e53323c44d4288084f5a26c7e28f7fd4f13aeaab35d3af8ddb3641e6c27f563523ca01cb2f1020b8a273f08a7c3ebb93aa4898a1902a47ef769784b5a90100629dae772e1bab2"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020a07b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000700)='kfree\x00', r1}, 0x18) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000280)='./bus\x00', 0x811400, 0x0, 0xff, 0x0, &(0x7f00000007c0)) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000a00)='./bus/file0\x00') r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1b, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1004}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r2}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r3, 0x0, 0x4}, 0x18) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xb}]}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)={0x14, r6, 0x1, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x800) 4m17.868474301s ago: executing program 9 (id=8382): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./bus\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="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"], 0xfe, 0x2b7, &(0x7f0000001340)="$eJzs3T9vW1UUAPDzHPvFJUMyMCEk3tCBhajpyoArFCREJpAH/khQ0VaqYqtSLFkqIKxOfAIGBr4HGzsSC98AiQ/ARoUqXfT8Xmxju3ad4hSlv9+Sq3PP8T3X7yUerHfzxev90zsPBvceffN7tNtZNDrRicdZHEQjzqVaAABXwuOU4s8Lfb43G9vqCQDYrpnP/9ZTUnYXQ+9suy0AYIs++viTD26dnBx/WBTtiP53w24W1c9q/ta9uB+9uBs3Yj+eTL8LSKkav/f+yXE0i9JBXO+Pht2ysv/5r5PUPMb1R7EfB8vrj4rKTP1o2G3FK7uRZRH3O2UjN2M/Xl2oL+ePby6pj24eb7brTZbrH8Z+/PZlPIhe3Bl/pzFd/9s8infT9399/WmZXNZno2F3d5w3lXYu+9oAAAAAAAAAAAAAAAAAAAAAAHB1HRYTB3G9X4bq83d2noznD/81Pz5fpzGer+qziHw8mDsfaJTix/PzdW4URZGyKn9yvs+1ZrzWjOYL2zgAAAAAAAAAAAAAAAAAAAD8jwwefnV6u9e7e/afDOqH/CeP9V/0dTozkTdidfLuRmvFTp1e9jqfc/TLZ/1JpNzERZoftoqIVT23FiLXyn7Wv/LfKaWUZRHPd5laz7LWmsHe6pzyDf75h723Tm9n697D9vmF+2l2Ko+zwcO5axrZJh2mjW6/fEVOXt8xz/Q6e8/5S/T2H9VidSRbs4vWTKRVD+Jpt197o/v58v4GAQAAAAAAAAAAAAAAAAAAlelDv0smH60sbWytKQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC4ZNP//z8dxEJkbjCqi5fnpJRGk0geZ4MXvEUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABeAv8EAAD//yiCbKI=") mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14c, 0x14c, 0x8, [@type_tag={0xc, 0x0, 0x0, 0x12, 0x2}, @struct={0x6, 0x9, 0x0, 0x4, 0x0, 0x0, [{0x8, 0x4, 0x3}, {0xe, 0x0, 0x1}, {0xd, 0x3, 0x7}, {0xb, 0x4, 0x9}, {0x7, 0x4, 0x2}, {0x7, 0x5, 0x65}, {0xc, 0x2, 0xefc}, {0x3, 0x3, 0x7}, {0xc, 0x4, 0xffff}]}, @float={0x6, 0x0, 0x0, 0x10, 0x4}, @struct={0xa, 0xa, 0x0, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0xa, 0x2, 0x9}, {0x0, 0x1, 0x8}, {0xe, 0x4, 0x81}, {0xf, 0x0, 0x5}, {0x2, 0x1, 0x8000}, {0x9, 0x3, 0xb}, {0x9, 0x5, 0x1}, {0x8, 0x0, 0x86}, {0xf, 0x5, 0x5}]}, @var={0x9, 0x0, 0x0, 0xe, 0x2, 0x2}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x7, 0x6}, @volatile={0x1, 0x0, 0x0, 0x9, 0x2}, @const={0x5, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x30, 0x5f, 0x2e, 0x0, 0x30, 0x5f]}}, &(0x7f0000000840)=""/113, 0x16c, 0x71, 0x0, 0x4c10a144, 0x10000}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000400)=[{0x6, 0x1, 0x2, 0x7fff7ffc}]}) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f00000012c0)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000007f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x290) close_range(r2, 0xffffffffffffffff, 0x0) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000300)='\x00', 0x81901) move_mount(r4, &(0x7f0000000380)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x8000) close(0x3) r5 = getpid() r6 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @private2}, &(0x7f00000000c0)=0x1c, 0x800) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4f8, 0xffffffff, 0x2f8, 0x0, 0x2f8, 0xffffffff, 0xffffffff, 0x428, 0x428, 0x428, 0xffffffff, 0x4, &(0x7f0000000100), {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffff00, 0xffffff00], 'veth0_to_bond\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2, 0x4c, 0x6, 0x24}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@icmp6={{0x28}, {0xe, 'E_'}}, @common=@ah={{0x30}, {[0x4d5, 0x4d5], 0xfff, 0xf2, 0x2}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x6, 0xd}}}, {{@uncond, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x9, 'system_u:object_r:tmp_t:s0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x130, 0x0, {}, [@common=@ipv6header={{0x28}, {0x4, 0x101, 0x1}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@local, [0xffffffff, 0xff0000ff, 0xffffff00], 0x4e23, 0x4e24, 0x4e20, 0x4e24, 0x9, 0x7, 0xb49, 0x4, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x558) r7 = syz_pidfd_open(r5, 0x0) setns(r7, 0x24020000) umount2(&(0x7f0000000040)='.\x00', 0x2) 4m17.841315432s ago: executing program 37 (id=8382): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./bus\x00', 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="73686f72746e616d653d77696e39352c73686f72746e616d653d77696e6e742c756e695f786c6174653d302c756e695f786c6174653d312c757466383d312c757466383d312c646973636172642c757466383d302c756e695f786c6174653d302c666c7573682c73686f72746e616d653d6d697865642c73686f72746e616d653d6c6f7765722c646f733178666c6f7070792c73686f72746e616d653d77696e6e742c73686f72746e616d653d6c6f7765722c757466382c0014697a7960fb374b723f64329787434c6c9f891d2e309efaf1d4e529e1ba0f697fedffb095592bc19d5a8f8141ee9bf46262f3a2b1452bf206c0e2ae8a465e6e1be6eeb5d588035a24458d476fc1f9a234cdc4ba352a4185614ce67df4870bff796357ee95fffb99cde9"], 0xfe, 0x2b7, &(0x7f0000001340)="$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") mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000008c0)={&(0x7f00000006c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14c, 0x14c, 0x8, [@type_tag={0xc, 0x0, 0x0, 0x12, 0x2}, @struct={0x6, 0x9, 0x0, 0x4, 0x0, 0x0, [{0x8, 0x4, 0x3}, {0xe, 0x0, 0x1}, {0xd, 0x3, 0x7}, {0xb, 0x4, 0x9}, {0x7, 0x4, 0x2}, {0x7, 0x5, 0x65}, {0xc, 0x2, 0xefc}, {0x3, 0x3, 0x7}, {0xc, 0x4, 0xffff}]}, @float={0x6, 0x0, 0x0, 0x10, 0x4}, @struct={0xa, 0xa, 0x0, 0x4, 0x0, 0x1, [{0x5, 0x3, 0x5}, {0xa, 0x2, 0x9}, {0x0, 0x1, 0x8}, {0xe, 0x4, 0x81}, {0xf, 0x0, 0x5}, {0x2, 0x1, 0x8000}, {0x9, 0x3, 0xb}, {0x9, 0x5, 0x1}, {0x8, 0x0, 0x86}, {0xf, 0x5, 0x5}]}, @var={0x9, 0x0, 0x0, 0xe, 0x2, 0x2}, @int={0xf, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, 0x7, 0x6}, @volatile={0x1, 0x0, 0x0, 0x9, 0x2}, @const={0x5, 0x0, 0x0, 0xa, 0x5}]}, {0x0, [0x30, 0x5f, 0x2e, 0x0, 0x30, 0x5f]}}, &(0x7f0000000840)=""/113, 0x16c, 0x71, 0x0, 0x4c10a144, 0x10000}, 0x28) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000900)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0xfffffffffffffffd}, 0x18) r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000400)=[{0x6, 0x1, 0x2, 0x7fff7ffc}]}) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f00000012c0)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000400000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000007f00000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x290) close_range(r2, 0xffffffffffffffff, 0x0) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000300)='\x00', 0x81901) move_mount(r4, &(0x7f0000000380)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) truncate(&(0x7f0000000000)='./file1\x00', 0x8000) close(0x3) r5 = getpid() r6 = accept4$inet6(0xffffffffffffffff, &(0x7f0000000080)={0xa, 0x0, 0x0, @private2}, &(0x7f00000000c0)=0x1c, 0x800) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000140)=@security={'security\x00', 0xe, 0x4, 0x4f8, 0xffffffff, 0x2f8, 0x0, 0x2f8, 0xffffffff, 0xffffffff, 0x428, 0x428, 0x428, 0xffffffff, 0x4, &(0x7f0000000100), {[{{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @local, [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], [0xffffff00, 0xffffff00], 'veth0_to_bond\x00', 'vlan1\x00', {0xff}, {0xff}, 0x2, 0x4c, 0x6, 0x24}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@icmp6={{0x28}, {0xe, 'E_'}}, @common=@ah={{0x30}, {[0x4d5, 0x4d5], 0xfff, 0xf2, 0x2}}]}, @common=@unspec=@NFQUEUE2={0x28, 'NFQUEUE\x00', 0x2, {0x6, 0xd}}}, {{@uncond, 0x0, 0xa8, 0x1d0}, @common=@unspec=@SECMARK={0x128, 'SECMARK\x00', 0x0, {0x1, 0x9, 'system_u:object_r:tmp_t:s0\x00'}}}, {{@uncond, 0x0, 0xd0, 0x130, 0x0, {}, [@common=@ipv6header={{0x28}, {0x4, 0x101, 0x1}}]}, @common=@inet=@HMARK={0x60, 'HMARK\x00', 0x0, {@ipv6=@local, [0xffffffff, 0xff0000ff, 0xffffff00], 0x4e23, 0x4e24, 0x4e20, 0x4e24, 0x9, 0x7, 0xb49, 0x4, 0x8}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x558) r7 = syz_pidfd_open(r5, 0x0) setns(r7, 0x24020000) umount2(&(0x7f0000000040)='.\x00', 0x2) 4m12.95494067s ago: executing program 2 (id=8451): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = socket$inet(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, &(0x7f0000002700)=@raw={'raw\x00', 0x8, 0x3, 0x2a0, 0x208, 0x8, 0xfa04, 0x0, 0x6c02, 0x208, 0x194, 0x194, 0x208, 0x194, 0x3, 0x0, {[{{@ip={@empty=0x1e00, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'veth0_virt_wifi\x00', {}, {}, 0x6}, 0x0, 0xa0, 0xc8, 0x0, {0x0, 0x74020000}, [@common=@inet=@tcp={{0x30}, {[], [], 0x0, 0x0, 0x7a}}]}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@multicast1, @rand_addr, 0x0, 0x0, 'batadv_slave_0\x00', 'pimreg\x00'}, 0x0, 0xf8, 0x140, 0x0, {}, [@common=@unspec=@helper={{0x48}, {0x0, 'amanda\x00'}}, @common=@unspec=@connlimit={{0x40}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'snmp\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x300) 4m12.934508731s ago: executing program 2 (id=8452): r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) r3 = socket$inet6_sctp(0xa, 0x3, 0x84) setsockopt$inet6_int(r3, 0x29, 0x4e, &(0x7f0000000040)=0x2, 0x4) bind$inet6(r3, &(0x7f0000000340)={0xa, 0x4e23, 0x2, @initdev={0xfe, 0x88, '\x00', 0x4, 0x0}, 0x8}, 0x1c) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000800)={0x3, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018", @ANYRESHEX=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085"], 0x0, 0x101, 0x0, 0x0, 0x41100, 0x59}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{}, 0x0, &(0x7f00000004c0)}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000b40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x5, 0x0, 0x0, 0x0, 0x25}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000003580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0xffffffffffffffff}], 0x9, 0x0) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x15}]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r6}, 0x10) r7 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) r8 = socket$tipc(0x1e, 0x2, 0x0) r9 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r9, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r8, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) 4m12.919287181s ago: executing program 2 (id=8453): sched_setscheduler(0x0, 0x2, 0x0) syz_open_dev$vcsu(0x0, 0xffffffffffff7fff, 0xa000) unshare(0x42000000) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)="5500000018007f5f00fe01b2a4a2809302060000ff41fd01020400000a00120002002800000019002d007fffffff0022de1330d54400009b84136ef75afb83de066a5900e1baac968300000000f2ff00", 0x50}], 0x1, 0x0, 0x0, 0x7a000000}, 0x4000884) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f00000001c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) syz_emit_ethernet(0x2a, &(0x7f0000000100)={@link_local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x11, 0x0, @private=0x800001c, @local}, {0x0, 0x17c1, 0x8}}}}}, 0x0) close(r3) socket(0x10, 0x3, 0x0) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}) write$cgroup_subtree(r2, &(0x7f0000000100)=ANY=[], 0x2a) 4m12.792986243s ago: executing program 2 (id=8457): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) socket(0x10, 0x803, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x0, &(0x7f00000004c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@noload}, {@acl}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}]}, 0x1, 0x783, &(0x7f0000001000)="$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") r1 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffd}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000000c0)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="73686f72746e616d653d77696e39352c756e695f786c6174653d312c636865636b3d7374726963742c646f733178666c6f7070792c757466383d312c757466383d312c757466383d302c696f636861727365743d6370313235de26302c696f636861727365743d69736f383835392d342c696f636861727365743d64656661756c742c73686f72746e616d653d6d69786564", @ANYRES8=0x0], 0xfe, 0x19c, &(0x7f0000000200)="$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") truncate(&(0x7f0000000000)='./file1\x00', 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[], 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c40)={'veth0_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000046c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x8000000, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x2, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x40000000, 0x1000, 0x2, 0x0, 0x0, 0x8000002, 0x0, 0x7e150a0b, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x10000, 0x5d2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x1007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x3, 0x0, 0x1, 0x8, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x9, 0x0, 0x0, 0x7, 0xfbfffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7, 0x4fd, 0x2000, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffe, 0x0, 0x7e98263b, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x9, 0x9, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2d1, 0x0, 0x0, 0xb2e, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xff, 0x1000, 0x0, 0x0, 0x0, 0x4000, 0xfffffffe, 0x6, 0xc3f3, 0x1, 0x0, 0x800, 0x9, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0xfffffffe, 0xc, 0x0, 0x0, 0x80, 0x0, 0x40000000, 0x0, 0x8000, 0x0, 0xfffffffd, 0x0, 0x0, 0xd819ac9, 0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x2, 0x0, 0x80000001, 0x0, 0x10, 0x20, 0x4, 0x400000b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1000, 0x100, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x1, 0x4, 0xfffffffe, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0x20000040, 0xffffffff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0xaaf0]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x3, 0x0, 0x0, 0xfffc, 0xc0000001}, {0x3, 0x0, 0xb, 0x0, 0x0, 0xffffffff}, 0x7, 0x10, 0x2000000}}]}}]}, 0x45c}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r1, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0), 0x0, 0x3c, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000740), &(0x7f0000000840), 0x8, 0x8d, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) r8 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$cgroup_subtree(r8, &(0x7f0000000240)=ANY=[@ANYBLOB="2b68756765a565e9"], 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x20, 0x2, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x4}], &(0x7f0000000100)='syzkaller\x00', 0x8, 0xbc, &(0x7f0000000380)=""/188, 0x41000, 0x28, '\x00', r6, @netfilter, r1, 0x8, &(0x7f0000000300)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x3, 0xc, 0x200, 0xe}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000b40)=[r1, r1, r1, r5, r1, r1, r8], 0x0, 0x10, 0x101}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) socket$inet_udp(0x2, 0x2, 0x0) r9 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r9, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x4800000, 0x8005, 0x0, 0x0, 0x9, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d10a00966d61fdcf335263bd9bffbcc2542ded71038259ca0400e1a311efec32d71e14ef3dc177b5b48b00", "f2fdffffffffffffff810000000000d300e6d602000000000000000000000001", [0xca4e]}) dup(r0) socket(0x10, 0x3, 0x0) 4m12.674332905s ago: executing program 2 (id=8460): r0 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) r1 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000980)={'ip6gre0\x00', &(0x7f00000008c0)={'ip6_vti0\x00', 0x0, 0x4, 0x40, 0x3, 0x10e6451c, 0x24, @rand_addr=' \x01\x00', @mcast2, 0x40, 0x7, 0x7f, 0x8b1}}) sendmsg$MPTCP_PM_CMD_SUBFLOW_DESTROY(0xffffffffffffffff, &(0x7f00000014c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000f40)={&(0x7f0000001400)={0x94, 0x0, 0x1, 0x70bd2b, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_ADDR_REMOTE={0x1c, 0x6, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0xa}, @MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @loopback}]}, @MPTCP_PM_ATTR_ADDR={0x34, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8, 0x7, r3}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xb}, @MPTCP_PM_ADDR_ATTR_FLAGS={0x8}, @MPTCP_PM_ADDR_ATTR_ADDR4={0x8, 0x3, @broadcast}, @MPTCP_PM_ADDR_ATTR_FAMILY={0x6, 0x1, 0x2}, @MPTCP_PM_ADDR_ATTR_ID={0x5, 0x2, 0xc}]}, @MPTCP_PM_ATTR_ADDR={0x28, 0x1, 0x0, 0x1, [@MPTCP_PM_ADDR_ATTR_IF_IDX={0x8}, @MPTCP_PM_ADDR_ATTR_PORT={0x6, 0x5, 0x4e23}, @MPTCP_PM_ADDR_ATTR_ADDR6={0x14, 0x4, @private2={0xfc, 0x2, '\x00', 0x1}}]}, @MPTCP_PM_ATTR_RCV_ADD_ADDRS={0x8, 0x2, 0x4}]}, 0x94}, 0x1, 0x0, 0x0, 0x8000}, 0xc0) r4 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r2) ioctl$IOCTL_GET_NCIDEV_IDX(r1, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r2, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000500)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r4, @ANYBLOB="010026bd70003c0200000200000008000100", @ANYRES32=r5], 0x1c}}, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000200), 0xffffffffffffffff) gettid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x500, 0x0, 0x2000040}, 0xc, &(0x7f0000000240)={&(0x7f0000000540)=ANY=[], 0x2c}, 0x1, 0x0, 0x0, 0x20000040}, 0x4000000) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000180)='./file0\x00', 0x20044e, &(0x7f0000000340)={[{@minixdf}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}, {@stripe}, {@noblock_validity}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6}}]}, 0x3, 0x451, &(0x7f0000000f80)="$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") r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r9, 0x29, 0x40, &(0x7f0000000b40)=@filter={'filter\x00', 0x4, 0x4, 0x370, 0xffffffff, 0x260, 0x260, 0xe8, 0xfeffffff, 0xffffffff, 0x3e8, 0x3e8, 0x3e8, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev={0xfe, 0x80, '\x00', 0x29}, @private2, [0xffffffff, 0xff000000, 0xff, 0xffffff00], [0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff], 'hsr0\x00', 'sit0\x00', {}, {}, 0x87, 0x3, 0x4, 0x5}, 0x2f2, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x5, {0x7}}}}, {{@ipv6={@private2, @empty, [], [0x0, 0x0, 0xff000000], 'sit0\x00', 'batadv_slave_1\x00'}, 0x0, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x5, {0x2000010}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3d0) r10 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000a00)=ANY=[@ANYBLOB="442300003b0007010100000000000000017c00000400fc802b2301"], 0x2344}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c000) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) syz_genetlink_get_family_id$mptcp(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x84}, 0x0) sendmsg$NL802154_CMD_DEL_SEC_DEVKEY(r2, &(0x7f0000000540)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="000425bd57218d46bfa21ec8cba1c85f9470", @ANYRES32=r11, @ANYBLOB="08000300", @ANYRES32=r11, @ANYBLOB="20002f800c0002000202aaaaaaaaaaaa040003800c0002008302ffffffffffff"], 0x44}, 0x1, 0x0, 0x0, 0x4041}, 0x890) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) recvmmsg(r0, &(0x7f00000009c0)=[{{0x0, 0x0, &(0x7f0000000940)=[{&(0x7f0000000440)=""/185, 0xb9}], 0x1}, 0xb}], 0x1, 0x40012163, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f00000000c0)={'team0\x00'}) 4m12.040207455s ago: executing program 2 (id=8463): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) socket(0x10, 0x803, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x0, &(0x7f00000004c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@noload}, {@acl}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}]}, 0x1, 0x783, &(0x7f0000001000)="$eJzs3c9rHFUcAPDvbJKmSauJIGg9BQQNlG5Mja2Ch4oHESwU9Gy7bLahZpMt2U1pQg4tIngRVDwIeunZH/Xm1R9X/S88SEvVtFjxIJHZH+222U03bXY3kM8HXva9mdm89903P97sDDsB7FkT6Z9MxKGI+DiJGKtPTyJiqJobjDhRW+72+lo+TUlsbLz9Z1Jd5tb6Wj6a3pM6UC88HRE/fRBxOLO53vLK6nyuWCws1ctTlYXzU+WV1SPnFnJzhbnC4rHpmZmjx186fmznYv3719WD1z954/lvT/z7/lNXP/o5iRNxsD6vOY6dMhET9c9kKP0I7/H6TlfWZ0m/G8BDSTfNgdpWHodiLAaquTZGetkyAKBbNgCAPSgxBgCAPabxPcCt9bV8I/X3G4neuvFaROyvxd+4vlmbM1i/Zre/eh109FZyz5WRJCLGd6D+iYj48vt3v05T1PvBtTSgFy5djogz4xOb9//JpnsWtuuFrWZuDFdfJu6bvNeOP9BPP6Tjn5dbjf8yd8Y/0WL8M9xi230YD97+M9d2oJq20vHfq033tt1uir9ufKBeeqw65htKzp4rFtJ92+MRMRlDw2l5urpo65Hb5M3/brarv3n899en732V1p++3l0ic21w+N73zOYquUeNu+HG5YhnBlvFn9zp/6TN+PdUh3W8+cqHX7Sbl8afxttIm+Pvro0rEc+17P+7fZlseX/iVHV1mGqsFC1899vno+3qb+7/NKX1N84FeiHt/9Gt4x9Pmu/XLG+/jl+ujP3Ybt6D42+9/u9L3qnm99WnXcxVKkvTEfuStzZPP3r3vY1yY/k0/slnW2//tWpbr//pOeGZDuMfvP7HNw8ff3el8c9uq/+3n7l6e36gXf2d9f9MNTdZn9LJ/q/TBj7KZwcAAAAAAAAAAAAAAAAAAAAAAAAAncpExMFIMtk7+Uwmm609w/vJGM0US+XK4bOl5cXZqD4rezyGMo2fuhxr+j3U6frv4TfKR+8rvxgRT0TEZ8Mj1XI2XyrO9jt4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKg70Ob5/6nfh/vdOgCga/b3uwEAQM85/gPA3rO94/9I19oBAPSO838A2Hs6Pv6f6W47AIDecf4PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAl506eTJNG/+sr+XT8uyFleX50oUjs4XyfHZhOZ/Nl5bOZ+dKpbliIZsvLbT9R5dqL8VS6fxMLC5fnKoUypWp8srq6YXS8mLl9LmF3FzhdGGoZ5EBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQOfKK6vzuWKxsCSzZWZkdzRj12QGY1c0Q6Zrmea9xEj/dlAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAu9z/AQAA//+MoS4e") r1 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffd}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000000c0)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="73686f72746e616d653d77696e39352c756e695f786c6174653d312c636865636b3d7374726963742c646f733178666c6f7070792c757466383d312c757466383d312c757466383d302c696f636861727365743d6370313235de26302c696f636861727365743d69736f383835392d342c696f636861727365743d64656661756c742c73686f72746e616d653d6d69786564", @ANYRES8=0x0], 0xfe, 0x19c, &(0x7f0000000200)="$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") truncate(&(0x7f0000000000)='./file1\x00', 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[], 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c40)={'veth0_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000046c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x8000000, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x2, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x40000000, 0x1000, 0x2, 0x0, 0x0, 0x8000002, 0x0, 0x7e150a0b, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x10000, 0x5d2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x1007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x3, 0x0, 0x1, 0x8, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x9, 0x0, 0x0, 0x7, 0xfbfffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7, 0x4fd, 0x2000, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffe, 0x0, 0x7e98263b, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x9, 0x9, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2d1, 0x0, 0x0, 0xb2e, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xff, 0x1000, 0x0, 0x0, 0x0, 0x4000, 0xfffffffe, 0x6, 0xc3f3, 0x1, 0x0, 0x800, 0x9, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0xfffffffe, 0xc, 0x0, 0x0, 0x80, 0x0, 0x40000000, 0x0, 0x8000, 0x0, 0xfffffffd, 0x0, 0x0, 0xd819ac9, 0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x2, 0x0, 0x80000001, 0x0, 0x10, 0x20, 0x4, 0x400000b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1000, 0x100, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x1, 0x4, 0xfffffffe, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0x20000040, 0xffffffff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0xaaf0]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x3, 0x0, 0x0, 0xfffc, 0xc0000001}, {0x3, 0x0, 0xb, 0x0, 0x0, 0xffffffff}, 0x7, 0x10, 0x2000000}}]}}]}, 0x45c}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r1, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0), 0x0, 0x3c, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000740), &(0x7f0000000840), 0x8, 0x8d, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) r8 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$cgroup_subtree(r8, &(0x7f0000000240)=ANY=[@ANYBLOB="2b68756765a565e9"], 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x20, 0x2, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x4}], &(0x7f0000000100)='syzkaller\x00', 0x8, 0xbc, &(0x7f0000000380)=""/188, 0x41000, 0x28, '\x00', r6, @netfilter, r1, 0x8, &(0x7f0000000300)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x3, 0xc, 0x200, 0xe}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000b40)=[r1, r1, r1, r5, r1, r1, r8], 0x0, 0x10, 0x101}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000009c0)=@nat={'nat\x00', 0x19, 0x0, 0xc0, [0x200000000500, 0x0, 0x0, 0x200000000530, 0x200000000560], 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000001000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000"]}, 0x138) r9 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r9, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x4800000, 0x8005, 0x0, 0x0, 0x9, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d10a00966d61fdcf335263bd9bffbcc2542ded71038259ca0400e1a311efec32d71e14ef3dc177b5b48b00", "f2fdffffffffffffff810000000000d300e6d602000000000000000000000001", [0xca4e]}) dup(r0) socket(0x10, 