last executing test programs: 9m9.662747184s ago: executing program 1 (id=5211): socket$inet_tcp(0x2, 0x1, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000100)='cgroup.kill\x00', 0x275a, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x0, 0x0, 0x0, 0xf5b}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r3 = syz_io_uring_setup(0x111, &(0x7f00000000c0)={0x0, 0x24ad, 0x10000, 0x1, 0x1de}, &(0x7f00000029c0)=0x0, &(0x7f0000000000)=0x0) r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) close_range(r1, r6, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000001040)=@IORING_OP_CLOSE={0x13, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x1}) io_uring_enter(r3, 0x1733, 0x6323, 0x20, 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) syz_mount_image$ext4(&(0x7f0000000140)='ext3\x00', &(0x7f00000005c0)='./file0\x00', 0x1019e18, &(0x7f00000006c0)={[], [{@dont_measure}, {@dont_measure}, {@euid_lt}, {@obj_type={'obj_type', 0x3d, '}'}}, {@dont_hash}, {@fscontext={'fscontext', 0x3d, 'user_u'}}, {@permit_directio}, {@hash}, {@appraise_type}, {@uid_gt}]}, 0x1, 0x630, &(0x7f0000002080)="$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") r7 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r8 = ioctl$LOOP_CTL_GET_FREE(r7, 0x4c82) ioctl$LOOP_CTL_REMOVE(r7, 0x4c81, r8) fcntl$lock(r0, 0x7, 0x0) r9 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000040)=ANY=[@ANYRESDEC=r2, @ANYRES64=0x0], &(0x7f0000001f80)=""/226, 0x26, 0xe2, 0x20002, 0x0, 0x10000, @value=r6}, 0x28) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000000)={0x1}, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000140)={{0x1}, &(0x7f00000000c0), &(0x7f0000000100)=r9}, 0x20) mkdir(&(0x7f00000003c0)='./file0\x00', 0x21) mount(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000080)='sysfs\x00', 0x1214040, 0x0) lgetxattr(&(0x7f0000001cc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000200)=@known='trusted.overlay.nlink\x00', 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x12, 0x10, &(0x7f0000000240)=ANY=[@ANYRES64=r10, @ANYRES8=r5, @ANYRESHEX=r4, @ANYRES64=r2], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @cgroup_sock_addr=0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x208, 0xd9}, 0x50) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r11, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000e50095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r12}, 0x18) 9m9.567910662s ago: executing program 1 (id=5214): socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) socket$inet6(0xa, 0x1, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000280)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x2, 0x5}}, @int={0xfffffffd, 0x0, 0x0, 0x1, 0x5, 0x20}]}}, 0x0, 0x42}, 0x28) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB="16000000000000000400000007"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000000000000081, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x18) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) r4 = socket(0x10, 0x3, 0x0) getsockopt$inet_pktinfo(r4, 0x0, 0x8, &(0x7f0000000040)={0x0, @loopback, @loopback}, &(0x7f0000000080)=0xc) sendmsg$nl_route_sched(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001280)=@newtaction={0x18, 0x31, 0x3d, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000700)={0x0, 0x1e5, &(0x7f00000006c0)={&(0x7f0000000440)=@deltaction={0x28, 0x31, 0x101, 0x0, 0x0, {}, [@TCA_ACT_TAB={0x14, 0x1, [{0x10, 0x1, 0x0, 0x0, @TCA_ACT_KIND={0x9, 0x1, 'gact\x00'}}]}]}, 0x28}}, 0x0) 9m9.567053952s ago: executing program 1 (id=5215): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000ff0f00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0x4, &(0x7f00000005c0)=ANY=[@ANYBLOB="18000000feffffff0000000000"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r2}, 0x18) move_pages(0x0, 0x20a0, &(0x7f0000000040), &(0x7f0000001180), &(0x7f0000000000), 0x0) 9m9.549196853s ago: executing program 1 (id=5216): bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000ff0f00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r0}, 0x10) move_pages(0x0, 0x20a0, &(0x7f0000000040), &(0x7f0000001180), &(0x7f0000000000), 0x0) 9m9.532766495s ago: executing program 1 (id=5217): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setscheduler(r0, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000840)=@abs={0x0, 0x0, 0x4e20}, 0x9) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)={0x1c, r5, 0x9c3fa077fa966179, 0x0, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x4008084}, 0x0) 9m8.449559743s ago: executing program 1 (id=5229): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0xfffffffffffffdd0, 0x0, 0x41000}, 0x94) creat(&(0x7f0000000040)='./file0\x00', 0x0) (async) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r1}, 0x10) pipe2$9p(&(0x7f00000001c0), 0x0) (async) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_u}]}}) (async) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_u}]}}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) write$binfmt_aout(r5, 0x0, 0x0) waitid(0x0, r4, 0x0, 0x4, 0x0) syz_pidfd_open(r4, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x30e, &(0x7f0000000f00)="$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") r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r7 = creat(&(0x7f0000000180)='./file0\x00', 0x0) close(r7) (async) close(r7) r8 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}}) r9 = openat(r7, &(0x7f00000000c0)='./bus\x00', 0x80002, 0x26843c9d44ba4bba) write(r9, &(0x7f0000004200)='t', 0x1) sendfile(r9, r6, 0x0, 0x3ffff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, 0x0, 0x0) sendfile(r9, r6, 0x0, 0x7ffff000) 8m52.890735122s ago: executing program 32 (id=5229): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0xfffffffffffffdd0, 0x0, 0x41000}, 0x94) creat(&(0x7f0000000040)='./file0\x00', 0x0) (async) creat(&(0x7f0000000040)='./file0\x00', 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r1}, 0x10) pipe2$9p(&(0x7f00000001c0), 0x0) (async) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_u}]}}) (async) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@version_u}]}}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) (async) r4 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) r5 = openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) write$binfmt_aout(r5, 0x0, 0x0) waitid(0x0, r4, 0x0, 0x4, 0x0) syz_pidfd_open(r4, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x30e, &(0x7f0000000f00)="$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") r6 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r7 = creat(&(0x7f0000000180)='./file0\x00', 0x0) close(r7) (async) close(r7) r8 = timerfd_create(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}}) r9 = openat(r7, &(0x7f00000000c0)='./bus\x00', 0x80002, 0x26843c9d44ba4bba) write(r9, &(0x7f0000004200)='t', 0x1) sendfile(r9, r6, 0x0, 0x3ffff) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x1000000000021, 0x0, 0x0) sendfile(r9, r6, 0x0, 0x7ffff000) 5m35.955232621s ago: executing program 3 (id=7896): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000f00)={'veth0_to_batadv\x00', &(0x7f0000000000)=@ethtool_perm_addr={0x4b, 0x37, "4372071e845c1497c855383000000002000000372a72ee4dfeed37968b00905020000055965737d2aaec032b9753384b00000000ef86ed"}}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='ufshcd_upiu\x00', r4, 0x0, 0x2}, 0x18) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000780)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb}}, @TCA_CT_MARK={0x8, 0x10}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004000}, 0x10000000) fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') getxattr(&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="871000000000000000000100000008000300000001000500060000000000050005"], 0x30}, 0x1, 0x0, 0x0, 0x94}, 0x8808) setxattr$incfs_metadata(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f00000000c0)='T', 0x1, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000000)=@known='user.incfs.metadata\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) timer_create(0x0, 0x0, &(0x7f0000001240)=0x0) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a80000000060a0b04200000000000000002000000540004803c0001800a0001006c696d69740000002c0002800c000240000000000000000008000540000000000c00014000000000000000010800044000000001140001800b0001007470726f78790000040002800900010073797a30000000000900020073797a32"], 0xa8}}, 0x0) timer_gettime(r9, &(0x7f0000001280)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x5a, &(0x7f0000000580)=[{0x6, 0xc3, 0x2, 0xfffffffc}, {0xa04, 0x2, 0x59, 0x9}, {0x3, 0x3, 0x7, 0x80000000}, {0x8, 0x3, 0xd7, 0x9}, {0x1012, 0x0, 0x4, 0x8}, {0x8, 0x4, 0x4, 0xc4}, {0x7ff, 0x6, 0xff, 0xf12}, {0xff, 0x6, 0x18, 0x756a}, {0x4, 0xc9, 0x40, 0x3f}, {0x5, 0xc, 0x6, 0x5}]}) 5m35.704911301s ago: executing program 3 (id=7904): ioctl$HDIO_GETGEO(0xffffffffffffffff, 0x301, &(0x7f0000000000)) bind$inet6(0xffffffffffffffff, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ptrace$poke(0x4, 0x0, 0x0, 0x7) openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)={0x4c, 0x2, 0x6, 0x801, 0x0, 0x0, {0x0, 0x0, 0x40}, [@IPSET_ATTR_PROTOCOL={0x5, 0x1, 0x6}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}, @IPSET_ATTR_TYPENAME={0x11, 0x3, 'hash:ip,mark\x00'}]}, 0x4c}}, 0x0) sendmsg$IPSET_CMD_ADD(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)=ANY=[@ANYBLOB="4c0000000906010200000000000000000500fff7240007800c000180080001406401012008000a40004000020c00028008000140640101000900020073797a3100000000050001000700"], 0x4c}, 0x1, 0x0, 0x0, 0x800}, 0x40c0080) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r3, 0xc0105500, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0xa, 0x4, &(0x7f0000000040)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 5m34.778793546s ago: executing program 3 (id=7920): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000140)='ext4_es_find_extent_range_enter\x00', r0, 0x0, 0x3}, 0x18) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, &(0x7f0000000500)={0x1, {{0xa, 0x4e22, 0x4, @empty, 0x1}}}, 0x88) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x3, 0x0, 0x7ffc1ff9}]}) getpriority(0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) lchown(&(0x7f00000006c0)='./file0\x00', 0x0, 0xee01) 5m34.741350259s ago: executing program 3 (id=7921): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x10, 0x7ffc1ffb}]}) r0 = getpid() tgkill(r0, 0x0, 0xf) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040), 0x105480, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000300)={'syztnl0\x00', &(0x7f0000000500)={'ip6tnl0\x00', 0x0, 0x2f, 0xff, 0x5, 0x1ff, 0x44, @empty, @mcast1, 0x40, 0x8000, 0x0, 0x3c38e439}}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r3, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pipe2(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) splice(r7, 0x0, r6, 0x0, 0x6, 0x0) fcntl$setstatus(r6, 0x4, 0x7c00) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000700000000000000000000850000002300000095"], &(0x7f00000001c0)='GPL\x00', 0x4, 0x0, 0x0, 0x41000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x18) dup3(r7, r6, 0x0) sendmsg$IPSET_CMD_PROTOCOL(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000340)=ANY=[@ANYBLOB="2c000000010605"], 0x2c}, 0x1, 0x0, 0x0, 0x40001d0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) ioctl$PPPIOCSACTIVE(r5, 0x40107446, &(0x7f00000002c0)={0x5, &(0x7f0000000280)=[{0x8, 0x2, 0x6, 0x5}, {0x2, 0xa1, 0x8, 0x2}, {0x5, 0x80, 0x9, 0x87}, {0x4, 0x4, 0x5, 0xff}, {0x5409, 0x6, 0xa8}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, 0xffffffffffffffff, 0x0) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) bpf$MAP_CREATE(0x0, 0x0, 0x50) 5m34.559052964s ago: executing program 3 (id=7927): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa00"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x37, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000200)='kmem_cache_free\x00', r1}, 0x18) mq_open(&(0x7f0000000040)='\x00', 0x1, 0x1, &(0x7f0000000080)={0x2, 0x8, 0x7fffffffffffffff, 0x7fffffff}) 5m34.511846568s ago: executing program 3 (id=7929): pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup(r1) (async) r2 = dup(r1) mkdir(&(0x7f0000000200)='./file0\x00', 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x18}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x94) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x18}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x2040, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$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") (async) syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$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") bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000340)='mm_page_free\x00', r6, 0x0, 0x100000002}, 0x18) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x2000c12, &(0x7f00000000c0)={[{@unhide}]}, 0x2, 0xa1a, &(0x7f0000000e40)="$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") bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x52, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x20, 0x1, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x9}}]}, 0x20}}, 0x0) (async) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x20, 0x1, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x9}}]}, 0x20}}, 0x0) socket(0x10, 0x3, 0x0) (async) r7 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r7, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="2000000052000100000000000000000002"], 0x20}}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) (async) creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000380)='9p_protocol_dump\x00', r3}, 0x18) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) (async) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 5m19.563799698s ago: executing program 33 (id=7929): pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) dup(r1) (async) r2 = dup(r1) mkdir(&(0x7f0000000200)='./file0\x00', 0xfffffffffffffffe) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x18}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x94) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x3, 0x4, &(0x7f0000000000)=@framed={{0x18, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, [@call={0x85, 0x0, 0x0, 0x18}]}, &(0x7f0000000080)='syzkaller\x00'}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x2040, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$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") (async) syz_mount_image$ext4(&(0x7f0000000300)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f00000001c0), 0x1, 0x553, &(0x7f0000001080)="$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") bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) (async) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000340)='mm_page_free\x00', r6, 0x0, 0x100000002}, 0x18) syz_mount_image$iso9660(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x2000c12, &(0x7f00000000c0)={[{@unhide}]}, 0x2, 0xa1a, &(0x7f0000000e40)="$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") bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x52, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x20, 0x1, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x9}}]}, 0x20}}, 0x0) (async) sendmsg$NFQNL_MSG_VERDICT(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={0x20, 0x1, 0x3, 0x101, 0x0, 0x0, {}, [@NFQA_VERDICT_HDR={0xc, 0x2, {0xfffffffffffffffe, 0x9}}]}, 0x20}}, 0x0) socket(0x10, 0x3, 0x0) (async) r7 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r7, 0x10e, 0xc, &(0x7f0000000040)={0x802}, 0x10) sendmsg$nl_generic(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="2000000052000100000000000000000002"], 0x20}}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r8}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) (async) creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r4, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000380)='9p_protocol_dump\x00', r3}, 0x18) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) (async) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000b80), 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) 2m30.919934367s ago: executing program 2 (id=11535): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x50) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x1f, 0xf, &(0x7f0000001440)=ANY=[@ANYBLOB="180000000000000000000000fdffffff18110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000400850000008600000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x11, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80002002}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000500)={r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000640), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_SET(r2, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000280)={0x14, r3, 0x1, 0x0, 0x4, {0x2c}}, 0x14}}, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r4 = socket$packet(0x11, 0x2, 0x300) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r5, &(0x7f0000000180)={0xa, 0x4001, 0xd000000, @dev={0xfe, 0x80, '\x00', 0x1b}, 0xd}, 0x1c) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='blkio.throttle.io_service_bytes_recursive\x00', 0x275a, 0x0) write$binfmt_script(r6, &(0x7f0000000100), 0xfffffd9d) sendfile(r5, r6, 0x0, 0x8000002b) setsockopt$packet_fanout_data(r4, 0x107, 0x16, &(0x7f0000000100)={0x2, &(0x7f0000000080)=[{0x30, 0x0, 0x0, 0xfffff00c}, {0x6, 0x0, 0x5, 0x12e}]}, 0x10) 2m30.493805602s ago: executing program 2 (id=11542): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000f00)={'veth0_to_batadv\x00', &(0x7f0000000000)=@ethtool_perm_addr={0x4b, 0x37, "4372071e845c1497c855383000000002000000372a72ee4dfeed37968b00905020000055965737d2aaec032b9753384b00000000ef86ed"}}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='ufshcd_upiu\x00', r4, 0x0, 0x2}, 0x18) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000780)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb}}, @TCA_CT_MARK={0x8, 0x10}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004000}, 0x10000000) fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') getxattr(&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) r6 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r6, 0x0, 0x8808) setxattr$incfs_metadata(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f00000000c0)='T', 0x1, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000000)=@known='user.incfs.metadata\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r7}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) timer_create(0x0, 0x0, &(0x7f0000001240)=0x0) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r9, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a80000000060a0b04200000000000000002000000540004803c0001800a0001006c696d69740000002c0002800c000240000000000000000008000540000000000c00014000000000000000010800044000000001140001800b0001007470726f78790000040002800900010073797a30000000000900020073797a32"], 0xa8}}, 0x0) timer_gettime(r8, &(0x7f0000001280)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x5a, &(0x7f0000000580)=[{0x6, 0xc3, 0x2, 0xfffffffc}, {0xa04, 0x2, 0x59, 0x9}, {0x3, 0x3, 0x7, 0x80000000}, {0x8, 0x3, 0xd7, 0x9}, {0x1012, 0x0, 0x4, 0x8}, {0x8, 0x4, 0x4, 0xc4}, {0x7ff, 0x6, 0xff, 0xf12}, {0xff, 0x6, 0x18, 0x756a}, {0x4, 0xc9, 0x40, 0x3f}, {0x5, 0xc, 0x6, 0x5}]}) 2m30.02135711s ago: executing program 2 (id=11548): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ff"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0x0, 0x0, 0x0, 0xffffffe5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) socket$inet(0x2, 0x1, 0x0) r0 = io_uring_setup(0x25c7, &(0x7f0000000740)={0x0, 0xffffffeb, 0x400, 0x103fc, 0x207}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) timer_create(0x3, 0x0, &(0x7f00000000c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x20, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000140)=@gcm_128={{0x303}, "342a4f49e872f79d", "4b8b4e0802ff03fbe3c7a6f875981e00", "85372e3c", "090000e6ff00"}, 0x28) readv(r1, &(0x7f0000000400)=[{&(0x7f0000000300)=""/203, 0xcb}, {&(0x7f0000000280)=""/35, 0x23}], 0x2) close_range(r0, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_CREATE(0xffffffffffffffff, 0xc02054a5, &(0x7f00000004c0)={0x600, r2, 'id1\x00'}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x5, 0x400, 0x9, 0x1, r3, 0x0, '\x00', 0x0, r3}, 0x50) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/tty/ldiscs\x00', 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1d, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffea5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000057"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r6}, 0x10) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000000c0)='kmem_cache_free\x00', r9}, 0x18) 2m29.76970172s ago: executing program 2 (id=11557): r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0xfffffffc, 0x3, 0x3}, 0x10) r2 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000640)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000600)={r4, 0xe0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, &(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x1, &(0x7f00000002c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0], 0x0, 0xcb, &(0x7f0000000380)=[{}, {}, {}, {}], 0x20, 0x10, &(0x7f00000003c0), &(0x7f0000000400), 0x8, 0x2a, 0x8, 0x8, &(0x7f00000004c0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xe, 0xe, &(0x7f0000001540)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0x0, 0x4}, 0x8, 0x10, &(0x7f0000000000), 0x10, r6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x53}, 0x94) r7 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000240)=[{0x6, 0x0, 0x5, 0x7fff0000}]}) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000001000040000000000000000000300000a20000000000a05000000000000000000070000000900010073797a300000000044000000090a010400000000000000000700ffff08000a40000000030900020073797a31000000000900010073797a3000000000080005400000002105000d40930000005c0000000c0a01020000000000000000070000000900020073797a31000000000900010073797a3000000000300003802c0000800400018024000b80100001800c000100636f756e7465720010000180090001006c617374"], 0xe8}, 0x1, 0x0, 0x0, 0x10}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="4400000010003b1500"/20, @ANYRES32=0x0, @ANYBLOB="000000000000000024001280090001007866726d0000000014000280040003000400000008"], 0x44}, 0x1, 0x0, 0x0, 0x11}, 0x0) close_range(r7, 0xffffffffffffffff, 0x0) 2m29.591642685s ago: executing program 2 (id=11561): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, 0x0, 0x0) sendmmsg$inet(r2, &(0x7f0000000240)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000340)="00000064c6ee84b46cd2525d13c96b5dbe1a8843", 0x14}], 0x1}}], 0x1, 0x0) 2m29.517201481s ago: executing program 2 (id=11564): socket$igmp6(0xa, 0x3, 0x2) creat(&(0x7f0000000300)='./file0\x00', 0x28) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000040000000000000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r3 = dup(r2) write$P9_RLERRORu(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r4}, &(0x7f0000000400), &(0x7f0000000440)=r5}, 0x20) r6 = socket$inet6(0xa, 0x80002, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2c}}, 0x10) connect$inet(r7, &(0x7f0000000280)={0x2, 0x4, @multicast1}, 0x10) sendmmsg$inet(r7, &(0x7f0000004540)=[{{&(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x7e1f, 0x0}, 0xee0000b0}, {{0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000001100)="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", 0xc3}, {&(0x7f0000000d80)="7d68e6de85f9b0cbc9d710267f321ec64eab043ecad9af7e01e9463218ec45924a99867163e468d36a682fadd749caa325e685d75559a87139e02fae7271be8f55671cfd32a09896278d1941370174720838039d0989bc3394b8a4c4f4a30f0496be313d6d60fe47966c634a3ee1f659e8ef310647725bda0130d5de5028220a4cf5fc808a75694738ee26cb21302b4bba4265b845a5d5dce706d9820c6936b122f9658446d74a9016b94424971dd443a6907eb5c73b6b200e92b23f2c36a214729b0bc231511e4c", 0xc8}, {&(0x7f0000000380)="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", 0x9fd}], 0x3}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)="a6", 0x1}], 0x300}}], 0x3, 0x0) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff00000000000000}, 0x400}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4000000) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) 2m15.156125985s ago: executing program 34 (id=11564): socket$igmp6(0xa, 0x3, 0x2) creat(&(0x7f0000000300)='./file0\x00', 0x28) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000040000000000000000850000002300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r3 = dup(r2) write$P9_RLERRORu(r3, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000004c0)={{r4}, &(0x7f0000000400), &(0x7f0000000440)=r5}, 0x20) r6 = socket$inet6(0xa, 0x80002, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r7, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2c}}, 0x10) connect$inet(r7, &(0x7f0000000280)={0x2, 0x4, @multicast1}, 0x10) sendmmsg$inet(r7, &(0x7f0000004540)=[{{&(0x7f0000000040)={0x2, 0x4e22, @multicast1}, 0x7e1f, 0x0}, 0xee0000b0}, {{0x0, 0x0, &(0x7f00000012c0)=[{&(0x7f0000001100)="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", 0xc3}, {&(0x7f0000000d80)="7d68e6de85f9b0cbc9d710267f321ec64eab043ecad9af7e01e9463218ec45924a99867163e468d36a682fadd749caa325e685d75559a87139e02fae7271be8f55671cfd32a09896278d1941370174720838039d0989bc3394b8a4c4f4a30f0496be313d6d60fe47966c634a3ee1f659e8ef310647725bda0130d5de5028220a4cf5fc808a75694738ee26cb21302b4bba4265b845a5d5dce706d9820c6936b122f9658446d74a9016b94424971dd443a6907eb5c73b6b200e92b23f2c36a214729b0bc231511e4c", 0xc8}, {&(0x7f0000000380)="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", 0x9fd}], 0x3}}, {{0x0, 0x0, &(0x7f00000017c0)=[{&(0x7f0000001700)="a6", 0x1}], 0x300}}], 0x3, 0x0) connect$inet6(r6, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback={0xff00000000000000}, 0x400}, 0x1c) sendmmsg$inet6(r6, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000003980), 0x171}}], 0x400000000000172, 0x4000000) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r1, @ANYBLOB=',wfdno=', @ANYRESHEX=r3]) 2.368006918s ago: executing program 6 (id=14660): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a80000000060a010400000000000000000a0000010900010073797a310000000054000480500001800b00010074617267657400004000028008000240000000012c0003007339f2f10455afb9fdd672bad09dfb78c7699c74e891a0c70000000000000000000000000000000008000100544545000900020073797a3200000000140000001100"], 0xa8}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) close_range(r0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x94) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xc7d7}, 0x0, 0x0, 0xffffffffffffffff, 0xa) madvise(&(0x7f0000a5e000/0x1000)=nil, 0x1000, 0x17) 2.307992563s ago: executing program 0 (id=14662): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r3, 0x0, 0xf7}, 0x18) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3014850, &(0x7f0000000140)={[{@acl}, {@barrier_val={'barrier', 0x3d, 0x1003}}, {@errors_remount}, {@noauto_da_alloc}, {@dioread_lock}]}, 0x1, 0x4e4, &(0x7f0000002d40)="$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") name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x1600) mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2000000, 0x300) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000000)={0x4, &(0x7f00000004c0)=[{0x2, 0x7, 0x40, 0x9}, {0xf56, 0xe, 0x1, 0x1}, {0xfffb, 0x10, 0x3, 0x6}, {0x1000, 0x8, 0xc, 0x800}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r6, @ANYBLOB="0000000000000000b703000010000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) futex(&(0x7f0000000600)=0x1, 0xc, 0x1, 0x0, &(0x7f0000000500)=0x1, 0x0) r7 = dup2(r4, r4) write$selinux_load(r7, &(0x7f0000000580)=ANY=[], 0x43) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x20200) openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x200003, 0x0) 2.279549306s ago: executing program 6 (id=14664): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)=ANY=[@ANYBLOB="14000000250001"], 0x14}, 0x1, 0x0, 0x0, 0x4000}, 0x40) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000300)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@jqfmt_vfsold}, {@minixdf}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") setrlimit(0x1, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) pwrite64(r1, &(0x7f00000000c0)='a', 0x200000c1, 0x404043000) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0700000004000000800000000400000028"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000700000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x18) syz_genetlink_get_family_id$smc(0x0, 0xffffffffffffffff) r5 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000080)={'syz_tun\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x6, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f00000000c0)='GPL\x00', 0x4, 0x1000, &(0x7f000062b000)=""/4096, 0x0, 0x0, '\x00', 0x0, @xdp}, 0x94) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='rdma.current\x00', 0x275a, 0x0) fsetxattr(r6, 0x0, &(0x7f0000000080)=':\x00', 0x2, 0x0) socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r7, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x300, @rand_addr=0xac1414bb}, 0x10, &(0x7f0000000100)=[{&(0x7f00000000c0)='Q', 0x1}], 0x1}, 0x20000000}, {{&(0x7f0000000180)={0x2, 0x0, @remote}, 0x69, &(0x7f0000000400)=[{&(0x7f0000000240)="b9", 0x26892}], 0xbb}}], 0x2, 0x0) r8 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r8, 0x29, 0x2e, &(0x7f0000000200)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x7}, 0x20000}}, {{0xa, 0x0, 0x40000, @dev={0xfe, 0x80, '\x00', 0x26}}}}, 0x108) r9 = socket$inet_sctp(0x2, 0x5, 0x84) close(r9) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000002780)={&(0x7f00000026c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@int={0x1, 0x0, 0x0, 0x1, 0x0, 0x59, 0x0, 0x5, 0xe8ae1484fabd98b5}]}}, 0x0, 0x2a, 0x0, 0x1, 0xa}, 0x28) r10 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r10, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r10, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000240)=0x8) sendmsg$inet_sctp(r9, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)='F', 0x1}, {0x0, 0xe0}], 0x2, &(0x7f00000000c0)=[@sndinfo={0x20, 0x84, 0x2, {0xa, 0x4, 0x28, 0x200000b, r11}}], 0x20, 0x2400e044}, 0x0) 1.589274852s ago: executing program 7 (id=14670): r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000300)={'lo\x00', 0x0}) sendmsg$can_raw(r0, &(0x7f0000000000)={&(0x7f0000000580)={0x1d, r1}, 0x10, &(0x7f0000000080)={&(0x7f0000000400)=@can={{0x0, 0x1, 0x1, 0x1}, 0x1, 0x1, 0x0, 0x0, "dcb016b7374b51bf"}, 0x10}, 0x2, 0x0, 0x0, 0x95}, 0x10044009) (fail_nth: 5) 1.587525442s ago: executing program 7 (id=14671): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket$inet6(0xa, 0x80002, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000f00)={'veth0_to_batadv\x00', &(0x7f0000000000)=@ethtool_perm_addr={0x4b, 0x37, "4372071e845c1497c855383000000002000000372a72ee4dfeed37968b00905020000055965737d2aaec032b9753384b00000000ef86ed"}}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r3, @ANYBLOB], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='ufshcd_upiu\x00', r4, 0x0, 0x2}, 0x18) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000780)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0x24, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0xfdb}}, @TCA_CT_MARK={0x8, 0x10}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0x64}, 0x1, 0x0, 0x0, 0x20004000}, 0x10000000) fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') getxattr(&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', &(0x7f0000000040)=@known='system.sockprotoname\x00', 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="871000000000000000000100000008000300000001000500060000000000050005"], 0x30}, 0x1, 0x0, 0x0, 0x94}, 0x8808) setxattr$incfs_metadata(&(0x7f0000000080)='./file0\x00', &(0x7f00000001c0), &(0x7f00000000c0)='T', 0x1, 0x0) getxattr(&(0x7f0000000100)='./file0\x00', &(0x7f0000000000)=@known='user.incfs.metadata\x00', 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r8}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) timer_create(0x0, 0x0, &(0x7f0000001240)=0x0) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r10, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) timer_gettime(r9, &(0x7f0000001280)) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000140)={0x9, &(0x7f0000000580)=[{0x6, 0xc3, 0x2, 0xfffffffc}, {0xa04, 0x2, 0x59, 0x9}, {0x8, 0x3, 0xd7, 0x9}, {0x1012, 0x0, 0x4, 0x8}, {0x8, 0x4, 0x4, 0xc4}, {0x7ff, 0x6, 0xff, 0xf12}, {0xff, 0x6, 0x18, 0x756a}, {0x4, 0xc9, 0x40, 0x3f}, {0x5, 0xc, 0x6, 0x5}]}) 1.473249821s ago: executing program 0 (id=14672): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x8, 0x6}, 0x0, 0x0, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = gettid() r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$netlbl_mgmt(&(0x7f0000000040), r3) sendmsg$NLBL_MGMT_C_ADDDEF(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)={0x44, r4, 0x1, 0x0, 0x0, {}, [@NLBL_MGMT_A_IPV6ADDR={0x14, 0x5, @private0={0xfc, 0x0, '\x00', 0x1}}, @NLBL_MGMT_A_PROTOCOL={0x8, 0x2, 0x5}, @NLBL_MGMT_A_IPV6MASK={0x14, 0x6, @mcast2}]}, 0x44}}, 0x0) r5 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r5, 0x107, 0xf, &(0x7f0000006ffc)=0x4000000000000200, 0xe50fb6c50bc849c9) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$nl_route_sched(r7, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={0x0, 0x24}}, 0x0) getsockname$packet(r7, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffffffff00f687000000", @ANYRES32=r8, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000940)=@newqdisc={0x3c, 0x24, 0xe0b, 0x70bd28, 0x0, {0x0, 0x0, 0x0, r8, {}, {0xffff, 0xffff}, {0xffe0, 0xd064db0e491fa98f}}, [@qdisc_kind_options=@q_cake={{0x9}, {0xc, 0x2, [@TCA_CAKE_DIFFSERV_MODE={0x8, 0x3, 0x1}]}}]}, 0x3c}}, 0x4000080) bind$packet(r5, &(0x7f0000000040)={0x11, 0x0, r8, 0x1, 0x0, 0x6, @remote}, 0x14) sendto$inet6(r5, &(0x7f0000000800)="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", 0xfc13, 0x880, 0x0, 0xfffffffffffffef0) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) connect$pptp(r7, &(0x7f0000000200)={0x18, 0x2, {0x3, @multicast2}}, 0x1e) pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r9, 0x0, r11, 0x0, 0x7, 0x9) write$P9_RWRITE(r11, &(0x7f0000000040)={0xb}, 0x11000) read(r10, &(0x7f0000032440)=""/102364, 0x18fdc) connect$inet(r1, &(0x7f0000000480)={0x2, 0x4e24, @local}, 0x10) 1.413661186s ago: executing program 6 (id=14673): r0 = socket$tipc(0x1e, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$tipc(0x1e, 0x2, 0x0) bind$tipc(r1, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000008c0)={&(0x7f0000000500)='kfree\x00', r3}, 0x18) r4 = socket$unix(0x1, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x2, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="00000000000057b6b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xfffffffffffffec5, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001700)={&(0x7f0000000080)='kmem_cache_free\x00', r5}, 0x10) bind$unix(r4, &(0x7f0000000180)=@file={0x1}, 0x6e) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0a000000030000000800000001"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000400)={{r6}, &(0x7f0000000380), &(0x7f00000003c0)='%-010d \x00'}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f000000a280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) listen(r4, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) connect$unix(r7, &(0x7f0000000080)=@file={0x1}, 0x6e) accept(r4, 0x0, 0x0) 1.403272337s ago: executing program 7 (id=14674): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a80000000060a010400000000000000000a0000010900010073797a310000000054000480500001800b00010074617267657400004000028008000240000000012c0003007339f2f10455afb9fdd672bad09dfb78c7699c74e891a0c70000000000000000000000000000000008000100544545000900020073797a3200000000140000001100"], 0xa8}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) close_range(r0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000800"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x94) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xc7d7}, 0x0, 0x0, 0xffffffffffffffff, 0xa) madvise(&(0x7f0000a5e000/0x1000)=nil, 0x1000, 0x17) 1.348525861s ago: executing program 5 (id=14675): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000200850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r1}, 0x10) r2 = open$dir(0x0, 0x422000, 0x100) openat(r2, 0x0, 0x2040c0, 0x82) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000340)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) r3 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) flock(r3, 0x2) (fail_nth: 5) 1.320898923s ago: executing program 7 (id=14676): r0 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x1, @local}, 0x4a, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x5}}, 'veth0_to_hsr\x00'}) r1 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x3, @local}, {0x1, @remote}, 0x4a, {0x2, 0x0, @remote}, 'veth1_to_bridge\x00'}) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'ip6tnl0\x00', 0x0}) r4 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r4, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r4, 0x0) r5 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r5, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x40000) r6 = accept4$unix(r4, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000280)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='kmem_cache_free\x00', r7, 0x0, 0x7}, 0x18) sigaltstack(0x0, 0x0) recvmmsg(r6, &(0x7f0000000c00)=[{{0x0, 0x0, 0x0}, 0x807}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000006c0)=""/240, 0xf0}], 0x2c}, 0x1ff}], 0x2, 0x20022, 0x0) recvfrom$unix(r6, &(0x7f00000004c0)=""/249, 0xf9, 0x40, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a00)=@newqdisc={0x148, 0x24, 0xf0b, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xc}, {0xffff, 0xffff}, {0xd, 0xc}}, [@qdisc_kind_options=@q_red={{0x8}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "119ca8d51d85df964e173b70d2a9bc976c4592482783a0db6825d6cd86354377d626b1157ebc69714efbf12fddb86ac84012df53c341814b0f72cfa8b071b7bc99678c021131ea40768ed0b4f3c2eb0ecc1c6d975892a2088191f521a73914cb6575859f6544c9bbd2003840802fbe256bc972314130b2961af8783691799ce561d11f8b5cf61075f850825d2306172fe7063d2366634fea641c570d773de706a81ae386048ec46dd4be846fc32981115b672fcfa7a09101344f7bbe8576d2a2235c6595d65967679a172f5997332347ee68d5239949b6a034fb1313c4e03ba6eba727891635d241967eb619126bcccf1bf88bed50151278790ce92ff6259d30"}, @TCA_RED_PARMS={0x14, 0x1, {0x8, 0x3, 0x9, 0x16, 0x20, 0x6}}]}}]}, 0x148}, 0x1, 0x0, 0x0, 0x44004}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000200100000102000028"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x18) get_robust_list(0x0, &(0x7f0000000580)=0x0, &(0x7f0000000740)) syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2800883, &(0x7f0000000040)={[{@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@noquota}, {@errors_remount}]}, 0xff, 0x470, &(0x7f0000000680)="$eJzs3M1rXFUfB/DvTDJJ2j59kqdPn5e+abSKxZekSV/sQpCKggsFQRcVVzFNS23aSBPBlqLRRVxKwb24FPwL3Fg3oq4Et7oXoUg3Flcj85akSSbJNJOEdj4fuPSce0/uOb977+mcOffeCdCxBpMcSPKPJL8k6U9SWFpgsPbPnd4kt6+PF1Iuv/5HoVruz9vXxxtFG3+3q5Ypd61S79xbydjk5MSVen545tK7w9NXrz1z4dLY+YnzE5dHT506fuxQz8nRE22Jc3elrfs/mDq47+U3b7w6fubG2z98VajHnSVxtMtg9ahV9c8t2fZ4uyvbZrsXpQvd29gQWjKQpHK6StX+35+u7Jjf1p+XPt7WxgGbqlwulnvvXlValJ4tAw+wymge6ESND/rK99/GsoXDj21363Tm5zHu1Jfalu4U62VKm1j/YJIzs399XlmySfMQAACL3Tyd5Oll47/TS8v9szof3Def35Pk30n2JvlPkv8m+V+S/7dY/+CS/PLxT7m/xV22pDL+ey7JnWXjv8boLwNd9dzu6nx5qXDuwuTE0foxOZJSbyU/srDLZcPFb1/8+dNm9S8e/1WWSv2NsWC9Hb93L5mgOztWGtto3A23PqrdAFgef18at3Eq4+N9Sfa3sN9SdW6x5sKTXx5sVm7t+FfRhvtM5S+SJ2rnfzZ3xb9wF7TQ9P7kyLMnR08M92Vy4uhw46pY7sef5l5rVv+G4m+DWzfL2bni9T8f/0ChL5m+eu1i9X7tdOt1zP36SdPvNPd2/c+M9RTeqKZ76uveH5uZuTKS9BReWb5+dOFvG/lG+cr1f+Twyv1/TxaOxIEklYv4UJKHkjxcb/sjSR5NcniV+L9/4bF35hu07vh7V9lj+1TiP7vW+c/i8996ouvid183q3995/94NXWkvqZy/teKa70N3MixAwAAgPtFsfoMfKE4NJ8uFoeGas/w783O4uTU9MxT56beu3y29qz8QErFxkxX/6L50JH6s8SN/OiS/LEk/0ryWdeOan5ofGqylflEoP12Nen/Fb+t9gIP8GDwvhZ0Lv0fOpf+D51L/4fOpf9D51qp/3+4De0Att4an/87tqodwNYz/ofOpf9D52qh/89uZjuALdX03fjihl75l9iURCnJ6mW+6dnYbzWsP5Hidh+N+yjx/HpOSikrbupe949Z3EOikKR3xU3b/T8TAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAe/wdAAD//12b48g=") 1.019010108s ago: executing program 5 (id=14677): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e40)=ANY=[@ANYBLOB="0b00000005000000020000000200000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="1800000000160000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0xa0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) prctl$PR_SET_NAME(0xf, &(0x7f0000000100)='/dev/snd/seq\x00') (async) ioctl$FS_IOC_SETVERSION(0xffffffffffffffff, 0x40087602, &(0x7f0000000200)=0x4) (async) r2 = socket(0x2, 0xa, 0x300) ioctl$sock_inet_SIOCDARP(r2, 0x8953, 0x0) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) socket$inet6(0xa, 0x2, 0x451b7797) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) write(0xffffffffffffffff, &(0x7f00000002c0)="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", 0xfc) (async) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'veth0_vlan\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x0, {0x0, 0x0, 0x0, r4}}, 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x0) 1.018432818s ago: executing program 5 (id=14679): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$netlink(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r6, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') setreuid(0xee01, 0xee01) openat2(r7, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000080)={0x40, 0x0, 0x11}, 0x18) r8 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000840)={0x58, r8, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r9}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffbfff9}}}]}}]}, 0x58}, 0x1, 0x1000000, 0x0, 0x24004000}, 0x24040840) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6gre0\x00', 0x0, 0x29, 0x5, 0x5, 0x7fffffff, 0x2, @mcast2, @mcast2, 0x1, 0x1, 0xb, 0x6}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'erspan0\x00', &(0x7f0000000680)={'tunl0\x00', 0x0, 0x40, 0x700, 0x3, 0x1, {{0xa, 0x4, 0x1, 0x1, 0x28, 0x64, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x64010101, @local, {[@end, @end, @generic={0x86, 0x10, "6dc4e28a3b398292ade2e3baa3ac"}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vxcan0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000000dc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000880)={0x4f0, r8, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8}, {0x1a4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x0, 0x9f, 0x7, 0x4}, {0x0, 0x3, 0x58, 0x8}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3c5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5a}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r13}, {0x22c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r14}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x2, 0x0, 0x9, 0x7f}, {0xb, 0x7f, 0x4, 0x6}, {0x11, 0x8, 0xf, 0x220494ca}, {0x8, 0x6, 0x2, 0x2}]}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xb}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0x4f0}, 0x1, 0x0, 0x0, 0x90}, 0x4050) 979.123611ms ago: executing program 7 (id=14681): r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000000)="8907040400", 0x5) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f00000000c0)='ip6_vti0\x00', 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e20, @private=0xa010100}, 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000f40)=[{{&(0x7f0000000040)={0x2, 0x0, @broadcast}, 0x10, 0x0}}], 0x68000, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, 0x0, 0x0) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f00000008c0)=0x2, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7fff, 0x0, 0x0, 0x0, 0x46, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r3 = socket(0x10, 0x3, 0x9) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x7fffffffffffffff) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000000)={'veth0_vlan\x00', 0x0}) r7 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000280), 0x1082302, 0x0) ioctl$TIOCGWINSZ(r7, 0x5413, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000080)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0xfff1}, {0x3, 0x6}, {0x0, 0x1}}}, 0x24}, 0x1, 0x0, 0x0, 0x48080}, 0x0) syz_emit_ethernet(0x82, &(0x7f0000000100)=ANY=[@ANYBLOB="bbbbbbbbbbbbaaaaaaaaaabb08"], 0x0) r8 = socket$netlink(0x10, 0x3, 0xc) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r4, 0x402c5342, &(0x7f00000002c0)={0xd, 0x3, 0x17ffe, {0xffff8001, 0x2}, 0x8, 0x4}) bind$netlink(r8, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r8, 0x10e, 0x4, &(0x7f0000000140)=0x6, 0x4) setsockopt$sock_int(r8, 0x1, 0x8, &(0x7f0000000200), 0x4) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000900)=ANY=[@ANYBLOB="940000000001010400000000000000000a1d00003c0001802c0001801400b7b30300fe8000000000000000000000000000000000000000010c00028005000100000000003c0002800000000014000300fe8000000000000000000000000000aa14000400fea6589d03088656ee000000000000aa0c000280050001000000ae210800074000"/150], 0x94}}, 0x0) r10 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r10, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f00000005c0)={0x14, 0x6, 0x1, 0x301, 0x0, 0x0, {0xa, 0x0, 0x4}}, 0x14}, 0x1, 0x0, 0x0, 0x2404c031}, 0x20000000) bpf$PROG_LOAD(0x5, &(0x7f0000000d80)={0x2, 0x1d, &(0x7f0000000bc0)=@raw=[@map_idx={0x18, 0x9}, @printk={@lu, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x5}, @exit, @map_fd={0x18, 0x9}, @cb_func={0x18, 0x4, 0x4, 0x0, 0x4}], &(0x7f0000000180)='GPL\x00', 0x7, 0xfd, &(0x7f0000000780)=""/253, 0x41000, 0x44, '\x00', r6, @fallback=0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000400)={0x3, 0x5}, 0x8, 0x10, &(0x7f0000000640)={0x3, 0x0, 0x8000, 0x313}, 0x10, 0x0, r2, 0x3, &(0x7f0000000ac0)=[0xffffffffffffffff, r4, r1, r10, 0xffffffffffffffff, 0xffffffffffffffff, r4], &(0x7f0000000d40)=[{0x5, 0x5, 0xe, 0x2}, {0x3, 0x4, 0x6, 0xa}, {0x3, 0x3, 0xf, 0x5}], 0x10, 0x6}, 0x94) recvmsg(r10, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000080b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) 915.104276ms ago: executing program 6 (id=14683): r0 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r0, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r0, 0x0) r1 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r1, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) write$binfmt_elf64(r1, &(0x7f0000000240)=ANY=[], 0x40000) r2 = accept4$unix(r0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) recvfrom$unix(r2, &(0x7f00000004c0)=""/249, 0xf9, 0x40, 0x0, 0x0) 796.654306ms ago: executing program 6 (id=14685): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7}, 0x18) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000500)='./bus\x00', 0x1000c40, &(0x7f00000002c0), 0x5, 0x51c, &(0x7f0000000700)="$eJzs3cFvI1cZAPBvZjebNE2bFCoVENClFBa0WjvxtlHVU7mAUFUJUXHikIbEG0Vx4ih2ShNWavI/IFGJA4ITZyQQHCr1xBHBDW69lANSgRWoQeJgNONx1t3YG3c3awv795NGM29mMt97Y8178RfHL4CJdTUijiLiSkS8ERHzxf6kWOKV9pKd99Gd22snd26vJdFqvf6PJD+e7Yuun8k8XlxzJiK++62IHyRn4zYODrdWa7XqXlEuN7d3y42Dwxub26sb1Y3qTqWyvLS8+NLNFysDtWNmgHOe3f7Vh9/cfPV77/7uCx/86ejrP8qqNVcc627HRWo3feo0TuZyRLz6KIKNwKWiPVdGXREeSBoRn4qI5/Lnfz4u5a/mYHo81gDA/4FWaz5a891lAGDcpXkOLElLRS5gLtK0VGrn8J6O2bRWbzSv36rv76y3c2ULMZXe2qxVF4tc4UJMJVl56e1s+265Eh8v34yIpyLix9OP5eXS2uB5BgDgYj1+z/j/7+n2+A8AjLmeH57pfn++Mry6AADDMciHZwGA8WL8B4DJc3f8nx1pPQCA4fH+HwAmj/EfACbN+53x/9KoawIADMV3XnstW1onxfdfr795sL9Vf/PGerWxVdreXyut1fd2Sxv1+katWlqrb593vVq9vrv0Quy/VW5WG81y4+BwZbu+v9Ncyb/Xe6U6NZRWAQD389Sz7/0liYijlx/Ll+iay8FYDeMtHXUFgJGR84fJ5Vu4YXJ5jw+T69fFf/yeN5dn348Iv/MAQVtvP8APARft2mfl/2FSyf/D5JL/h8kl/w+Tq9VK+s35n56eAgCMlU+Y4/cnARhDQ/37PwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIyJuXxZ6CqnaakU8URELMRUcmuzVl2MiCcj4s/TU9NZeWmkNQYAHl76t6SY/+va/PNz9x69kvxnOl9HxA9/+vpP3lptNveWsv3/PN3ffKfYXxlF/QGA83TG6c443vHRndtrnWWY9fnwG+3JRbO4J8XSPnI5LmerP87kkw7P/itplwvZ7yuXLiD+0XFEfKZX+5M8N7JQzHx6b/ws9hNDjZ9+LH6aH2uvs3vx6TNXnu4b87y5XmFSvJf1P6/0ev7SuJqvZ3pOfjyT91APr9P/nZzp/zrP+0ze1/Tq/64OGuOF33+777HjiM9d7hU/OY2f9In//IDx3//8F5/rd6z184hr0Tt+d6xyc3u33Dg4vJHd+OpGdadSWV5aXnzp5ouVcp6jLncy1d3aI8TfX77+ZN/2//K3RUd5Nv7MOe3/yn1b3TrtgH/x3ze+/6V+8Y8jvvbl3q//0/eJn42JXy22+/f0bauzv+k7fXcWf719/48/6et//Zy4HR/89XB9wFMBgCFoHBxurdZq1b0L3ZiKC75g10byiOpsYwQbMcRY2a/JD3udZ4qU2Wrn+ek+5w8/e/eZbN/I7+qFbIyuTwKG4+5DP+qaAAAAAAAAAAAAAAAA/TzyfydKR91CAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAxtn/AgAA//8LKMVX") bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x4b, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) syz_io_uring_setup(0x3c0c, &(0x7f0000000400)={0x0, 0xc890, 0x4000}, 0x0, 0x0) 704.592433ms ago: executing program 6 (id=14687): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b700000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='kfree\x00', r1, 0x0, 0x7}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$IPT_SO_SET_REPLACE(r3, 0x4000000000000, 0x4, 0x0, 0x0) 633.339119ms ago: executing program 4 (id=14688): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) io_setup(0x8, &(0x7f00000001c0)=0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/disk', 0x1, 0x20) socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) io_pgetevents(r1, 0x0, 0x6, &(0x7f0000000580)=[{}, {}, {}, {}, {}, {}], 0x0, &(0x7f00000003c0)={0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000740), 0x1, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r4, 0x0, 0x2}, 0x18) sendmsg$IPSET_CMD_DESTROY(0xffffffffffffffff, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x3, 0x6, 0x401, 0x0, 0x0, {0x7, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x10) io_submit(r1, 0x1, &(0x7f0000000400)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x1, 0x0, r2, 0x0, 0x0, 0x10}]) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x34, 0x0, 0x8, 0x101, 0x0, 0x0, {0x3, 0x0, 0x2}, [@CTA_TIMEOUT_L3PROTO={0x6, 0x2, 0x1, 0x0, 0x6}, @CTA_TIMEOUT_L4PROTO={0x5, 0x3, 0x11}, @CTA_TIMEOUT_DATA={0x4}, @CTA_TIMEOUT_NAME={0x9, 0x1, 'syz1\x00'}]}, 0x34}}, 0x8010) 623.89102ms ago: executing program 5 (id=14689): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d00"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) r1 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r1, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x30004081) setsockopt$sock_attach_bpf(r1, 0x1, 0x24, &(0x7f0000000000), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='block_bio_remap\x00', r0}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) write$binfmt_elf64(r3, &(0x7f00000004c0)={{0x7f, 0x45, 0x4c, 0x46, 0x4, 0x2, 0x6, 0x8, 0x9, 0x2, 0x6, 0x2, 0x2d2, 0x40, 0x298, 0x81, 0x5, 0x38, 0x1, 0x0, 0x7f, 0x1}, [{0x3, 0x6, 0xc38, 0x2, 0x2, 0x336, 0x9ee000000000000, 0xffffffffffffff76}], "3831c0e0460b522832660612c129d9797579f1d79d19041b1cacf503abeccac5a585812d8d6c0f7ad4a57f0d844517579b523881287f7419935936d9a08ced810c86b78b2aafd3a409bca1978f3a7f585461621436bd6cef496c79fcb984c56e1a222c17d155750625beee5d5d4239e40d6df77df7a681570088458f7909e8d2be761b25b40cc22bd34ff2e6f7db2903a62685efa3c9c4573f69"}, 0x112) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='block_bio_remap\x00', r2}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r4}, 0x10) r5 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r5, 0x10e, 0xc, &(0x7f0000000000)={0xfff}, 0x10) write(r5, &(0x7f0000000180)="2000000012005f0214f9f4070000fbe40a0000000000", 0x41d) r6 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000440), 0x103940) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r6, 0x4058534c, &(0x7f0000000040)={0x80, 0x18, 0x2, 0xfffffff7, 0x0, 0x9}) 563.261334ms ago: executing program 0 (id=14690): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b70400000000000085"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x3, 0x0, 0x111, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000280)={0x3, 0x40, 0xfa00, {{0xa, 0x4e23, 0x7fe, @empty, 0x1}, {0xa, 0x4e20, 0x1ff, @dev={0xfe, 0x80, '\x00', 0x1d}, 0x2}, 0xffffffffffffffff, 0xb}}, 0x48) write$RDMA_USER_CM_CMD_DESTROY_ID(r2, &(0x7f0000000f80)={0x1, 0xe, 0xfa00, {&(0x7f0000000300)}}, 0x18) 562.162134ms ago: executing program 5 (id=14691): r0 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @local}, {0x1, @local}, 0x4a, {0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x5}}, 'veth0_to_hsr\x00'}) r1 = socket$inet(0x2, 0x3, 0x6) ioctl$sock_inet_SIOCSARP(r1, 0x8955, &(0x7f0000000000)={{0x2, 0x3, @local}, {0x1, @remote}, 0x4a, {0x2, 0x0, @remote}, 'veth1_to_bridge\x00'}) r2 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'ip6tnl0\x00', 0x0}) r4 = socket(0x28, 0x5, 0x0) bind$vsock_stream(r4, &(0x7f0000000040)={0x28, 0x0, 0x0, @local}, 0x10) listen(r4, 0x0) r5 = socket(0x28, 0x5, 0x0) connect$vsock_stream(r5, &(0x7f0000000080)={0x28, 0x0, 0x0, @local}, 0x10) write$binfmt_elf64(r5, &(0x7f0000000240)=ANY=[], 0x40000) r6 = accept4$unix(r4, 0x0, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0x14, &(0x7f0000000280)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000200)='kmem_cache_free\x00', r7, 0x0, 0x7}, 0x18) sigaltstack(0x0, 0x0) recvmmsg(r6, &(0x7f0000000c00)=[{{0x0, 0x0, 0x0}, 0x807}, {{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000006c0)=""/240, 0xf0}], 0x2c}, 0x1ff}], 0x2, 0x20022, 0x0) recvfrom$unix(r6, &(0x7f00000004c0)=""/249, 0xf9, 0x40, 0x0, 