0x3, 0x0) 4m11.985243956s ago: executing program 38 (id=8463): r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) socket(0x10, 0x803, 0x0) syz_mount_image$ext4(&(0x7f0000000780)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x0, &(0x7f00000004c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@noload}, {@acl}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}]}, 0x1, 0x783, &(0x7f0000001000)="$eJzs3c9rHFUcAPDvbJKmSauJIGg9BQQNlG5Mja2Ch4oHESwU9Gy7bLahZpMt2U1pQg4tIngRVDwIeunZH/Xm1R9X/S88SEvVtFjxIJHZH+222U03bXY3kM8HXva9mdm89903P97sDDsB7FkT6Z9MxKGI+DiJGKtPTyJiqJobjDhRW+72+lo+TUlsbLz9Z1Jd5tb6Wj6a3pM6UC88HRE/fRBxOLO53vLK6nyuWCws1ctTlYXzU+WV1SPnFnJzhbnC4rHpmZmjx186fmznYv3719WD1z954/lvT/z7/lNXP/o5iRNxsD6vOY6dMhET9c9kKP0I7/H6TlfWZ0m/G8BDSTfNgdpWHodiLAaquTZGetkyAKBbNgCAPSgxBgCAPabxPcCt9bV8I/X3G4neuvFaROyvxd+4vlmbM1i/Zre/eh109FZyz5WRJCLGd6D+iYj48vt3v05T1PvBtTSgFy5djogz4xOb9//JpnsWtuuFrWZuDFdfJu6bvNeOP9BPP6Tjn5dbjf8yd8Y/0WL8M9xi230YD97+M9d2oJq20vHfq033tt1uir9ufKBeeqw65htKzp4rFtJ92+MRMRlDw2l5urpo65Hb5M3/brarv3n899en732V1p++3l0ic21w+N73zOYquUeNu+HG5YhnBlvFn9zp/6TN+PdUh3W8+cqHX7Sbl8afxttIm+Pvro0rEc+17P+7fZlseX/iVHV1mGqsFC1899vno+3qb+7/NKX1N84FeiHt/9Gt4x9Pmu/XLG+/jl+ujP3Ybt6D42+9/u9L3qnm99WnXcxVKkvTEfuStzZPP3r3vY1yY/k0/slnW2//tWpbr//pOeGZDuMfvP7HNw8ff3el8c9uq/+3n7l6e36gXf2d9f9MNTdZn9LJ/q/TBj7KZwcAAAAAAAAAAAAAAAAAAAAAAAAAncpExMFIMtk7+Uwmm609w/vJGM0US+XK4bOl5cXZqD4rezyGMo2fuhxr+j3U6frv4TfKR+8rvxgRT0TEZ8Mj1XI2XyrO9jt4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAKg70Ob5/6nfh/vdOgCga/b3uwEAQM85/gPA3rO94/9I19oBAPSO838A2Hs6Pv6f6W47AIDecf4PAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAl506eTJNG/+sr+XT8uyFleX50oUjs4XyfHZhOZ/Nl5bOZ+dKpbliIZsvLbT9R5dqL8VS6fxMLC5fnKoUypWp8srq6YXS8mLl9LmF3FzhdGGoZ5EBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAQOfKK6vzuWKxsCSzZWZkdzRj12QGY1c0Q6Zrmea9xEj/dlAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAu9z/AQAA//+MoS4e") r1 = open(&(0x7f0000000180)='./bus\x00', 0x14937e, 0x111) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x5000, 0x0) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x4, 0x7fe2, 0x1}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3fffd}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) syz_mount_image$vfat(&(0x7f0000000180), &(0x7f00000000c0)='./file0\x00', 0x1000000, &(0x7f00000003c0)=ANY=[@ANYBLOB="73686f72746e616d653d77696e39352c756e695f786c6174653d312c636865636b3d7374726963742c646f733178666c6f7070792c757466383d312c757466383d312c757466383d302c696f636861727365743d6370313235de26302c696f636861727365743d69736f383835392d342c696f636861727365743d64656661756c742c73686f72746e616d653d6d69786564", @ANYRES8=0x0], 0xfe, 0x19c, &(0x7f0000000200)="$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") truncate(&(0x7f0000000000)='./file1\x00', 0x8000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[], 0x48) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000c40)={'veth0_vlan\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000046c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x8000000, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x2, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x40000000, 0x1000, 0x2, 0x0, 0x0, 0x8000002, 0x0, 0x7e150a0b, 0x0, 0x5, 0x0, 0x0, 0x0, 0x4, 0x0, 0x100000, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x10000, 0x5d2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x1007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, 0x3, 0x0, 0x1, 0x8, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, 0x9, 0x0, 0x0, 0x7, 0xfbfffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x7, 0x4fd, 0x2000, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffe, 0x0, 0x7e98263b, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x4, 0x0, 0x0, 0x9, 0x9, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2d1, 0x0, 0x0, 0xb2e, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xff, 0x1000, 0x0, 0x0, 0x0, 0x4000, 0xfffffffe, 0x6, 0xc3f3, 0x1, 0x0, 0x800, 0x9, 0x7fc, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0xfffffffe, 0xc, 0x0, 0x0, 0x80, 0x0, 0x40000000, 0x0, 0x8000, 0x0, 0xfffffffd, 0x0, 0x0, 0xd819ac9, 0x1, 0x80, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x2, 0x0, 0x80000001, 0x0, 0x10, 0x20, 0x4, 0x400000b2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x1000, 0x100, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x1, 0x4, 0xfffffffe, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x4, 0x0, 0x0, 0x20000040, 0xffffffff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0xaaf0]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x3, 0x0, 0x0, 0xfffc, 0xc0000001}, {0x3, 0x0, 0xb, 0x0, 0x0, 0xffffffff}, 0x7, 0x10, 0x2000000}}]}}]}, 0x45c}}, 0x0) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000640)={r1, 0xe0, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000640), ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680), &(0x7f00000006c0), 0x0, 0x3c, &(0x7f00000007c0)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000740), &(0x7f0000000840), 0x8, 0x8d, 0x8, 0x8, &(0x7f0000000880)}}, 0x10) r8 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$cgroup_subtree(r8, &(0x7f0000000240)=ANY=[@ANYBLOB="2b68756765a565e9"], 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x20, 0x2, &(0x7f00000000c0)=@raw=[@map_idx={0x18, 0x8, 0x5, 0x0, 0x4}], &(0x7f0000000100)='syzkaller\x00', 0x8, 0xbc, &(0x7f0000000380)=""/188, 0x41000, 0x28, '\x00', r6, @netfilter, r1, 0x8, &(0x7f0000000300)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000440)={0x3, 0xc, 0x200, 0xe}, 0x10, r7, 0xffffffffffffffff, 0x0, &(0x7f0000000b40)=[r1, r1, r1, r5, r1, r1, r8], 0x0, 0x10, 0x101}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) setsockopt$EBT_SO_SET_ENTRIES(0xffffffffffffffff, 0x0, 0x80, &(0x7f00000009c0)=@nat={'nat\x00', 0x19, 0x0, 0xc0, [0x200000000500, 0x0, 0x0, 0x200000000530, 0x200000000560], 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000001000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffff00000000"]}, 0x138) r9 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r9, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x4800000, 0x8005, 0x0, 0x0, 0x9, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d10a00966d61fdcf335263bd9bffbcc2542ded71038259ca0400e1a311efec32d71e14ef3dc177b5b48b00", "f2fdffffffffffffff810000000000d300e6d602000000000000000000000001", [0xca4e]}) dup(r0) socket(0x10, 0x3, 0x0) 3m27.570715634s ago: executing program 5 (id=9086): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c0002800500010000000000080007"], 0x64}, 0x1, 0x0, 0x0, 0x20040000}, 0x4010) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=ANY=[@ANYBLOB="6c000000000101040000000000000000020000002c000180140001800800010955279a0108000200ac1414000c00028005000100000000000600034000040000240002801400018008000100e000000108000200e00000010c00828005000100000000000800074000000000c79193ecd9b3c854f615410db34609cda103258ab8b4c60cd7a33798e86d57d9249c7cd9340a9fc468aa41384d678862d63065b07b14eb"], 0x6c}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x20000000000000b4, &(0x7f0000000340)=ANY=[@ANYBLOB="180300000000000000000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x40}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}]}, 0x4c}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file1\x00', 0x0, &(0x7f00000003c0), 0x1, 0xb80, &(0x7f00000017c0)="$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") pwritev2(0xffffffffffffffff, 0x0, 0x0, 0x7800, 0x0, 0x3) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4b, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x0, 0x1, 0x0, 0x25cfdbfc, {0x54}}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x40010) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x48, 0x9, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0xffff}, [@IPSET_ATTR_DATA={0x20, 0x7, 0x0, 0x1, [@IPSET_ATTR_IP={0xc, 0x1, 0x0, 0x1, @IPSET_ATTR_IPADDR_IPV4={0x8, 0x1, 0x1, 0x0, @multicast2}}, @IPSET_ATTR_MARK={0x8, 0xa, 0x1, 0x0, 0xffff060e}, @IPSET_ATTR_CIDR={0x5, 0x3, 0x2}]}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_PROTOCOL={0x5}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x40c0080) 3m27.364934867s ago: executing program 5 (id=9090): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000007c0)={&(0x7f00000005c0)=ANY=[@ANYBLOB="9feb010018000000000000005e0000005e00000006000000080000000300000f020000000300000033bd0000000022faffffffffffff000001000000010000000200000081000000a6220f000000000000110100000005000000100000000000000901000000010000000000000e030000000200000000000000305f0000"], &(0x7f0000000700)=""/154, 0x7e, 0x9a, 0x1, 0x38}, 0x28) r0 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00'}, 0x18) (async) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) (async) r1 = getpid() (async) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x6) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) (async) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) (async) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) (async) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) (async) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0x7, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000fdffffffffffff19110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7020000140000e5b7030000000700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) (async, rerun: 64) r4 = creat(&(0x7f0000000580)='./bus\x00', 0x0) (async, rerun: 64) io_setup(0x4, &(0x7f00000003c0)=0x0) (async) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r6 = dup(r0) setsockopt$packet_drop_memb(r6, 0x107, 0x2, 0x0, 0x0) (async) syz_emit_ethernet(0xe7, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x0) (async) io_submit(r5, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x15, 0x0, 0x0, 0x1, 0x0, r4, &(0x7f0000000000), 0x1a00001a}]) r7 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc00000019000100000000000000000020010000000000000000000000000000ac1414aa0000be92f3cd00000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000a900000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000000000000000000000000000000a000000000000000000000080400000000000000000080000000000000000000000000000000044000500fc000000000000000000000000000001000000003c"], 0xfc}}, 0x0) (async, rerun: 64) r8 = socket$nl_xfrm(0x10, 0x3, 0x6) (rerun: 64) sendmsg$nl_xfrm(r8, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000640)=ANY=[@ANYBLOB="5000000021000002fcffffef000000000a010101000000000000000040000000fc02000000000000000000000000000000000000000000b10a00000088000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000100000000000"], 0x50}}, 0x0) sendmsg$RDMA_NLDEV_CMD_SET(r4, &(0x7f0000000480)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000440)={&(0x7f0000000400)=ANY=[@ANYBLOB="380000000214000026bd7000fbdbdf251d403fbb0900020073797a3200000000050054000000000005005400"/56], 0x38}, 0x1, 0x0, 0x0, 0x20008001}, 0x44081) (async) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r0, {r2}}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00'}) ioctl$TCSETS(r9, 0x5402, &(0x7f0000000300)={0x0, 0x4, 0x6, 0x7, 0xb, "76d4c5f0acc5ef317a0d6618905cace08d8f6c"}) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="190000000400000008000000"], 0x48) (async, rerun: 64) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, 0x0, 0x8808) (async, rerun: 64) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) 3m27.268828669s ago: executing program 5 (id=9093): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) munlockall() 3m27.249687629s ago: executing program 5 (id=9094): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x200000, &(0x7f0000000300)={[{@minixdf}, {}, {@barrier_val={'barrier', 0x3d, 0x9}}, {@commit={'commit', 0x3d, 0x5}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@lazytime}, {@nodelalloc}, {@noblock_validity}, {@nomblk_io_submit}]}, 0x1, 0x566, &(0x7f00000015c0)="$eJzs3c9rHFUcAPDvbJL+1qZQinqQQA9GajdN4o8KgvUiiBYLeq9LMg0lm27JbkoTC20P9uJFiiBiQfwDvHss/gP+FQUtFClBD14is5lNt81ukqYbN3U+H5j2vZnZvPnum+/bNzu7bACFNZL9U4p4OSK+SSIOt20bjHzjyOp+yw+vTWVLEisrn/2ZRJKva+2f5P8fzCsvRcSvX0WcKK1vt764NFupVtP5vD7WmLs8Vl9cOnlxrjKTzqSXJiYnT781OfHuO2/3LNbXz/39/ad3Pzr99fHl736+f+R2EmfiUL6tPY5ncKO9MhIj+XMyFGee2HG8B43tJkm/D4BtGcjzfCiyMeBwDORZD/z/XY+IFaCgEvkPBdWaB7Su7Xt0HfzcePDB6gXQ+vgHV98biX3Na6MDy8ljV0bZ9e5wD9rP2vjljzu3syU2eR/ieg/aA2i5cTMiTg0Orh//knz8275TzTePN/ZkG0V7/YF+upvNf97oNP8prc1/osP852CH3N2OzfO/dL8HzXSVzf/e6zj/XRu6hgfy2gvNOd9QcuFiNT0VES9GxGgM7c3qG93POb18b6Xbtvb5X7Zk7bfmgvlx3B/c+/hjpiuNyrPE3O7BzYhXOs5/k7X+Tzr0f/Z8nNtiG8fSO69227Z5/Dtr5aeI1zr2/6M7WsnG9yfHmufDWOusWO+vW8d+69b+6If9jT/r/wMbxz+ctN+vrT99Gz/u+yfttm275/+e5PNmeU++7mql0Zgfj9iTfLJ+/cSjx7bqrf2z+EePbzz+dTr/90fEF1uM/9bRW1137ff5n8U//VT9//SFex9/+UO39rfW/282S6P5mq2Mf1s9wGd57gAAAAAAAGC3KUXEoUhK5bVyqVQur36+42gcKFVr9caJC7WFS9PR/K7scAyVWne6D7d9HmI8/zxsqz7xRH0yIo5ExLcD+5v18lStOt3v4AEAAAAAAAAAAAAAAAAAAGCXONjl+/+Z3wf6fXTAjvOT31Bcm+Z/L37pCdiVvP5Dccl/KC75D8Ul/6G45D8Ul/yH4pL/UFzyHwAAAAAAAAAAAAAAAAAAAAAAAAAAAHrq3Nmz2bKy/PDaVFafvrK4MFu7cnI6rc+W5xamylO1+cvlmVptppqWp2pzm/29aq12eXwiFq6ONdJ6Y6y+uHR+rrZwqXH+4lxlJj2fDv0nUQEAAAAAAAAAAAAAAAAAAMDzpb64NFupVtN5ha6F92NXHMZOBrhqWw8f3C1RKHQt7NtG5/Z5YAIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACANv8GAAD//04mM/E=") bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='rss_stat\x00', r0}, 0x10) syz_clone(0x42000000, 0x0, 0x0, 0x0, 0x0, 0x0) setuid(0xee00) unlink(&(0x7f0000000180)='./file1\x00') 3m26.968689714s ago: executing program 5 (id=9098): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaa230180c20000000800450000b00000000000119078000000000000000000004e20009c907801000000000000007b4b143b7461fd777b1c012bd14efb9f495e68900664940e3583ad5c8c82b8af584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c045942824251d7d17b5191584bcd4fbe40a23424dbc906f65afd5c2131f2f19935e6996c7096ffeeb03000000000000649a3bfbc1f39cb307b3472eb9cdb042d2643fcbb2c5a57df67d544af6e8dafe09"], 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) recvmmsg(r2, &(0x7f0000003d40)=[{{0x0, 0x0, 0x0}, 0x5}], 0x1, 0x2, 0x0) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syslog(0x2, &(0x7f00000006c0)=""/268, 0x10c) 3m26.722032918s ago: executing program 5 (id=9107): mknod$loop(0x0, 0x6000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x16, 0x24, &(0x7f0000000280)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000880)=[{0x0, 0x3, 0x6}, {0x4, 0x1, 0x8, 0xa}, {0x0, 0x5, 0x2, 0x5}], 0x10, 0x8}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000006c0)="5c00000013006bcd9e3fe3dc6e48aa310b6b8703100000001f03000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x4014) (fail_nth: 12) 3m26.701039078s ago: executing program 39 (id=9107): mknod$loop(0x0, 0x6000, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x16, 0x24, &(0x7f0000000280)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000880)=[{0x0, 0x3, 0x6}, {0x4, 0x1, 0x8, 0xa}, {0x0, 0x5, 0x2, 0x5}], 0x10, 0x8}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000006c0)="5c00000013006bcd9e3fe3dc6e48aa310b6b8703100000001f03000000000000040014000d000a000d0000009ee517d34460bc24eab556a705251e6182949a3651f60a84c9f5d1938037e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x4014) (fail_nth: 12) 24.70350852s ago: executing program 3 (id=12015): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080f00000a"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0xa54a9d76e5e2e84, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_buf(r2, 0x29, 0x20, &(0x7f00000000c0)="0bbb268dd6ffa80800000002000000000000210d0000aaa8fa017242ba9380d440fe0000", 0x24) 24.644632081s ago: executing program 3 (id=12016): socket$kcm(0xa, 0x2, 0x73) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000100)='io_uring_register\x00', r0}, 0x10) r1 = io_uring_setup(0xf08, &(0x7f0000000780)={0x0, 0xfb6e, 0x38c1, 0x4, 0xf0}) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f000000c000/0x1000)=nil, &(0x7f000001f000/0x1000)=nil, &(0x7f0000015000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f000000c000/0x4000)=nil, &(0x7f000001d000/0x3000)=nil, &(0x7f0000012000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0}, 0x68) io_uring_register$IORING_REGISTER_FILES(r1, 0x20, &(0x7f0000000000)=[r1], 0x1) 24.644195111s ago: executing program 3 (id=12017): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="a1832abd7000ffffffff05000000080003"], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x4040004) 24.637615471s ago: executing program 3 (id=12018): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt(r0, 0x84, 0x81, &(0x7f0000000280)="1a00000002000000", 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r0, 0x84, 0x64, &(0x7f0000000000)=[@in6={0xa, 0x4e23, 0x401, @loopback}], 0x1c) r1 = eventfd2(0x0, 0x0) io_setup(0x6, &(0x7f0000000180)=0x0) ioprio_set$uid(0x3, 0x0, 0x0) io_submit(r2, 0x1, &(0x7f0000002900)=[&(0x7f0000000200)={0x0, 0x0, 0x20, 0x7, 0x3511, r1, 0x0, 0x0, 0x0, 0x0, 0x1, r1}]) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r4, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x262) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fdf, 0x1}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f00000001c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = dup2(r6, r5) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r7}, 0x10) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x2440, 0x0) utime(&(0x7f0000000080)='./file0\x00', 0x0) sendto$inet6(r0, &(0x7f0000000100)="b8", 0xffe0, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x7, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x9, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f00000000c0)={'syztnl2\x00', &(0x7f0000000380)={'syztnl2\x00', 0x0, 0x29, 0x63, 0x0, 0x6, 0x8, @local, @private0, 0x20, 0x8000, 0x1, 0x5}}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000400)={r3, r8, 0x25, 0x1, @void}, 0x10) setsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x18, &(0x7f0000000300), 0x8) 24.527715403s ago: executing program 3 (id=12022): bpf$MAP_CREATE(0x0, &(0x7f0000001b80)=ANY=[@ANYBLOB="0600000004000000080000000a"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r0}, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000380), 0xffffffffffffffff) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$WG_CMD_SET_DEVICE(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000680)=ANY=[@ANYBLOB="c8010000", @ANYRES16=r2, @ANYBLOB="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"], 0x1c8}}, 0x0) (fail_nth: 1) 24.404399815s ago: executing program 3 (id=12025): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000180)={0x1f, 0xffff, 0x3}, 0x6) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = add_key$keyring(&(0x7f00000101c0), &(0x7f0000010180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000240)=@keyring={'key_or_keyring:', r2, 0x30}) io_setup(0x8f0, &(0x7f0000002400)) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x84000, &(0x7f0000000640)={[{@user_xattr}, {@noquota}, {@nobarrier}, {@jqfmt_vfsv1}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x800}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x7ad}}, {@noauto_da_alloc}, {@nolazytime}, {@dax_inode}, {@user_xattr}, {@noinit_itable}]}, 0x3, 0x58e, &(0x7f0000001080)="$eJzs3c1rHOUfAPDvbHbb9OX3awqlWBEp9GCldtMkvlTwUI+ixYJ6rkuyDSWbbsluShMLtgd78SJFELEg3vXuwUPx4tG/oqCFIiXowcvKbGaTbbPJbtKtidnPByZ5npnZPPudZ56HZ/bZyQQwsI6nP3IRxyLiiyTiUNu2fGQbjy/vt/ToxmS6JNFofPBHEkm2rrV/kv0+kGWei4ifP4s4lVtbbm1hcaZUqZTnsvxoffbqaG1h8fTl2dJ0ebp8ZXxi4uxrE+NvvvF632J9+cJfX79/752zn59Y+uqHB4fvJHEuDmbb2uN4CjfbM8cbjeyYFOLcEzuO9aGwnSTZ7jfAlgxl7bwQEccKhwqtVg/sfp9GRAMYUMkm2/9e/QXsEq1xQOvavk/Xwf8ZD99evgBaG39++bORGG5eG+1fSh67Mkqvd0f6UH5axo+/372TLtG/zyEAurp5KyLO5PNr+78k6/+27kwP+zxZhv4P/j330vHPK53GP7mV8U90GP8c6NB2t6J7+8896EMx60rHf291HP+uTFqNDGW5/zXHfIXk0uVKOe3b/h8RJ6OwN81vNJ9zdul+Y71t7eO/dEnLb40Fs/fxIL/38ddMleqlp4m53cNbEc93HP8mK/WfdKj/9Hh81GMZR8t3X1xvW/f4n63GdxEvdaz/1RmtZOP5ydHm+TDaOivW+vP20V/XK79z/L/89AxC7Sit//0bxz+StM/X1jZfxrfDf5fX27bV839P8mEzvSdbd71Ur8+NRexJ3lu7fnz1ta18a/80/pMnNu7/Op3/+yLi4x7jv33k+xe2Hn8nQz2W3F0a/9Sm6n/zifvvfvLN1uNP6//VZupktqaX/q/XN/g0xw4AAAAAAAB2mlxEHIwkV4zhLJ3LFYvL3+84EvtzlWqtfupSdf7KVDTvlR2JQq41032o7fsQY9n3YVv58SfyExFxOCK+HNrXzBcnq5Wp7Q4eAAAAAAAAAAAAAAAAAAAAdogDK/f/x2P3/6d+69+/GQd2qvzy87+BAdT1kf/9eNITsCN1bf/ArqX9w+DS/mFwaf8wkJpTfNo/DC7tHwaX9g+DS/sHAAAAAAAAAAAAAAAAAAAAAAAAAACAvrpw/ny6NJYe3ZhM81PXFuZnqtdOT5VrM8XZ+cniZHXuanG6Wp2ulIuT1dluf69SrV4dG4/566P1cq0+WltYvDhbnb9Sv3h5tjRdvlj2nHEAAAAAAAAAAAAAAAAAAABYq7awOFOqVMpzfUgUKpVyLiJ62TmiT4UOYCKtt5v53o7zs0kksbomv1MOS0+J4YP9Ped3b2K7eyYAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWPVPAAAA//9G8zCF") r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000c00)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000000000000000d5ffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000600980000000900000007000000ffffffffc0641161860d11498d7978ecd24a5763332ffbb8a43c4d14a655dc3f1d618ff30376bb599162309ec671b67917e0c9590807d5354cd2434bdc382b47cb6958d1ac185ff5ee7086186cc000b22e8653e460a4ec9fb1160fbe669c4ff4bcc81d477df5b53dbb9d6387e19025b48c09d06fcee38df571d57b470572be1247ac2e370bc55da3789162b981bf1c966c073b07ee1467beb00238ff4d4356ecf5938e0d"], 0x118) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRES64=r3], 0x48) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000001040)={'gre0\x00', &(0x7f0000000280)={'syztnl2\x00', 0x0, 0x700, 0xab00, 0x0, 0x1, {{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0xff01, 0x4, 0x2f, 0x0, @loopback, @empty, {[@lsrr={0x83, 0xb, 0xbf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}]}}}}}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = socket(0x2, 0x80805, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, 0x0, 0x0) add_key(&(0x7f00000001c0)='ceph\x00', 0x0, &(0x7f0000000840)='\x00\x00\x00\x00\x00\x00\x00\x00\x00*\x00\x00', 0xc, 0xffffffffffffffff) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x843, 0x0) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) sendmsg$NL80211_CMD_SET_INTERFACE(r7, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="340000b0", @ANYRES16=r8, @ANYBLOB="00042cbd7000fedbdf25060000000a00180003030303030300000a0018000303030303030000080005000b000000"], 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x10, 0x0, 0x7ffc0002}]}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9, 0x0, 0x7}, 0x18) setuid(0xee00) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x20, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) 24.404145975s ago: executing program 40 (id=12025): r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000180)={0x1f, 0xffff, 0x3}, 0x6) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = add_key$keyring(&(0x7f00000101c0), &(0x7f0000010180)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r2, &(0x7f00000001c0)='asymmetric\x00', &(0x7f0000000240)=@keyring={'key_or_keyring:', r2, 0x30}) io_setup(0x8f0, &(0x7f0000002400)) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x84000, &(0x7f0000000640)={[{@user_xattr}, {@noquota}, {@nobarrier}, {@jqfmt_vfsv1}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x800}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x7ad}}, {@noauto_da_alloc}, {@nolazytime}, {@dax_inode}, {@user_xattr}, {@noinit_itable}]}, 0x3, 0x58e, &(0x7f0000001080)="$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") r3 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) write$UHID_CREATE2(r3, &(0x7f0000000c00)=ANY=[@ANYBLOB="0b00000073797a300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000000000000000d5ffffffffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000600980000000900000007000000ffffffffc0641161860d11498d7978ecd24a5763332ffbb8a43c4d14a655dc3f1d618ff30376bb599162309ec671b67917e0c9590807d5354cd2434bdc382b47cb6958d1ac185ff5ee7086186cc000b22e8653e460a4ec9fb1160fbe669c4ff4bcc81d477df5b53dbb9d6387e19025b48c09d06fcee38df571d57b470572be1247ac2e370bc55da3789162b981bf1c966c073b07ee1467beb00238ff4d4356ecf5938e0d"], 0x118) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRES64=r3], 0x48) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000001040)={'gre0\x00', &(0x7f0000000280)={'syztnl2\x00', 0x0, 0x700, 0xab00, 0x0, 0x1, {{0x8, 0x4, 0x0, 0x0, 0x20, 0x0, 0xff01, 0x4, 0x2f, 0x0, @loopback, @empty, {[@lsrr={0x83, 0xb, 0xbf, [@initdev={0xac, 0x1e, 0x0, 0x0}, @multicast1]}]}}}}}) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) r6 = socket(0x2, 0x80805, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r6, 0x84, 0x75, 0x0, 0x0) add_key(&(0x7f00000001c0)='ceph\x00', 0x0, &(0x7f0000000840)='\x00\x00\x00\x00\x00\x00\x00\x00\x00*\x00\x00', 0xc, 0xffffffffffffffff) r7 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x843, 0x0) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), r0) sendmsg$NL80211_CMD_SET_INTERFACE(r7, &(0x7f00000004c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000400)={&(0x7f00000003c0)=ANY=[@ANYBLOB="340000b0", @ANYRES16=r8, @ANYBLOB="00042cbd7000fedbdf25060000000a00180003030303030300000a0018000303030303030000080005000b000000"], 0x34}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x10, 0x0, 0x7ffc0002}]}) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9, 0x0, 0x7}, 0x18) setuid(0xee00) ioctl$EXT4_IOC_MIGRATE(r7, 0x6609) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x0, &(0x7f0000000040)}, 