0x0) sendmsg$nl_route_sched(r2, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000a00)=@newqdisc={0x148, 0x24, 0xf0b, 0x70bd26, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0x0, 0xc}, {0xffff, 0xffff}, {0xd, 0xc}}, [@qdisc_kind_options=@q_red={{0x8}, {0x11c, 0x2, [@TCA_RED_STAB={0x104, 0x2, "119ca8d51d85df964e173b70d2a9bc976c4592482783a0db6825d6cd86354377d626b1157ebc69714efbf12fddb86ac84012df53c341814b0f72cfa8b071b7bc99678c021131ea40768ed0b4f3c2eb0ecc1c6d975892a2088191f521a73914cb6575859f6544c9bbd2003840802fbe256bc972314130b2961af8783691799ce561d11f8b5cf61075f850825d2306172fe7063d2366634fea641c570d773de706a81ae386048ec46dd4be846fc32981115b672fcfa7a09101344f7bbe8576d2a2235c6595d65967679a172f5997332347ee68d5239949b6a034fb1313c4e03ba6eba727891635d241967eb619126bcccf1bf88bed50151278790ce92ff6259d30"}, @TCA_RED_PARMS={0x14, 0x1, {0x8, 0x3, 0x9, 0x16, 0x20, 0x6}}]}}]}, 0x148}, 0x1, 0x0, 0x0, 0x44004}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000200100000102000028"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x18) get_robust_list(0x0, &(0x7f0000000580)=0x0, &(0x7f0000000740)) syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x2800883, &(0x7f0000000040)={[{@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@noquota}, {@errors_remount}]}, 0xff, 0x470, &(0x7f0000000680)="$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") 523.604438ms ago: executing program 4 (id=14692): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x48241, 0x0) (async) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) (async, rerun: 64) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'bond_slave_1\x00', 0x10}) (async, rerun: 64) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='net/psched\x00') prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r1) (async) r2 = socket(0x10, 0x6, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r5 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x505800, 0x41) (async) getsockopt$PNPIPE_IFINDEX(r2, 0x113, 0x2, &(0x7f0000000140)=0x0, &(0x7f0000000200)=0x4) setsockopt$packet_add_memb(r5, 0x107, 0x1, &(0x7f0000000280)={r6, 0x1, 0x6, @multicast}, 0x10) syz_genetlink_get_family_id$fou(&(0x7f0000000340), r2) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) (async) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000200000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000004"], 0x48) (async, rerun: 32) sendmsg$nl_route_sched(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=@newqdisc={0x30, 0x24, 0x3fe3aa0262d8c583, 0x3, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0x0, 0xf}, {0xffff, 0x4}, {0xc, 0x5}}, [@qdisc_kind_options=@q_pie={{0x8}, {0x4}}]}, 0x30}, 0x1, 0x0, 0x0, 0x4011}, 0x2404400c) (async, rerun: 32) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) (async) munmap(&(0x7f000087a000/0x1000)=nil, 0x1000) 489.630311ms ago: executing program 0 (id=14693): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000000085000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) r1 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000440), 0x103940) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r1, 0x4058534c, &(0x7f0000000040)={0x80, 0x18, 0x2, 0xfffffff7, 0x0, 0x9}) 488.8367ms ago: executing program 5 (id=14694): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$netlink(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r6, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') setreuid(0xee01, 0xee01) openat2(r7, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000080)={0x40, 0x0, 0x11}, 0x18) r8 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000840)={0x58, r8, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r9}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffbfff9}}}]}}]}, 0x58}, 0x1, 0x1000000, 0x0, 0x24004000}, 0x24040840) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6gre0\x00', 0x0, 0x29, 0x5, 0x5, 0x7fffffff, 0x2, @mcast2, @mcast2, 0x1, 0x1, 0xb, 0x6}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'erspan0\x00', &(0x7f0000000680)={'tunl0\x00', 0x0, 0x40, 0x700, 0x3, 0x1, {{0xa, 0x4, 0x1, 0x1, 0x28, 0x64, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x64010101, @local, {[@end, @end, @generic={0x86, 0x10, "6dc4e28a3b398292ade2e3baa3ac"}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vxcan0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000000dc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000880)={0x4e0, r8, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8}, {0x194, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r10}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}, {0x34, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3c5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r12}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5a}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r13}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r14}, {0x22c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r15}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x2, 0x0, 0x9, 0x7f}, {0xb, 0x7f, 0x4, 0x6}, {0x11, 0x8, 0xf, 0x220494ca}, {0x8, 0x6, 0x2, 0x2}]}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xb}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0x4e0}, 0x1, 0x0, 0x0, 0x90}, 0x4050) 452.437824ms ago: executing program 0 (id=14695): r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0xa4000021) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYRESOCT=r1], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x101000, 0x2) r4 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB], 0x30}}, 0x800) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x80, 0x0) r6 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) write$selinux_validatetrans(r6, &(0x7f0000000300)={'system_u:object_r:restorecond_var_run_t:s0', 0x20, 'system_u:object_r:groupadd_exec_t:s0', 0x20, 0x2, 0x20, '/usr/lib/telepathy/mission-control-5\x00'}, 0x8a) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) r9 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x4}, &(0x7f0000000300)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r10, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r10, r11, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x1e, 0x0, 0x0, 0x3, &(0x7f0000000280)={0x0, 0x989680}}) io_uring_enter(r9, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) r12 = perf_event_open(&(0x7f0000000040)={0x5, 0x6c, 0x2, 0x2, 0x8, 0x9, 0x0, 0x6, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x2000, 0xff, 0x9, 0x0, 0x4, 0x145d, 0x1, 0x0, 0x3f8, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r12, 0x4008240b, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x2}) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079d}) socketpair(0x1, 0x1, 0x1, &(0x7f00000002c0)) 131.726979ms ago: executing program 4 (id=14696): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x18, 0xd, 0x0, &(0x7f0000001b80)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) shmat(0x0, &(0x7f0000ffc000/0x2000)=nil, 0x4000) 130.66651ms ago: executing program 7 (id=14697): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$netlink(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r6, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') setreuid(0xee01, 0xee01) openat2(r7, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000080)={0x40, 0x0, 0x11}, 0x18) r8 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000840)={0x58, r8, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r9}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffbfff9}}}]}}]}, 0x58}, 0x1, 0x1000000, 0x0, 0x24004000}, 0x24040840) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6gre0\x00', 0x0, 0x29, 0x5, 0x5, 0x7fffffff, 0x2, @mcast2, @mcast2, 0x1, 0x1, 0xb, 0x6}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'erspan0\x00', &(0x7f0000000680)={'tunl0\x00', 0x0, 0x40, 0x700, 0x3, 0x1, {{0xa, 0x4, 0x1, 0x1, 0x28, 0x64, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x64010101, @local, {[@end, @end, @generic={0x86, 0x10, "6dc4e28a3b398292ade2e3baa3ac"}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vxcan0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000000dc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000880)={0x4f0, r8, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8}, {0x1a4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x3, 0x1, 0x4, 0x5877}, {0x0, 0x3, 0x58, 0x8}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3c5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5a}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r13}, {0x22c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r14}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x2, 0x0, 0x9, 0x7f}, {0xb, 0x7f, 0x4, 0x6}, {0x11, 0x8, 0xf, 0x220494ca}, {0x8, 0x6, 0x2, 0x2}]}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xb}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0x4f0}, 0x1, 0x0, 0x0, 0x90}, 0x4050) 82.875013ms ago: executing program 4 (id=14698): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000480)='kfree\x00', r0, 0x0, 0x7}, 0x18) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x7}, 0x1c) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x4, 0x0, 0x0) 23.169158ms ago: executing program 4 (id=14699): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xa, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a80000000060a010400000000000000000a0000010900010073797a310000000054000480500001800b00010074617267657400004000028008000240000000012c0003007339f2f10455afb9fdd672bad09dfb78c7699c74e891a0c70000000000000000000000000000000008000100544545000900020073797a320000000014000000110001"], 0xa8}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) close_range(r0, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x94) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0xc7d7}, 0x0, 0x0, 0xffffffffffffffff, 0xa) madvise(&(0x7f0000a5e000/0x1000)=nil, 0x1000, 0x17) 22.602318ms ago: executing program 4 (id=14700): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000740)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41100}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000300), 0x0, 0x0) r3 = ioctl$LOOP_CTL_GET_FREE(r2, 0x4c82) ioctl$LOOP_CTL_REMOVE(r2, 0x4c81, r3) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$netlink(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r6, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r7 = syz_open_procfs(0x0, &(0x7f0000000000)='ns\x00') setreuid(0xee01, 0xee01) openat2(r7, &(0x7f0000000040)='./cgroup\x00', &(0x7f0000000080)={0x40, 0x0, 0x11}, 0x18) r8 = syz_genetlink_get_family_id$team(&(0x7f00000000c0), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000840)={0x58, r8, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [{{0x8, 0x1, r9}, {0x3c, 0x2, 0x0, 0x1, [{0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0xfffbfff9}}}]}}]}, 0x58}, 0x1, 0x1000000, 0x0, 0x24004000}, 0x24040840) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000180)={0x1, 0x58, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f00000002c0)={'syztnl2\x00', &(0x7f0000000240)={'ip6gre0\x00', 0x0, 0x29, 0x5, 0x5, 0x7fffffff, 0x2, @mcast2, @mcast2, 0x1, 0x1, 0xb, 0x6}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f0000000580)={'erspan0\x00', &(0x7f0000000680)={'tunl0\x00', 0x0, 0x40, 0x700, 0x3, 0x1, {{0xa, 0x4, 0x1, 0x1, 0x28, 0x64, 0x0, 0x0, 0x29, 0x0, @rand_addr=0x64010101, @local, {[@end, @end, @generic={0x86, 0x10, "6dc4e28a3b398292ade2e3baa3ac"}]}}}}}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000700)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000800)={'vxcan0\x00', 0x0}) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000000dc0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000d80)={&(0x7f0000000880)={0x4f0, r8, 0x800, 0x70bd2b, 0x25dfdbfb, {}, [{{0x8}, {0x1a4, 0x2, 0x0, 0x1, [{0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24}, {0x5}, {0x8, 0x4, 0x7fff}}, {0x8, 0x6, r10}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8}}}, {0x44, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x14, 0x4, [{0x0, 0x9f, 0x7, 0x4}, {0x0, 0x3, 0x58, 0x8}]}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x3c5}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x2}}}]}}, {{0x8}, {0xf4, 0x2, 0x0, 0x1, [{0x40, 0x1, @queue_id={{{0x24}, {0x5}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r11}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24}, {0x5}, {0x8, 0x4, 0x5a}}}, {0x3c, 0x1, @user_linkup={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r12}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r13}, {0x22c, 0x2, 0x0, 0x1, [{0x3c, 0x1, @user_linkup_enabled={{{0x24}, {0x5}, {0x4}}, {0x8, 0x6, r14}}}, {0x54, 0x1, @bpf_hash_func={{0x24}, {0x5}, {0x24, 0x4, [{0x2, 0x0, 0x9, 0x7f}, {0xb, 0x7f, 0x4, 0x6}, {0x11, 0x8, 0xf, 0x220494ca}, {0x8, 0x6, 0x2, 0x2}]}}}, {0x38, 0x1, @notify_peers_count={{0x24}, {0x5}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @lb_tx_method={{0x24}, {0x5}, {0x9, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24}, {0x5}, {0x8, 0x4, 0xb}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x1}}}, {0x3c, 0x1, @enabled={{{0x24}, {0x5}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24}, {0x5}, {0x8, 0x4, 0x6}}}, {0x38, 0x1, @notify_peers_interval={{0x24}, {0x5}, {0x8, 0x4, 0x8}}}]}}]}, 0x4f0}, 0x1, 0x0, 0x0, 0x90}, 0x4050) 0s ago: executing program 0 (id=14701): r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000000000)='.\x00', 0xa4000021) close(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYRESOCT=r1], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x101000, 0x2) r4 = syz_genetlink_get_family_id$tipc2(0x0, 0xffffffffffffffff) sendmsg$TIPC_NL_MON_PEER_GET(0xffffffffffffffff, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r4, @ANYBLOB], 0x30}}, 0x800) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x80, 0x0) r6 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) write$selinux_validatetrans(r6, &(0x7f0000000300)={'system_u:object_r:restorecond_var_run_t:s0', 0x20, 'system_u:object_r:groupadd_exec_t:s0', 0x20, 0x2, 0x20, '/usr/lib/telepathy/mission-control-5\x00'}, 0x8a) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r7}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x10) r9 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x4}, &(0x7f0000000300)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r10, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r10, r11, &(0x7f0000000200)=@IORING_OP_TIMEOUT={0xb, 0x1e, 0x0, 0x0, 0x3, &(0x7f0000000280)={0x0, 0x989680}}) io_uring_enter(r9, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) r12 = perf_event_open(&(0x7f0000000040)={0x5, 0x6c, 0x2, 0x2, 0x8, 0x9, 0x0, 0x6, 0x0, 0xc, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_bp={0x0, 0x8}, 0x2000, 0xff, 0x9, 0x0, 0x4, 0x145d, 0x1, 0x0, 0x3f8, 0x0, 0x100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r12, 0x4008240b, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000000)={'syzkaller0\x00', 0x2}) socketpair(0x1, 0x1, 0x1, &(0x7f00000002c0)) ioctl$TUNSETLINK(r5, 0x400454cd, 0x30a) kernel console output (not intermixed with test programs): t 20000 - 0 [ 823.129702][T31020] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 20000 - 0 [ 823.160148][T31020] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 20000 - 0 [ 823.169690][T31020] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 20000 - 0 [ 823.406882][T13044] __nla_validate_parse: 7 callbacks suppressed [ 823.406963][T13044] netlink: 4 bytes leftover after parsing attributes in process `syz.5.13689'. [ 823.819697][T13087] FAULT_INJECTION: forcing a failure. [ 823.819697][T13087] name failslab, interval 1, probability 0, space 0, times 0 [ 823.832409][T13087] CPU: 1 UID: 0 PID: 13087 Comm: syz.7.13707 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 823.832594][T13087] Tainted: [W]=WARN [ 823.832599][T13087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 823.832648][T13087] Call Trace: [ 823.832652][T13087] [ 823.832657][T13087] __dump_stack+0x1d/0x30 [ 823.832671][T13087] dump_stack_lvl+0xe8/0x140 [ 823.832682][T13087] dump_stack+0x15/0x1b [ 823.832715][T13087] should_fail_ex+0x265/0x280 [ 823.832781][T13087] should_failslab+0x8c/0xb0 [ 823.832794][T13087] kmem_cache_alloc_noprof+0x50/0x310 [ 823.832809][T13087] ? dst_alloc+0xbd/0x100 [ 823.832820][T13087] ? avc_alloc_node+0x26d/0x2c0 [ 823.832904][T13087] dst_alloc+0xbd/0x100 [ 823.832913][T13087] ? ip_vs_mh_init_svc+0x2e2/0x320 [ 823.832993][T13087] ip_route_output_key_hash_rcu+0xef5/0x1380 [ 823.833027][T13087] ip_route_output_key_hash+0x7a/0xb0 [ 823.833044][T13087] __ip4_datagram_connect+0x4e8/0x7e0 [ 823.833057][T13087] __ip6_datagram_connect+0xe7/0x7e0 [ 823.833179][T13087] ? _raw_spin_unlock_bh+0x36/0x40 [ 823.833190][T13087] ? lock_sock_nested+0x112/0x140 [ 823.833204][T13087] ? ip6_datagram_release_cb+0xec/0x160 [ 823.833220][T13087] udpv6_connect+0x33/0x150 [ 823.833263][T13087] inet_dgram_connect+0x125/0x1c0 [ 823.833275][T13087] ? __pfx_inet_dgram_connect+0x10/0x10 [ 823.833286][T13087] __sys_connect+0x1ef/0x2b0 [ 823.833306][T13087] __x64_sys_connect+0x3f/0x50 [ 823.833372][T13087] x64_sys_call+0x2c08/0x2ff0 [ 823.833383][T13087] do_syscall_64+0xd2/0x200 [ 823.833459][T13087] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 823.833511][T13087] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 823.833525][T13087] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 823.833538][T13087] RIP: 0033:0x7f3c27afebe9 [ 823.833549][T13087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 823.833624][T13087] RSP: 002b:00007f3c2655f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 823.833635][T13087] RAX: ffffffffffffffda RBX: 00007f3c27d25fa0 RCX: 00007f3c27afebe9 [ 823.833642][T13087] RDX: 000000000000001c RSI: 00002000000002c0 RDI: 0000000000000003 [ 823.833650][T13087] RBP: 00007f3c2655f090 R08: 0000000000000000 R09: 0000000000000000 [ 