0x10) r10 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x20, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) socketpair(0xf, 0x3, 0x2, &(0x7f00000001c0)) 2.012274247s ago: executing program 4 (id=12443): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0x7fffffff}, 0x18) writev(0xffffffffffffffff, 0x0, 0x0) r1 = openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) write$selinux_access(r1, &(0x7f0000000840)={'system_u:object_r:dhcpd_state_t:s0', 0x20, '/usr/sbin/cupsd', 0x20, 0x1f}, 0x48) socket$key(0xf, 0x3, 0x2) 2.009740147s ago: executing program 4 (id=12445): rseq(&(0x7f0000000300)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) rt_sigprocmask(0x2, &(0x7f0000000040)={[0x6d285c1d]}, 0x0, 0x8) r0 = gettid() rt_sigtimedwait(&(0x7f00000001c0)={[0xfffffffffffffffd]}, &(0x7f0000000200), 0x0, 0x8) tkill(r0, 0x1f) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454da, &(0x7f00000001c0)={'bond_slave_0\x00'}) sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f0000000d80)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000d40)={&(0x7f0000000cc0)={0x44, 0x0, 0x8, 0x70bd28, 0x25dfdbfc, {}, [@NL80211_ATTR_WIPHY_RETRY_SHORT={0x5, 0x3d, 0xfa}, @NL80211_ATTR_WIPHY_TX_POWER_SETTING={0x8, 0x61, 0xd3ec}, @NL80211_ATTR_WIPHY_RETRY_LONG={0x5, 0x3e, 0x3}, @NL80211_ATTR_TXQ_MEMORY_LIMIT={0x8, 0x10b, 0x8}, @NL80211_ATTR_WIPHY_ANTENNA_TX={0x8}, @NL80211_ATTR_WIPHY_TX_POWER_LEVEL={0x8}]}, 0x44}, 0x1, 0x0, 0x0, 0x44000}, 0x20000000) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000000)={'dvmrp1\x00', 0x1}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000280)='cachefiles_link\x00', 0xffffffffffffffff, 0x0, 0x2}, 0x18) prlimit64(0x0, 0xe, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x19, 0x4, 0x8, 0x8}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xef) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x1, 0x100006, 0x220104, 0xe2a4, 0x1}, 0x48) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x109200, 0x0) ioctl$TUNSETIFF(r4, 0x400454da, &(0x7f0000000140)={'bond0\x00'}) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000100)={'nicvf0\x00', 0x1432}) syz_usb_connect(0x0, 0x60b, &(0x7f00000003c0)={{0x12, 0x1, 0x310, 0x41, 0x23, 0x77, 0xff, 0x2040, 0x721e, 0x84d9, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x5f9, 0x3, 0x2, 0x88, 0x80, 0xff, [{{0x9, 0x4, 0xfe, 0x2b, 0x4, 0xe7, 0xf3, 0xe4, 0xc, [@generic={0xd7, 0xd, "6e3686ce7ff5dbb61caf7929b95eb5d8d9d7f2ea03a10ccbaca55841c8ca93db3d125d5ea49fe17d1269b1b0e842f3efd0c52519148d1e76f715e1bc948b953d63e8984dabd8475d1e13f3fb728fe0f7d4a22e84184833701a60152091ada1ee0f954a3b8e8f08645366245d3dee4ceb2fa056ffa874a7e287f77c906fa96081fe923dbee034d1205c21c488f1ea5dbf5eff5171485d9218a2bba4cb10ca66abe2f63189046c329dd0ec28e0cbb5cc0253397b2e7251888bccf6d445c509677a306a2e225c28e97cddd3d4449c099e9487849166aa"}], [{{0x9, 0x5, 0xb, 0x0, 0x20, 0x6, 0x0, 0x9}}, {{0x9, 0x5, 0xe, 0x10, 0x40, 0x2a, 0x10, 0x1, [@uac_iso={0x7, 0x25, 0x1, 0x83, 0x5, 0xfff9}]}}, {{0x9, 0x5, 0x9, 0x10, 0x3ff, 0x6f, 0x6, 0x6f, [@generic={0x2a, 0x16, "7c615203e2d158607fbc79404dd25bb5c8953c382161e210b278e40d6f512e94f3268fbcf2237f7d"}, @uac_iso={0x7, 0x25, 0x1, 0x80, 0x9, 0x9}]}}, {{0x9, 0x5, 0x5, 0x10, 0x8, 0x2, 0x2, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x9, 0x3}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0xf9, 0x816c}]}}]}}, {{0x9, 0x4, 0x46, 0x2, 0x0, 0xff, 0xff, 0xff, 0x8, [@uac_control={{0xa, 0x24, 0x1, 0x9, 0x3}, [@mixer_unit={0xa, 0x24, 0x4, 0x5, 0x0, "51194d6c6c"}, @selector_unit={0x8, 0x24, 0x5, 0x5, 0xa, "9841e5"}, @output_terminal={0x9, 0x24, 0x3, 0x6, 0x103, 0x3, 0x4, 0x7}]}]}}, {{0x9, 0x4, 0x1d, 0x1, 0xe, 0x11, 0x93, 0x5f, 0x60, [], [{{0x9, 0x5, 0x6, 0x0, 0x40, 0x1, 0x7, 0x3, [@uac_iso={0x7, 0x25, 0x1, 0x3, 0x6, 0x8}, @generic={0x4e, 0x20, "0590416ddb66726d9197a2919d385750ee448a7495c03c900aa2da7419d921a4ba017d44e38d15a4bfba5d19e094d513696f7c20756b4bb9530fa0256078dd8e7f56459af6e258e0e16ab727"}]}}, {{0x9, 0x5, 0xd, 0x10, 0x40, 0x2, 0x0, 0x0, [@uac_iso={0x7, 0x25, 0x1, 0x81, 0x5, 0xaa13}, @uac_iso={0x7, 0x25, 0x1, 0x0, 0xe0, 0x7ff}]}}, {{0x9, 0x5, 0xa, 0x0, 0x8, 0xf9, 0x2, 0x8, [@uac_iso={0x7, 0x25, 0x1, 0x0, 0x8, 0xffff}]}}, {{0x9, 0x5, 0x0, 0x0, 0x40, 0x0, 0xc8, 0xa7, [@generic={0x95, 0xc, "7911bf109a420d606f5a96b353bd854e45e87f471ac7d80ddd522afa9a8b18f00aa3b516b585a735effc72f60d269d5901ff0a34348f564e6241c433881182aa6e5ba25769a08201375582f6bee44e9d430dd11eff082f74955c6b50a290dd02851dc49e607ff154f46b041e3c49691974a3295d58f261615439a2df8fcea8950a62a7f0455c39161a664b3222a7cc7ac71531"}]}}, {{0x9, 0x5, 0xf, 0x3, 0x40, 0x2, 0x81, 0x5, [@uac_iso={0x7, 0x25, 0x1, 0x1, 0x4b}]}}, {{0x9, 0x5, 0xd, 0x0, 0x3ff, 0xeb, 0x2, 0x6c}}, {{0x9, 0x5, 0x9, 0x0, 0x410, 0x59, 0x3, 0x7, [@generic={0xd8, 0x7, "b4aac49e0e51cccd4c6eebd3fdc99fc5442aa7445d85c3e6aa37b236bcdab8fd09bed8c054eeedee06bd798e4dfa2e34c731acf8f5ae5f0b20633ea3971d1f6a0cef94c1eb807eab7b65668a2b59a3dc16d1a6e41d7a0978710d4edfcb93e3650771955fa924cf8ce235c1ffea8f9ab8a527e769036469d19b6c4acbba751237be214daf678a5a8f6bd5eb0e88f2a779c7b321a2076fbe9dbdd2c5be8c2810f1d2c4650d55c822bdfa235234f0f0f8d9accbf9e8661b7c58d1f31d9e2821c2a3cc641eb6df4f54dc98a34b7f7e50b4ebe19fab79a2fa"}]}}, {{0x9, 0x5, 0xb, 0x1, 0x10, 0x7, 0x80, 0x64, [@generic={0xfb, 0xb, "f4eb3cd16e3cacfb4398c97a6c1de8a14202d4454a6ade8a3f664d1b1c8253f1e360add0204dca9c98100bf588f816c9536398acde2a391e9d9b6efd60c7fb59b8a53bd21b6d972771cb31fd80b1f78d7900bf4351473ac5662ac3802d633837f507116c32fd0d85ac2e88c3d4870183e0d7fd7fbbfd0226cf961769505538f1db7dd8b0f8ecadd2c473f2d6ea4dbbac68bab4df31fe04cd67618ad5f43efd8704e41756b2800af5db615b3344b0e11d7bf6f100ae776f3dc6e7587c44965245317b8c5ac790fb25df00c23979d73f3c29effe87c58259166a0d4a125d922304fe9e0787a6ccf3fdb393d3b6315b0b2039c6cd0f5c49a13e24"}]}}, {{0x9, 0x5, 0x4, 0x8, 0x10, 0x6, 0x10, 0x8a, [@uac_iso={0x7, 0x25, 0x1, 0x2, 0x1}]}}, {{0x9, 0x5, 0xf, 0x1, 0x0, 0x4b, 0x2, 0x8, [@uac_iso={0x7, 0x25, 0x1, 0x80, 0x7, 0xc783}]}}, {{0x9, 0x5, 0x4, 0x0, 0x400, 0x1, 0x7, 0x8, [@generic={0x9e, 0xe, "f42fe4e1bf7faf40fe8c9fb0bed3aaeaf12c8d10a6b64b846db90d2ad1a5a74cb9f327b2966e086d26b8574f76cbb17caf48cdc715004de1da9ed58bfc732c898267e9b03affd8934624ed8b50aad346fc1ffca85766d4300bea5963f65e2bfacdc14c4a8df3eeea76fb4a3caeee4fdde9823ff9589b4f399ccbb1bfaa8f158b90ba865991425a6bfdf3fe2bda65246c5f3947b355bf4d2da1b08c0b"}]}}, {{0x9, 0x5, 0xb, 0x3, 0x10, 0x7f, 0x8, 0x8, [@generic={0x2, 0x8}, @uac_iso={0x7, 0x25, 0x1, 0x81, 0x1, 0x100}]}}, {{0x9, 0x5, 0x6, 0x0, 0x8, 0xe, 0x5, 0x54}}, {{0x9, 0x5, 0x5, 0x0, 0x10, 0x55, 0x2, 0x6, [@generic={0x5d, 0xd, "0dc9888c9b8a706db1a43d12f5df463f3dcfbd85252533476695e626789ba0be0577e3da0b4ef5783984d7e1af41bdf980b136b0efac84c2005b741e226c474eadf916933665f9ad9ec60c89c3095ce20bfebe41b42234dbaf9b53"}, @uac_iso={0x7, 0x25, 0x1, 0x82, 0x7f, 0xf}]}}]}}]}}]}}, &(0x7f0000000c40)={0xa, &(0x7f0000000a00)={0xa, 0x6, 0x110, 0x7, 0x0, 0x8, 0x8, 0x6}, 0x56, &(0x7f0000000a40)={0x5, 0xf, 0x56, 0x6, [@ext_cap={0x7, 0x10, 0x2, 0x0, 0x3, 0xe, 0xd2}, @ptm_cap={0x3}, @ssp_cap={0x1c, 0x10, 0xa, 0xa7, 0x4, 0x5, 0xff0f, 0x444, [0xc0, 0xc000, 0xff0000, 0xff003f]}, @ss_container_id={0x14, 0x10, 0x4, 0x7, "5cba3c660b123a28d5339d3a8fe4026c"}, @wireless={0xb, 0x10, 0x1, 0x4, 0x16, 0x8, 0x2, 0x8, 0x5}, @ssp_cap={0xc, 0x10, 0xa, 0x8, 0x0, 0x7, 0xf00, 0xfff}]}, 0x3, [{0xf7, &(0x7f0000000ac0)=@string={0xf7, 0x3, "ab8026f51e29a365121221143b787375130ce07b9fb51c7250a251b976d56a9cd57f35a9ad98d1812fefe82acc1c1c7eb8803345feb5fd43580d565a5902a7a370d1bd410ee8f8ef96e3fe153c9d84da8cb09e0f3fb9f6bcb0d5e6a4a70704cd26c65f8f5fdecc6bc23669936a88a2a1cc8c9b5d8e72ed185d6a2a24f1f6d4f338b24f80ad1e89f7f113a5dbb588ed49a558505875c7bc7d36202a60871a0b3bcb1ba685b3996dd85bf1d04a2899ae28da9899a1f0138a63be03c635a8a533af5008d514e4d978aba423226ee1380074ef74fb9f1d72257be8aa22bb9cd5639629e961a99fc912791cf4fc65c2ac96600c5f5cc84d"}}, {0x12, &(0x7f0000000bc0)=@string={0x12, 0x3, "144acee86f1d75f8fad4ecd3ec4a170b"}}, {0x4, &(0x7f0000000c00)=@lang_id={0x4, 0x3, 0x816}}]}) openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) 1.276947199s ago: executing program 6 (id=12463): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x80000}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000001880), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="a1832abd7000ffffffff05000000080003"], 0x34}, 0x1, 0x0, 0x0, 0x10}, 0x4040004) 1.22977543s ago: executing program 6 (id=12464): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000100)='io_uring_register\x00', r1}, 0x10) r2 = io_uring_setup(0xf08, &(0x7f0000000780)={0x0, 0xfb6e, 0x38c1, 0x4, 0xf0}) io_uring_register$IORING_REGISTER_FILES(r2, 0x20, &(0x7f0000000000)=[r2], 0x1) 1.168488511s ago: executing program 6 (id=12466): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="02000000040000000800000001000000"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r2, &(0x7f0000001b80)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f00000003c0)={0x80, r3, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@ETHTOOL_A_FEATURES_WANTED={0x54, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0x1ff}, @ETHTOOL_A_BITSET_VALUE={0x44, 0x4, "d700981b00eb2e0466b3b726c12bffd2da6226299a994f49a227f189a859257dea5b53a46afb0f8effa4689e815bf8cce16e4a1e1c00"/64}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x881}, 0x8000) 1.098866702s ago: executing program 6 (id=12467): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000280)={'wg2\x00'}) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(0xffffffffffffffff, 0x10e, 0x1, &(0x7f0000000700)=0xb, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000000)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x51}, 0x94) r4 = creat(&(0x7f00000000c0)='./file0\x00', 0xc9028ba210c11ff0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x8, 0x4, 0x80400, 0x2004, 0x7fc}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f0000000540)={{0x1, 0x1, 0x18, r1, {0x8}}, './file0\x00'}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r7 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000340), 0x0, 0x0) write$P9_RVERSION(r7, &(0x7f0000000500)={0x15, 0x65, 0xffff, 0x4ae4, 0x8, '9P2000.u'}, 0x15) dup(r5) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$ethtool(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKINFO_GET(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000002c0)=ANY=[@ANYBLOB="182a230bc804d33fa3eb4c6bac000000", @ANYRES16=r9, @ANYBLOB="01002bbd7000000000001a00000004000180"], 0x18}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r10}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x2000000000000038, &(0x7f0000000080)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @initr0, @generic={0x65}, @initr0={0x18, 0x0, 0x0, 0x0, 0x20000000}, @exit, @alu={0x4, 0x0, 0xa, 0x3, 0x0, 0x0, 0xfffffffffffffffc}]}, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x45}, 0x94) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r12, 0x8914, &(0x7f0000000040)={'wg2\x00', @multicast}) ppoll(&(0x7f0000000580)=[{r6, 0x40}, {r10, 0x4000}, {r11, 0xc040}, {r0, 0x208}], 0x4, &(0x7f00000005c0)={0x77359400}, &(0x7f0000000600)={[0x3]}, 0x8) 1.064475292s ago: executing program 4 (id=12468): openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x480, 0x0) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x8, [{0x0, 0x2, 0x20}]}, @volatile={0x0, 0x0, 0x0, 0x9, 0x3}, @restrict={0x0, 0x0, 0x0, 0x4}]}}, 0x0, 0x4a}, 0x20) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="00000000010000000000000000000000000000000000000000000000ef8afe4b26a6f431e1a986cb7e73274f8b673e53323c44d4288084f5a26c7e28f7fd4f13aeaab35d3af8ddb3641e6c27f563523ca01cb2f1020b8a273f08a7c3ebb93aa4898a1902a47ef769784b5a90100629dae772e1bab2"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000600)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020a07b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x6f, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000700)='kfree\x00', r1}, 0x18) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000280)='./bus\x00', 0x811400, 0x0, 0xff, 0x0, &(0x7f00000007c0)) rename(&(0x7f0000000180)='./file0\x00', &(0x7f0000000a00)='./bus/file0\x00') bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r2, 0x0, 0x4}, 0x18) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x2, 0x0, 0x7fff0000}]}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0xb}]}) sendto$packet(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e22, @empty}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)={0x14, r5, 0x1, 0x70bd2c, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x20000800}, 0x800) 980.659554ms ago: executing program 6 (id=12469): mq_open(&(0x7f0000000a00)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb\xb8r~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x90\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8M$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xe1(\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xd5j*\xad\x18I\xcc\xe9\xaa{]\xef\xfb\xff\xff\xff\xff\xff\xff\xfft\xd0s\xc4\x04\xe0\xa1\xd2@\x06\xc2`H\xf7\xcc\xe3\xa0\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x00', 0x42, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x5, 0x8}, 0x4e58, 0x5, 0x0, 0x4, 0x87, 0x9, 0xb, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) capset(&(0x7f0000000380)={0x20080522}, &(0x7f0000000040)={0x200000, 0x40200003, 0x0, 0x6, 0x7}) setrlimit(0x40000000000008, &(0x7f0000000080)={0x0, 0x6}) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendmmsg$inet(r1, 0x0, 0x0, 0x4008804) 951.073964ms ago: executing program 6 (id=12471): r0 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x47ff, 0x0, 0x0, 0x5}, 0x10) (async) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000000)={0x47ff, 0x0, 0x0, 0x5}, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000003900)={0x24, 0x16, 0xa01, 0x0, 0x0, {0xa}, [@typed={0x4}, @typed={0xc, 0xa, 0x0, 0x0, @u64}]}, 0x24}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r1) (async) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000700), r1) recvmmsg(r1, &(0x7f0000001a00)=[{{0x0, 0x0, 0x0}, 0xc}], 0x1, 0x60010182, 0x0) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000080)=ANY=[@ANYBLOB="18000000", @ANYRES16=r2, @ANYBLOB="030704707900000000000100040004000180"], 0x18}}, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000900)={'tunl0\x00', &(0x7f0000000a80)={'gre0\x00', 0x0, 0x80, 0x8000, 0x934, 0xee84, {{0x38, 0x4, 0x1, 0x6, 0xe0, 0x67, 0x0, 0x7, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0x43}, @initdev={0xac, 0x1e, 0x0, 0x0}, {[@timestamp_addr={0x44, 0x24, 0x9b, 0x1, 0x2, [{@empty, 0xd5}, {@rand_addr=0x64010101, 0x3}, {@local, 0x5}, {@empty, 0xfff}]}, @lsrr={0x83, 0x13, 0xdf, [@loopback, @multicast2, @broadcast, @dev={0xac, 0x14, 0x14, 0x12}]}, @end, @ssrr={0x89, 0x2b, 0xda, [@loopback, @local, @rand_addr=0x64010102, @remote, @multicast1, @private=0xa010100, @remote, @rand_addr=0x64010100, @multicast2, @empty]}, @timestamp_prespec={0x44, 0x4, 0x79, 0x3, 0xf}, @cipso={0x86, 0x62, 0x5, [{0x1, 0xf, "e4c2d4a5b4b9fead22ea848f5e"}, {0x2, 0x6, "872ffc8b"}, {0x2, 0xa, "d6791fdbc6f084c9"}, {0x1, 0xf, "dc3fb56ca8c63a737fc2ab25d6"}, {0x6, 0x6, "92b581fb"}, {0x6, 0x12, "cbf0eef4c298fdbe0adbbc10c0045fab"}, {0x0, 0x4, "68a2"}, {0x0, 0x12, "1ce61410d679bdd2010c76b319aa8584"}]}]}}}}}) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f0000000d40)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00022dbd7000ffdbdf250e0000002400028004000100080002003a970000080002000700000004000400080002000100000030000180080003000300000008000300030000774a31abf0c0650fdd26b90008000300010000001400020070696d72656731000000000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x20040040) (async) sendmsg$ETHTOOL_MSG_PRIVFLAGS_SET(r0, &(0x7f0000000980)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000940)={&(0x7f0000000d40)=ANY=[@ANYBLOB='h\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="00022dbd7000ffdbdf250e0000002400028004000100080002003a970000080002000700000004000400080002000100000030000180080003000300000008000300030000774a31abf0c0650fdd26b90008000300010000001400020070696d72656731000000000000000000"], 0x68}, 0x1, 0x0, 0x0, 0x10}, 0x20040040) r3 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x36, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280), 0x40900, 0x0) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x5400, 0x0) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) (async) bind$inet(r3, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0xbe, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaa000000119078000000000000000000004e20009c907801000000000000007b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c045942824251d7d17b5191584bcd4fbe40a23424dbcfd56f1375461caaa2f19935e6996c7096ffeeb03000000000000649a3bfbc1f39cb307b3472eb9cdb042d2643fcbb2c5a57df67d544af6e8dafe09"], 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c80)={0x6, 0x3, &(0x7f0000000c40)=ANY=[@ANYRES16=r1], 0x0, 0x3, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000c80)={0x6, 0x3, &(0x7f0000000c40)=ANY=[@ANYRES16=r1], 0x0, 0x3, 0x0, 0x0, 0x0, 0x49, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc}, 0x94) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7}, 0x94) socket$inet_smc(0x2b, 0x1, 0x0) (async) r6 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, 0x0, 0x0) r7 = syz_open_dev$tty1(0xc, 0x4, 0x1) r8 = dup(r7) write$UHID_INPUT(r8, &(0x7f0000002b40)={0xe, {"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", 0x942}}, 0x1006) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000100)={&(0x7f0000000300)=ANY=[@ANYBLOB="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"], 0x60c}, 0x1, 0x0, 0x0, 0x4000000}, 0x14) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abea", 0x1d, 0x11, 0x0, 0x0) (async) sendto$inet(0xffffffffffffffff, &(0x7f00000012c0)="09268a927f1f6588b967481241ba7860fcfaf65ac618ded8974895abea", 0x1d, 0x11, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x2000004e, &(0x7f0000000880)=ANY=[@ANYRES16, @ANYRES8=r4, @ANYRES16], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x2000004e, &(0x7f0000000880)=ANY=[@ANYRES16, @ANYRES8=r4, @ANYRES16], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r5, 0x5, 0xb68, 0xffffffffffffff5d, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) recvmmsg(r3, &(0x7f0000001480)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000380)=""/165, 0x94}], 0x1}, 0x5}], 0x1, 0x10000, 0x0) (async) recvmmsg(r3, &(0x7f0000001480)=[{{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000380)=""/165, 0x94}], 0x1}, 0x5}], 0x1, 0x10000, 0x0) 934.524684ms ago: executing program 4 (id=12472): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000040)=@base={0x1b, 0x0, 0x0, 0x2000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000100)='io_uring_register\x00', r1}, 0x10) r2 = io_uring_setup(0xf08, 0x0) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000000)={&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f000000c000/0x1000)=nil, &(0x7f000001f000/0x1000)=nil, &(0x7f0000015000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f000000c000/0x4000)=nil, &(0x7f000001d000/0x3000)=nil, &(0x7f0000012000/0x4000)=nil, &(0x7f0000ffc000/0x1000)=nil, 0x0}, 0x68) io_uring_register$IORING_REGISTER_FILES(r2, 0x20, &(0x7f0000000000)=[r2], 0x1) 886.180825ms ago: executing program 4 (id=12473): syz_mount_image$vfat(&(0x7f0000000280), &(0x7f0000000000)='./file0\x00', 0x1018000, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0, @ANYRES16, @ANYRES16, @ANYRESOCT, @ANYRES32, @ANYRESDEC], 0x1, 0x2f5, &(0x7f00000004c0)="$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") mkdirat(0xffffffffffffffff, &(0x7f0000000100)='./control\x00', 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000031c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kmem_cache_free\x00', r0, 0x0, 0xfffffffffffffffe}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000003580)=[{{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000380)="a1", 0x1}], 0x1, &(0x7f0000000800)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0000000014"], 0x30, 0x40400d1}}], 0x1, 0x10) pipe(&(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0xa86, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB], 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff000000850000000e000000c500000001f0ffff95"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='mm_page_free\x00', r4, 0x0, 0xd}, 0x18) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r6 = ioctl$LOOP_CTL_GET_FREE(r5, 0x4c82) ioctl$LOOP_CTL_REMOVE(r5, 0x4c81, r6) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x8510, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x2, @perf_bp={0x0, 0xa}, 0x1020, 0x5dd8, 0x0, 0x5, 0x3, 0x8, 0xfffb, 0x0, 0x4000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$ETHTOOL_MSG_CHANNELS_GET(0xffffffffffffffff, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xd4}, 0x24008000) getrandom(&(0x7f0000000240)=""/286, 0xffffff9a, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r7 = creat(&(0x7f0000000080)='./bus\x00', 0x0) write$cgroup_int(r7, &(0x7f0000000540), 0xfffffdd8) madvise(&(0x7f0000000000/0x400000)=nil, 0x40001e, 0x15) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) r8 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r8, 0x402c542d, &(0x7f0000000140)={0x3, 0x7fff, 0x0, 0x400fdff, 0x1, "4ae23ae1179c12747512700bba94224cbad08f", 0x7, 0x2}) ioctl$TIOCSTI(r8, 0x5412, &(0x7f0000000040)=0xba) 720.224078ms ago: executing program 0 (id=12478): r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = dup2(r0, r0) ioctl$BLKTRACESETUP(r1, 0xc0481273, &(0x7f0000000240)={'\x00', 0x40, 0xa, 0x1, 0x40000000, 0x10}) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r4, 0x0, 0xf7}, 0x18) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES64=r1, @ANYRES8=r5, @ANYRESDEC], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) write$selinux_load(0xffffffffffffffff, &(0x7f00000003c0)={0xf97cff8c, 0x8, 'SE Linux', "1ef2bfb61ba7d406"}, 0x18) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r1}, 0x8) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f00000017c0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @multicast1}}}], 0x20}}], 0x1, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x23, &(0x7f0000000740)={@multicast2, @loopback}, 0xc) r8 = socket$netlink(0x10, 0x3, 0x0) writev(r8, &(0x7f00000003c0)=[{&(0x7f0000000180)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) writev(r8, &(0x7f0000000300)=[{&(0x7f00000001c0)="390000001300034700bb5be1c3e4feff06000000010000004500000025000000190004000400ad000d00000000000006040000000000f93132", 0x39}], 0x1) r9 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_mreqn(r9, 0x0, 0x23, &(0x7f0000000080)={@multicast2, @loopback}, 0xc) setsockopt$inet_msfilter(r9, 0x0, 0x29, &(0x7f0000000000)=ANY=[@ANYBLOB="e00000027f"], 0x57) setsockopt$inet_mreqsrc(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000440)={@multicast2, @loopback, @empty}, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00'}, 0x10) 622.317069ms ago: executing program 0 (id=12481): mq_open(&(0x7f0000000a00)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb\xb8r~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x90\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8M$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xe1(\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xd5j*\xad\x18I\xcc\xe9\xaa{]\xef\xfb\xff\xff\xff\xff\xff\xff\xfft\xd0s\xc4\x04\xe0\xa1\xd2@\x06\xc2`H\xf7\xcc\xe3\xa0\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x00', 0x42, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x5, 0x8}, 0x4e58, 0x5, 0x0, 0x4, 0x87, 0x9, 0xb, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) capset(&(0x7f0000000380)={0x20080522}, &(0x7f0000000040)={0x200000, 0x40200003, 0x0, 0x6, 0x7}) setrlimit(0x40000000000008, &(0x7f0000000080)={0x0, 0x6}) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendmmsg$inet(r1, &(0x7f0000000780), 0x0, 0x4008804) 485.471262ms ago: executing program 1 (id=12484): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x9504, &(0x7f0000000100)=[{&(0x7f0000000000)="2b10", 0xffbd}], 0x1, 0x0, 0x0, 0x2c}, 0x4) socket$netlink(0x10, 0x3, 0x8000000004) 484.554171ms ago: executing program 1 (id=12485): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='vm_unmapped_area\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x18) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='vm_unmapped_area\x00', r0}, 0x10) io_setup(0x3, &(0x7f0000000340)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/vmstat\x00', 0x0, 0x0) r2 = syz_io_uring_setup(0x49d, &(0x7f00000003c0)={0x0, 0x79ac, 0x2000, 0x7ffd, 0x32c, 0x0, r1}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x4007, @fd=r1, 0x6, &(0x7f0000000580)=""/207, 0xcf, 0x2, 0x1}) io_uring_enter(r2, 0xfd0, 0x4c1, 0x43, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x18) open_tree(0xffffffffffffff9c, 0x0, 0x89901) syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@multicast, @broadcast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @empty}, {0x2000, 0x88be, 0xc, 0x0, @opaque="6b8b8368"}}}}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r6}, 0x0, &(0x7f00000002c0)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000000)=0xf41, 0x4) sendto$packet(0xffffffffffffffff, &(0x7f0000000240)='\x00', 0x1, 0x800, &(0x7f0000000080)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xfc}}, 0x14) 469.103402ms ago: executing program 8 (id=12486): bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x8}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) socket$netlink(0x10, 0x3, 0x10) socket$rds(0x15, 0x5, 0x0) socket$packet(0x11, 0x3, 0x300) socket$packet(0x11, 0xa, 0x300) socket$packet(0x11, 0xa, 0x300) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x560b0007, &(0x7f0000000000)="259a53f271a76d2608064c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r2 = socket$netlink(0x10, 0x3, 0x0) memfd_create(&(0x7f0000000bc0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x00\x00.\xd4`=z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x80\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xad\b\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc00x0}) sendmsg$nl_route_sched(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=@newqdisc={0x38, 0x24, 0x3fe3aa0262d8c583, 0x0, 0x0, {0x0, 0x0, 0x0, r2, {}, {0xffff, 0xffff}, {0x0, 0xa}}, [@qdisc_kind_options=@q_hhf={{0x8}, {0xc, 0x2, [@TCA_HHF_NON_HH_WEIGHT={0x8}]}}]}, 0x38}, 0x1, 0x0, 0x0, 0x80884}, 0x20000000) 257.521815ms ago: executing program 8 (id=12493): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = socket$inet6(0xa, 0x80002, 0x88) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) r3 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000840), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000008c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000880)={0xffffffffffffffff}, 0x2, 0x9}}, 0x20) write$RDMA_USER_CM_CMD_CONNECT(r3, &(0x7f0000000900)={0x6, 0x118, 0xfa00, {{0x101, 0xa7, "a6e67f5fec8427e5a35a4e1c958b3b32015939564b58eba3f2e9de386f62b2407402cff9daf54a55ae90d05ad50ad2f4a1717558264837d4dfa7e4c4f28079684aba168d474962b610cc94b79b7beea3a500d5f35c216363f214a4f7e59775d056ddb2409823701f97b53c56bed59b3bc935ec1c8882ef919015e0a2b6a770b5d0705d3e74d7baeda5fffd035baa06884634a9a20f8c73d118ebf6dee4c5c4f20e0ba93e3e6095646eb93c90f77defd68951031e2f8bd3c35baa8c2b537e313bbc1735bd13de582f84e7e79e5e0280780c5338a0114eb48e817e6e8f9dd93f30a0497c087a256df9fbf1003a8b1713547826681995da8f9bc1a9fc3327e95bf3", 0x2, 0x2, 0x5, 0x4, 0x63, 0x1, 0x10, 0x1}, r4}}, 0x120) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x10000000004e20, 0x0, @mcast2, 0x6}, 0x1c) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, 0x0, 0x0) setsockopt$inet6_udp_int(r1, 0x11, 0xb, &(0x7f00000000c0), 0x4) syz_emit_ethernet(0x83, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaf9ff030486dd601b8b97004d88c19e9ace5ffb2e9fc603dd282100000002ff02000000000000000000000000000104004e200023"], 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x18) 241.605236ms ago: executing program 8 (id=12494): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100003020702500000000002020207b1af8ff00000000bfa1000000000000070100003affffffb702000008000000b7030000000000a3850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) syz_read_part_table(0x105b, &(0x7f0000000000)="$eJzsz72NwkAUBODx2WtfdDVcSBN0AbUQ8idED3QAAS0Q0gtNgCzjgAIQQvq+ZGe0u0964aPaxWvfnrv+OAytKtVqvJk0acb8m9Ql+cmt+9+tSzJt+1lJrpvj7PnovkxK6lL1Zfxa57L/G2KTzE/v3Q4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAvsMjAAD//wv/C64=") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0, r0}, 0x18) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') writev(r1, &(0x7f00000000c0)=[{&(0x7f0000000040)="dc", 0x1}], 0x8) 209.924486ms ago: executing program 1 (id=12495): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r2, &(0x7f0000000080)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) sendmsg(r2, &(0x7f00000000c0)={0x0, 0x9504, &(0x7f0000000100)=[{&(0x7f0000000000)="2b10", 0xffbd}], 0x1, 0x0, 0x0, 0x2c}, 0x4) socket$netlink(0x10, 0x3, 0x8000000004) 172.262407ms ago: executing program 1 (id=12496): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000640)='X', 0x1, 0x0, &(0x7f000005ffe4)={0xa, 0x0, 0x0, @loopback={0xfec0ffffffffffff, 0x1c9ae7fffe9a6f34}}, 0x1c) recvmsg(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0}, 0x10002) setsockopt$inet_sctp6_SCTP_EVENTS(r0, 0x84, 0xb, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88, 0x1, 0x0, 0x3}, 0xe) setsockopt$inet_sctp6_SCTP_RECVRCVINFO(r0, 0x84, 0x20, &(0x7f0000000400)=0x6, 0x4) shutdown(r0, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="01000000030000000200000004"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000008900000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000fdffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000000000000850000007500000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.current\x00', 0x275a, 0x0) write$cgroup_int(r4, &(0x7f0000000100), 0x1001) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b00)={&(0x7f0000000ac0)='mm_page_free_batched\x00', r3}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.current\x00', 0x275a, 0x0) 80.755918ms ago: executing program 8 (id=12497): mq_open(&(0x7f0000000a00)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb\xb8r~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x90\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8M$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xe1(\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xd5j*\xad\x18I\xcc\xe9\xaa{]\xef\xfb\xff\xff\xff\xff\xff\xff\xfft\xd0s\xc4\x04\xe0\xa1\xd2@\x06\xc2`H\xf7\xcc\xe3\xa0\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x00', 0x42, 0x0, 0x0) perf_event_open(&(0x7f0000000580)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, @perf_config_ext={0x5, 0x8}, 0x4e58, 0x5, 0x0, 0x4, 0x87, 0x9, 0xb, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x41100}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) capset(&(0x7f0000000380)={0x20080522}, &(0x7f0000000040)={0x200000, 0x40200003, 0x0, 0x6, 0x7}) setrlimit(0x40000000000008, &(0x7f0000000080)={0x0, 0x6}) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_int(r1, 0x1, 0x3c, &(0x7f00000000c0)=0x1, 0x4) sendmmsg$inet(r1, &(0x7f0000000780), 0x0, 0x4008804) 46.314839ms ago: executing program 8 (id=12498): bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000300)='grpquota'}, 0x30) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={@ifindex, 0xffffffffffffffff, 0x13}, 0x20) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x38, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, @perf_bp={0x0}, 0x10238d, 0x10003, 0x1, 0x1, 0x8, 0x21005, 0x2b, 0x0, 0x0, 0x0, 0xffffffffffffff7f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) gettid() r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) preadv2(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000000)=""/167, 0xa7}], 0x1, 0x0, 0x4, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000ab9ff0)={0x1, &(0x7f0000000000)=[{0x6, 0xf}]}, 0x10) openat$nci(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) 27.010359ms ago: executing program 1 (id=12499): mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xc, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000040)='.\x00', 0x1000080, &(0x7f0000000000), 0x3, 0x4ef, &(0x7f00000006c0)="$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") r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='percpu_alloc_percpu\x00', r2}, 0x10) syz_io_uring_setup(0x111, &(0x7f0000000340)={0x0, 0x0, 0x2, 0x4, 0x1e1}, 0x0, 0x0) 0s ago: executing program 4 (id=12500): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='vm_unmapped_area\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffc}, 0x18) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='vm_unmapped_area\x00', r0}, 0x10) io_setup(0x3, &(0x7f0000000340)) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000380)='/proc/vmstat\x00', 0x0, 0x0) r2 = syz_io_uring_setup(0x49d, &(0x7f00000003c0)={0x0, 0x79ac, 0x2000, 0x7ffd, 0x32c, 0x0, r1}, &(0x7f0000000340)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x4007, @fd=r1, 0x6, &(0x7f0000000580)=""/207, 0xcf, 0x2, 0x1}) io_uring_enter(r2, 0xfd0, 0x4c1, 0x43, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x1, 0x0, 0x7ffc1ffb}]}) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000de0000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x18) open_tree(0xffffffffffffff9c, 0x0, 0x89901) syz_emit_ethernet(0x2e, &(0x7f00000000c0)={@multicast, @broadcast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2f, 0x0, @rand_addr, @empty}, {0x2000, 0x88be, 0xc, 0x0, @opaque="6b8b8368"}}}}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000580)={{r6}, 0x0, &(0x7f00000002c0)}, 0x20) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wg1\x00', 0x0}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x14, &(0x7f0000000000)=0xf41, 0x4) sendto$packet(0xffffffffffffffff, &(0x7f0000000240)='\x00', 0x1, 0x800, &(0x7f0000000080)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @dev={'\xaa\xaa\xaa\xaa\xaa', 0xfc}}, 0x14) kernel console output (not intermixed with test programs): _slave_1) entered forwarding state [ 916.873733][ T5566] FAULT_INJECTION: forcing a failure. [ 916.873733][ T5566] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 916.886992][ T5566] CPU: 0 UID: 0 PID: 5566 Comm: syz.0.11604 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 916.887061][ T5566] Tainted: [W]=WARN [ 916.887103][ T5566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 916.887116][ T5566] Call Trace: [ 916.887123][ T5566] [ 916.887132][ T5566] __dump_stack+0x1d/0x30 [ 916.887235][ T5566] dump_stack_lvl+0xe8/0x140 [ 916.887253][ T5566] dump_stack+0x15/0x1b [ 916.887273][ T5566] should_fail_ex+0x265/0x280 [ 916.887302][ T5566] should_fail+0xb/0x20 [ 916.887332][ T5566] should_fail_usercopy+0x1a/0x20 [ 916.887398][ T5566] _copy_to_user+0x20/0xa0 [ 916.887419][ T5566] simple_read_from_buffer+0xb5/0x130 [ 916.887450][ T5566] proc_fail_nth_read+0x100/0x140 [ 916.887542][ T5566] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 916.887575][ T5566] vfs_read+0x1a0/0x6f0 [ 916.887666][ T5566] ? __rcu_read_unlock+0x4f/0x70 [ 916.887689][ T5566] ? __fget_files+0x184/0x1c0 [ 916.887708][ T5566] ksys_read+0xda/0x1a0 [ 916.887740][ T5566] __x64_sys_read+0x40/0x50 [ 916.887798][ T5566] x64_sys_call+0x2d77/0x2fb0 [ 916.887873][ T5566] do_syscall_64+0xd2/0x200 [ 916.887890][ T5566] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 916.887914][ T5566] ? clear_bhb_loop+0x40/0x90 [ 916.887934][ T5566] ? clear_bhb_loop+0x40/0x90 [ 916.887974][ T5566] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 916.887994][ T5566] RIP: 0033:0x7f3c9e45d3bc [ 916.888010][ T5566] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 916.888030][ T5566] RSP: 002b:00007f3c9cac7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 916.888051][ T5566] RAX: ffffffffffffffda RBX: 00007f3c9e685fa0 RCX: 00007f3c9e45d3bc [ 916.888064][ T5566] RDX: 000000000000000f RSI: 00007f3c9cac70a0 RDI: 0000000000000005 [ 916.888076][ T5566] RBP: 00007f3c9cac7090 R08: 0000000000000000 R09: 0000000000000000 [ 916.888087][ T5566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 916.888098][ T5566] R13: 0000000000000000 R14: 00007f3c9e685fa0 R15: 00007ffee847d448 [ 916.888149][ T5566] [ 917.141476][ T5572] IPv4: Oversized IP packet from 127.202.26.0 [ 917.171999][ T5468] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 917.403286][ T5468] veth0_vlan: entered promiscuous mode [ 917.428637][ T5468] veth1_vlan: entered promiscuous mode [ 917.446990][ T5468] veth0_macvtap: entered promiscuous mode [ 917.468561][ T5468] veth1_macvtap: entered promiscuous mode [ 917.497218][ T5468] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 917.509622][ T5606] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 917.518438][ T5468] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 917.531114][ T5606] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 917.542814][ T5468] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 917.551856][ T5468] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 917.560645][ T5468] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 917.569540][ T5468] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 917.618791][ T5616] IPv4: Oversized IP packet from 127.202.26.0 [ 918.063335][ T5631] pim6reg1: entered promiscuous mode [ 918.068843][ T5631] pim6reg1: entered allmulticast mode [ 918.211803][ T5642] netlink: 'syz.8.11623': attribute type 1 has an invalid length. [ 918.234223][ T5641] netlink: 60 bytes leftover after parsing attributes in process `syz.3.11624'. [ 918.258522][ T5642] 8021q: adding VLAN 0 to HW filter on device bond1 [ 918.702467][ T5660] IPv4: Oversized IP packet from 127.202.26.0 [ 918.778032][ T5664] FAULT_INJECTION: forcing a failure. [ 918.778032][ T5664] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 918.791238][ T5664] CPU: 0 UID: 0 PID: 5664 Comm: syz.8.11631 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 918.791267][ T5664] Tainted: [W]=WARN [ 918.791274][ T5664] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 918.791288][ T5664] Call Trace: [ 918.791296][ T5664] [ 918.791345][ T5664] __dump_stack+0x1d/0x30 [ 918.791367][ T5664] dump_stack_lvl+0xe8/0x140 [ 918.791388][ T5664] dump_stack+0x15/0x1b [ 918.791407][ T5664] should_fail_ex+0x265/0x280 [ 918.791483][ T5664] should_fail+0xb/0x20 [ 918.791564][ T5664] should_fail_usercopy+0x1a/0x20 [ 918.791670][ T5664] _copy_from_user+0x1c/0xb0 [ 918.791741][ T5664] ___sys_sendmsg+0xc1/0x1d0 [ 918.791772][ T5664] __x64_sys_sendmsg+0xd4/0x160 [ 918.791797][ T5664] x64_sys_call+0x2999/0x2fb0 [ 918.791827][ T5664] do_syscall_64+0xd2/0x200 [ 918.791853][ T5664] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 918.791895][ T5664] ? clear_bhb_loop+0x40/0x90 [ 918.791950][ T5664] ? clear_bhb_loop+0x40/0x90 [ 918.791970][ T5664] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 918.791989][ T5664] RIP: 0033:0x7f2b9e8be9a9 [ 918.792002][ T5664] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 918.792079][ T5664] RSP: 002b:00007f2b9cf1f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 918.792111][ T5664] RAX: ffffffffffffffda RBX: 00007f2b9eae5fa0 RCX: 00007f2b9e8be9a9 [ 918.792124][ T5664] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000003 [ 918.792138][ T5664] RBP: 00007f2b9cf1f090 R08: 0000000000000000 R09: 0000000000000000 [ 918.792151][ T5664] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 918.792162][ T5664] R13: 0000000000000000 R14: 00007f2b9eae5fa0 R15: 00007ffde4546598 [ 918.792180][ T5664] [ 919.130375][ T5674] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 919.144843][ T5674] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 919.274597][ T5694] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=20 sclass=netlink_audit_socket pid=5694 comm=syz.4.11639 [ 919.547974][ T5703] FAULT_INJECTION: forcing a failure. [ 919.547974][ T5703] name failslab, interval 1, probability 0, space 0, times 0 [ 919.560858][ T5703] CPU: 0 UID: 0 PID: 5703 Comm: syz.4.11643 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 919.560951][ T5703] Tainted: [W]=WARN [ 919.560957][ T5703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 919.560973][ T5703] Call Trace: [ 919.560980][ T5703] [ 919.560988][ T5703] __dump_stack+0x1d/0x30 [ 919.561011][ T5703] dump_stack_lvl+0xe8/0x140 [ 919.561030][ T5703] dump_stack+0x15/0x1b [ 919.561104][ T5703] should_fail_ex+0x265/0x280 [ 919.561134][ T5703] ? nl80211_prepare_wdev_dump+0x16b/0x3b0 [ 919.561233][ T5703] should_failslab+0x8c/0xb0 [ 919.561253][ T5703] __kmalloc_cache_noprof+0x4c/0x320 [ 919.561349][ T5703] nl80211_prepare_wdev_dump+0x16b/0x3b0 [ 919.561384][ T5703] nl80211_dump_mpath+0x93/0x430 [ 919.561413][ T5703] ? __alloc_skb+0x1b2/0x320 [ 919.561487][ T5703] genl_dumpit+0xac/0x110 [ 919.561511][ T5703] netlink_dump+0x448/0x850 [ 919.561550][ T5703] __netlink_dump_start+0x43e/0x520 [ 919.561603][ T5703] genl_family_rcv_msg_dumpit+0x115/0x180 [ 919.561629][ T5703] ? __pfx_genl_start+0x10/0x10 [ 919.561661][ T5703] ? __pfx_genl_dumpit+0x10/0x10 [ 919.561774][ T5703] ? __pfx_genl_done+0x10/0x10 [ 919.561813][ T5703] genl_rcv_msg+0x3f0/0x460 [ 919.561841][ T5703] ? __pfx_nl80211_dump_mpath+0x10/0x10 [ 919.561874][ T5703] netlink_rcv_skb+0x123/0x220 [ 919.561986][ T5703] ? __pfx_genl_rcv_msg+0x10/0x10 [ 919.562014][ T5703] genl_rcv+0x28/0x40 [ 919.562034][ T5703] netlink_unicast+0x5a8/0x680 [ 919.562091][ T5703] netlink_sendmsg+0x58b/0x6b0 [ 919.562138][ T5703] ? __pfx_netlink_sendmsg+0x10/0x10 [ 919.562156][ T5703] __sock_sendmsg+0x142/0x180 [ 919.562184][ T5703] ____sys_sendmsg+0x31e/0x4e0 [ 919.562207][ T5703] ___sys_sendmsg+0x17b/0x1d0 [ 919.562235][ T5703] __x64_sys_sendmsg+0xd4/0x160 [ 919.562276][ T5703] x64_sys_call+0x2999/0x2fb0 [ 919.562295][ T5703] do_syscall_64+0xd2/0x200 [ 919.562313][ T5703] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 919.562343][ T5703] ? clear_bhb_loop+0x40/0x90 [ 919.562437][ T5703] ? clear_bhb_loop+0x40/0x90 [ 919.562460][ T5703] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 919.562483][ T5703] RIP: 0033:0x7fd81eaae9a9 [ 919.562498][ T5703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 919.562517][ T5703] RSP: 002b:00007fd81d117038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 919.562551][ T5703] RAX: ffffffffffffffda RBX: 00007fd81ecd5fa0 RCX: 00007fd81eaae9a9 [ 919.562565][ T5703] RDX: 0000000000000000 RSI: 0000200000000340 RDI: 0000000000000005 [ 919.562577][ T5703] RBP: 00007fd81d117090 R08: 0000000000000000 R09: 0000000000000000 [ 919.562588][ T5703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 919.562662][ T5703] R13: 0000000000000000 R14: 00007fd81ecd5fa0 R15: 00007ffc76c338a8 [ 919.562679][ T5703] [ 920.040500][ T5721] netlink: 96 bytes leftover after parsing attributes in process `syz.6.11651'. [ 920.055329][ T5722] x_tables: ip6_tables: tcpmss match: only valid for protocol 6 [ 920.082949][ T29] kauditd_printk_skb: 222 callbacks suppressed [ 920.083087][ T29] audit: type=1400 audit(1754276298.214:18790): avc: denied { create } for pid=5713 comm="syz.8.11648" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 920.151527][ T5731] sch_fq: defrate 0 ignored. [ 920.156280][ T29] audit: type=1400 audit(1754276298.284:18791): avc: denied { ioctl } for pid=5730 comm="syz.6.11655" path="/dev/rtc0" dev="devtmpfs" ino=244 ioctlcmd=0x700b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 920.185275][ T5733] FAULT_INJECTION: forcing a failure. [ 920.185275][ T5733] name failslab, interval 1, probability 0, space 0, times 0 [ 920.198165][ T5733] CPU: 1 UID: 0 PID: 5733 Comm: syz.8.11656 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 920.198194][ T5733] Tainted: [W]=WARN [ 920.198200][ T5733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 920.198227][ T5733] Call Trace: [ 920.198235][ T5733] [ 920.198243][ T5733] __dump_stack+0x1d/0x30 [ 920.198279][ T5733] dump_stack_lvl+0xe8/0x140 [ 920.198299][ T5733] dump_stack+0x15/0x1b [ 920.198318][ T5733] should_fail_ex+0x265/0x280 [ 920.198351][ T5733] should_failslab+0x8c/0xb0 [ 920.198376][ T5733] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 920.198452][ T5733] ? sidtab_sid2str_get+0xa0/0x130 [ 920.198476][ T5733] kmemdup_noprof+0x2b/0x70 [ 920.198497][ T5733] sidtab_sid2str_get+0xa0/0x130 [ 920.198519][ T5733] security_sid_to_context_core+0x1eb/0x2e0 [ 920.198582][ T5733] security_sid_to_context+0x27/0x40 [ 920.198601][ T5733] selinux_lsmprop_to_secctx+0x67/0xf0 [ 920.198622][ T5733] security_lsmprop_to_secctx+0x43/0x80 [ 920.198655][ T5733] audit_log_task_context+0x77/0x190 [ 920.198754][ T5733] audit_log_task+0xf4/0x250 [ 920.198783][ T5733] audit_seccomp+0x61/0x100 [ 920.198809][ T5733] ? __seccomp_filter+0x68c/0x10d0 [ 920.198834][ T5733] __seccomp_filter+0x69d/0x10d0 [ 920.198859][ T5733] ? do_unlinkat+0x47e/0x4c0 [ 920.198980][ T5733] ? mntput_no_expire+0x6f/0x3c0 [ 920.199007][ T5733] ? do_unlinkat+0x47e/0x4c0 [ 920.199039][ T5733] ? kmem_cache_free+0xdf/0x300 [ 920.199129][ T5733] __secure_computing+0x82/0x150 [ 920.199187][ T5733] syscall_trace_enter+0xcf/0x1e0 [ 920.199257][ T5733] do_syscall_64+0xac/0x200 [ 920.199275][ T5733] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 920.199298][ T5733] ? clear_bhb_loop+0x40/0x90 [ 920.199337][ T5733] ? clear_bhb_loop+0x40/0x90 [ 920.199362][ T5733] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 920.199391][ T5733] RIP: 0033:0x7f2b9e8bd3bc [ 920.199405][ T5733] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 920.199421][ T5733] RSP: 002b:00007f2b9cf1f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 920.199438][ T5733] RAX: ffffffffffffffda RBX: 00007f2b9eae5fa0 RCX: 00007f2b9e8bd3bc [ 920.199453][ T5733] RDX: 000000000000000f RSI: 00007f2b9cf1f0a0 RDI: 0000000000000006 [ 920.199466][ T5733] RBP: 00007f2b9cf1f090 R08: 0000000000000000 R09: 0000000000000000 [ 920.199477][ T5733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 920.199535][ T5733] R13: 0000000000000000 R14: 00007f2b9eae5fa0 R15: 00007ffde4546598 [ 920.199556][ T5733] [ 920.199565][ T5733] audit: error in audit_log_task_context [ 920.308144][ T29] audit: type=1326 audit(1754276298.314:18792): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5732 comm="syz.8.11656" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 920.483541][ T29] audit: type=1326 audit(1754276298.314:18793): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5732 comm="syz.8.11656" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 920.507263][ T29] audit: type=1326 audit(1754276298.314:18794): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5732 comm="syz.8.11656" exe="/root/syz-executor" sig=0 arch=c000003e syscall=258 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 920.531554][ T29] audit: type=1326 audit(1754276298.314:18795): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5732 comm="syz.8.11656" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 920.555096][ T29] audit: type=1326 audit(1754276298.314:18796): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5732 comm="syz.8.11656" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 920.578758][ T29] audit: type=1326 audit(1754276298.314:18797): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5732 comm="syz.8.11656" exe="/root/syz-executor" sig=0 arch=c000003e syscall=85 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 920.602531][ T29] audit: type=1326 audit(1754276298.314:18798): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5732 comm="syz.8.11656" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 920.650656][ T5739] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 920.660699][ T5739] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 920.670968][ T5748] netlink: 16 bytes leftover after parsing attributes in process `syz.3.11661'. [ 920.703592][ T5752] bridge: RTM_NEWNEIGH bridge0 without NUD_PERMANENT [ 920.806539][ T5768] sch_fq: defrate 0 ignored. [ 921.149076][ T5781] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 921.194964][ T5781] netlink: 48 bytes leftover after parsing attributes in process `syz.4.11676'. [ 921.344973][ T5792] netlink: 48 bytes leftover after parsing attributes in process `syz.6.11681'. [ 921.352172][ T5787] bond1: entered promiscuous mode [ 921.359107][ T5787] bond1: entered allmulticast mode [ 921.372371][ T5787] 8021q: adding VLAN 0 to HW filter on device bond1 [ 921.392106][ T5787] bond1 (unregistering): Released all slaves [ 921.412608][ T5793] netlink: 'syz.4.11680': attribute type 3 has an invalid length. [ 921.454385][ T5793] netlink: 'syz.4.11680': attribute type 3 has an invalid length. [ 921.474793][ T5793] netlink: 'syz.4.11680': attribute type 3 has an invalid length. [ 921.496793][ T5793] netlink: 'syz.4.11680': attribute type 3 has an invalid length. [ 921.516717][ T5801] random: crng reseeded on system resumption [ 921.519837][ T5793] netlink: 'syz.4.11680': attribute type 3 has an invalid length. [ 921.565426][ T5793] netlink: 'syz.4.11680': attribute type 3 has an invalid length. [ 921.591962][ T5793] netlink: 'syz.4.11680': attribute type 3 has an invalid length. [ 921.630272][ T5793] netlink: 'syz.4.11680': attribute type 3 has an invalid length. [ 921.659970][ T5793] netlink: 'syz.4.11680': attribute type 3 has an invalid length. [ 921.680404][ T5793] netlink: 'syz.4.11680': attribute type 3 has an invalid length. [ 921.730014][ T5819] geneve1: entered promiscuous mode [ 921.747781][ T5819] bond0: (slave geneve1): Enslaving as an active interface with an up link [ 921.768066][ T5817] atomic_op ffff88810a4cdd28 conn xmit_atomic 0000000000000000 [ 921.791016][ T5819] syzkaller1: entered promiscuous mode [ 921.791037][ T5819] syzkaller1: entered allmulticast mode [ 921.836167][ T5827] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11691'. [ 921.856281][ T5827] syzkaller1: entered promiscuous mode [ 921.861956][ T5827] syzkaller1: entered allmulticast mode [ 921.992142][ T5845] netlink: 240 bytes leftover after parsing attributes in process `syz.4.11704'. [ 922.014923][ T5843] sch_fq: defrate 0 ignored. [ 922.088312][ T5856] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 922.132230][ T5860] netlink: 12 bytes leftover after parsing attributes in process `syz.4.11704'. [ 922.221455][ T5856] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 922.372833][ T5856] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 922.530614][ T5856] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 922.684350][ T5856] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 922.783356][ T5856] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 922.847910][ T5856] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 922.888619][ T5856] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 922.928361][ T5883] SELinux: Context : is not valid (left unmapped). [ 923.594673][ T5913] netlink: 52 bytes leftover after parsing attributes in process `syz.8.11727'. [ 923.785396][ T5924] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11734'. [ 923.955106][ T5930] bond0: (slave team0): Releasing backup interface [ 923.993389][ T5930] bridge_slave_0: left allmulticast mode [ 923.999228][ T5930] bridge_slave_0: left promiscuous mode [ 924.004903][ T5930] bridge0: port 1(bridge_slave_0) entered disabled state [ 924.016656][ T5943] netlink: 52 bytes leftover after parsing attributes in process `syz.6.11741'. [ 924.038291][ T5930] bridge_slave_1: left allmulticast mode [ 924.044086][ T5930] bridge_slave_1: left promiscuous mode [ 924.049852][ T5930] bridge0: port 2(bridge_slave_1) entered disabled state [ 924.078796][ T5930] bond0: (slave bond_slave_0): Releasing backup interface [ 924.097179][ T5930] bond0: (slave bond_slave_1): Releasing backup interface [ 924.124409][ T5930] team0: Port device team_slave_0 removed [ 924.136479][ T5930] team0: Port device team_slave_1 removed [ 924.160727][ T5930] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 924.168364][ T5930] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 924.222465][ T5930] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 924.229953][ T5930] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 924.310111][ T5935] team0: Mode changed to "loadbalance" [ 924.352144][ T5956] tipc: Started in network mode [ 924.357214][ T5956] tipc: Node identity aaaaaaaaaa1a, cluster identity 4711 [ 924.364472][ T5956] tipc: Enabled bearer , priority 0 [ 924.403290][ T5948] vlan0: entered promiscuous mode [ 924.423078][ T5948] team0: Port device vlan0 added [ 924.675633][ T5972] FAULT_INJECTION: forcing a failure. [ 924.675633][ T5972] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 924.688969][ T5972] CPU: 1 UID: 0 PID: 5972 Comm: syz.8.11750 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 924.689072][ T5972] Tainted: [W]=WARN [ 924.689077][ T5972] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 924.689088][ T5972] Call Trace: [ 924.689093][ T5972] [ 924.689099][ T5972] __dump_stack+0x1d/0x30 [ 924.689188][ T5972] dump_stack_lvl+0xe8/0x140 [ 924.689273][ T5972] dump_stack+0x15/0x1b [ 924.689287][ T5972] should_fail_ex+0x265/0x280 [ 924.689332][ T5972] should_fail+0xb/0x20 [ 924.689435][ T5972] should_fail_usercopy+0x1a/0x20 [ 924.689541][ T5972] _copy_from_user+0x1c/0xb0 [ 924.689619][ T5972] __sys_connect+0xd0/0x2b0 [ 924.689649][ T5972] __x64_sys_connect+0x3f/0x50 [ 924.689674][ T5972] x64_sys_call+0x1daa/0x2fb0 [ 924.689719][ T5972] do_syscall_64+0xd2/0x200 [ 924.689736][ T5972] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 924.689758][ T5972] ? clear_bhb_loop+0x40/0x90 [ 924.689777][ T5972] ? clear_bhb_loop+0x40/0x90 [ 924.689836][ T5972] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 924.689854][ T5972] RIP: 0033:0x7f2b9e8be9a9 [ 924.689868][ T5972] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 924.689890][ T5972] RSP: 002b:00007f2b9cf1f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 924.689907][ T5972] RAX: ffffffffffffffda RBX: 00007f2b9eae5fa0 RCX: 00007f2b9e8be9a9 [ 924.689917][ T5972] RDX: 0000000000000010 RSI: 0000200000000240 RDI: 0000000000000005 [ 924.689928][ T5972] RBP: 00007f2b9cf1f090 R08: 0000000000000000 R09: 0000000000000000 [ 924.689939][ T5972] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 924.689949][ T5972] R13: 0000000000000000 R14: 00007f2b9eae5fa0 R15: 00007ffde4546598 [ 924.689964][ T5972] [ 925.140426][ T6003] __nla_validate_parse: 2 callbacks suppressed [ 925.140463][ T6003] netlink: 4 bytes leftover after parsing attributes in process `syz.8.11762'. [ 925.185102][ T6003] syzkaller1: entered promiscuous mode [ 925.190627][ T6003] syzkaller1: entered allmulticast mode [ 925.241609][ T6005] netlink: 24 bytes leftover after parsing attributes in process `syz.6.11763'. [ 925.332580][ T6007] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 925.352705][ T6008] netlink: 8 bytes leftover after parsing attributes in process `syz.8.11764'. [ 925.361809][ T6008] netlink: 8 bytes leftover after parsing attributes in process `syz.8.11764'. [ 925.381705][ T6009] netlink: 12 bytes leftover after parsing attributes in process `syz.6.11763'. [ 925.392313][ T6007] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 925.430076][ T3620] tipc: Node number set to 11578026 [ 925.439904][ T6007] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 925.486305][ T29] kauditd_printk_skb: 200 callbacks suppressed [ 925.486321][ T29] audit: type=1326 audit(1754276303.607:18999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6010 comm="syz.8.11765" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2b9e8b5967 code=0x7ffc0000 [ 925.516030][ T29] audit: type=1326 audit(1754276303.607:19000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6010 comm="syz.8.11765" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f2b9e85ab89 code=0x7ffc0000 [ 925.539760][ T29] audit: type=1326 audit(1754276303.607:19001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6010 comm="syz.8.11765" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2b9e8b5967 code=0x7ffc0000 [ 925.563448][ T29] audit: type=1326 audit(1754276303.607:19002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6010 comm="syz.8.11765" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f2b9e85ab89 code=0x7ffc0000 [ 925.587222][ T29] audit: type=1326 audit(1754276303.607:19003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6010 comm="syz.8.11765" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 925.610937][ T29] audit: type=1326 audit(1754276303.607:19004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6010 comm="syz.8.11765" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 925.639610][ T6007] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 925.660341][ T6013] tipc: Invalid UDP bearer configuration [ 925.660356][ T6013] tipc: Enabling of bearer rejected, failed to enable media [ 925.949176][ T6007] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 926.044472][ T6007] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 926.123893][ T6007] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 926.137216][ T29] audit: type=1326 audit(1754276303.607:19005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6010 comm="syz.8.11765" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 926.160918][ T29] audit: type=1326 audit(1754276303.607:19006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6010 comm="syz.8.11765" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2b9e8b5967 code=0x7ffc0000 [ 926.184430][ T29] audit: type=1326 audit(1754276303.607:19007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6010 comm="syz.8.11765" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f2b9e85ab89 code=0x7ffc0000 [ 926.200481][ T6007] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 926.208231][ T29] audit: type=1326 audit(1754276303.607:19008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6010 comm="syz.8.11765" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2b9e8b5967 code=0x7ffc0000 [ 926.299979][ T6022] RDS: rds_bind could not find a transport for ::ffff:172.20.20.187, load rds_tcp or rds_rdma? [ 926.618536][ T6068] netlink: 4 bytes leftover after parsing attributes in process `syz.3.11783'. [ 926.645300][ T6068] netlink: 12 bytes leftover after parsing attributes in process `syz.3.11783'. [ 926.744049][ T6076] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00aa with DS=0x19 [ 927.425589][ T6109] sch_fq: defrate 0 ignored. [ 927.453547][ T6111] : renamed from bond0 (while UP) [ 927.493055][ T6119] FAULT_INJECTION: forcing a failure. [ 927.493055][ T6119] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 927.506292][ T6119] CPU: 0 UID: 0 PID: 6119 Comm: syz.4.11806 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 927.506392][ T6119] Tainted: [W]=WARN [ 927.506398][ T6119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 927.506408][ T6119] Call Trace: [ 927.506414][ T6119] [ 927.506421][ T6119] __dump_stack+0x1d/0x30 [ 927.506441][ T6119] dump_stack_lvl+0xe8/0x140 [ 927.506537][ T6119] dump_stack+0x15/0x1b [ 927.506555][ T6119] should_fail_ex+0x265/0x280 [ 927.506583][ T6119] should_fail+0xb/0x20 [ 927.506661][ T6119] should_fail_usercopy+0x1a/0x20 [ 927.506735][ T6119] _copy_to_user+0x20/0xa0 [ 927.506753][ T6119] simple_read_from_buffer+0xb5/0x130 [ 927.506860][ T6119] proc_fail_nth_read+0x100/0x140 [ 927.506890][ T6119] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 927.507023][ T6119] vfs_read+0x1a0/0x6f0 [ 927.507079][ T6119] ? __rcu_read_unlock+0x4f/0x70 [ 927.507126][ T6119] ? __fget_files+0x184/0x1c0 [ 927.507139][ T6119] ksys_read+0xda/0x1a0 [ 927.507156][ T6119] __x64_sys_read+0x40/0x50 [ 927.507173][ T6119] x64_sys_call+0x2d77/0x2fb0 [ 927.507324][ T6119] do_syscall_64+0xd2/0x200 [ 927.507416][ T6119] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 927.507431][ T6119] ? clear_bhb_loop+0x40/0x90 [ 927.507443][ T6119] ? clear_bhb_loop+0x40/0x90 [ 927.507455][ T6119] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 927.507528][ T6119] RIP: 0033:0x7fd81eaad3bc [ 927.507538][ T6119] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 927.507548][ T6119] RSP: 002b:00007fd81d117030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 927.507560][ T6119] RAX: ffffffffffffffda RBX: 00007fd81ecd5fa0 RCX: 00007fd81eaad3bc [ 927.507582][ T6119] RDX: 000000000000000f RSI: 00007fd81d1170a0 RDI: 0000000000000007 [ 927.507590][ T6119] RBP: 00007fd81d117090 R08: 0000000000000000 R09: 0000000000000000 [ 927.507597][ T6119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 927.507604][ T6119] R13: 0000000000000000 R14: 00007fd81ecd5fa0 R15: 00007ffc76c338a8 [ 927.507614][ T6119] [ 927.764936][ T6125] netlink: 4 bytes leftover after parsing attributes in process `syz.8.11808'. [ 927.798889][ T6125] netlink: 4 bytes leftover after parsing attributes in process `syz.8.11808'. [ 927.840870][ T6137] netlink: 212 bytes leftover after parsing attributes in process `syz.4.11813'. [ 928.052030][ T6155] FAULT_INJECTION: forcing a failure. [ 928.052030][ T6155] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 928.065178][ T6155] CPU: 0 UID: 0 PID: 6155 Comm: syz.6.11820 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 928.065249][ T6155] Tainted: [W]=WARN [ 928.065255][ T6155] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 928.065266][ T6155] Call Trace: [ 928.065273][ T6155] [ 928.065280][ T6155] __dump_stack+0x1d/0x30 [ 928.065340][ T6155] dump_stack_lvl+0xe8/0x140 [ 928.065357][ T6155] dump_stack+0x15/0x1b [ 928.065372][ T6155] should_fail_ex+0x265/0x280 [ 928.065400][ T6155] should_fail+0xb/0x20 [ 928.065427][ T6155] should_fail_usercopy+0x1a/0x20 [ 928.065460][ T6155] _copy_to_user+0x20/0xa0 [ 928.065480][ T6155] simple_read_from_buffer+0xb5/0x130 [ 928.065518][ T6155] proc_fail_nth_read+0x100/0x140 [ 928.065553][ T6155] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 928.065581][ T6155] vfs_read+0x1a0/0x6f0 [ 928.065658][ T6155] ? __rcu_read_unlock+0x4f/0x70 [ 928.065679][ T6155] ? __fget_files+0x184/0x1c0 [ 928.065745][ T6155] ksys_read+0xda/0x1a0 [ 928.065775][ T6155] __x64_sys_read+0x40/0x50 [ 928.065802][ T6155] x64_sys_call+0x2d77/0x2fb0 [ 928.065822][ T6155] do_syscall_64+0xd2/0x200 [ 928.065855][ T6155] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 928.065928][ T6155] ? clear_bhb_loop+0x40/0x90 [ 928.065949][ T6155] ? clear_bhb_loop+0x40/0x90 [ 928.065969][ T6155] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 928.066015][ T6155] RIP: 0033:0x7fe37261d3bc [ 928.066055][ T6155] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 928.066074][ T6155] RSP: 002b:00007fe370c7f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 928.066094][ T6155] RAX: ffffffffffffffda RBX: 00007fe372845fa0 RCX: 00007fe37261d3bc [ 928.066158][ T6155] RDX: 000000000000000f RSI: 00007fe370c7f0a0 RDI: 0000000000000005 [ 928.066169][ T6155] RBP: 00007fe370c7f090 R08: 0000000000000000 R09: 0000000000000000 [ 928.066180][ T6155] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 928.066192][ T6155] R13: 0000000000000000 R14: 00007fe372845fa0 R15: 00007ffe23329a88 [ 928.066278][ T6155] [ 928.400275][ T6166] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00aa with DS=0x19 [ 928.924337][ T6191] IPv4: Oversized IP packet from 127.202.26.0 [ 929.572888][ T6213] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 929.581434][ T6213] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 930.391535][ T6229] validate_nla: 50 callbacks suppressed [ 930.391550][ T6229] netlink: 'syz.4.11846': attribute type 1 has an invalid length. [ 930.503318][ T6234] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00aa with DS=0x19 [ 930.571312][ T29] kauditd_printk_skb: 333 callbacks suppressed [ 930.571325][ T29] audit: type=1400 audit(1754276308.693:19342): avc: denied { watch watch_reads } for pid=6242 comm="syz.6.11852" path="/561" dev="tmpfs" ino=3009 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 930.655486][ T6243] team_slave_0: left promiscuous mode [ 930.661053][ T6243] team_slave_0: left allmulticast mode [ 930.683994][ T6243] team0: Port device team_slave_0 removed [ 930.707852][ T6243] team_slave_1: left promiscuous mode [ 930.713560][ T6243] team_slave_1: left allmulticast mode [ 930.740984][ T6243] team0: Port device team_slave_1 removed [ 930.747070][ T6252] IPv4: Oversized IP packet from 127.202.26.0 [ 930.756708][ T6243] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 930.764781][ T6243] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 930.784202][ T6257] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00aa with DS=0x19 [ 930.802052][ T6243] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 930.809801][ T6243] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 930.843380][ T6243] bond0: (slave batadv1): Releasing active interface [ 930.901844][ T6272] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00aa with DS=0x19 [ 930.981495][ T6284] __nla_validate_parse: 5 callbacks suppressed [ 930.981511][ T6284] netlink: 8 bytes leftover after parsing attributes in process `syz.6.11866'. [ 930.997041][ T6284] netlink: 8 bytes leftover after parsing attributes in process `syz.6.11866'. [ 931.028696][ T29] audit: type=1400 audit(1754276309.143:19343): avc: denied { mounton } for pid=6283 comm="syz.6.11866" path="/proc/1440/task" dev="proc" ino=152685 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dir permissive=1 [ 931.052040][ T29] audit: type=1400 audit(1754276309.143:19344): avc: denied { create } for pid=6283 comm="syz.6.11866" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 931.080727][ T6290] IPv4: Oversized IP packet from 127.202.26.0 [ 931.675908][ T6308] sch_fq: defrate 0 ignored. [ 931.883353][ T6319] random: crng reseeded on system resumption [ 931.894813][ T6319] Restarting kernel threads ... [ 931.900300][ T6319] Done restarting kernel threads. [ 932.099232][ T6332] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 932.107763][ T6332] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 932.307407][ T6341] IPv4: Oversized IP packet from 127.202.26.0 [ 932.329395][ T6343] netlink: 24 bytes leftover after parsing attributes in process `syz.3.11887'. [ 932.345097][ T6343] wireguard0: entered promiscuous mode [ 932.586808][ T29] audit: type=1326 audit(1754276310.702:19345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6348 comm="syz.3.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4d3eebe9a9 code=0x7ffc0000 [ 932.612159][ T29] audit: type=1326 audit(1754276310.702:19346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6348 comm="syz.3.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4d3eebe9a9 code=0x7ffc0000 [ 932.635775][ T29] audit: type=1326 audit(1754276310.702:19347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6348 comm="syz.3.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4d3eebe9a9 code=0x7ffc0000 [ 932.659415][ T29] audit: type=1326 audit(1754276310.702:19348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6348 comm="syz.3.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4d3eebe9a9 code=0x7ffc0000 [ 932.683265][ T29] audit: type=1326 audit(1754276310.702:19349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6348 comm="syz.3.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4d3eebe9a9 code=0x7ffc0000 [ 932.706930][ T29] audit: type=1326 audit(1754276310.702:19350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6348 comm="syz.3.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4d3eebe9a9 code=0x7ffc0000 [ 932.730658][ T29] audit: type=1326 audit(1754276310.702:19351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6348 comm="syz.3.11889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4d3eebe9a9 code=0x7ffc0000 [ 932.831777][ T6367] syzkaller1: entered promiscuous mode [ 932.834501][ T6371] IPv4: Oversized IP packet from 127.202.26.0 [ 932.837289][ T6367] syzkaller1: entered allmulticast mode [ 933.054351][ T6388] netlink: 4 bytes leftover after parsing attributes in process `syz.0.11905'. [ 933.063744][ T6394] SELinux: syz.4.11904 (6394) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 933.095263][ T6388] veth0_macvtap: left promiscuous mode [ 933.103413][ T6396] netlink: 4 bytes leftover after parsing attributes in process `syz.6.11907'. [ 933.159669][ T6407] IPv4: Oversized IP packet from 127.202.26.0 [ 933.216503][ T6415] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 933.258296][ T6419] netlink: 'syz.0.11917': attribute type 4 has an invalid length. [ 933.259230][ T6421] usb usb2: usbfs: process 6421 (syz.8.11915) did not claim interface 2 before use [ 933.289877][ T6415] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 933.303204][ T6419] netlink: 'syz.0.11917': attribute type 4 has an invalid length. [ 933.375156][ T6415] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 933.471122][ T6415] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 933.510293][ T6437] IPv4: Oversized IP packet from 127.202.26.0 [ 933.549386][ T6415] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 933.560348][ T6415] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 933.572176][ T6415] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 933.584184][ T6415] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 933.661830][ T6452] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00aa with DS=0x19 [ 933.895862][ T6478] sd 0:0:1:0: device reset [ 934.034712][ T6499] syzkaller1: entered promiscuous mode [ 934.040310][ T6499] syzkaller1: entered allmulticast mode [ 934.126162][ T6509] FAULT_INJECTION: forcing a failure. [ 934.126162][ T6509] name failslab, interval 1, probability 0, space 0, times 0 [ 934.138972][ T6509] CPU: 0 UID: 0 PID: 6509 Comm: syz.3.11953 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 934.139002][ T6509] Tainted: [W]=WARN [ 934.139008][ T6509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 934.139018][ T6509] Call Trace: [ 934.139025][ T6509] [ 934.139032][ T6509] __dump_stack+0x1d/0x30 [ 934.139052][ T6509] dump_stack_lvl+0xe8/0x140 [ 934.139072][ T6509] dump_stack+0x15/0x1b [ 934.139088][ T6509] should_fail_ex+0x265/0x280 [ 934.139120][ T6509] ? resv_map_alloc+0x32/0x190 [ 934.139143][ T6509] should_failslab+0x8c/0xb0 [ 934.139165][ T6509] __kmalloc_cache_noprof+0x4c/0x320 [ 934.139189][ T6509] ? current_time+0x174/0x240 [ 934.139209][ T6509] resv_map_alloc+0x32/0x190 [ 934.139230][ T6509] hugetlb_reserve_pages+0x211/0xba0 [ 934.139264][ T6509] ? touch_atime+0x106/0x340 [ 934.139288][ T6509] hugetlbfs_file_mmap+0x27e/0x330 [ 934.139319][ T6509] mmap_region+0xf35/0x1580 [ 934.139358][ T6509] do_mmap+0x9b3/0xbe0 [ 934.139394][ T6509] vm_mmap_pgoff+0x17a/0x2e0 [ 934.139424][ T6509] ksys_mmap_pgoff+0x2d0/0x310 [ 934.139456][ T6509] x64_sys_call+0x1602/0x2fb0 [ 934.139484][ T6509] do_syscall_64+0xd2/0x200 [ 934.139504][ T6509] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 934.139532][ T6509] ? clear_bhb_loop+0x40/0x90 [ 934.139554][ T6509] ? clear_bhb_loop+0x40/0x90 [ 934.139574][ T6509] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 934.139591][ T6509] RIP: 0033:0x7f4d3eebe9a9 [ 934.139605][ T6509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 934.139623][ T6509] RSP: 002b:00007f4d3d527038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 934.139642][ T6509] RAX: ffffffffffffffda RBX: 00007f4d3f0e5fa0 RCX: 00007f4d3eebe9a9 [ 934.139655][ T6509] RDX: 0000000000000000 RSI: 0000000001400000 RDI: 0000200000000000 [ 934.139668][ T6509] RBP: 00007f4d3d527090 R08: ffffffffffffffff R09: 0000000000000000 [ 934.139681][ T6509] R10: 00000000000c3072 R11: 0000000000000246 R12: 0000000000000002 [ 934.139694][ T6509] R13: 0000000000000000 R14: 00007f4d3f0e5fa0 R15: 00007ffdd3d92408 [ 934.139710][ T6509] [ 934.539069][ T6525] Cannot find del_set index 0 as target [ 934.592082][ T6527] usb usb8: usbfs: interface 0 claimed by hub while 'syz.6.11961' resets device [ 934.603831][ T6527] netlink: '+}[@': attribute type 13 has an invalid length. [ 934.615887][ T6527] gretap0: refused to change device tx_queue_len [ 934.624195][ T6527] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 934.666248][ T6530] netlink: 'syz.6.11962': attribute type 4 has an invalid length. [ 934.689506][ T6530] netlink: 'syz.6.11962': attribute type 4 has an invalid length. [ 934.766577][ T6538] netlink: 60 bytes leftover after parsing attributes in process `syz.6.11965'. [ 934.775915][ T6538] netlink: 16 bytes leftover after parsing attributes in process `syz.6.11965'. [ 934.785155][ T6538] netlink: 60 bytes leftover after parsing attributes in process `syz.6.11965'. [ 934.803643][ T6538] xt_CT: You must specify a L4 protocol and not use inversions on it [ 935.349169][ T6550] netlink: 8 bytes leftover after parsing attributes in process `syz.3.11968'. [ 935.364477][ T6547] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 935.450104][ T6547] netlink: 24 bytes leftover after parsing attributes in process `syz.0.11969'. [ 935.510035][ T6550] Cannot find set identified by id 0 to match [ 935.523637][ T6550] xt_CT: You must specify a L4 protocol and not use inversions on it [ 935.532175][ T6560] sch_fq: defrate 0 ignored. [ 935.576170][ T6566] FAULT_INJECTION: forcing a failure. [ 935.576170][ T6566] name failslab, interval 1, probability 0, space 0, times 0 [ 935.588983][ T6566] CPU: 1 UID: 0 PID: 6566 Comm: syz.0.11975 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 935.589080][ T6566] Tainted: [W]=WARN [ 935.589084][ T6566] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 935.589091][ T6566] Call Trace: [ 935.589095][ T6566] [ 935.589100][ T6566] __dump_stack+0x1d/0x30 [ 935.589114][ T6566] dump_stack_lvl+0xe8/0x140 [ 935.589164][ T6566] dump_stack+0x15/0x1b [ 935.589173][ T6566] should_fail_ex+0x265/0x280 [ 935.589191][ T6566] ? tcx_link_attach+0xae/0x5f0 [ 935.589204][ T6566] should_failslab+0x8c/0xb0 [ 935.589217][ T6566] __kmalloc_cache_noprof+0x4c/0x320 [ 935.589311][ T6566] tcx_link_attach+0xae/0x5f0 [ 935.589324][ T6566] link_create+0x536/0x6c0 [ 935.589338][ T6566] __sys_bpf+0x4c7/0x790 [ 935.589359][ T6566] __x64_sys_bpf+0x41/0x50 [ 935.589400][ T6566] x64_sys_call+0x2478/0x2fb0 [ 935.589412][ T6566] do_syscall_64+0xd2/0x200 [ 935.589424][ T6566] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 935.589439][ T6566] ? clear_bhb_loop+0x40/0x90 [ 935.589498][ T6566] ? clear_bhb_loop+0x40/0x90 [ 935.589510][ T6566] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 935.589523][ T6566] RIP: 0033:0x7f3c9e45e9a9 [ 935.589532][ T6566] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 935.589581][ T6566] RSP: 002b:00007f3c9cac7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 935.589636][ T6566] RAX: ffffffffffffffda RBX: 00007f3c9e685fa0 RCX: 00007f3c9e45e9a9 [ 935.589643][ T6566] RDX: 0000000000000020 RSI: 0000200000000140 RDI: 000000000000001c [ 935.589651][ T6566] RBP: 00007f3c9cac7090 R08: 0000000000000000 R09: 0000000000000000 [ 935.589658][ T6566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 935.589665][ T6566] R13: 0000000000000000 R14: 00007f3c9e685fa0 R15: 00007ffee847d448 [ 935.589675][ T6566] [ 935.856132][ T29] kauditd_printk_skb: 175 callbacks suppressed [ 935.856147][ T29] audit: type=1326 audit(1754276313.970:19527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6574 comm="syz.0.11979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f3c9e455967 code=0x7ffc0000 [ 935.921721][ T29] audit: type=1326 audit(1754276313.970:19528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6574 