823.833657][T13087] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 823.833663][T13087] R13: 00007f3c27d26038 R14: 00007f3c27d25fa0 R15: 00007fff2142b988 [ 823.833674][T13087] [ 824.085170][ T29] kauditd_printk_skb: 1831 callbacks suppressed [ 824.085184][ T29] audit: type=1326 audit(1859.823:169278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13079 comm="syz.5.13704" exe="/root/syz-executor" sig=0 arch=c000003e syscall=19 compat=0 ip=0x7f6d8ad3ebe9 code=0x7ffc0000 [ 824.114750][ T29] audit: type=1326 audit(1859.823:169279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13079 comm="syz.5.13704" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6d8ad3ebe9 code=0x7ffc0000 [ 824.138214][ T29] audit: type=1326 audit(1859.823:169280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=13079 comm="syz.5.13704" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6d8ad3ebe9 code=0x7ffc0000 [ 824.166250][ T29] audit: type=1400 audit(1859.865:169281): avc: denied { create } for pid=13089 comm="syz.7.13708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 824.185535][ T29] audit: type=1400 audit(1859.876:169282): avc: denied { map_create } for pid=13089 comm="syz.7.13708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 824.204549][ T29] audit: type=1400 audit(1859.876:169283): avc: denied { prog_load } for pid=13089 comm="syz.7.13708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 824.223476][ T29] audit: type=1400 audit(1859.876:169284): avc: denied { bpf } for pid=13089 comm="syz.7.13708" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 824.243982][ T29] audit: type=1400 audit(1859.876:169285): avc: denied { perfmon } for pid=13089 comm="syz.7.13708" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 824.264921][ T29] audit: type=1400 audit(1859.876:169286): avc: denied { prog_run } for pid=13089 comm="syz.7.13708" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 824.285082][ T29] audit: type=1400 audit(1859.991:169287): avc: denied { allowed } for pid=13091 comm="syz.5.13719" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 824.367171][T13094] netlink: 4 bytes leftover after parsing attributes in process `syz.4.13709'. [ 824.849115][T13147] netlink: 4 bytes leftover after parsing attributes in process `syz.7.13721'. [ 824.862212][T13147] netlink: 68 bytes leftover after parsing attributes in process `syz.7.13721'. [ 824.871803][T13147] netlink: 12 bytes leftover after parsing attributes in process `syz.7.13721'. [ 824.880860][T13147] netlink: 20 bytes leftover after parsing attributes in process `syz.7.13721'. [ 825.567634][T13223] netlink: 4 bytes leftover after parsing attributes in process `syz.0.13728'. [ 825.646102][T13229] netlink: 4 bytes leftover after parsing attributes in process `syz.7.13731'. [ 825.714355][T13232] netlink: 4 bytes leftover after parsing attributes in process `syz.4.13732'. [ 825.969032][T13258] netlink: 4 bytes leftover after parsing attributes in process `syz.7.13744'. [ 827.130883][T13344] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 20000 - 0 [ 827.179678][T13344] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 20000 - 0 [ 827.264060][T13344] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 20000 - 0 [ 827.327210][T13344] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 20000 - 0 [ 827.378270][T31123] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 20000 - 0 [ 827.402394][T31124] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 20000 - 0 [ 827.438871][T31124] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 20000 - 0 [ 827.453414][T31124] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 20000 - 0 [ 828.418345][T13457] __nla_validate_parse: 15 callbacks suppressed [ 828.418360][T13457] netlink: 4 bytes leftover after parsing attributes in process `syz.4.13799'. [ 828.699664][T13500] netlink: 52 bytes leftover after parsing attributes in process `syz.6.13804'. [ 828.777861][T13503] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 828.832262][T13503] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 828.855589][ T29] kauditd_printk_skb: 2517 callbacks suppressed [ 828.855604][ T29] audit: type=1400 audit(1864.831:171805): avc: denied { write } for pid=13501 comm="syz.4.13805" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 828.936634][T13503] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 828.946183][ T29] audit: type=1400 audit(1864.852:171806): avc: denied { create } for pid=13515 comm="syz.5.13810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 828.967069][ T29] audit: type=1400 audit(1864.852:171807): avc: denied { create } for pid=13515 comm="syz.5.13810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 828.987502][ T29] audit: type=1400 audit(1864.852:171808): avc: denied { map_create } for pid=13515 comm="syz.5.13810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 829.006641][ T29] audit: type=1400 audit(1864.873:171809): avc: denied { bpf } for pid=13515 comm="syz.5.13810" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 829.027536][ T29] audit: type=1400 audit(1864.873:171810): avc: denied { map_read map_write } for pid=13515 comm="syz.5.13810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 829.047388][ T29] audit: type=1400 audit(1864.873:171811): avc: denied { create } for pid=13516 comm="syz.0.13811" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 829.068347][ T29] audit: type=1400 audit(1864.873:171812): avc: denied { map_create } for pid=13515 comm="syz.5.13810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 829.087639][ T29] audit: type=1400 audit(1864.873:171813): avc: denied { map_read map_write } for pid=13515 comm="syz.5.13810" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 829.107301][ T29] audit: type=1400 audit(1864.873:171814): avc: denied { map_create } for pid=13516 comm="syz.0.13811" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 829.143447][T13523] batadv1: entered promiscuous mode [ 829.169095][T13503] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 829.240506][T31124] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 829.252135][T31124] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 829.266588][T31124] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 829.284619][T31124] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 829.357481][T13540] netlink: 52 bytes leftover after parsing attributes in process `syz.7.13817'. [ 829.471729][T13555] openvswitch: netlink: Message has 6 unknown bytes. [ 829.731898][T13572] netlink: 4 bytes leftover after parsing attributes in process `syz.7.13826'. [ 829.870263][T13589] netlink: 96 bytes leftover after parsing attributes in process `syz.7.13830'. [ 830.177127][T13639] netlink: 52 bytes leftover after parsing attributes in process `syz.5.13837'. [ 830.218871][T13645] netlink: 4 bytes leftover after parsing attributes in process `syz.6.13839'. [ 830.222730][T13644] netlink: 4 bytes leftover after parsing attributes in process `syz.7.13840'. [ 830.246189][T13645] hsr_slave_1 (unregistering): left promiscuous mode [ 830.281164][T13648] netlink: 4 bytes leftover after parsing attributes in process `syz.5.13841'. [ 830.610027][T13676] netlink: 52 bytes leftover after parsing attributes in process `syz.6.13851'. [ 830.745623][T13682] smc: net device bond0 applied user defined pnetid SYZ0 [ 830.763914][T13682] smc: net device bond0 erased user defined pnetid SYZ0 [ 832.943720][T13888] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 832.977387][T13888] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.023396][T13888] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.119558][T13888] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 833.201072][T31145] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 833.224912][T31145] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 833.234643][T31145] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 833.255026][T31145] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 833.344983][T13905] __nla_validate_parse: 20 callbacks suppressed [ 833.344999][T13905] netlink: 4 bytes leftover after parsing attributes in process `syz.6.13947'. [ 833.414191][T13912] netlink: 52 bytes leftover after parsing attributes in process `syz.7.13950'. [ 833.622761][ T29] kauditd_printk_skb: 3182 callbacks suppressed [ 833.622778][ T29] audit: type=1400 audit(1869.849:174997): avc: denied { create } for pid=13921 comm="syz.5.13954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 833.689248][ T29] audit: type=1400 audit(1869.849:174998): avc: denied { write } for pid=13923 comm="syz.6.13955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 833.709880][ T29] audit: type=1400 audit(1869.870:174999): avc: denied { ioctl } for pid=13921 comm="syz.5.13954" path="socket:[208914]" dev="sockfs" ino=208914 ioctlcmd=0x8955 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 833.734790][ T29] audit: type=1400 audit(1869.870:175000): avc: denied { map_create } for pid=13923 comm="syz.6.13955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 833.753890][ T29] audit: type=1400 audit(1869.870:175001): avc: denied { create } for pid=13921 comm="syz.5.13954" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 833.773564][ T29] audit: type=1400 audit(1869.870:175002): avc: denied { bpf } for pid=13923 comm="syz.6.13955" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 833.794317][ T29] audit: type=1400 audit(1869.870:175003): avc: denied { map_read map_write } for pid=13923 comm="syz.6.13955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 833.814439][ T29] audit: type=1400 audit(1869.870:175004): avc: denied { prog_load } for pid=13923 comm="syz.6.13955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 833.833592][ T29] audit: type=1400 audit(1869.870:175005): avc: denied { perfmon } for pid=13923 comm="syz.6.13955" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 833.854591][ T29] audit: type=1400 audit(1869.870:175006): avc: denied { prog_run } for pid=13923 comm="syz.6.13955" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 834.076270][T13936] netlink: 4 bytes leftover after parsing attributes in process `syz.0.13961'. [ 834.118088][T13950] hub 8-0:1.0: USB hub found [ 834.122797][T13950] hub 8-0:1.0: 8 ports detected [ 834.132131][T31118] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.234098][T31118] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.250155][T13940] lo speed is unknown, defaulting to 1000 [ 834.291819][T31118] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.334141][T31118] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 834.349006][T13940] chnl_net:caif_netlink_parms(): no params data found [ 834.389765][T13940] bridge0: port 1(bridge_slave_0) entered blocking state [ 834.396911][T13940] bridge0: port 1(bridge_slave_0) entered disabled state [ 834.404110][T13940] bridge_slave_0: entered allmulticast mode [ 834.410497][T13940] bridge_slave_0: entered promiscuous mode [ 834.417304][T13940] bridge0: port 2(bridge_slave_1) entered blocking state [ 834.424450][T13940] bridge0: port 2(bridge_slave_1) entered disabled state [ 834.431810][T13940] bridge_slave_1: entered allmulticast mode [ 834.438352][T13940] bridge_slave_1: entered promiscuous mode [ 834.468194][T13940] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 834.483815][T31118] bridge_slave_1: left allmulticast mode [ 834.489497][T31118] bridge_slave_1: left promiscuous mode [ 834.495132][T31118] bridge0: port 2(bridge_slave_1) entered disabled state [ 834.503062][T31118] bridge_slave_0: left allmulticast mode [ 834.508788][T31118] bridge_slave_0: left promiscuous mode [ 834.514418][T31118] bridge0: port 1(bridge_slave_0) entered disabled state [ 834.577990][T31118] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 834.588159][T31118] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 834.597864][T31118] bond0 (unregistering): Released all slaves [ 834.606222][T31118] bond1 (unregistering): Released all slaves [ 834.614874][T31118] bond3 (unregistering): Released all slaves [ 834.623780][T13940] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 834.648805][T31118] hsr_slave_0: left promiscuous mode [ 834.654627][T31118] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 834.662184][T31118] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 834.670100][T31118] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 834.677482][T31118] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 834.687232][T31118] veth1_macvtap: left promiscuous mode [ 834.692806][T31118] veth0_macvtap: left promiscuous mode [ 834.749228][T13940] team0: Port device team_slave_0 added [ 834.757430][T13940] team0: Port device team_slave_1 added [ 834.772913][T13940] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 834.780064][T13940] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 834.806296][T13940] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 834.822006][T13940] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 834.828997][T13940] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 834.855109][T13940] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 834.909990][T13940] hsr_slave_0: entered promiscuous mode [ 834.927365][T13940] hsr_slave_1: entered promiscuous mode [ 834.933566][T13940] debugfs: 'hsr0' already exists in 'hsr' [ 834.939348][T13940] Cannot create hsr debugfs directory [ 835.334428][T14005] block device autoloading is deprecated and will be removed. [ 835.342216][T14005] I/O error, dev loop9, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 835.351939][T14005] FAT-fs (loop9): unable to read boot sector [ 835.387721][T13940] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 835.404482][T13940] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 835.422413][T13940] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 835.437933][T13940] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 835.611729][T14025] netlink: 4 bytes leftover after parsing attributes in process `syz.0.13986'. [ 835.613137][T13940] 8021q: adding VLAN 0 to HW filter on device bond0 [ 835.651746][T13940] 8021q: adding VLAN 0 to HW filter on device team0 [ 835.664113][T14025] netlink: 12 bytes leftover after parsing attributes in process `syz.0.13986'. [ 835.685902][T31155] bridge0: port 1(bridge_slave_0) entered blocking state [ 835.693177][T31155] bridge0: port 1(bridge_slave_0) entered forwarding state [ 835.725461][T31123] bridge0: port 2(bridge_slave_1) entered blocking state [ 835.732676][T31123] bridge0: port 2(bridge_slave_1) entered forwarding state [ 835.764661][T13940] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 835.775261][T13940] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 835.876658][T14040] netlink: 4 bytes leftover after parsing attributes in process `syz.4.13995'. [ 835.907360][T14043] netlink: 4 bytes leftover after parsing attributes in process `syz.0.13996'. [ 835.953494][T13940] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 836.222785][T14072] netlink: 'syz.4.14002': attribute type 13 has an invalid length. [ 836.263852][T14078] netlink: 4 bytes leftover after parsing attributes in process `syz.5.14004'. [ 836.307732][T14086] openvswitch: netlink: Message has 6 unknown bytes. [ 836.325987][T14072] bridge0: port 2(bridge_slave_1) entered disabled state [ 836.333427][T14072] bridge0: port 1(bridge_slave_0) entered disabled state [ 836.367739][T14072] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 836.378097][T14072] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 836.446240][T31114] netdevsim netdevsim4 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 836.455309][T31114] netdevsim netdevsim4 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 836.465168][T14085] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14005'. [ 836.469858][T13940] veth0_vlan: entered promiscuous mode [ 836.486991][T31114] netdevsim netdevsim4 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 836.517015][T31114] netdevsim netdevsim4 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 836.550521][T13940] veth1_vlan: entered promiscuous mode [ 836.649779][T14105] block device autoloading is deprecated and will be removed. [ 836.653021][T13940] veth0_macvtap: entered promiscuous mode [ 836.663341][T14105] I/O error, dev loop1, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 836.668101][T14101] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14009'. [ 836.673678][T14105] FAT-fs (loop1): unable to read boot sector [ 836.689877][T13940] veth1_macvtap: entered promiscuous mode [ 836.703703][T13940] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 836.725249][T13940] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 836.745623][T31123] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 836.757801][T31123] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 836.767155][T31123] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 836.777501][T31123] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 837.275098][T14150] cgroup: Unknown subsys name 'trans' [ 838.395931][ T29] kauditd_printk_skb: 2721 callbacks suppressed [ 838.395945][ T29] audit: type=1400 audit(1874.856:177724): avc: denied { prog_load } for pid=14241 comm="syz.6.14064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 838.421298][ T29] audit: type=1400 audit(1874.856:177725): avc: denied { bpf } for pid=14241 comm="syz.6.14064" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 838.454096][T14242] __nla_validate_parse: 8 callbacks suppressed [ 838.454111][T14242] netlink: 52 bytes leftover after parsing attributes in process `syz.6.14064'. [ 838.479782][ T29] audit: type=1400 audit(1874.909:177726): avc: denied { create } for pid=14241 comm="syz.6.14064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 838.500293][ T29] audit: type=1400 