comm="syz.0.11979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f3c9e3fab89 code=0x7ffc0000 [ 935.945323][ T29] audit: type=1326 audit(1754276313.970:19529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6574 comm="syz.0.11979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f3c9e455967 code=0x7ffc0000 [ 935.968986][ T29] audit: type=1326 audit(1754276313.970:19530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6574 comm="syz.0.11979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f3c9e3fab89 code=0x7ffc0000 [ 935.992647][ T29] audit: type=1326 audit(1754276313.970:19531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6574 comm="syz.0.11979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c9e45e9a9 code=0x7ffc0000 [ 936.016266][ T29] audit: type=1326 audit(1754276313.970:19532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6574 comm="syz.0.11979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3c9e45e9a9 code=0x7ffc0000 [ 936.039846][ T29] audit: type=1326 audit(1754276313.970:19533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6574 comm="syz.0.11979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c9e45e9a9 code=0x7ffc0000 [ 936.063677][ T29] audit: type=1326 audit(1754276313.970:19534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6574 comm="syz.0.11979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f3c9e45d310 code=0x7ffc0000 [ 936.087433][ T29] audit: type=1326 audit(1754276313.970:19535): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6574 comm="syz.0.11979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3c9e45e9a9 code=0x7ffc0000 [ 936.111215][ T29] audit: type=1326 audit(1754276313.970:19536): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6574 comm="syz.0.11979" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f3c9e45e9a9 code=0x7ffc0000 [ 936.775221][ T6591] sch_tbf: burst 0 is lower than device lo mtu (11337746) ! [ 936.825003][ T6600] netlink: 'syz.4.11990': attribute type 4 has an invalid length. [ 936.875887][ T6602] netlink: 'syz.4.11990': attribute type 4 has an invalid length. [ 936.893815][ T6593] bridge0: port 2(bridge_slave_1) entered disabled state [ 936.901129][ T6593] bridge0: port 1(bridge_slave_0) entered disabled state [ 936.957298][ T6593] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 936.971491][ T6593] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 937.050012][ T6593] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 937.059038][ T6593] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 937.068022][ T6593] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 937.077206][ T6593] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 938.261092][ T6674] netlink: 24 bytes leftover after parsing attributes in process `syz.3.12017'. [ 938.434627][ T6680] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 938.456193][ T6680] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 938.717874][T22552] bridge_slave_1: left allmulticast mode [ 938.723605][T22552] bridge_slave_1: left promiscuous mode [ 938.729432][T22552] bridge0: port 2(bridge_slave_1) entered disabled state [ 938.748000][T22552] bridge_slave_0: left allmulticast mode [ 938.753706][T22552] bridge_slave_0: left promiscuous mode [ 938.759347][T22552] bridge0: port 1(bridge_slave_0) entered disabled state [ 938.962667][T22552] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 938.972227][T22552] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 938.981249][T22552] bond0 (unregistering): Released all slaves [ 939.025933][ T6694] chnl_net:caif_netlink_parms(): no params data found [ 939.040723][T22552] hsr_slave_0: left promiscuous mode [ 939.046588][T22552] hsr_slave_1: left promiscuous mode [ 939.052373][T22552] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 939.061391][T22552] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 939.098762][T22552] team0 (unregistering): Port device team_slave_1 removed [ 939.111587][T22552] team0 (unregistering): Port device team_slave_0 removed [ 939.215792][ T6694] bridge0: port 1(bridge_slave_0) entered blocking state [ 939.222896][ T6694] bridge0: port 1(bridge_slave_0) entered disabled state [ 939.230261][ T6694] bridge_slave_0: entered allmulticast mode [ 939.238109][ T6694] bridge_slave_0: entered promiscuous mode [ 939.245171][ T6694] bridge0: port 2(bridge_slave_1) entered blocking state [ 939.252367][ T6694] bridge0: port 2(bridge_slave_1) entered disabled state [ 939.261112][ T6694] bridge_slave_1: entered allmulticast mode [ 939.267806][ T6694] bridge_slave_1: entered promiscuous mode [ 939.292401][ T6694] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 939.306303][ T6704] chnl_net:caif_netlink_parms(): no params data found [ 939.319221][ T6694] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 939.409459][ T6694] team0: Port device team_slave_0 added [ 939.436163][ T6694] team0: Port device team_slave_1 added [ 939.520924][ T6704] bridge0: port 1(bridge_slave_0) entered blocking state [ 939.528277][ T6704] bridge0: port 1(bridge_slave_0) entered disabled state [ 939.552205][ T6704] bridge_slave_0: entered allmulticast mode [ 939.562021][ T6704] bridge_slave_0: entered promiscuous mode [ 939.589971][ T6694] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 939.597007][ T6694] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 939.624473][ T6694] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 939.655666][ T6704] bridge0: port 2(bridge_slave_1) entered blocking state [ 939.663747][ T6704] bridge0: port 2(bridge_slave_1) entered disabled state [ 939.673579][ T6704] bridge_slave_1: entered allmulticast mode [ 939.682280][ T6704] bridge_slave_1: entered promiscuous mode [ 939.689787][ T6694] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 939.696897][ T6694] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 939.727048][ T6694] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 939.769523][ T6704] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 939.782204][T22552] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 939.848527][ T6704] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 939.866464][T22552] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 939.892721][ T6694] hsr_slave_0: entered promiscuous mode [ 939.900845][ T6694] hsr_slave_1: entered promiscuous mode [ 939.922028][ T6694] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 939.960184][ T6694] Cannot create hsr debugfs directory [ 939.991948][T22552] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 940.021005][ T6704] team0: Port device team_slave_0 added [ 940.021922][ T6764] SELinux: policydb table sizes (0,0) do not match mine (8,7) [ 940.045623][ T6704] team0: Port device team_slave_1 added [ 940.056314][ T6764] SELinux: failed to load policy [ 940.076131][T22552] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 940.098500][ T6704] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 940.105542][ T6704] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 940.131579][ T6704] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 940.218491][ T6704] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 940.225505][ T6704] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 940.251622][ T6704] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 940.276918][ T6769] syzkaller1: entered promiscuous mode [ 940.282483][ T6769] syzkaller1: entered allmulticast mode [ 940.357420][ T6704] hsr_slave_0: entered promiscuous mode [ 940.363472][ T6704] hsr_slave_1: entered promiscuous mode [ 940.370322][ T6704] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 940.379666][ T6704] Cannot create hsr debugfs directory [ 940.423009][T22552] bond0 (unregistering): Released all slaves [ 940.467808][T22552] hsr_slave_0: left promiscuous mode [ 940.473786][T22552] hsr_slave_1: left promiscuous mode [ 940.481080][T22552] batadv_slave_1: left promiscuous mode [ 940.486920][T22552] veth1_macvtap: left promiscuous mode [ 940.492507][T22552] veth0_macvtap: left promiscuous mode [ 940.498358][T22552] veth1_vlan: left promiscuous mode [ 940.547335][ T6792] FAULT_INJECTION: forcing a failure. [ 940.547335][ T6792] name failslab, interval 1, probability 0, space 0, times 0 [ 940.560239][ T6792] CPU: 0 UID: 0 PID: 6792 Comm: gtp Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 940.560335][ T6792] Tainted: [W]=WARN [ 940.560339][ T6792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 940.560421][ T6792] Call Trace: [ 940.560424][ T6792] [ 940.560429][ T6792] __dump_stack+0x1d/0x30 [ 940.560443][ T6792] dump_stack_lvl+0xe8/0x140 [ 940.560454][ T6792] dump_stack+0x15/0x1b [ 940.560464][ T6792] should_fail_ex+0x265/0x280 [ 940.560482][ T6792] should_failslab+0x8c/0xb0 [ 940.560535][ T6792] kmem_cache_alloc_noprof+0x50/0x310 [ 940.560589][ T6792] ? dup_fd+0x3a/0x540 [ 940.560605][ T6792] dup_fd+0x3a/0x540 [ 940.560658][ T6792] copy_files+0x98/0xf0 [ 940.560672][ T6792] copy_process+0xc44/0x1f90 [ 940.560739][ T6792] kernel_clone+0x16c/0x5b0 [ 940.560771][ T6792] __se_sys_clone3+0x1c2/0x200 [ 940.560792][ T6792] __x64_sys_clone3+0x31/0x40 [ 940.560870][ T6792] x64_sys_call+0x10c9/0x2fb0 [ 940.560882][ T6792] do_syscall_64+0xd2/0x200 [ 940.560893][ T6792] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 940.560985][ T6792] ? clear_bhb_loop+0x40/0x90 [ 940.561008][ T6792] ? clear_bhb_loop+0x40/0x90 [ 940.561076][ T6792] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 940.561094][ T6792] RIP: 0033:0x7f3c9e45e9a9 [ 940.561104][ T6792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 940.561115][ T6792] RSP: 002b:00007f3c9cac6f08 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 940.561127][ T6792] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f3c9e45e9a9 [ 940.561134][ T6792] RDX: 00007f3c9cac6f20 RSI: 0000000000000058 RDI: 00007f3c9cac6f20 [ 940.561141][ T6792] RBP: 00007f3c9cac7090 R08: 0000000000000000 R09: 0000000000000058 [ 940.561260][ T6792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 940.561267][ T6792] R13: 0000000000000000 R14: 00007f3c9e685fa0 R15: 00007ffee847d448 [ 940.561342][ T6792] [ 940.778880][ T6795] IPv4: Oversized IP packet from 127.202.26.0 [ 940.969969][ T6694] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 941.004759][ T6694] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 941.044311][ T6694] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 941.056305][ T6694] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 941.122222][ T6694] 8021q: adding VLAN 0 to HW filter on device bond0 [ 941.165582][ T6694] 8021q: adding VLAN 0 to HW filter on device team0 [ 941.186606][T27824] bridge0: port 1(bridge_slave_0) entered blocking state [ 941.193774][T27824] bridge0: port 1(bridge_slave_0) entered forwarding state [ 941.226360][T27824] bridge0: port 2(bridge_slave_1) entered blocking state [ 941.233701][T27824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 941.343851][ T6704] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 941.368770][ T6704] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 941.409795][ T6704] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 941.466287][ T6704] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 941.526106][ T6694] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 941.565261][ T6704] 8021q: adding VLAN 0 to HW filter on device bond0 [ 941.584252][ T6825] syzkaller1: entered promiscuous mode [ 941.589862][ T6825] syzkaller1: entered allmulticast mode [ 941.614362][ T6704] 8021q: adding VLAN 0 to HW filter on device team0 [ 941.624133][T27824] bridge0: port 1(bridge_slave_0) entered blocking state [ 941.631233][T27824] bridge0: port 1(bridge_slave_0) entered forwarding state [ 941.653626][T27824] bridge0: port 2(bridge_slave_1) entered blocking state [ 941.660846][T27824] bridge0: port 2(bridge_slave_1) entered forwarding state [ 941.668194][ T6834] FAULT_INJECTION: forcing a failure. [ 941.668194][ T6834] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 941.681310][ T6834] CPU: 1 UID: 0 PID: 6834 Comm: syz.4.12056 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 941.681346][ T6834] Tainted: [W]=WARN [ 941.681353][ T6834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 941.681366][ T6834] Call Trace: [ 941.681372][ T6834] [ 941.681380][ T6834] __dump_stack+0x1d/0x30 [ 941.681401][ T6834] dump_stack_lvl+0xe8/0x140 [ 941.681454][ T6834] dump_stack+0x15/0x1b [ 941.681473][ T6834] should_fail_ex+0x265/0x280 [ 941.681504][ T6834] should_fail+0xb/0x20 [ 941.681547][ T6834] should_fail_usercopy+0x1a/0x20 [ 941.681627][ T6834] _copy_from_iter+0xcf/0xe40 [ 941.681660][ T6834] ? __build_skb_around+0x1a0/0x200 [ 941.681767][ T6834] ? __alloc_skb+0x223/0x320 [ 941.681798][ T6834] netlink_sendmsg+0x471/0x6b0 [ 941.681880][ T6834] ? __pfx_netlink_sendmsg+0x10/0x10 [ 941.681901][ T6834] __sock_sendmsg+0x142/0x180 [ 941.681930][ T6834] ____sys_sendmsg+0x31e/0x4e0 [ 941.681975][ T6834] ___sys_sendmsg+0x17b/0x1d0 [ 941.682007][ T6834] __x64_sys_sendmsg+0xd4/0x160 [ 941.682031][ T6834] x64_sys_call+0x2999/0x2fb0 [ 941.682107][ T6834] do_syscall_64+0xd2/0x200 [ 941.682126][ T6834] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 941.682206][ T6834] ? clear_bhb_loop+0x40/0x90 [ 941.682277][ T6834] ? clear_bhb_loop+0x40/0x90 [ 941.682363][ T6834] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 941.682386][ T6834] RIP: 0033:0x7fd81eaae9a9 [ 941.682464][ T6834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 941.682481][ T6834] RSP: 002b:00007fd81d117038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 941.682499][ T6834] RAX: ffffffffffffffda RBX: 00007fd81ecd5fa0 RCX: 00007fd81eaae9a9 [ 941.682513][ T6834] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000000003 [ 941.682601][ T6834] RBP: 00007fd81d117090 R08: 0000000000000000 R09: 0000000000000000 [ 941.682612][ T6834] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 941.682623][ T6834] R13: 0000000000000000 R14: 00007fd81ecd5fa0 R15: 00007ffc76c338a8 [ 941.682712][ T6834] [ 941.970170][ T6704] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 942.022197][ T6694] veth0_vlan: entered promiscuous mode [ 942.046241][ T6694] veth1_vlan: entered promiscuous mode [ 942.083427][ T6864] serio: Serial port ptm0 [ 942.100585][ T6694] veth0_macvtap: entered promiscuous mode [ 942.115233][ T6704] veth0_vlan: entered promiscuous mode [ 942.122075][ T6694] veth1_macvtap: entered promiscuous mode [ 942.132724][ T6704] veth1_vlan: entered promiscuous mode [ 942.150362][ T6694] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 942.162274][ T6704] veth0_macvtap: entered promiscuous mode [ 942.180655][ T6694] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 942.190547][ T6704] veth1_macvtap: entered promiscuous mode [ 942.210752][ T6694] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 942.219684][ T6694] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 942.228484][ T6694] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 942.237346][ T6694] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 942.293332][ T6704] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 942.311984][ T6704] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 942.337883][ T6704] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 942.346783][ T6704] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 942.355607][ T6704] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 942.364347][ T6704] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 942.386279][ T6871] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 942.395049][ T6871] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 942.424582][ T29] kauditd_printk_skb: 43 callbacks suppressed [ 942.424595][ T29] audit: type=1400 audit(1754276320.527:19580): avc: denied { read write } for pid=6704 comm="syz-executor" name="loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 942.455135][ T29] audit: type=1400 audit(1754276320.527:19581): avc: denied { open } for pid=6704 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=101 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 942.479395][ T29] audit: type=1400 audit(1754276320.527:19582): avc: denied { ioctl } for pid=6704 comm="syz-executor" path="/dev/loop1" dev="devtmpfs" ino=101 ioctlcmd=0x4c01 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 942.664080][ T6884] netlink: 24 bytes leftover after parsing attributes in process `syz.8.12065'. [ 942.673276][ T6884] netlink: 212 bytes leftover after parsing attributes in process `syz.8.12065'. [ 942.685697][ T6884] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 942.735605][ T6885] netlink: 12 bytes leftover after parsing attributes in process `syz.8.12065'. [ 942.736434][ T6884] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 942.786273][ T6884] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 942.811775][ T6887] FAULT_INJECTION: forcing a failure. [ 942.811775][ T6887] name failslab, interval 1, probability 0, space 0, times 0 [ 942.824656][ T6887] CPU: 0 UID: 0 PID: 6887 Comm: syz.0.12066 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 942.824693][ T6887] Tainted: [W]=WARN [ 942.824701][ T6887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 942.824714][ T6887] Call Trace: [ 942.824741][ T6887] [ 942.824748][ T6887] __dump_stack+0x1d/0x30 [ 942.824768][ T6887] dump_stack_lvl+0xe8/0x140 [ 942.824786][ T6887] dump_stack+0x15/0x1b [ 942.824802][ T6887] should_fail_ex+0x265/0x280 [ 942.824900][ T6887] should_failslab+0x8c/0xb0 [ 942.824922][ T6887] kmem_cache_alloc_noprof+0x50/0x310 [ 942.824970][ T6887] ? dst_alloc+0xbd/0x100 [ 942.824988][ T6887] dst_alloc+0xbd/0x100 [ 942.825005][ T6887] ip_route_output_key_hash_rcu+0xf16/0x1440 [ 942.825099][ T6887] ip_route_output_flow+0x7b/0x130 [ 942.825114][ T6887] tcp_v4_connect+0x484/0xac0 [ 942.825130][ T6887] __inet_stream_connect+0x166/0x7e0 [ 942.825165][ T6887] ? _raw_spin_unlock_bh+0x36/0x40 [ 942.825233][ T6887] ? release_sock+0x116/0x150 [ 942.825258][ T6887] ? _raw_spin_unlock_bh+0x36/0x40 [ 942.825271][ T6887] ? lock_sock_nested+0x112/0x140 [ 942.825357][ T6887] ? selinux_netlbl_socket_connect+0x115/0x130 [ 942.825409][ T6887] inet_stream_connect+0x44/0x70 [ 942.825427][ T6887] ? __pfx_inet_stream_connect+0x10/0x10 [ 942.825446][ T6887] __sys_connect+0x1f2/0x2b0 [ 942.825535][ T6887] __x64_sys_connect+0x3f/0x50 [ 942.825551][ T6887] x64_sys_call+0x1daa/0x2fb0 [ 942.825564][ T6887] do_syscall_64+0xd2/0x200 [ 942.825623][ T6887] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 942.825638][ T6887] ? clear_bhb_loop+0x40/0x90 [ 942.825663][ T6887] ? clear_bhb_loop+0x40/0x90 [ 942.825676][ T6887] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 942.825702][ T6887] RIP: 0033:0x7f3c9e45e9a9 [ 942.825712][ T6887] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 942.825724][ T6887] RSP: 002b:00007f3c9cac7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 942.825797][ T6887] RAX: ffffffffffffffda RBX: 00007f3c9e685fa0 RCX: 00007f3c9e45e9a9 [ 942.825804][ T6887] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000006 [ 942.825812][ T6887] RBP: 00007f3c9cac7090 R08: 0000000000000000 R09: 0000000000000000 [ 942.825819][ T6887] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 942.825826][ T6887] R13: 0000000000000000 R14: 00007f3c9e685fa0 R15: 00007ffee847d448 [ 942.825894][ T6887] [ 943.086778][ T6884] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 943.116714][ T6891] FAULT_INJECTION: forcing a failure. [ 943.116714][ T6891] name failslab, interval 1, probability 0, space 0, times 0 [ 943.129403][ T6891] CPU: 1 UID: 0 PID: 6891 Comm: syz.6.12068 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 943.129435][ T6891] Tainted: [W]=WARN [ 943.129475][ T6891] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 943.129488][ T6891] Call Trace: [ 943.129534][ T6891] [ 943.129542][ T6891] __dump_stack+0x1d/0x30 [ 943.129562][ T6891] dump_stack_lvl+0xe8/0x140 [ 943.129612][ T6891] dump_stack+0x15/0x1b [ 943.129627][ T6891] should_fail_ex+0x265/0x280 [ 943.129688][ T6891] should_failslab+0x8c/0xb0 [ 943.129713][ T6891] kmem_cache_alloc_noprof+0x50/0x310 [ 943.129757][ T6891] ? inet_bind_bucket_create+0x2e/0x100 [ 943.129789][ T6891] ? bpf_trace_printk+0xd6/0x1c0 [ 943.129826][ T6891] inet_bind_bucket_create+0x2e/0x100 [ 943.129909][ T6891] inet_csk_get_port+0x985/0x1070 [ 943.129934][ T6891] ? __pfx_inet_csk_get_port+0x10/0x10 [ 943.129962][ T6891] inet_csk_listen_start+0xca/0x1c0 [ 943.129991][ T6891] inet_listen+0x1b1/0x200 [ 943.130114][ T6891] __x64_sys_listen+0x110/0x170 [ 943.130141][ T6891] x64_sys_call+0x2b93/0x2fb0 [ 943.130161][ T6891] do_syscall_64+0xd2/0x200 [ 943.130178][ T6891] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 943.130256][ T6891] ? clear_bhb_loop+0x40/0x90 [ 943.130276][ T6891] ? clear_bhb_loop+0x40/0x90 [ 943.130347][ T6891] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 943.130458][ T6891] RIP: 0033:0x7f40a7b0e9a9 [ 943.130472][ T6891] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 943.130488][ T6891] RSP: 002b:00007f40a6177038 EFLAGS: 00000246 ORIG_RAX: 0000000000000032 [ 943.130577][ T6891] RAX: ffffffffffffffda RBX: 00007f40a7d35fa0 RCX: 00007f40a7b0e9a9 [ 943.130590][ T6891] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 0000000000000005 [ 943.130602][ T6891] RBP: 00007f40a6177090 R08: 0000000000000000 R09: 0000000000000000 [ 943.130613][ T6891] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 943.130624][ T6891] R13: 0000000000000000 R14: 00007f40a7d35fa0 R15: 00007ffff2e7aa08 [ 943.130718][ T6891] [ 943.351721][ T6884] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 943.392687][ T6884] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 943.408997][ T6884] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 943.435561][ T6884] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 943.459580][ T6905] netlink: 24 bytes leftover after parsing attributes in process `syz.1.12074'. [ 943.500983][ T29] audit: type=1326 audit(1754276321.607:19583): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6904 comm="syz.1.12074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 943.524807][ T29] audit: type=1326 audit(1754276321.607:19584): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6904 comm="syz.1.12074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 943.548575][ T29] audit: type=1326 audit(1754276321.607:19585): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6904 comm="syz.1.12074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=83 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 943.572403][ T29] audit: type=1326 audit(1754276321.607:19586): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6904 comm="syz.1.12074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 943.578471][ T6907] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00aa with DS=0x19 [ 943.596266][ T29] audit: type=1326 audit(1754276321.607:19587): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6904 comm="syz.1.12074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 943.629101][ T29] audit: type=1326 audit(1754276321.607:19588): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6904 comm="syz.1.12074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=84 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 943.652646][ T29] audit: type=1326 audit(1754276321.607:19589): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6904 comm="syz.1.12074" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 943.706173][ T6917] IPv4: Oversized IP packet from 127.202.26.0 [ 944.335751][ T6944] netlink: 24 bytes leftover after parsing attributes in process `syz.6.12085'. [ 944.344892][ T6944] netlink: 212 bytes leftover after parsing attributes in process `syz.6.12085'. [ 944.358511][ T6944] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 944.407860][ T6949] netlink: 12 bytes leftover after parsing attributes in process `syz.6.12085'. [ 944.453611][ T6953] netlink: 12 bytes leftover after parsing attributes in process `syz.1.12088'. [ 944.999094][ T7006] IPv4: Oversized IP packet from 127.202.26.0 [ 945.028236][ T7013] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00aa with DS=0x19 [ 945.038171][ T7015] netlink: 24 bytes leftover after parsing attributes in process `syz.4.12110'. [ 945.780868][ T6944] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 945.849991][ T6944] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 945.930041][ T6944] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 946.014279][ T7047] netlink: 12 bytes leftover after parsing attributes in process `syz.0.12119'. [ 946.023540][ T7047] netlink: 40 bytes leftover after parsing attributes in process `syz.0.12119'. [ 946.036062][ T7047] netlink: 28 bytes leftover after parsing attributes in process `syz.0.12119'. [ 946.045182][ T7047] netem: change failed [ 946.051924][ T6944] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 946.060635][ T7043] Falling back ldisc for ttyS3. [ 946.069504][ T6944] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 946.089121][ T6944] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 946.102984][ T6944] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 946.132201][ T7055] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12123'. [ 946.161934][ T7051] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 946.170695][ T7051] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 946.319795][ T7081] FAULT_INJECTION: forcing a failure. [ 946.319795][ T7081] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 946.333001][ T7081] CPU: 0 UID: 0 PID: 7081 Comm: syz.6.12133 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 946.333032][ T7081] Tainted: [W]=WARN [ 946.333039][ T7081] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 946.333052][ T7081] Call Trace: [ 946.333059][ T7081] [ 946.333067][ T7081] __dump_stack+0x1d/0x30 [ 946.333090][ T7081] dump_stack_lvl+0xe8/0x140 [ 946.333112][ T7081] dump_stack+0x15/0x1b [ 946.333179][ T7081] should_fail_ex+0x265/0x280 [ 946.333208][ T7081] should_fail+0xb/0x20 [ 946.333239][ T7081] should_fail_usercopy+0x1a/0x20 [ 946.333271][ T7081] _copy_from_iter+0xcf/0xe40 [ 946.333337][ T7081] ? skb_set_owner_w+0x16a/0x1c0 [ 946.333354][ T7081] ? sock_alloc_send_pskb+0x456/0x4f0 [ 946.333457][ T7081] skb_copy_datagram_from_iter+0xb1/0x490 [ 946.333480][ T7081] ? skb_put+0xa9/0xf0 [ 946.333507][ T7081] tun_get_user+0xa0e/0x2500 [ 946.333675][ T7081] ? ref_tracker_alloc+0x1f2/0x2f0 [ 946.333756][ T7081] ? selinux_file_permission+0x1e4/0x320 [ 946.333778][ T7081] tun_chr_write_iter+0x15e/0x210 [ 946.333808][ T7081] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 946.333831][ T7081] vfs_write+0x4a0/0x8e0 [ 946.333886][ T7081] ksys_write+0xda/0x1a0 [ 946.333918][ T7081] __x64_sys_write+0x40/0x50 [ 946.333947][ T7081] x64_sys_call+0x2cdd/0x2fb0 [ 946.333969][ T7081] do_syscall_64+0xd2/0x200 [ 946.334051][ T7081] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 946.334069][ T7081] ? clear_bhb_loop+0x40/0x90 [ 946.334081][ T7081] ? clear_bhb_loop+0x40/0x90 [ 946.334109][ T7081] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 946.334123][ T7081] RIP: 0033:0x7f40a7b0e9a9 [ 946.334133][ T7081] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 946.334144][ T7081] RSP: 002b:00007f40a6177038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 946.334156][ T7081] RAX: ffffffffffffffda RBX: 00007f40a7d35fa0 RCX: 00007f40a7b0e9a9 [ 946.334163][ T7081] RDX: 0000000000000fce RSI: 00002000000000c0 RDI: 0000000000000003 [ 946.334217][ T7081] RBP: 00007f40a6177090 R08: 0000000000000000 R09: 0000000000000000 [ 946.334224][ T7081] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 946.334231][ T7081] R13: 0000000000000000 R14: 00007f40a7d35fa0 R15: 00007ffff2e7aa08 [ 946.334241][ T7081] [ 946.740475][ T7092] FAULT_INJECTION: forcing a failure. [ 946.740475][ T7092] name failslab, interval 1, probability 0, space 0, times 0 [ 946.753355][ T7092] CPU: 1 UID: 0 PID: 7092 Comm: syz.8.12137 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 946.753384][ T7092] Tainted: [W]=WARN [ 946.753389][ T7092] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 946.753400][ T7092] Call Trace: [ 946.753406][ T7092] [ 946.753412][ T7092] __dump_stack+0x1d/0x30 [ 946.753451][ T7092] dump_stack_lvl+0xe8/0x140 [ 946.753467][ T7092] dump_stack+0x15/0x1b [ 946.753481][ T7092] should_fail_ex+0x265/0x280 [ 946.753510][ T7092] should_failslab+0x8c/0xb0 [ 946.753529][ T7092] kmem_cache_alloc_noprof+0x50/0x310 [ 946.753647][ T7092] ? audit_log_start+0x365/0x6c0 [ 946.753675][ T7092] audit_log_start+0x365/0x6c0 [ 946.753791][ T7092] audit_seccomp+0x48/0x100 [ 946.753814][ T7092] ? __seccomp_filter+0x68c/0x10d0 [ 946.753832][ T7092] __seccomp_filter+0x69d/0x10d0 [ 946.753851][ T7092] ? update_load_avg+0x1da/0x820 [ 946.753875][ T7092] ? __list_add_valid_or_report+0x38/0xe0 [ 946.753935][ T7092] ? _raw_spin_unlock+0x26/0x50 [ 946.753959][ T7092] __secure_computing+0x82/0x150 [ 946.753977][ T7092] syscall_trace_enter+0xcf/0x1e0 [ 946.754053][ T7092] do_syscall_64+0xac/0x200 [ 946.754120][ T7092] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 946.754142][ T7092] ? clear_bhb_loop+0x40/0x90 [ 946.754180][ T7092] ? clear_bhb_loop+0x40/0x90 [ 946.754199][ T7092] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 946.754217][ T7092] RIP: 0033:0x7f2b9e8bd3bc [ 946.754230][ T7092] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 946.754326][ T7092] RSP: 002b:00007f2b9cf1f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 946.754372][ T7092] RAX: ffffffffffffffda RBX: 00007f2b9eae5fa0 RCX: 00007f2b9e8bd3bc [ 946.754383][ T7092] RDX: 000000000000000f RSI: 00007f2b9cf1f0a0 RDI: 0000000000000006 [ 946.754394][ T7092] RBP: 00007f2b9cf1f090 R08: 0000000000000000 R09: 0000000000000000 [ 946.754404][ T7092] R10: 0000000000000006 R11: 0000000000000246 R12: 0000000000000001 [ 946.754414][ T7092] R13: 0000000000000000 R14: 00007f2b9eae5fa0 R15: 00007ffde4546598 [ 946.754441][ T7092] [ 947.199166][ T7111] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 947.208553][ T7111] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 947.415422][ T7120] syzkaller1: entered promiscuous mode [ 947.421143][ T7120] syzkaller1: entered allmulticast mode [ 947.932888][ T29] kauditd_printk_skb: 196 callbacks suppressed [ 947.932901][ T29] audit: type=1400 audit(1754276326.045:19782): avc: denied { bind } for pid=7130 comm="syz.8.12153" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 948.544232][ T7135] xt_CT: No such helper "pptp" [ 948.555952][ T7135] netlink: 'syz.1.12155': attribute type 19 has an invalid length. [ 948.564114][ T7135] __nla_validate_parse: 4 callbacks suppressed [ 948.564127][ T7135] netlink: 55 bytes leftover after parsing attributes in process `syz.1.12155'. [ 948.705650][ T7160] netlink: 'syz.4.12163': attribute type 46 has an invalid length. [ 948.732708][ T7160] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7160 comm=syz.4.12163 [ 948.926644][ T29] audit: type=1326 audit(1754276327.035:19783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7168 comm="syz.8.12166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2b9e8b5967 code=0x7ffc0000 [ 948.950332][ T29] audit: type=1326 audit(1754276327.035:19784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7168 comm="syz.8.12166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f2b9e85ab89 code=0x7ffc0000 [ 948.973859][ T29] audit: type=1326 audit(1754276327.035:19785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7168 comm="syz.8.12166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f2b9e8b5967 code=0x7ffc0000 [ 948.997425][ T29] audit: type=1326 audit(1754276327.035:19786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7168 comm="syz.8.12166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f2b9e85ab89 code=0x7ffc0000 [ 949.020999][ T29] audit: type=1326 audit(1754276327.045:19787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7168 comm="syz.8.12166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 949.045515][ T29] audit: type=1326 audit(1754276327.155:19788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7168 comm="syz.8.12166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 949.049289][ T7170] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 949.069333][ T29] audit: type=1326 audit(1754276327.155:19789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7168 comm="syz.8.12166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 949.101610][ T29] audit: type=1326 audit(1754276327.155:19790): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7168 comm="syz.8.12166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 949.115359][ T7170] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 949.125307][ T29] audit: type=1326 audit(1754276327.155:19791): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7168 comm="syz.8.12166" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2b9e8be9a9 code=0x7ffc0000 [ 949.167597][ T7169] FAULT_INJECTION: forcing a failure. [ 949.167597][ T7169] name failslab, interval 1, probability 0, space 0, times 0 [ 949.180283][ T7169] CPU: 1 UID: 0 PID: 7169 Comm: syz.8.12166 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 949.180365][ T7169] Tainted: [W]=WARN [ 949.180372][ T7169] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 949.180383][ T7169] Call Trace: [ 949.180449][ T7169] [ 949.180462][ T7169] __dump_stack+0x1d/0x30 [ 949.180483][ T7169] dump_stack_lvl+0xe8/0x140 [ 949.180500][ T7169] dump_stack+0x15/0x1b [ 949.180542][ T7169] should_fail_ex+0x265/0x280 [ 949.180610][ T7169] ? bpf_prog_alloc_no_stats+0xc4/0x390 [ 949.180638][ T7169] should_failslab+0x8c/0xb0 [ 949.180660][ T7169] __kmalloc_cache_noprof+0x4c/0x320 [ 949.180694][ T7169] bpf_prog_alloc_no_stats+0xc4/0x390 [ 949.180724][ T7169] bpf_prog_alloc+0x3c/0x150 [ 949.180753][ T7169] bpf_prog_load+0x514/0x1070 [ 949.180824][ T7169] ? security_bpf+0x2b/0x90 [ 949.180845][ T7169] __sys_bpf+0x51d/0x790 [ 949.180878][ T7169] __x64_sys_bpf+0x41/0x50 [ 949.180902][ T7169] x64_sys_call+0x2478/0x2fb0 [ 949.180972][ T7169] do_syscall_64+0xd2/0x200 [ 949.180992][ T7169] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 949.181082][ T7169] ? clear_bhb_loop+0x40/0x90 [ 949.181104][ T7169] ? clear_bhb_loop+0x40/0x90 [ 949.181127][ T7169] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 949.181150][ T7169] RIP: 0033:0x7f2b9e8be9a9 [ 949.181195][ T7169] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 949.181214][ T7169] RSP: 002b:00007f2b9cf1f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 949.181235][ T7169] RAX: ffffffffffffffda RBX: 00007f2b9eae5fa0 RCX: 00007f2b9e8be9a9 [ 949.181305][ T7169] RDX: 0000000000000090 RSI: 00002000000000c0 RDI: 0000000000000005 [ 949.181317][ T7169] RBP: 00007f2b9cf1f090 R08: 0000000000000000 R09: 0000000000000000 [ 949.181329][ T7169] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 949.181398][ T7169] R13: 0000000000000000 R14: 00007f2b9eae5fa0 R15: 00007ffde4546598 [ 949.181422][ T7169] [ 949.507262][ T7176] netlink: 'syz.8.12168': attribute type 4 has an invalid length. [ 949.523815][ T7176] netlink: 'syz.8.12168': attribute type 4 has an invalid length. [ 949.631812][ T7188] IPv4: Oversized IP packet from 127.202.26.0 [ 949.716410][ T7208] netlink: 24 bytes leftover after parsing attributes in process `syz.1.12179'. [ 949.735716][ T7211] netlink: 4 bytes leftover after parsing attributes in process `syz.4.12181'. [ 949.744938][ T7211] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 949.758581][ T7211] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 949.897086][ T7220] syzkaller1: entered promiscuous mode [ 949.902604][ T7220] syzkaller1: entered allmulticast mode [ 950.109166][ T7232] netlink: 24 bytes leftover after parsing attributes in process `syz.0.12187'. [ 950.135163][ T7234] netlink: 24 bytes leftover after parsing attributes in process `syz.0.12188'. [ 950.290072][ T7245] ip6_tunnel: non-ECT from fe80:0000:0000:0000:0000:0000:0000:00aa with DS=0x19 [ 950.504350][ T7256] netlink: zone id is out of range [ 950.509681][ T7256] netlink: zone id is out of range [ 950.514847][ T7256] netlink: zone id is out of range [ 950.520027][ T7256] netlink: zone id is out of range [ 950.525173][ T7256] netlink: zone id is out of range [ 950.530471][ T7256] netlink: zone id is out of range [ 950.535748][ T7256] netlink: zone id is out of range [ 950.541114][ T7256] netlink: zone id is out of range [ 950.688010][ T7268] netlink: 24 bytes leftover after parsing attributes in process `syz.1.12199'. [ 951.292859][ T7291] netlink: 'syz.8.12207': attribute type 1 has an invalid length. [ 951.391224][ T7301] netlink: 8 bytes leftover after parsing attributes in process `syz.8.12211'. [ 951.400252][ T7301] netlink: 4 bytes leftover after parsing attributes in process `syz.8.12211'. [ 951.420750][ T7303] netlink: 24 bytes leftover after parsing attributes in process `syz.6.12212'. [ 951.491979][ T7311] syzkaller1: entered promiscuous mode [ 951.497682][ T7311] syzkaller1: entered allmulticast mode [ 951.705058][ T7340] FAULT_INJECTION: forcing a failure. [ 951.705058][ T7340] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 951.718513][ T7340] CPU: 0 UID: 0 PID: 7340 Comm: syz.1.12226 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 951.718548][ T7340] Tainted: [W]=WARN [ 951.718622][ T7340] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 951.718635][ T7340] Call Trace: [ 951.718641][ T7340] [ 951.718649][ T7340] __dump_stack+0x1d/0x30 [ 951.718670][ T7340] dump_stack_lvl+0xe8/0x140 [ 951.718692][ T7340] dump_stack+0x15/0x1b [ 951.718711][ T7340] should_fail_ex+0x265/0x280 [ 951.718818][ T7340] should_fail_alloc_page+0xf2/0x100 [ 951.718845][ T7340] __alloc_frozen_pages_noprof+0xff/0x360 [ 951.718932][ T7340] alloc_pages_mpol+0xb3/0x250 [ 951.718967][ T7340] alloc_pages_noprof+0x90/0x130 [ 951.719000][ T7340] pgd_alloc+0x51/0x2e0 [ 951.719062][ T7340] mm_init+0x34b/0x810 [ 951.719086][ T7340] ? kmem_cache_alloc_noprof+0x220/0x310 [ 951.719157][ T7340] ? copy_mm+0xc6/0x370 [ 951.719183][ T7340] copy_mm+0x101/0x370 [ 951.719206][ T7340] copy_process+0xcf1/0x1f90 [ 951.719236][ T7340] kernel_clone+0x16c/0x5b0 [ 951.719277][ T7340] ? vfs_write+0x75e/0x8e0 [ 951.719307][ T7340] __x64_sys_clone+0xe6/0x120 [ 951.719337][ T7340] x64_sys_call+0x2c59/0x2fb0 [ 951.719414][ T7340] do_syscall_64+0xd2/0x200 [ 951.719434][ T7340] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 951.719462][ T7340] ? clear_bhb_loop+0x40/0x90 [ 951.719483][ T7340] ? clear_bhb_loop+0x40/0x90 [ 951.719506][ T7340] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 951.719573][ T7340] RIP: 0033:0x7f0205bbe9a9 [ 951.719638][ T7340] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 951.719656][ T7340] RSP: 002b:00007f0204226fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 951.719674][ T7340] RAX: ffffffffffffffda RBX: 00007f0205de5fa0 RCX: 00007f0205bbe9a9 [ 951.719694][ T7340] RDX: 0000000000000000 RSI: 0000000000009000 RDI: 0000000004021400 [ 951.719707][ T7340] RBP: 00007f0204227090 R08: 0000000000000000 R09: 0000000000000000 [ 951.719719][ T7340] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000002 [ 951.719732][ T7340] R13: 0000000000000000 R14: 00007f0205de5fa0 R15: 00007ffee3809088 [ 951.719750][ T7340] [ 952.106500][ T7355] netlink: 8 bytes leftover after parsing attributes in process `syz.4.12230'. [ 952.144710][ T7356] syzkaller1: entered promiscuous mode [ 952.150461][ T7356] syzkaller1: entered allmulticast mode [ 952.157754][ T7358] FAULT_INJECTION: forcing a failure. [ 952.157754][ T7358] name failslab, interval 1, probability 0, space 0, times 0 [ 952.170485][ T7358] CPU: 0 UID: 0 PID: 7358 Comm: syz.4.12232 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 952.170593][ T7358] Tainted: [W]=WARN [ 952.170600][ T7358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 952.170614][ T7358] Call Trace: [ 952.170620][ T7358] [ 952.170627][ T7358] __dump_stack+0x1d/0x30 [ 952.170647][ T7358] dump_stack_lvl+0xe8/0x140 [ 952.170664][ T7358] dump_stack+0x15/0x1b [ 952.170742][ T7358] should_fail_ex+0x265/0x280 [ 952.170841][ T7358] should_failslab+0x8c/0xb0 [ 952.170866][ T7358] kmem_cache_alloc_noprof+0x50/0x310 [ 952.170894][ T7358] ? fib_insert_alias+0x16c/0x770 [ 952.170921][ T7358] fib_insert_alias+0x16c/0x770 [ 952.171032][ T7358] ? kmem_cache_alloc_noprof+0x220/0x310 [ 952.171119][ T7358] ? fib_trie_unmerge+0x351/0xa90 [ 952.171206][ T7358] fib_trie_unmerge+0x456/0xa90 [ 952.171274][ T7358] fib_unmerge+0x82/0x210 [ 952.171300][ T7358] ? fib4_rule_configure+0x1eb/0x4f0 [ 952.171376][ T7358] fib4_rule_configure+0x1f4/0x4f0 [ 952.171394][ T7358] fib_newrule+0x48d/0x930 [ 952.171425][ T7358] fib_nl_newrule+0x46/0x60 [ 952.171470][ T7358] ? __pfx_fib_nl_newrule+0x10/0x10 [ 952.171490][ T7358] rtnetlink_rcv_msg+0x5fb/0x6d0 [ 952.171518][ T7358] netlink_rcv_skb+0x123/0x220 [ 952.171637][ T7358] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 952.171668][ T7358] rtnetlink_rcv+0x1c/0x30 [ 952.171687][ T7358] netlink_unicast+0x5a8/0x680 [ 952.171736][ T7358] netlink_sendmsg+0x58b/0x6b0 [ 952.171759][ T7358] ? __pfx_netlink_sendmsg+0x10/0x10 [ 952.171810][ T7358] __sock_sendmsg+0x142/0x180 [ 952.171834][ T7358] ____sys_sendmsg+0x31e/0x4e0 [ 952.171852][ T7358] ___sys_sendmsg+0x17b/0x1d0 [ 952.171883][ T7358] __x64_sys_sendmsg+0xd4/0x160 [ 952.171905][ T7358] x64_sys_call+0x2999/0x2fb0 [ 952.171969][ T7358] do_syscall_64+0xd2/0x200 [ 952.171987][ T7358] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 952.172014][ T7358] ? clear_bhb_loop+0x40/0x90 [ 952.172080][ T7358] ? clear_bhb_loop+0x40/0x90 [ 952.172108][ T7358] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 952.172130][ T7358] RIP: 0033:0x7fd81eaae9a9 [ 952.172147][ T7358] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 952.172168][ T7358] RSP: 002b:00007fd81d117038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 952.172186][ T7358] RAX: ffffffffffffffda RBX: 00007fd81ecd5fa0 RCX: 00007fd81eaae9a9 [ 952.172197][ T7358] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000005 [ 952.172279][ T7358] RBP: 00007fd81d117090 R08: 0000000000000000 R09: 0000000000000000 [ 952.172290][ T7358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 952.172301][ T7358] R13: 0000000000000000 R14: 00007fd81ecd5fa0 R15: 00007ffc76c338a8 [ 952.172317][ T7358] [ 952.704606][ T7396] ipvlan0: entered promiscuous mode [ 952.797042][ T7399] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 952.806601][ T7399] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 953.002344][ T29] kauditd_printk_skb: 118 callbacks suppressed [ 953.002365][ T29] audit: type=1326 audit(1754276331.004:19910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7393 comm="syz.1.12243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 953.032491][ T29] audit: type=1326 audit(1754276331.004:19911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7393 comm="syz.1.12243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 953.056339][ T29] audit: type=1326 audit(1754276331.004:19912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7393 comm="syz.1.12243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 953.079916][ T29] audit: type=1326 audit(1754276331.004:19913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7393 comm="syz.1.12243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 953.103564][ T29] audit: type=1326 audit(1754276331.004:19914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7393 comm="syz.1.12243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 953.127234][ T29] audit: type=1326 audit(1754276331.004:19915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7393 comm="syz.1.12243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 953.150895][ T29] audit: type=1326 audit(1754276331.004:19916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7393 comm="syz.1.12243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 953.174940][ T29] audit: type=1326 audit(1754276331.004:19917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7393 comm="syz.1.12243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 953.198554][ T29] audit: type=1326 audit(1754276331.004:19918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7393 comm="syz.1.12243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=460 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 953.222211][ T29] audit: type=1326 audit(1754276331.004:19919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7393 comm="syz.1.12243" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0205bbe9a9 code=0x7ffc0000 [ 953.636457][ T7438] __nla_validate_parse: 2 callbacks suppressed [ 953.636467][ T7438] netlink: 40 bytes leftover after parsing attributes in process `syz.1.12256'. [ 953.760876][ T7447] sd 0:0:1:0: device reset [ 953.962175][ T7480] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 953.970751][ T7480] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 954.464220][ T7487] netlink: 24 bytes leftover after parsing attributes in process `syz.8.12271'. [ 954.515659][ T7493] syzkaller1: entered promiscuous mode [ 954.521235][ T7493] syzkaller1: entered allmulticast mode [ 954.545734][ T7495] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12275'. [ 954.556271][ T7495] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12275'. [ 954.565838][ T7495] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12275'. [ 954.575157][ T7495] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12275'. [ 954.597328][ T7497] FAULT_INJECTION: forcing a failure. [ 954.597328][ T7497] name failslab, interval 1, probability 0, space 0, times 0 [ 954.610298][ T7497] CPU: 1 UID: 0 PID: 7497 Comm: syz.1.12276 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 954.610331][ T7497] Tainted: [W]=WARN [ 954.610337][ T7497] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 954.610405][ T7497] Call Trace: [ 954.610431][ T7497] [ 954.610438][ T7497] __dump_stack+0x1d/0x30 [ 954.610458][ T7497] dump_stack_lvl+0xe8/0x140 [ 954.610476][ T7497] dump_stack+0x15/0x1b [ 954.610529][ T7497] should_fail_ex+0x265/0x280 [ 954.610562][ T7497] should_failslab+0x8c/0xb0 [ 954.610588][ T7497] kmem_cache_alloc_node_noprof+0x57/0x320 [ 954.610633][ T7497] ? __alloc_skb+0x101/0x320 [ 954.610666][ T7497] __alloc_skb+0x101/0x320 [ 954.610694][ T7497] netlink_alloc_large_skb+0xba/0xf0 [ 954.610725][ T7497] netlink_sendmsg+0x3cf/0x6b0 [ 954.610794][ T7497] ? __pfx_netlink_sendmsg+0x10/0x10 [ 954.610827][ T7497] __sock_sendmsg+0x142/0x180 [ 954.610853][ T7497] ____sys_sendmsg+0x31e/0x4e0 [ 954.610875][ T7497] ___sys_sendmsg+0x17b/0x1d0 [ 954.610978][ T7497] __x64_sys_sendmsg+0xd4/0x160 [ 954.611002][ T7497] x64_sys_call+0x2999/0x2fb0 [ 954.611025][ T7497] do_syscall_64+0xd2/0x200 [ 954.611044][ T7497] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 954.611070][ T7497] ? clear_bhb_loop+0x40/0x90 [ 954.611116][ T7497] ? clear_bhb_loop+0x40/0x90 [ 954.611138][ T7497] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 954.611232][ T7497] RIP: 0033:0x7f0205bbe9a9 [ 954.611248][ T7497] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 954.611266][ T7497] RSP: 002b:00007f0204227038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 954.611286][ T7497] RAX: ffffffffffffffda RBX: 00007f0205de5fa0 RCX: 00007f0205bbe9a9 [ 954.611299][ T7497] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 954.611331][ T7497] RBP: 00007f0204227090 R08: 0000000000000000 R09: 0000000000000000 [ 954.611344][ T7497] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 954.611357][ T7497] R13: 0000000000000000 R14: 00007f0205de5fa0 R15: 00007ffee3809088 [ 954.611379][ T7497] [ 954.613371][ T7499] netlink: 'syz.4.12277': attribute type 21 has an invalid length. [ 954.834684][ T7499] netlink: 'syz.4.12277': attribute type 4 has an invalid length. [ 954.842559][ T7499] netlink: 132 bytes leftover after parsing attributes in process `syz.4.12277'. [ 954.878572][ T7512] SELinux: failed to load policy [ 954.898226][ T7517] netlink: 24 bytes leftover after parsing attributes in process `syz.1.12283'. [ 954.969411][ T7531] syzkaller1: entered promiscuous mode [ 954.975040][ T7531] syzkaller1: entered allmulticast mode [ 955.011128][ T7522] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 955.020163][ T7522] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 955.159119][ T7553] netlink: 24 bytes leftover after parsing attributes in process `syz.1.12297'. [ 955.266289][ T7551] FAULT_INJECTION: forcing a failure. [ 955.266289][ T7551] name failslab, interval 1, probability 0, space 0, times 0 [ 955.279097][ T7551] CPU: 0 UID: 0 PID: 7551 Comm: syz.8.12294 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 955.279133][ T7551] Tainted: [W]=WARN [ 955.279139][ T7551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 955.279150][ T7551] Call Trace: [ 955.279156][ T7551] [ 955.279163][ T7551] __dump_stack+0x1d/0x30 [ 955.279193][ T7551] dump_stack_lvl+0xe8/0x140 [ 955.279214][ T7551] dump_stack+0x15/0x1b [ 955.279231][ T7551] should_fail_ex+0x265/0x280 [ 955.279265][ T7551] ? tcp_sendmsg_fastopen+0x172/0x520 [ 955.279291][ T7551] should_failslab+0x8c/0xb0 [ 955.279316][ T7551] __kmalloc_cache_noprof+0x4c/0x320 [ 955.279347][ T7551] tcp_sendmsg_fastopen+0x172/0x520 [ 955.279429][ T7551] tcp_sendmsg_locked+0x26e8/0x2c10 [ 955.279452][ T7551] ? mntput_no_expire+0x6f/0x3c0 [ 955.279481][ T7551] ? mntput+0x4b/0x80 [ 955.279505][ T7551] ? __rcu_read_unlock+0x4f/0x70 [ 955.279532][ T7551] ? avc_has_perm_noaudit+0x1b1/0x200 [ 955.279558][ T7551] ? avc_has_perm+0xd3/0x150 [ 955.279580][ T7551] ? _raw_spin_unlock_bh+0x36/0x40 [ 955.279605][ T7551] ? __pfx_tcp_sendmsg+0x10/0x10 [ 955.279713][ T7551] tcp_sendmsg+0x2f/0x50 [ 955.279771][ T7551] inet_sendmsg+0x76/0xd0 [ 955.279793][ T7551] __sock_sendmsg+0x102/0x180 [ 955.279828][ T7551] __sys_sendto+0x268/0x330 [ 955.279866][ T7551] __x64_sys_sendto+0x76/0x90 [ 955.279925][ T7551] x64_sys_call+0x2eb6/0x2fb0 [ 955.279948][ T7551] do_syscall_64+0xd2/0x200 [ 955.279968][ T7551] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 955.279998][ T7551] ? clear_bhb_loop+0x40/0x90 [ 955.280079][ T7551] ? clear_bhb_loop+0x40/0x90 [ 955.280102][ T7551] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 955.280125][ T7551] RIP: 0033:0x7f2b9e8be9a9 [ 955.280142][ T7551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 955.280162][ T7551] RSP: 002b:00007f2b9cefe038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 955.280192][ T7551] RAX: ffffffffffffffda RBX: 00007f2b9eae6080 RCX: 00007f2b9e8be9a9 [ 955.280204][ T7551] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000007 [ 955.280215][ T7551] RBP: 00007f2b9cefe090 R08: 0000000000000000 R09: 0000000000000000 [ 955.280226][ T7551] R10: 00000000240087f9 R11: 0000000000000246 R12: 0000000000000001 [ 955.280243][ T7551] R13: 0000000000000000 R14: 00007f2b9eae6080 R15: 00007ffde4546598 [ 955.280262][ T7551] [ 956.020108][ T7582] netlink: 96 bytes leftover after parsing attributes in process `syz.8.12308'. [ 956.654156][ T7622] FAULT_INJECTION: forcing a failure. [ 956.654156][ T7622] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 956.667563][ T7622] CPU: 1 UID: 0 PID: 7622 Comm: syz.8.12323 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 956.667592][ T7622] Tainted: [W]=WARN [ 956.667599][ T7622] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 956.667678][ T7622] Call Trace: [ 956.667686][ T7622] [ 956.667695][ T7622] __dump_stack+0x1d/0x30 [ 956.667725][ T7622] dump_stack_lvl+0xe8/0x140 [ 956.667747][ T7622] dump_stack+0x15/0x1b [ 956.667765][ T7622] should_fail_ex+0x265/0x280 [ 956.667793][ T7622] should_fail_alloc_page+0xf2/0x100 [ 956.667842][ T7622] alloc_pages_bulk_noprof+0xef/0x540 [ 956.667921][ T7622] copy_splice_read+0xf3/0x5f0 [ 956.668021][ T7622] ? __pfx_shmem_file_splice_read+0x10/0x10 [ 956.668118][ T7622] splice_direct_to_actor+0x290/0x680 [ 956.668149][ T7622] ? __pfx_direct_splice_actor+0x10/0x10 [ 956.668214][ T7622] do_splice_direct+0xda/0x150 [ 956.668244][ T7622] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 956.668282][ T7622] do_sendfile+0x380/0x650 [ 956.668308][ T7622] __x64_sys_sendfile64+0x105/0x150 [ 956.668384][ T7622] x64_sys_call+0xb39/0x2fb0 [ 956.668407][ T7622] do_syscall_64+0xd2/0x200 [ 956.668455][ T7622] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 956.668481][ T7622] ? clear_bhb_loop+0x40/0x90 [ 956.668551][ T7622] ? clear_bhb_loop+0x40/0x90 [ 956.668574][ T7622] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 956.668619][ T7622] RIP: 0033:0x7f2b9e8be9a9 [ 956.668681][ T7622] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 956.668700][ T7622] RSP: 002b:00007f2b9cf1f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 956.668729][ T7622] RAX: ffffffffffffffda RBX: 00007f2b9eae5fa0 RCX: 00007f2b9e8be9a9 [ 956.668768][ T7622] RDX: 0000000000000000 RSI: 0000000000000006 RDI: 0000000000000006 [ 956.668779][ T7622] RBP: 00007f2b9cf1f090 R08: 0000000000000000 R09: 0000000000000000 [ 956.668789][ T7622] R10: 0000000800000009 R11: 0000000000000246 R12: 0000000000000001 [ 956.668801][ T7622] R13: 0000000000000000 R14: 00007f2b9eae5fa0 R15: 00007ffde4546598 [ 956.668820][ T7622] [ 956.949242][ T7630] FAULT_INJECTION: forcing a failure. [ 956.949242][ T7630] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 956.962444][ T7630] CPU: 1 UID: 0 PID: 7630 Comm: syz.8.12326 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 956.962559][ T7630] Tainted: [W]=WARN [ 956.962641][ T7630] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 956.962654][ T7630] Call Trace: [ 956.962686][ T7630] [ 956.962693][ T7630] __dump_stack+0x1d/0x30 [ 956.962712][ T7630] dump_stack_lvl+0xe8/0x140 [ 956.962730][ T7630] dump_stack+0x15/0x1b [ 956.962749][ T7630] should_fail_ex+0x265/0x280 [ 956.962849][ T7630] should_fail+0xb/0x20 [ 956.962879][ T7630] should_fail_usercopy+0x1a/0x20 [ 956.962914][ T7630] _copy_from_user+0x1c/0xb0 [ 956.963006][ T7630] kstrtouint_from_user+0x69/0xf0 [ 956.963039][ T7630] ? 