audit(1874.909:177727): avc: denied { write } for pid=14241 comm="syz.6.14064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 838.520611][ T29] audit: type=1400 audit(1874.909:177728): avc: denied { read } for pid=14241 comm="syz.6.14064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 838.540971][ T29] audit: type=1400 audit(1874.909:177729): avc: denied { create } for pid=14241 comm="syz.6.14064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 838.561314][ T29] audit: type=1400 audit(1874.909:177730): avc: denied { create } for pid=14241 comm="syz.6.14064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 838.580989][ T29] audit: type=1400 audit(1874.909:177731): avc: denied { setopt } for pid=14241 comm="syz.6.14064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 838.600352][ T29] audit: type=1400 audit(1874.909:177732): avc: denied { read } for pid=14241 comm="syz.6.14064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 838.619767][ T29] audit: type=1400 audit(1874.909:177733): avc: denied { write } for pid=14241 comm="syz.6.14064" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 838.741768][T14256] netlink: 80 bytes leftover after parsing attributes in process `syz.6.14071'. [ 838.754081][T14257] netlink: 80 bytes leftover after parsing attributes in process `syz.6.14071'. [ 838.860325][T14265] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 838.914213][T14265] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 838.927350][T14268] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 838.982046][T14265] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 839.031854][T14274] netlink: 4 bytes leftover after parsing attributes in process `syz.7.14077'. [ 839.044904][T14265] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 839.046218][T14274] netlink: 68 bytes leftover after parsing attributes in process `syz.7.14077'. [ 839.069510][T14274] netlink: 12 bytes leftover after parsing attributes in process `syz.7.14077'. [ 839.078585][T14274] netlink: 20 bytes leftover after parsing attributes in process `syz.7.14077'. [ 839.121547][T31118] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 839.136611][T31118] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 839.151434][T31118] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 839.165494][T31123] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 839.202732][T14280] lo speed is unknown, defaulting to 1000 [ 839.408542][T31118] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 20000 - 0 [ 839.501080][T31118] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 20000 - 0 [ 839.540267][T14268] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 839.574607][T31118] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 20000 - 0 [ 839.633409][T14268] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 839.665380][T31118] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 20000 - 0 [ 839.708239][T14268] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 839.737504][T14289] lo speed is unknown, defaulting to 1000 [ 839.795809][T31118] bridge_slave_1: left allmulticast mode [ 839.801491][T31118] bridge_slave_1: left promiscuous mode [ 839.807258][T31118] bridge0: port 2(bridge_slave_1) entered disabled state [ 839.823895][T31118] bridge_slave_0: left allmulticast mode [ 839.829638][T31118] bridge_slave_0: left promiscuous mode [ 839.835471][T31118] bridge0: port 1(bridge_slave_0) entered disabled state [ 839.883230][T31118] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 839.894480][T31118] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 839.903568][T31118] bond0 (unregistering): Released all slaves [ 839.931339][T31123] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 839.945596][T31118] hsr_slave_0: left promiscuous mode [ 839.952124][T31118] hsr_slave_1: left promiscuous mode [ 839.958013][T31118] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 839.966152][T31118] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 840.014127][T31118] team0 (unregistering): Port device team_slave_1 removed [ 840.033486][T31118] team0 (unregistering): Port device C removed [ 840.082879][T31114] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 840.097924][T31114] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 840.123403][T31114] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 840.152164][T14312] netlink: 12 bytes leftover after parsing attributes in process `syz.4.14087'. [ 840.258175][T14289] chnl_net:caif_netlink_parms(): no params data found [ 840.374430][T14289] bridge0: port 1(bridge_slave_0) entered blocking state [ 840.381615][T14289] bridge0: port 1(bridge_slave_0) entered disabled state [ 840.390001][T14289] bridge_slave_0: entered allmulticast mode [ 840.419050][T14289] bridge_slave_0: entered promiscuous mode [ 840.441412][T14289] bridge0: port 2(bridge_slave_1) entered blocking state [ 840.448757][T14289] bridge0: port 2(bridge_slave_1) entered disabled state [ 840.464534][T14289] bridge_slave_1: entered allmulticast mode [ 840.474917][T14289] bridge_slave_1: entered promiscuous mode [ 840.526471][T14289] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 840.541877][T14289] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 840.578465][T14289] team0: Port device team_slave_0 added [ 840.590710][T14289] team0: Port device team_slave_1 added [ 840.607304][T14289] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 840.614397][T14289] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 840.640343][T14289] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 840.672482][T14289] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 840.679461][T14289] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 840.705562][T14289] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 840.764294][T14289] hsr_slave_0: entered promiscuous mode [ 840.787776][T14289] hsr_slave_1: entered promiscuous mode [ 840.881722][T14347] netlink: 12 bytes leftover after parsing attributes in process `syz.7.14099'. [ 841.143441][T14289] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 841.157978][T14289] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 841.167064][T14289] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 841.179632][T14289] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 841.232408][T14289] 8021q: adding VLAN 0 to HW filter on device bond0 [ 841.245055][T14361] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 841.259724][T14289] 8021q: adding VLAN 0 to HW filter on device team0 [ 841.269315][T31114] bridge0: port 1(bridge_slave_0) entered blocking state [ 841.276427][T31114] bridge0: port 1(bridge_slave_0) entered forwarding state [ 841.287773][T31145] bridge0: port 2(bridge_slave_1) entered blocking state [ 841.294989][T31145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 841.306013][T14361] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 841.362543][T14361] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 841.396968][T14361] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 841.415395][T14289] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 841.444808][T31145] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 841.457699][T31145] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 841.469099][T31114] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 841.482971][T31145] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 841.553318][T14289] veth0_vlan: entered promiscuous mode [ 841.562219][T14289] veth1_vlan: entered promiscuous mode [ 841.577762][T14289] veth0_macvtap: entered promiscuous mode [ 841.591646][T14289] veth1_macvtap: entered promiscuous mode [ 841.603681][T14289] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 841.616630][T14289] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 841.631436][T31155] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 841.650741][T31155] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 841.666357][T31155] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 841.702992][T31155] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 841.723492][T14387] FAULT_INJECTION: forcing a failure. [ 841.723492][T14387] name failslab, interval 1, probability 0, space 0, times 0 [ 841.736275][T14387] CPU: 0 UID: 0 PID: 14387 Comm: syz.7.14109 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 841.736356][T14387] Tainted: [W]=WARN [ 841.736363][T14387] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 841.736375][T14387] Call Trace: [ 841.736381][T14387] [ 841.736389][T14387] __dump_stack+0x1d/0x30 [ 841.736426][T14387] dump_stack_lvl+0xe8/0x140 [ 841.736447][T14387] dump_stack+0x15/0x1b [ 841.736542][T14387] should_fail_ex+0x265/0x280 [ 841.736561][T14387] should_failslab+0x8c/0xb0 [ 841.736592][T14387] __kmalloc_noprof+0xa5/0x3e0 [ 841.736618][T14387] ? security_prepare_creds+0x52/0x120 [ 841.736651][T14387] security_prepare_creds+0x52/0x120 [ 841.736672][T14387] prepare_creds+0x34a/0x4c0 [ 841.736696][T14387] copy_creds+0x8f/0x3f0 [ 841.736795][T14387] copy_process+0x658/0x2000 [ 841.736822][T14387] ? copy_clone_args_from_user+0x3ce/0x490 [ 841.736861][T14387] kernel_clone+0x16c/0x5c0 [ 841.736893][T14387] __se_sys_clone3+0x1c2/0x200 [ 841.736937][T14387] __x64_sys_clone3+0x31/0x40 [ 841.736962][T14387] x64_sys_call+0x1fc9/0x2ff0 [ 841.737016][T14387] do_syscall_64+0xd2/0x200 [ 841.737087][T14387] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 841.737110][T14387] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 841.737134][T14387] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 841.737233][T14387] RIP: 0033:0x7f3c27afebe9 [ 841.737246][T14387] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 841.737273][T14387] RSP: 002b:00007f3c2655ef08 EFLAGS: 00000246 ORIG_RAX: 00000000000001b3 [ 841.737293][T14387] RAX: ffffffffffffffda RBX: 0000000000000058 RCX: 00007f3c27afebe9 [ 841.737305][T14387] RDX: 00007f3c2655ef20 RSI: 0000000000000058 RDI: 00007f3c2655ef20 [ 841.737374][T14387] RBP: 00007f3c2655f090 R08: 0000000000000000 R09: 0000000000000058 [ 841.737387][T14387] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 841.737455][T14387] R13: 00007f3c27d26038 R14: 00007f3c27d25fa0 R15: 00007fff2142b988 [ 841.737471][T14387] [ 842.096044][T14398] netlink: 20 bytes leftover after parsing attributes in process `syz.7.14112'. [ 842.181614][T14406] lo speed is unknown, defaulting to 1000 [ 842.955520][T14423] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 842.962867][T14423] IPv6: NLM_F_CREATE should be set when creating new route [ 843.181092][ T29] kauditd_printk_skb: 1254 callbacks suppressed [ 843.181105][ T29] audit: type=1400 audit(1879.874:178988): avc: denied { map_create } for pid=14438 comm="syz.0.14128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 843.206459][ T29] audit: type=1400 audit(1879.874:178989): avc: denied { bpf } for pid=14438 comm="syz.0.14128" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 843.272382][T14442] hub 9-0:1.0: USB hub found [ 843.277233][T14442] hub 9-0:1.0: 8 ports detected [ 843.306625][ T29] audit: type=1400 audit(1879.927:178990): avc: denied { map_read map_write } for pid=14438 comm="syz.0.14128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 843.326705][ T29] audit: type=1400 audit(1879.927:178991): avc: denied { prog_load } for pid=14438 comm="syz.0.14128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 843.345585][ T29] audit: type=1400 audit(1879.927:178992): avc: denied { bpf } for pid=14438 comm="syz.0.14128" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 843.366091][ T29] audit: type=1400 audit(1879.927:178993): avc: denied { perfmon } for pid=14438 comm="syz.0.14128" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 843.386772][ T29] audit: type=1400 audit(1879.937:178994): avc: denied { prog_run } for pid=14438 comm="syz.0.14128" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 843.405645][ T29] audit: type=1400 audit(1879.969:178995): avc: denied { map_create } for pid=14441 comm="syz.6.14129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 843.424726][ T29] audit: type=1400 audit(1879.969:178996): avc: denied { bpf } for pid=14441 comm="syz.6.14129" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 843.445591][ T29] audit: type=1400 audit(1879.969:178997): avc: denied { map_read map_write } for pid=14441 comm="syz.6.14129" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 843.532756][T14442] lo speed is unknown, defaulting to 1000 [ 843.719676][T14461] lo speed is unknown, defaulting to 1000 [ 844.117253][T14470] netlink: 4 bytes leftover after parsing attributes in process `syz.5.14136'. [ 844.163327][T14471] netlink: 4 bytes leftover after parsing attributes in process `syz.6.14138'. [ 844.203316][T14472] netlink: 68 bytes leftover after parsing attributes in process `syz.5.14136'. [ 844.262812][T14472] netlink: 12 bytes leftover after parsing attributes in process `syz.5.14136'. [ 844.272084][T14472] netlink: 20 bytes leftover after parsing attributes in process `syz.5.14136'. [ 845.116961][T14502] netlink: 8 bytes leftover after parsing attributes in process `syz.4.14149'. [ 845.151042][T14502] netlink: 'syz.4.14149': attribute type 1 has an invalid length. [ 845.218973][T14502] gre0: entered promiscuous mode [ 845.291315][T14506] random: crng reseeded on system resumption [ 845.333800][T14520] netlink: 52 bytes leftover after parsing attributes in process `syz.4.14156'. [ 845.345866][T14521] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14152'. [ 845.436509][T14526] netlink: 68 bytes leftover after parsing attributes in process `syz.0.14152'. [ 845.460876][T14526] netlink: 12 bytes leftover after parsing attributes in process `syz.0.14152'. [ 845.496543][T14525] ip6gre1: entered allmulticast mode [ 845.578839][T14537] ip6gre1: entered allmulticast mode [ 846.059433][T14567] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 846.131595][T14567] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 846.178890][T14579] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 846.186152][T14579] IPv6: NLM_F_CREATE should be set when creating new route [ 846.194862][T14567] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 846.264258][T14567] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 846.319269][T31130] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 846.338738][T31130] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 846.355108][T31130] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 846.374265][T31130] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 846.404835][T14586] IPv6: RTM_NEWROUTE with no NLM_F_CREATE or NLM_F_REPLACE [ 846.412122][T14586] IPv6: NLM_F_CREATE should be set when creating new route [ 846.613492][T14600] 9pnet_fd: Insufficient options for proto=fd [ 846.688956][T14594] random: crng reseeded on system resumption [ 846.905045][T14622] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 846.949639][T14622] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 847.000827][T14622] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 847.036207][T14622] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 847.070872][T14634] 9pnet_fd: Insufficient options for proto=fd [ 847.483733][T14666] 9pnet_fd: Insufficient options for proto=fd [ 847.726200][T14689] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 847.772677][T14689] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 847.819007][T14689] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 847.848000][T14698] 9pnet_fd: Insufficient options for proto=fd [ 847.878225][T14689] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 847.936797][T31130] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 847.948846][ T29] kauditd_printk_skb: 2000 callbacks suppressed [ 847.948861][ T29] audit: type=1326 audit(1884.882:180998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14703 comm="syz.6.14231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=29 compat=0 ip=0x7f19f908ebe9 code=0x7ffc0000 [ 847.955697][T31130] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 847.987366][ T29] audit: type=1326 audit(1884.882:180999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14703 comm="syz.6.14231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f19f908ebe9 code=0x7ffc0000 [ 848.010797][ T29] audit: type=1326 audit(1884.882:181000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14703 comm="syz.6.14231" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f19f908ebe9 code=0x7ffc0000 [ 848.036443][T31130] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 848.045030][T31130] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 848.062176][ T29] audit: type=1400 audit(1884.997:181001): avc: denied { prog_load } for pid=14705 comm="syz.6.14232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 848.086979][ T29] audit: type=1400 audit(1884.997:181002): avc: denied { bpf } for pid=14705 comm="syz.6.14232" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 848.107593][ T29] audit: type=1400 audit(1884.997:181003): avc: denied { perfmon } for pid=14705 comm="syz.6.14232" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 848.122298][T14706] ip6gre2: entered allmulticast mode [ 848.128541][ T29] audit: type=1400 audit(1884.997:181004): avc: denied { prog_run } for pid=14705 comm="syz.6.14232" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 848.155959][ T29] audit: type=1400 audit(1885.102:181005): avc: denied { audit_write } for pid=14705 comm="syz.6.14232" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 848.177163][ T29] audit: type=1400 audit(1885.102:181006): avc: denied { audit_write } for pid=14705 comm="syz.6.14232" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 848.198404][ T29] audit: type=1107 audit(1885.102:181007): pid=14705 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='•Y¡LŸ' [ 848.238947][T14715] FAULT_INJECTION: forcing a failure. [ 848.238947][T14715] name failslab, interval 1, probability 0, space 0, times 0 [ 848.251706][T14715] CPU: 0 UID: 0 PID: 14715 Comm: syz.6.14236 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 848.251799][T14715] Tainted: [W]=WARN [ 848.251805][T14715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 848.251816][T14715] Call Trace: [ 848.251823][T14715] [ 848.251833][T14715] __dump_stack+0x1d/0x30 [ 848.251855][T14715] dump_stack_lvl+0xe8/0x140 [ 848.251871][T14715] dump_stack+0x15/0x1b [ 848.251889][T14715] should_fail_ex+0x265/0x280 [ 848.251987][T14715] should_failslab+0x8c/0xb0 [ 848.252007][T14715] __kmalloc_node_noprof+0xa9/0x410 [ 848.252077][T14715] ? __vmalloc_node_range_noprof+0x3f9/0xe00 [ 848.252109][T14715] __vmalloc_node_range_noprof+0x3f9/0xe00 [ 848.252201][T14715] ? avc_compute_av+0x2fc/0x3e0 [ 848.252231][T14715] ? avc_has_perm_noaudit+0x156/0x200 [ 848.252255][T14715] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 848.252281][T14715] __vmalloc_noprof+0x83/0xc0 [ 848.252344][T14715] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 848.252387][T14715] bpf_prog_alloc_no_stats+0x47/0x3a0 [ 848.252408][T14715] ? bpf_prog_alloc+0x2a/0x150 [ 848.252448][T14715] bpf_prog_alloc+0x3c/0x150 [ 848.252473][T14715] bpf_prog_create_from_user+0x7d/0x260 [ 848.252496][T14715] ? __pfx_seccomp_check_filter+0x10/0x10 [ 848.252583][T14715] do_seccomp+0x5ef/0xa40 [ 848.252620][T14715] prctl_set_seccomp+0x4c/0x70 [ 848.252641][T14715] __se_sys_prctl+0x238/0x1300 [ 848.252731][T14715] __x64_sys_prctl+0x67/0x80 [ 848.252754][T14715] x64_sys_call+0x20cf/0x2ff0 [ 848.252771][T14715] do_syscall_64+0xd2/0x200 [ 848.252821][T14715] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 848.252840][T14715] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 848.252860][T14715] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 848.252934][T14715] RIP: 0033:0x7f19f908ebe9 [ 848.252950][T14715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 848.252968][T14715] RSP: 002b:00007f19f7af7038 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 848.252988][T14715] RAX: ffffffffffffffda RBX: 00007f19f92b5fa0 RCX: 00007f19f908ebe9 [ 848.253000][T14715] RDX: 0000200000000000 RSI: 0000000000000002 RDI: 0000000000000016 [ 848.253011][T14715] RBP: 00007f19f7af7090 R08: 0000000000000000 R09: 0000000000000000 [ 848.253021][T14715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 848.253034][T14715] R13: 00007f19f92b6038 R14: 00007f19f92b5fa0 R15: 00007fff416789a8 [ 848.253127][T14715] [ 848.497141][T14715] syz.6.14236: vmalloc error: size 8192, failed to allocated page array size 16, mode:0x400dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 848.515053][T14715] CPU: 0 UID: 0 PID: 14715 Comm: syz.6.14236 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 848.515096][T14715] Tainted: [W]=WARN [ 848.515179][T14715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 848.515191][T14715] Call Trace: [ 848.515198][T14715] [ 848.515207][T14715] __dump_stack+0x1d/0x30 [ 848.515228][T14715] dump_stack_lvl+0xe8/0x140 [ 848.515303][T14715] dump_stack+0x15/0x1b [ 848.515375][T14715] warn_alloc+0x12b/0x1a0 [ 848.515455][T14715] ? should_failslab+0x8c/0xb0 [ 848.515498][T14715] __vmalloc_node_range_noprof+0x497/0xe00 [ 848.515523][T14715] ? avc_compute_av+0x2fc/0x3e0 [ 848.515549][T14715] ? avc_has_perm_noaudit+0x156/0x200 [ 848.515570][T14715] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 848.515643][T14715] __vmalloc_noprof+0x83/0xc0 [ 848.515778][T14715] ? bpf_prog_alloc_no_stats+0x47/0x3a0 [ 848.515845][T14715] bpf_prog_alloc_no_stats+0x47/0x3a0 [ 848.515981][T14715] ? bpf_prog_alloc+0x2a/0x150 [ 848.516002][T14715] bpf_prog_alloc+0x3c/0x150 [ 848.516093][T14715] bpf_prog_create_from_user+0x7d/0x260 [ 848.516149][T14715] ? __pfx_seccomp_check_filter+0x10/0x10 [ 848.516170][T14715] do_seccomp+0x5ef/0xa40 [ 848.516188][T14715] prctl_set_seccomp+0x4c/0x70 [ 848.516205][T14715] __se_sys_prctl+0x238/0x1300 [ 848.516294][T14715] __x64_sys_prctl+0x67/0x80 [ 848.516317][T14715] x64_sys_call+0x20cf/0x2ff0 [ 848.516334][T14715] do_syscall_64+0xd2/0x200 [ 848.516355][T14715] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 848.516424][T14715] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 848.516444][T14715] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 848.516461][T14715] RIP: 0033:0x7f19f908ebe9 [ 848.516474][T14715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 848.516565][T14715] RSP: 002b:00007f19f7af7038 EFLAGS: 00000246 ORIG_RAX: 000000000000009d [ 848.516583][T14715] RAX: ffffffffffffffda RBX: 00007f19f92b5fa0 RCX: 00007f19f908ebe9 [ 848.516595][T14715] RDX: 0000200000000000 RSI: 0000000000000002 RDI: 0000000000000016 [ 848.516607][T14715] RBP: 00007f19f7af7090 R08: 0000000000000000 R09: 0000000000000000 [ 848.516619][T14715] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 848.516630][T14715] R13: 00007f19f92b6038 R14: 00007f19f92b5fa0 R15: 00007fff416789a8 [ 848.516649][T14715] [ 848.516657][T14715] Mem-Info: [ 848.753074][T14715] active_anon:4661 inactive_anon:219 isolated_anon:0 [ 848.753074][T14715] active_file:17096 inactive_file:11178 isolated_file:0 [ 848.753074][T14715] unevictable:0 dirty:628 writeback:1 [ 848.753074][T14715] slab_reclaimable:3710 slab_unreclaimable:111301 [ 848.753074][T14715] mapped:45947 shmem:202 pagetables:1498 [ 848.753074][T14715] sec_pagetables:0 bounce:0 [ 848.753074][T14715] kernel_misc_reclaimable:0 [ 848.753074][T14715] free:1748269 free_pcp:5418 free_cma:0 [ 848.798584][T14715] Node 0 active_anon:18644kB inactive_anon:876kB active_file:68384kB inactive_file:44712kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:183788kB dirty:2512kB writeback:4kB shmem:808kB kernel_stack:6528kB pagetables:5992kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 848.826154][T14715] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 848.854821][T14715] lowmem_reserve[]: 0 2883 7862 7862 [ 848.860185][T14715] Node 0 DMA32 free:2949196kB boost:0kB min:4132kB low:7064kB high:9996kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2952828kB mlocked:0kB bounce:0kB free_pcp:3632kB local_pcp:100kB free_cma:0kB [ 848.890644][T14715] lowmem_reserve[]: 0 0 4978 4978 [ 848.895742][T14715] Node 0 Normal free:4028520kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB free_highatomic:0KB active_anon:18644kB inactive_anon:876kB active_file:68384kB inactive_file:44712kB unevictable:0kB writepending:2516kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:17976kB local_pcp:7768kB free_cma:0kB [ 848.928544][T14715] lowmem_reserve[]: 0 0 0 0 [ 848.933098][T14715] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 848.945917][T14715] Node 0 DMA32: 3*4kB (M) 2*8kB (M) 3*16kB (M) 2*32kB (M) 3*64kB (M) 4*128kB (M) 3*256kB (M) 3*512kB (M) 3*1024kB (M) 3*2048kB (M) 717*4096kB (M) = 2949196kB [ 848.961976][T14715] Node 0 Normal: 2278*4kB (UME) 1576*8kB (UME) 985*16kB (UME) 726*32kB (UME) 488*64kB (UME) 278*128kB (UME) 194*256kB (UM) 324*512kB (UM) 391*1024kB (UM) 78*2048kB (UM) 763*4096kB (UM) = 4028456kB [ 848.981534][T14715] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 848.990882][T14715] 28706 total pagecache pages [ 848.995542][T14715] 234 pages in swap cache [ 849.000347][T14715] Free swap = 123932kB [ 849.004479][T14715] Total swap = 124996kB [ 849.008694][T14715] 2097051 pages RAM [ 849.012480][T14715] 0 pages HighMem/MovableOnly [ 849.017180][T14715] 80444 pages reserved [ 849.303453][T14749] ip6gre1: entered allmulticast mode [ 849.355411][T14751] ip6gre2: entered allmulticast mode [ 849.430199][T14755] tipc: Started in network mode [ 849.435149][T14755] tipc: Node identity 1ab66970a4b3, cluster identity 4711 [ 849.442453][T14755] tipc: Enabled bearer , priority 0 [ 849.451420][T14752] tipc: Disabling bearer [ 849.516111][T14759] __nla_validate_parse: 4 callbacks suppressed [ 849.516125][T14759] netlink: 4 bytes leftover after parsing attributes in process `syz.4.14254'. [ 849.665129][T14772] ip6gre1: entered allmulticast mode [ 849.717330][T14777] ip6gre2: entered allmulticast mode [ 849.800031][T14779] netlink: 4 bytes leftover after parsing attributes in process `syz.7.14262'. [ 849.810191][T14779] hsr_slave_0: left promiscuous mode [ 849.817908][T14779] hsr_slave_1: left promiscuous mode [ 849.840257][T31130] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 849.851496][T31130] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 849.865378][T31130] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 849.877404][T31114] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 850.223498][T14799] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14269'. [ 850.352749][T14804] ip6gre1: entered allmulticast mode [ 850.471245][T14808] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 850.522171][T14808] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 850.571021][T14808] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 850.626755][T14808] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 850.694546][T31130] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 850.730586][T31130] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 850.747065][T14819] FAULT_INJECTION: forcing a failure. [ 850.747065][T14819] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 850.760275][T14819] CPU: 1 UID: 0 PID: 14819 Comm: syz.0.14279 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 850.760307][T14819] Tainted: [W]=WARN [ 850.760313][T14819] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 850.760323][T14819] Call Trace: [ 850.760330][T14819] [ 850.760338][T14819] __dump_stack+0x1d/0x30 [ 850.760436][T14819] dump_stack_lvl+0xe8/0x140 [ 850.760455][T14819] dump_stack+0x15/0x1b [ 850.760472][T14819] should_fail_ex+0x265/0x280 [ 850.760494][T14819] should_fail+0xb/0x20 [ 850.760512][T14819] should_fail_usercopy+0x1a/0x20 [ 850.760560][T14819] _copy_from_user+0x1c/0xb0 [ 850.760584][T14819] kstrtouint_from_user+0x69/0xf0 [ 850.760602][T14819] ? 0xffffffff81000000 [ 850.760613][T14819] ? selinux_file_permission+0x1e4/0x320 [ 850.760689][T14819] proc_fail_nth_write+0x50/0x160 [ 850.760734][T14819] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 850.760754][T14819] vfs_write+0x269/0x960 [ 850.760771][T14819] ? vfs_read+0x4e6/0x770 [ 850.760791][T14819] ? __rcu_read_unlock+0x4f/0x70 [ 850.760812][T14819] ? __fget_files+0x184/0x1c0 [ 850.760838][T14819] ksys_write+0xda/0x1a0 [ 850.760926][T14819] __x64_sys_write+0x40/0x50 [ 850.760945][T14819] x64_sys_call+0x27fe/0x2ff0 [ 850.760965][T14819] do_syscall_64+0xd2/0x200 [ 850.761039][T14819] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 850.761142][T14819] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 850.761186][T14819] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 850.761207][T14819] RIP: 0033:0x7f4ed7bfd69f [ 850.761293][T14819] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 850.761308][T14819] RSP: 002b:00007f4ed6667030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 850.761324][T14819] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f4ed7bfd69f [ 850.761335][T14819] RDX: 0000000000000001 RSI: 00007f4ed66670a0 RDI: 0000000000000003 [ 850.761353][T14819] RBP: 00007f4ed6667090 R08: 0000000000000000 R09: 00237363762f7665 [ 850.761366][T14819] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 850.761378][T14819] R13: 00007f4ed7e26038 R14: 00007f4ed7e25fa0 R15: 00007ffc0aec1cb8 [ 850.761396][T14819] [ 850.767912][T31130] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 851.004734][T31130] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 851.049924][T14827] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14282'. [ 851.132538][T14830] netlink: 4 bytes leftover after parsing attributes in process `syz.5.14283'. [ 851.312340][T14851] lo speed is unknown, defaulting to 1000 [ 851.437290][T14860] ip6gre3: entered allmulticast mode [ 851.838509][T14871] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14299'. [ 852.032268][T14882] netlink: 4 bytes leftover after parsing attributes in process `syz.7.14301'. [ 852.280764][T14893] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 852.400094][T14893] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 852.432695][T14894] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14306'. [ 852.475253][T14893] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 852.550870][T14893] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 852.620603][T14908] ip6gre2: entered allmulticast mode [ 852.652853][T31130] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 852.673287][T31130] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 852.686334][T31130] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 852.701989][T31130] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 852.721678][ T29] kauditd_printk_skb: 1693 callbacks suppressed [ 852.721702][ T29] audit: type=1400 audit(1889.889:182701): avc: denied { create } for pid=14913 comm="syz.4.14314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 852.751623][ T29] audit: type=1400 audit(1889.900:182702): avc: denied { write } for pid=14913 comm="syz.4.14314" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 852.852250][ T29] audit: type=1400 audit(1889.952:182703): avc: denied { create } for pid=14916 comm="syz.0.14315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 852.871677][ T29] audit: type=1400 audit(1889.952:182704): avc: denied { prog_load } for pid=14916 comm="syz.0.14315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 852.890565][ T29] audit: type=1400 audit(1889.952:182705): avc: denied { bpf } for pid=14916 comm="syz.0.14315" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 852.911479][ T29] audit: type=1400 audit(1889.952:182706): avc: denied { perfmon } for pid=14916 comm="syz.0.14315" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 852.918625][T14931] audit: audit_backlog=65 > audit_backlog_limit=64 [ 852.932511][ T29] audit: type=1400 audit(1889.952:182708): avc: denied { map_create } for pid=14918 comm="syz.5.14316" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 852.932537][ T29] audit: type=1400 audit(1889.952:182707): avc: denied { prog_load } for pid=14916 comm="syz.0.14315" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 852.939050][T14931] audit: audit_lost=208 audit_rate_limit=0 audit_backlog_limit=64 [ 852.991496][T14920] netlink: 4 bytes leftover after parsing attributes in process `syz.5.14316'. [ 853.199614][T14939] lo speed is unknown, defaulting to 1000 [ 853.452445][T14947] netlink: 8 bytes leftover after parsing attributes in process `syz.7.14327'. [ 853.577819][T14933] Set syz1 is full, maxelem 65536 reached [ 854.082755][T14978] FAULT_INJECTION: forcing a failure. [ 854.082755][T14978] name failslab, interval 1, probability 0, space 0, times 0 [ 854.095559][T14978] CPU: 1 UID: 0 PID: 14978 Comm: syz.7.14338 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 854.095599][T14978] Tainted: [W]=WARN [ 854.095673][T14978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 854.095684][T14978] Call Trace: [ 854.095689][T14978] [ 854.095697][T14978] __dump_stack+0x1d/0x30 [ 854.095728][T14978] dump_stack_lvl+0xe8/0x140 [ 854.095747][T14978] dump_stack+0x15/0x1b [ 854.095763][T14978] should_fail_ex+0x265/0x280 [ 854.095785][T14978] should_failslab+0x8c/0xb0 [ 854.095808][T14978] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 854.095865][T14978] ? sidtab_sid2str_get+0xa0/0x130 [ 854.095885][T14978] kmemdup_noprof+0x2b/0x70 [ 854.095910][T14978] sidtab_sid2str_get+0xa0/0x130 [ 854.095968][T14978] security_sid_to_context_core+0x1eb/0x2e0 [ 854.095988][T14978] security_sid_to_context+0x27/0x40 [ 854.096048][T14978] avc_audit_post_callback+0x9d/0x520 [ 854.096071][T14978] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 854.096129][T14978] common_lsm_audit+0x1b8/0x230 [ 854.096226][T14978] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 854.096252][T14978] slow_avc_audit+0x104/0x140 [ 854.096275][T14978] avc_has_perm+0x13a/0x180 [ 854.096344][T14978] selinux_kernel_module_request+0xb0/0xe0 [ 854.096408][T14978] security_kernel_module_request+0x36/0x70 [ 854.096430][T14978] __request_module+0x121/0x3e0 [ 854.096450][T14978] ? capable+0x7c/0xb0 [ 854.096472][T14978] dev_load+0x61/0xc0 [ 854.096545][T14978] dev_ioctl+0x6f4/0x960 [ 854.096567][T14978] sock_do_ioctl+0x197/0x220 [ 854.096598][T14978] sock_ioctl+0x41b/0x610 [ 854.096622][T14978] ? __pfx_sock_ioctl+0x10/0x10 [ 854.096707][T14978] __se_sys_ioctl+0xce/0x140 [ 854.096750][T14978] __x64_sys_ioctl+0x43/0x50 [ 854.096777][T14978] x64_sys_call+0x1816/0x2ff0 [ 854.096794][T14978] do_syscall_64+0xd2/0x200 [ 854.096863][T14978] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 854.096883][T14978] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 854.096903][T14978] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 854.096920][T14978] RIP: 0033:0x7f3c27afebe9 [ 854.096987][T14978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 854.097003][T14978] RSP: 002b:00007f3c2655f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 854.097019][T14978] RAX: ffffffffffffffda RBX: 00007f3c27d25fa0 RCX: 00007f3c27afebe9 [ 854.097030][T14978] RDX: 0000200000000000 RSI: 0000000000008937 RDI: 0000000000000004 [ 854.097041][T14978] RBP: 00007f3c2655f090 R08: 0000000000000000 R09: 0000000000000000 [ 854.097051][T14978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 854.097073][T14978] R13: 00007f3c27d26038 R14: 00007f3c27d25fa0 R15: 00007fff2142b988 [ 854.097091][T14978] [ 854.115526][T14979] ip6gre3: entered allmulticast mode [ 854.669015][T15009] ip6gre3: entered allmulticast mode [ 854.951854][T15036] __nla_validate_parse: 6 callbacks suppressed [ 854.951879][T15036] netlink: 4 bytes leftover after parsing attributes in process `syz.7.14364'. [ 