0xffffffff81000000 [ 956.963055][ T7630] ? selinux_file_permission+0x1e4/0x320 [ 956.963083][ T7630] proc_fail_nth_write+0x50/0x160 [ 956.963199][ T7630] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 956.963234][ T7630] vfs_write+0x266/0x8e0 [ 956.963329][ T7630] ? vfs_read+0x47f/0x6f0 [ 956.963360][ T7630] ? __rcu_read_unlock+0x4f/0x70 [ 956.963386][ T7630] ? __fget_files+0x184/0x1c0 [ 956.963421][ T7630] ksys_write+0xda/0x1a0 [ 956.963456][ T7630] __x64_sys_write+0x40/0x50 [ 956.963490][ T7630] x64_sys_call+0x2cdd/0x2fb0 [ 956.963569][ T7630] do_syscall_64+0xd2/0x200 [ 956.963613][ T7630] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 956.963642][ T7630] ? clear_bhb_loop+0x40/0x90 [ 956.963663][ T7630] ? clear_bhb_loop+0x40/0x90 [ 956.963686][ T7630] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 956.963709][ T7630] RIP: 0033:0x7f2b9e8bd45f [ 956.963794][ T7630] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 956.963814][ T7630] RSP: 002b:00007f2b9cf1f030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 956.963835][ T7630] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f2b9e8bd45f [ 956.963848][ T7630] RDX: 0000000000000001 RSI: 00007f2b9cf1f0a0 RDI: 0000000000000005 [ 956.963862][ T7630] RBP: 00007f2b9cf1f090 R08: 0000000000000000 R09: 0000000000000000 [ 956.963927][ T7630] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000002 [ 956.963938][ T7630] R13: 0000000000000000 R14: 00007f2b9eae5fa0 R15: 00007ffde4546598 [ 956.963954][ T7630] [ 957.253839][ T7636] ALSA: seq fatal error: cannot create timer (-19) [ 957.262657][T30741] IPVS: starting estimator thread 0... [ 957.315502][ T7651] rdma_op ffff88810710c180 conn xmit_rdma 0000000000000000 [ 957.383355][ T7643] IPVS: using max 2880 ests per chain, 144000 per kthread [ 957.903393][ T7737] FAULT_INJECTION: forcing a failure. [ 957.903393][ T7737] name failslab, interval 1, probability 0, space 0, times 0 [ 957.916281][ T7737] CPU: 0 UID: 0 PID: 7737 Comm: syz.8.12367 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 957.916316][ T7737] Tainted: [W]=WARN [ 957.916355][ T7737] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 957.916368][ T7737] Call Trace: [ 957.916374][ T7737] [ 957.916382][ T7737] __dump_stack+0x1d/0x30 [ 957.916405][ T7737] dump_stack_lvl+0xe8/0x140 [ 957.916424][ T7737] dump_stack+0x15/0x1b [ 957.916441][ T7737] should_fail_ex+0x265/0x280 [ 957.916473][ T7737] should_failslab+0x8c/0xb0 [ 957.916526][ T7737] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 957.916563][ T7737] ? shmem_alloc_inode+0x34/0x50 [ 957.916598][ T7737] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 957.916692][ T7737] shmem_alloc_inode+0x34/0x50 [ 957.916724][ T7737] alloc_inode+0x40/0x170 [ 957.916756][ T7737] new_inode+0x1d/0xe0 [ 957.916849][ T7737] shmem_get_inode+0x244/0x750 [ 957.916884][ T7737] __shmem_file_setup+0x113/0x210 [ 957.916955][ T7737] shmem_file_setup+0x3b/0x50 [ 957.916985][ T7737] __se_sys_memfd_create+0x2c3/0x590 [ 957.917019][ T7737] __x64_sys_memfd_create+0x31/0x40 [ 957.917051][ T7737] x64_sys_call+0x122f/0x2fb0 [ 957.917081][ T7737] do_syscall_64+0xd2/0x200 [ 957.917101][ T7737] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 957.917129][ T7737] ? clear_bhb_loop+0x40/0x90 [ 957.917152][ T7737] ? clear_bhb_loop+0x40/0x90 [ 957.917195][ T7737] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 957.917220][ T7737] RIP: 0033:0x7f2b9e8be9a9 [ 957.917302][ T7737] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 957.917322][ T7737] RSP: 002b:00007f2b9cf1ee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 957.917421][ T7737] RAX: ffffffffffffffda RBX: 000000000000053e RCX: 00007f2b9e8be9a9 [ 957.917434][ T7737] RDX: 00007f2b9cf1eef0 RSI: 0000000000000000 RDI: 00007f2b9e9416fc [ 957.917448][ T7737] RBP: 0000200000000940 R08: 00007f2b9cf1ebb7 R09: 00007f2b9cf1ee40 [ 957.917461][ T7737] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 957.917474][ T7737] R13: 00007f2b9cf1eef0 R14: 00007f2b9cf1eeb0 R15: 00002000000003c0 [ 957.917494][ T7737] [ 958.151820][ T7731] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=25116 sclass=netlink_route_socket pid=7731 comm=syz.6.12358 [ 958.216337][ T7744] FAULT_INJECTION: forcing a failure. [ 958.216337][ T7744] name failslab, interval 1, probability 0, space 0, times 0 [ 958.229069][ T7744] CPU: 1 UID: 0 PID: 7744 Comm: syz.8.12370 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 958.229099][ T7744] Tainted: [W]=WARN [ 958.229105][ T7744] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 958.229117][ T7744] Call Trace: [ 958.229124][ T7744] [ 958.229132][ T7744] __dump_stack+0x1d/0x30 [ 958.229152][ T7744] dump_stack_lvl+0xe8/0x140 [ 958.229208][ T7744] dump_stack+0x15/0x1b [ 958.229222][ T7744] should_fail_ex+0x265/0x280 [ 958.229249][ T7744] should_failslab+0x8c/0xb0 [ 958.229312][ T7744] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 958.229338][ T7744] ? strncmp+0x34/0x70 [ 958.229405][ T7744] ? match_strdup+0x37/0x40 [ 958.229423][ T7744] ? strcmp+0x22/0x50 [ 958.229440][ T7744] kmemdup_nul+0x36/0xc0 [ 958.229491][ T7744] match_strdup+0x37/0x40 [ 958.229509][ T7744] p9_client_create+0x2c9/0xbc0 [ 958.229540][ T7744] v9fs_session_init+0xf7/0xde0 [ 958.229563][ T7744] ? obj_cgroup_charge_account+0x122/0x1a0 [ 958.229667][ T7744] ? __rcu_read_unlock+0x4f/0x70 [ 958.229686][ T7744] ? should_fail_ex+0xdb/0x280 [ 958.229711][ T7744] ? v9fs_mount+0x51/0x590 [ 958.229764][ T7744] ? should_failslab+0x8c/0xb0 [ 958.229825][ T7744] ? __kmalloc_cache_noprof+0x189/0x320 [ 958.229850][ T7744] v9fs_mount+0x67/0x590 [ 958.229883][ T7744] ? __pfx_v9fs_mount+0x10/0x10 [ 958.229909][ T7744] legacy_get_tree+0x78/0xd0 [ 958.229937][ T7744] vfs_get_tree+0x54/0x1d0 [ 958.230034][ T7744] do_new_mount+0x207/0x680 [ 958.230067][ T7744] path_mount+0x4a4/0xb20 [ 958.230094][ T7744] ? user_path_at+0x109/0x130 [ 958.230135][ T7744] __se_sys_mount+0x28f/0x2e0 [ 958.230164][ T7744] ? fput+0x8f/0xc0 [ 958.230186][ T7744] __x64_sys_mount+0x67/0x80 [ 958.230214][ T7744] x64_sys_call+0xd36/0x2fb0 [ 958.230281][ T7744] do_syscall_64+0xd2/0x200 [ 958.230298][ T7744] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 958.230405][ T7744] ? clear_bhb_loop+0x40/0x90 [ 958.230484][ T7744] ? clear_bhb_loop+0x40/0x90 [ 958.230529][ T7744] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 958.230547][ T7744] RIP: 0033:0x7f2b9e8be9a9 [ 958.230586][ T7744] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 958.230602][ T7744] RSP: 002b:00007f2b9cf1f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 958.230618][ T7744] RAX: ffffffffffffffda RBX: 00007f2b9eae5fa0 RCX: 00007f2b9e8be9a9 [ 958.230699][ T7744] RDX: 0000200000000100 RSI: 0000200000000040 RDI: 0000000000000000 [ 958.230709][ T7744] RBP: 00007f2b9cf1f090 R08: 0000200000000200 R09: 0000000000000000 [ 958.230720][ T7744] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 958.230730][ T7744] R13: 0000000000000000 R14: 00007f2b9eae5fa0 R15: 00007ffde4546598 [ 958.230766][ T7744] [ 958.562591][ T29] kauditd_printk_skb: 247 callbacks suppressed [ 958.562606][ T29] audit: type=1326 audit(1754276336.663:20165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7753 comm="syz.4.12375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd81eaae9a9 code=0x7ffc0000 [ 958.592818][ T29] audit: type=1326 audit(1754276336.673:20166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7753 comm="syz.4.12375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7fd81eaae9a9 code=0x7ffc0000 [ 958.616802][ T29] audit: type=1326 audit(1754276336.673:20167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7753 comm="syz.4.12375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd81eaae9a9 code=0x7ffc0000 [ 958.640472][ T29] audit: type=1326 audit(1754276336.673:20168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7753 comm="syz.4.12375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd81eaae9a9 code=0x7ffc0000 [ 958.664093][ T29] audit: type=1326 audit(1754276336.673:20169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7753 comm="syz.4.12375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd81eaae9a9 code=0x7ffc0000 [ 958.687948][ T29] audit: type=1326 audit(1754276336.673:20170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7753 comm="syz.4.12375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fd81eaae9a9 code=0x7ffc0000 [ 958.711812][ T29] audit: type=1326 audit(1754276336.673:20171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7753 comm="syz.4.12375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd81eaae9a9 code=0x7ffc0000 [ 958.735814][ T29] audit: type=1326 audit(1754276336.673:20172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7753 comm="syz.4.12375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fd81eaae9a9 code=0x7ffc0000 [ 958.759448][ T29] audit: type=1326 audit(1754276336.673:20173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7753 comm="syz.4.12375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd81eaae9a9 code=0x7ffc0000 [ 958.783198][ T29] audit: type=1326 audit(1754276336.673:20174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7753 comm="syz.4.12375" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7fd81eaae9a9 code=0x7ffc0000 [ 958.810574][ T7760] __nla_validate_parse: 6 callbacks suppressed [ 958.810587][ T7760] netlink: 24 bytes leftover after parsing attributes in process `syz.6.12377'. [ 958.907453][ T7764] netlink: 64 bytes leftover after parsing attributes in process `syz.1.12379'. [ 959.104683][ T7781] netlink: 156 bytes leftover after parsing attributes in process `syz.8.12385'. [ 959.136204][ T7781] netlink: 24 bytes leftover after parsing attributes in process `syz.8.12385'. [ 959.221419][ T7792] FAULT_INJECTION: forcing a failure. [ 959.221419][ T7792] name failslab, interval 1, probability 0, space 0, times 0 [ 959.234176][ T7792] CPU: 1 UID: 0 PID: 7792 Comm: syz.0.12390 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 959.234211][ T7792] Tainted: [W]=WARN [ 959.234218][ T7792] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 959.234233][ T7792] Call Trace: [ 959.234240][ T7792] [ 959.234249][ T7792] __dump_stack+0x1d/0x30 [ 959.234345][ T7792] dump_stack_lvl+0xe8/0x140 [ 959.234437][ T7792] dump_stack+0x15/0x1b [ 959.234452][ T7792] should_fail_ex+0x265/0x280 [ 959.234486][ T7792] should_failslab+0x8c/0xb0 [ 959.234512][ T7792] __kvmalloc_node_noprof+0x123/0x4e0 [ 959.234540][ T7792] ? proc_sys_call_handler+0x243/0x4a0 [ 959.234616][ T7792] proc_sys_call_handler+0x243/0x4a0 [ 959.234639][ T7792] proc_sys_write+0x22/0x30 [ 959.234658][ T7792] iter_file_splice_write+0x5ef/0x970 [ 959.234735][ T7792] ? __pfx_iter_file_splice_write+0x10/0x10 [ 959.234767][ T7792] direct_splice_actor+0x153/0x2a0 [ 959.234793][ T7792] ? splice_shrink_spd+0x1/0x70 [ 959.234869][ T7792] splice_direct_to_actor+0x30f/0x680 [ 959.234926][ T7792] ? __pfx_direct_splice_actor+0x10/0x10 [ 959.235019][ T7792] do_splice_direct+0xda/0x150 [ 959.235044][ T7792] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 959.235076][ T7792] do_sendfile+0x380/0x650 [ 959.235178][ T7792] __x64_sys_sendfile64+0x105/0x150 [ 959.235201][ T7792] x64_sys_call+0xb39/0x2fb0 [ 959.235221][ T7792] do_syscall_64+0xd2/0x200 [ 959.235246][ T7792] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 959.235278][ T7792] ? clear_bhb_loop+0x40/0x90 [ 959.235424][ T7792] ? clear_bhb_loop+0x40/0x90 [ 959.235444][ T7792] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 959.235464][ T7792] RIP: 0033:0x7f3c9e45e9a9 [ 959.235481][ T7792] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 959.235502][ T7792] RSP: 002b:00007f3c9cac7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 959.235553][ T7792] RAX: ffffffffffffffda RBX: 00007f3c9e685fa0 RCX: 00007f3c9e45e9a9 [ 959.235564][ T7792] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 959.235575][ T7792] RBP: 00007f3c9cac7090 R08: 0000000000000000 R09: 0000000000000000 [ 959.235589][ T7792] R10: 00000000003fffff R11: 0000000000000246 R12: 0000000000000001 [ 959.235603][ T7792] R13: 0000000000000000 R14: 00007f3c9e685fa0 R15: 00007ffee847d448 [ 959.235626][ T7792] [ 959.503098][ T7777] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 959.513221][ T7777] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 959.678085][ T7802] netlink: 'syz.0.12394': attribute type 4 has an invalid length. [ 959.688897][ T7802] netlink: 'syz.0.12394': attribute type 4 has an invalid length. [ 960.020465][ T7857] netlink: 44 bytes leftover after parsing attributes in process `syz.8.12418'. [ 960.048959][ T7862] netlink: 24 bytes leftover after parsing attributes in process `syz.4.12421'. [ 960.130830][ T7880] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=7880 comm=syz.0.12427 [ 960.324295][ T7895] netlink: 'syz.0.12433': attribute type 4 has an invalid length. [ 960.346399][ T7895] netlink: 'syz.0.12433': attribute type 4 has an invalid length. [ 960.429049][ T7895] FAULT_INJECTION: forcing a failure. [ 960.429049][ T7895] name failslab, interval 1, probability 0, space 0, times 0 [ 960.441808][ T7895] CPU: 1 UID: 0 PID: 7895 Comm: syz.0.12433 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 960.441840][ T7895] Tainted: [W]=WARN [ 960.441848][ T7895] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 960.441862][ T7895] Call Trace: [ 960.441868][ T7895] [ 960.441875][ T7895] __dump_stack+0x1d/0x30 [ 960.441948][ T7895] dump_stack_lvl+0xe8/0x140 [ 960.441966][ T7895] dump_stack+0x15/0x1b [ 960.441981][ T7895] should_fail_ex+0x265/0x280 [ 960.442088][ T7895] should_failslab+0x8c/0xb0 [ 960.442108][ T7895] __kmalloc_noprof+0xa5/0x3e0 [ 960.442132][ T7895] ? sock_kmalloc+0x85/0xc0 [ 960.442153][ T7895] sock_kmalloc+0x85/0xc0 [ 960.442207][ T7895] __ip_mc_join_group+0x1be/0x2b0 [ 960.442238][ T7895] ip_mc_join_group+0x1f/0x30 [ 960.442262][ T7895] ip_mcast_join_leave+0x132/0x180 [ 960.442354][ T7895] do_ip_setsockopt+0x18e0/0x2240 [ 960.442383][ T7895] ip_setsockopt+0x58/0x110 [ 960.442414][ T7895] raw_setsockopt+0xbd/0x150 [ 960.442512][ T7895] sock_common_setsockopt+0x66/0x80 [ 960.442578][ T7895] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 960.442608][ T7895] __sys_setsockopt+0x181/0x200 [ 960.442640][ T7895] __x64_sys_setsockopt+0x64/0x80 [ 960.442669][ T7895] x64_sys_call+0x2bd5/0x2fb0 [ 960.442717][ T7895] do_syscall_64+0xd2/0x200 [ 960.442735][ T7895] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 960.442759][ T7895] ? clear_bhb_loop+0x40/0x90 [ 960.442779][ T7895] ? clear_bhb_loop+0x40/0x90 [ 960.442849][ T7895] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 960.442891][ T7895] RIP: 0033:0x7f3c9e45e9a9 [ 960.442905][ T7895] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 960.442922][ T7895] RSP: 002b:00007f3c9cac7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 960.442939][ T7895] RAX: ffffffffffffffda RBX: 00007f3c9e685fa0 RCX: 00007f3c9e45e9a9 [ 960.442950][ T7895] RDX: 000000000000002a RSI: 0000000000000000 RDI: 0000000000000005 [ 960.442964][ T7895] RBP: 00007f3c9cac7090 R08: 0000000000000088 R09: 0000000000000000 [ 960.442977][ T7895] R10: 00002000000008c0 R11: 0000000000000246 R12: 0000000000000001 [ 960.442999][ T7895] R13: 0000000000000000 R14: 00007f3c9e685fa0 R15: 00007ffee847d448 [ 960.443015][ T7895] [ 960.694745][ T7901] netlink: 24 bytes leftover after parsing attributes in process `syz.0.12435'. [ 960.789246][ T7918] program syz.0.12437 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 960.906964][ T7926] syzkaller1: entered promiscuous mode [ 960.912594][ T7926] syzkaller1: entered allmulticast mode [ 961.052848][ T7929] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 961.061715][ T7929] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 961.118931][ T7937] netlink: 24 bytes leftover after parsing attributes in process `syz.8.12448'. [ 961.185844][ T7948] FAULT_INJECTION: forcing a failure. [ 961.185844][ T7948] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 961.199622][ T7948] CPU: 0 UID: 0 PID: 7948 Comm: syz.1.12454 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 961.199654][ T7948] Tainted: [W]=WARN [ 961.199661][ T7948] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 961.199753][ T7948] Call Trace: [ 961.199760][ T7948] [ 961.199768][ T7948] __dump_stack+0x1d/0x30 [ 961.199814][ T7948] dump_stack_lvl+0xe8/0x140 [ 961.199835][ T7948] dump_stack+0x15/0x1b [ 961.199891][ T7948] should_fail_ex+0x265/0x280 [ 961.199925][ T7948] should_fail+0xb/0x20 [ 961.199990][ T7948] should_fail_usercopy+0x1a/0x20 [ 961.200026][ T7948] _copy_from_iter+0xcf/0xe40 [ 961.200209][ T7948] hci_sock_sendmsg+0x36d/0x910 [ 961.200267][ T7948] ? __pfx_hci_sock_sendmsg+0x10/0x10 [ 961.200292][ T7948] __sock_sendmsg+0x142/0x180 [ 961.200400][ T7948] sock_write_iter+0x165/0x1b0 [ 961.200424][ T7948] aio_write+0x2e5/0x410 [ 961.200447][ T7948] io_submit_one+0xacd/0x11d0 [ 961.200510][ T7948] __se_sys_io_submit+0xfb/0x280 [ 961.200595][ T7948] __x64_sys_io_submit+0x43/0x50 [ 961.200690][ T7948] x64_sys_call+0xfc4/0x2fb0 [ 961.200711][ T7948] do_syscall_64+0xd2/0x200 [ 961.200728][ T7948] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 961.200753][ T7948] ? clear_bhb_loop+0x40/0x90 [ 961.200820][ T7948] ? clear_bhb_loop+0x40/0x90 [ 961.200838][ T7948] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 961.200857][ T7948] RIP: 0033:0x7f0205bbe9a9 [ 961.200870][ T7948] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 961.200886][ T7948] RSP: 002b:00007f0204227038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 961.201024][ T7948] RAX: ffffffffffffffda RBX: 00007f0205de5fa0 RCX: 00007f0205bbe9a9 [ 961.201035][ T7948] RDX: 0000200000000340 RSI: 0000000000000001 RDI: 00007f02041e3000 [ 961.201046][ T7948] RBP: 00007f0204227090 R08: 0000000000000000 R09: 0000000000000000 [ 961.201056][ T7948] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 961.201067][ T7948] R13: 0000000000000000 R14: 00007f0205de5fa0 R15: 00007ffee3809088 [ 961.201140][ T7948] [ 961.511657][ T7959] syzkaller1: entered promiscuous mode [ 961.517319][ T7959] syzkaller1: entered allmulticast mode [ 961.653415][ T7973] netlink: 24 bytes leftover after parsing attributes in process `syz.6.12463'. [ 961.871297][ T7984] wg2: entered promiscuous mode [ 961.876195][ T7984] wg2: entered allmulticast mode [ 961.978279][ T7993] netlink: 'syz.6.12471': attribute type 10 has an invalid length. [ 962.058366][ T8000] netlink: 24 bytes leftover after parsing attributes in process `syz.0.12475'. [ 962.214245][ T8016] netlink: 'syz.0.12478': attribute type 4 has an invalid length. [ 962.247053][ T8016] netlink: 'syz.0.12478': attribute type 4 has an invalid length. [ 962.606371][ T8048] syzkaller1: entered promiscuous mode [ 962.612115][ T8048] syzkaller1: entered allmulticast mode [ 962.948660][ C0] ================================================================== [ 962.957037][ C0] BUG: KCSAN: data-race in wq_worker_tick / wq_worker_tick [ 962.964244][ C0] [ 962.966568][ C0] read-write to 0xffff8881001e36b8 of 8 bytes by interrupt on cpu 1: [ 962.974774][ C0] wq_worker_tick+0x60/0x230 [ 962.979377][ C0] sched_tick+0x11a/0x270 [ 962.983717][ C0] update_process_times+0x15f/0x190 [ 962.988935][ C0] tick_nohz_handler+0x249/0x2d0 [ 962.993893][ C0] __hrtimer_run_queues+0x20c/0x5a0 [ 962.999110][ C0] hrtimer_interrupt+0x21a/0x460 [ 963.004067][ C0] __sysvec_apic_timer_interrupt+0x5c/0x1d0 [ 963.009985][ C0] sysvec_apic_timer_interrupt+0x6f/0x80 [ 963.015640][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 963.021649][ C0] uncharge_folio+0xd7/0x350 [ 963.026265][ C0] __mem_cgroup_uncharge_folios+0x58/0xb0 [ 963.032640][ C0] folios_put_refs+0x26e/0x2d0 [ 963.037439][ C0] release_pages+0x2a8/0x2f0 [ 963.042194][ C0] io_free_region+0x7b/0x160 [ 963.046810][ C0] io_ring_ctx_free+0x1d0/0x390 [ 963.051693][ C0] io_ring_exit_work+0x529/0x560 [ 963.056649][ C0] process_scheduled_works+0x4cb/0x9d0 [ 963.062141][ C0] worker_thread+0x582/0x770 [ 963.066762][ C0] kthread+0x486/0x510 [ 963.070844][ C0] ret_from_fork+0xda/0x150 [ 963.075356][ C0] ret_from_fork_asm+0x1a/0x30 [ 963.080230][ C0] [ 963.082546][ C0] read-write to 0xffff8881001e36b8 of 8 bytes by interrupt on cpu 0: [ 963.090702][ C0] wq_worker_tick+0x60/0x230 [ 963.095313][ C0] sched_tick+0x11a/0x270 [ 963.099652][ C0] update_process_times+0x15f/0x190 [ 963.104885][ C0] tick_nohz_handler+0x249/0x2d0 [ 963.109861][ C0] __hrtimer_run_queues+0x20c/0x5a0 [ 963.115092][ C0] hrtimer_interrupt+0x21a/0x460 [ 963.120047][ C0] __sysvec_apic_timer_interrupt+0x5c/0x1d0 [ 963.125969][ C0] sysvec_apic_timer_interrupt+0x6f/0x80 [ 963.131627][ C0] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 963.137631][ C0] io_poll_remove_all+0x70/0x1a0 [ 963.142591][ C0] io_uring_try_cancel_requests+0x275/0x310 [ 963.148499][ C0] io_ring_exit_work+0x195/0x560 [ 963.153443][ C0] process_scheduled_works+0x4cb/0x9d0 [ 963.158906][ C0] worker_thread+0x582/0x770 [ 963.163520][ C0] kthread+0x486/0x510 [ 963.167684][ C0] ret_from_fork+0xda/0x150 [ 963.172388][ C0] ret_from_fork_asm+0x1a/0x30 [ 963.177159][ C0] [ 963.179474][ C0] value changed: 0x0000000000233f70 -> 0x0000000000236680 [ 963.186570][ C0] [ 963.188896][ C0] Reported by Kernel Concurrency Sanitizer on: [ 963.195047][ C0] CPU: 0 UID: 0 PID: 27825 Comm: kworker/u8:51 Tainted: G W 6.16.0-syzkaller #0 PREEMPT(voluntary) [ 963.207370][ C0] Tainted: [W]=WARN [ 963.211162][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 963.221229][ C0] Workqueue: iou_exit io_ring_exit_work [ 963.226794][ C0] ==================================================================