855.050711][T15046] 9pnet_fd: Insufficient options for proto=fd [ 855.268313][T15071] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14380'. [ 855.422535][T15061] netlink: 168 bytes leftover after parsing attributes in process `syz.4.14375'. [ 855.449706][T15061] C: renamed from team_slave_0 [ 855.551641][T15094] netlink: 4 bytes leftover after parsing attributes in process `syz.6.14390'. [ 855.596266][T15100] netlink: 4 bytes leftover after parsing attributes in process `syz.7.14392'. [ 855.733952][T15110] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 855.780009][T15110] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 855.858905][T15110] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 855.907356][T15110] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 855.964780][T31145] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 855.980773][T31145] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 855.991403][T31145] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.012250][T31145] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 856.108780][T15138] ip6gre3: entered allmulticast mode [ 856.123611][T15137] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14406'. [ 856.144565][T15145] netlink: 4 bytes leftover after parsing attributes in process `syz.6.14403'. [ 856.216951][T15150] netlink: 68 bytes leftover after parsing attributes in process `syz.6.14403'. [ 856.247326][T15150] netlink: 12 bytes leftover after parsing attributes in process `syz.6.14403'. [ 856.256473][T15150] netlink: 20 bytes leftover after parsing attributes in process `syz.6.14403'. [ 856.637944][T15173] FAULT_INJECTION: forcing a failure. [ 856.637944][T15173] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 856.651175][T15173] CPU: 1 UID: 0 PID: 15173 Comm: syz.4.14419 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 856.651237][T15173] Tainted: [W]=WARN [ 856.651243][T15173] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 856.651254][T15173] Call Trace: [ 856.651260][T15173] [ 856.651269][T15173] __dump_stack+0x1d/0x30 [ 856.651289][T15173] dump_stack_lvl+0xe8/0x140 [ 856.651386][T15173] dump_stack+0x15/0x1b [ 856.651402][T15173] should_fail_ex+0x265/0x280 [ 856.651422][T15173] should_fail+0xb/0x20 [ 856.651439][T15173] should_fail_usercopy+0x1a/0x20 [ 856.651460][T15173] _copy_to_iter+0x387/0xe70 [ 856.651563][T15173] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 856.651601][T15173] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 856.651647][T15173] __skb_datagram_iter+0xc6/0x690 [ 856.651674][T15173] ? __pfx_simple_copy_to_iter+0x10/0x10 [ 856.651881][T15173] skb_copy_datagram_iter+0x3d/0x110 [ 856.651994][T15173] netlink_recvmsg+0x1a8/0x550 [ 856.652042][T15173] ? __pfx_netlink_recvmsg+0x10/0x10 [ 856.652059][T15173] sock_recvmsg+0x139/0x170 [ 856.652082][T15173] ____sys_recvmsg+0xf5/0x280 [ 856.652182][T15173] ___sys_recvmsg+0x11f/0x370 [ 856.652211][T15173] do_recvmmsg+0x1ef/0x540 [ 856.652237][T15173] ? get_timespec64+0xc9/0x100 [ 856.652254][T15173] __x64_sys_recvmmsg+0xfb/0x170 [ 856.652331][T15173] x64_sys_call+0x27a6/0x2ff0 [ 856.652372][T15173] do_syscall_64+0xd2/0x200 [ 856.652396][T15173] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 856.652416][T15173] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 856.652504][T15173] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 856.652523][T15173] RIP: 0033:0x7f2351a9ebe9 [ 856.652539][T15173] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 856.652553][T15173] RSP: 002b:00007f23504ff038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 856.652569][T15173] RAX: ffffffffffffffda RBX: 00007f2351cc5fa0 RCX: 00007f2351a9ebe9 [ 856.652613][T15173] RDX: 04000000000003b4 RSI: 00002000000037c0 RDI: 0000000000000003 [ 856.652626][T15173] RBP: 00007f23504ff090 R08: 0000200000003700 R09: 0000000000000000 [ 856.652637][T15173] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 856.652648][T15173] R13: 00007f2351cc6038 R14: 00007f2351cc5fa0 R15: 00007ffe03b4d818 [ 856.652712][T15173] [ 857.334230][T15209] lo speed is unknown, defaulting to 1000 [ 857.371892][T15200] FAULT_INJECTION: forcing a failure. [ 857.371892][T15200] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 857.385213][T15200] CPU: 0 UID: 0 PID: 15200 Comm: syz.4.14430 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 857.385323][T15200] Tainted: [W]=WARN [ 857.385328][T15200] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 857.385338][T15200] Call Trace: [ 857.385344][T15200] [ 857.385352][T15200] __dump_stack+0x1d/0x30 [ 857.385435][T15200] dump_stack_lvl+0xe8/0x140 [ 857.385453][T15200] dump_stack+0x15/0x1b [ 857.385468][T15200] should_fail_ex+0x265/0x280 [ 857.385486][T15200] should_fail+0xb/0x20 [ 857.385501][T15200] should_fail_usercopy+0x1a/0x20 [ 857.385519][T15200] _copy_to_user+0x20/0xa0 [ 857.385556][T15200] simple_read_from_buffer+0xb5/0x130 [ 857.385575][T15200] proc_fail_nth_read+0x10e/0x150 [ 857.385640][T15200] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 857.385663][T15200] vfs_read+0x1a8/0x770 [ 857.385680][T15200] ? __rcu_read_unlock+0x4f/0x70 [ 857.385725][T15200] ? __fget_files+0x184/0x1c0 [ 857.385754][T15200] ksys_read+0xda/0x1a0 [ 857.385826][T15200] __x64_sys_read+0x40/0x50 [ 857.385847][T15200] x64_sys_call+0x27bc/0x2ff0 [ 857.385864][T15200] do_syscall_64+0xd2/0x200 [ 857.385889][T15200] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 857.385947][T15200] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 857.385971][T15200] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 857.386072][T15200] RIP: 0033:0x7f2351a9d5fc [ 857.386088][T15200] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 857.386106][T15200] RSP: 002b:00007f23504ff030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 857.386127][T15200] RAX: ffffffffffffffda RBX: 00007f2351cc5fa0 RCX: 00007f2351a9d5fc [ 857.386140][T15200] RDX: 000000000000000f RSI: 00007f23504ff0a0 RDI: 0000000000000006 [ 857.386153][T15200] RBP: 00007f23504ff090 R08: 0000000000000000 R09: 0000000000000000 [ 857.386181][T15200] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 857.386194][T15200] R13: 00007f2351cc6038 R14: 00007f2351cc5fa0 R15: 00007ffe03b4d818 [ 857.386214][T15200] [ 857.632086][ T29] kauditd_printk_skb: 2321 callbacks suppressed [ 857.632101][ T29] audit: type=1400 audit(1895.044:185027): avc: denied { read } for pid=15216 comm="syz.0.14435" name="loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 857.662477][ T29] audit: type=1400 audit(1895.044:185028): avc: denied { open } for pid=15216 comm="syz.0.14435" path="/dev/loop-control" dev="devtmpfs" ino=99 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 857.686994][ T29] audit: type=1400 audit(1895.044:185029): avc: denied { ioctl } for pid=15216 comm="syz.0.14435" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c82 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 857.720282][ T29] audit: type=1400 audit(1895.086:185030): avc: denied { name_bind } for pid=15217 comm="syz.5.14436" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 857.742230][ T29] audit: type=1400 audit(1895.086:185031): avc: denied { map_create } for pid=15217 comm="syz.5.14436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 857.761366][ T29] audit: type=1400 audit(1895.086:185032): avc: denied { bpf } for pid=15217 comm="syz.5.14436" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 857.782132][ T29] audit: type=1400 audit(1895.086:185033): avc: denied { prog_load } for pid=15217 comm="syz.5.14436" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 857.801205][ T29] audit: type=1400 audit(1895.138:185034): avc: denied { prog_load } for pid=15220 comm="syz.4.14437" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 857.820137][ T29] audit: type=1400 audit(1895.138:185035): avc: denied { bpf } for pid=15220 comm="syz.4.14437" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 857.840771][ T29] audit: type=1400 audit(1895.138:185036): avc: denied { perfmon } for pid=15220 comm="syz.4.14437" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 857.869542][T15219] FAULT_INJECTION: forcing a failure. [ 857.869542][T15219] name failslab, interval 1, probability 0, space 0, times 0 [ 857.882361][T15219] CPU: 1 UID: 0 PID: 15219 Comm: syz.0.14435 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 857.882419][T15219] Tainted: [W]=WARN [ 857.882425][T15219] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 857.882440][T15219] Call Trace: [ 857.882448][T15219] [ 857.882456][T15219] __dump_stack+0x1d/0x30 [ 857.882478][T15219] dump_stack_lvl+0xe8/0x140 [ 857.882497][T15219] dump_stack+0x15/0x1b [ 857.882511][T15219] should_fail_ex+0x265/0x280 [ 857.882531][T15219] should_failslab+0x8c/0xb0 [ 857.882573][T15219] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 857.882602][T15219] ? sidtab_sid2str_get+0xa0/0x130 [ 857.882656][T15219] kmemdup_noprof+0x2b/0x70 [ 857.882678][T15219] sidtab_sid2str_get+0xa0/0x130 [ 857.882745][T15219] security_sid_to_context_core+0x1eb/0x2e0 [ 857.882767][T15219] security_sid_to_context+0x27/0x40 [ 857.882786][T15219] avc_audit_post_callback+0x9d/0x520 [ 857.882808][T15219] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 857.882878][T15219] common_lsm_audit+0x1b8/0x230 [ 857.882933][T15219] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 857.882954][T15219] slow_avc_audit+0x104/0x140 [ 857.882975][T15219] avc_has_extended_perms+0x6d0/0x940 [ 857.883044][T15219] ioctl_has_perm+0x257/0x2a0 [ 857.883065][T15219] selinux_file_ioctl+0x308/0x3a0 [ 857.883082][T15219] ? __fget_files+0x184/0x1c0 [ 857.883104][T15219] security_file_ioctl+0x48/0x90 [ 857.883204][T15219] __se_sys_ioctl+0x47/0x140 [ 857.883222][T15219] __x64_sys_ioctl+0x43/0x50 [ 857.883307][T15219] x64_sys_call+0x1816/0x2ff0 [ 857.883327][T15219] do_syscall_64+0xd2/0x200 [ 857.883353][T15219] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 857.883375][T15219] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 857.883396][T15219] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 857.883465][T15219] RIP: 0033:0x7f4ed7bfebe9 [ 857.883479][T15219] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 857.883493][T15219] RSP: 002b:00007f4ed6667038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 857.883514][T15219] RAX: ffffffffffffffda RBX: 00007f4ed7e25fa0 RCX: 00007f4ed7bfebe9 [ 857.883525][T15219] RDX: 0000000000000000 RSI: 0000000000004c81 RDI: 0000000000000003 [ 857.883537][T15219] RBP: 00007f4ed6667090 R08: 0000000000000000 R09: 0000000000000000 [ 857.883564][T15219] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 857.883577][T15219] R13: 00007f4ed7e26038 R14: 00007f4ed7e25fa0 R15: 00007ffc0aec1cb8 [ 857.883638][T15219] [ 858.242077][T15229] 9pnet_fd: Insufficient options for proto=fd [ 858.405421][T15233] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 858.446792][T15233] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 858.500641][T15233] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 858.571891][T15233] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 858.661149][T31155] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 858.675995][T15258] 9pnet_fd: Insufficient options for proto=fd [ 858.694926][T31155] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 858.714068][T31155] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 858.722595][T31155] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 858.756387][T15257] geneve3: entered promiscuous mode [ 859.014253][T15278] syzkaller0: entered promiscuous mode [ 859.019939][T15278] syzkaller0: entered allmulticast mode [ 859.140231][T15288] 9pnet_fd: Insufficient options for proto=fd [ 859.218953][T15290] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 859.304715][T15290] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 859.353433][T15290] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 859.399833][T15290] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 859.454980][T31145] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 859.467468][T31145] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 859.478710][T31145] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 859.502906][T31145] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 859.565184][T15318] tmpfs: Unknown parameter '18446744073709551615' [ 859.586703][T15320] 9pnet_fd: Insufficient options for proto=fd [ 859.670520][T15318] lo speed is unknown, defaulting to 1000 [ 859.705635][T15322] lo speed is unknown, defaulting to 1000 [ 859.770505][T15334] __nla_validate_parse: 9 callbacks suppressed [ 859.770518][T15334] netlink: 36 bytes leftover after parsing attributes in process `syz.0.14480'. [ 859.933768][T15344] FAULT_INJECTION: forcing a failure. [ 859.933768][T15344] name failslab, interval 1, probability 0, space 0, times 0 [ 859.946526][T15344] CPU: 0 UID: 0 PID: 15344 Comm: syz.0.14483 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 859.946584][T15344] Tainted: [W]=WARN [ 859.946590][T15344] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 859.946600][T15344] Call Trace: [ 859.946608][T15344] [ 859.946616][T15344] __dump_stack+0x1d/0x30 [ 859.946697][T15344] dump_stack_lvl+0xe8/0x140 [ 859.946717][T15344] dump_stack+0x15/0x1b [ 859.946734][T15344] should_fail_ex+0x265/0x280 [ 859.946753][T15344] should_failslab+0x8c/0xb0 [ 859.946775][T15344] kmem_cache_alloc_noprof+0x50/0x310 [ 859.946841][T15344] ? security_inode_alloc+0x37/0x100 [ 859.946864][T15344] security_inode_alloc+0x37/0x100 [ 859.946911][T15344] inode_init_always_gfp+0x4b7/0x500 [ 859.946934][T15344] ? __pfx_sock_alloc_inode+0x10/0x10 [ 859.947026][T15344] alloc_inode+0x58/0x170 [ 859.947064][T15344] do_accept+0xa0/0x3a0 [ 859.947091][T15344] ? vfs_write+0x7e8/0x960 [ 859.947115][T15344] __sys_accept4+0xbf/0x140 [ 859.947159][T15344] __x64_sys_accept+0x42/0x50 [ 859.947196][T15344] x64_sys_call+0x212c/0x2ff0 [ 859.947216][T15344] do_syscall_64+0xd2/0x200 [ 859.947306][T15344] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 859.947334][T15344] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 859.947478][T15344] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 859.947496][T15344] RIP: 0033:0x7f4ed7bfebe9 [ 859.947509][T15344] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 859.947523][T15344] RSP: 002b:00007f4ed6667038 EFLAGS: 00000246 ORIG_RAX: 000000000000002b [ 859.947553][T15344] RAX: ffffffffffffffda RBX: 00007f4ed7e25fa0 RCX: 00007f4ed7bfebe9 [ 859.947566][T15344] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 859.947577][T15344] RBP: 00007f4ed6667090 R08: 0000000000000000 R09: 0000000000000000 [ 859.947589][T15344] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 859.947602][T15344] R13: 00007f4ed7e26038 R14: 00007f4ed7e25fa0 R15: 00007ffc0aec1cb8 [ 859.947619][T15344] [ 860.295943][T15365] netlink: 12 bytes leftover after parsing attributes in process `syz.7.14489'. [ 860.320515][T15364] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14490'. [ 860.376820][T15371] netlink: 12 bytes leftover after parsing attributes in process `syz.5.14502'. [ 860.381880][T15364] netlink: 16 bytes leftover after parsing attributes in process `syz.0.14490'. [ 860.394947][T15364] netlink: 24 bytes leftover after parsing attributes in process `syz.0.14490'. [ 860.478907][T15372] syzkaller0: entered promiscuous mode [ 860.484558][T15372] syzkaller0: entered allmulticast mode [ 860.516892][T15380] FAULT_INJECTION: forcing a failure. [ 860.516892][T15380] name failslab, interval 1, probability 0, space 0, times 0 [ 860.529664][T15380] CPU: 0 UID: 0 PID: 15380 Comm: syz.0.14493 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 860.529746][T15380] Tainted: [W]=WARN [ 860.529752][T15380] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 860.529762][T15380] Call Trace: [ 860.529769][T15380] [ 860.529777][T15380] __dump_stack+0x1d/0x30 [ 860.529798][T15380] dump_stack_lvl+0xe8/0x140 [ 860.529869][T15380] dump_stack+0x15/0x1b [ 860.529885][T15380] should_fail_ex+0x265/0x280 [ 860.529904][T15380] ? audit_log_d_path+0x8d/0x150 [ 860.529933][T15380] should_failslab+0x8c/0xb0 [ 860.529956][T15380] __kmalloc_cache_noprof+0x4c/0x320 [ 860.530019][T15380] audit_log_d_path+0x8d/0x150 [ 860.530044][T15380] audit_log_d_path_exe+0x42/0x70 [ 860.530067][T15380] audit_log_task+0x1e9/0x250 [ 860.530124][T15380] audit_seccomp+0x61/0x100 [ 860.530146][T15380] ? __seccomp_filter+0x68c/0x10d0 [ 860.530180][T15380] __seccomp_filter+0x69d/0x10d0 [ 860.530201][T15380] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 860.530323][T15380] ? vfs_write+0x7e8/0x960 [ 860.530344][T15380] ? __rcu_read_unlock+0x4f/0x70 [ 860.530365][T15380] ? __fget_files+0x184/0x1c0 [ 860.530424][T15380] __secure_computing+0x82/0x150 [ 860.530441][T15380] syscall_trace_enter+0xcf/0x1e0 [ 860.530479][T15380] do_syscall_64+0xac/0x200 [ 860.530500][T15380] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 860.530523][T15380] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 860.530612][T15380] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 860.530646][T15380] RIP: 0033:0x7f4ed7bfebe9 [ 860.530690][T15380] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 860.530716][T15380] RSP: 002b:00007f4ed6667038 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 860.530735][T15380] RAX: ffffffffffffffda RBX: 00007f4ed7e25fa0 RCX: 00007f4ed7bfebe9 [ 860.530746][T15380] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffffff [ 860.530853][T15380] RBP: 00007f4ed6667090 R08: 0000000000000000 R09: 0000000000000000 [ 860.530865][T15380] R10: 000000000000fe44 R11: 0000000000000246 R12: 0000000000000001 [ 860.530896][T15380] R13: 00007f4ed7e26038 R14: 00007f4ed7e25fa0 R15: 00007ffc0aec1cb8 [ 860.530908][T15380] [ 861.007676][T15388] lo speed is unknown, defaulting to 1000 [ 861.076934][T15388] chnl_net:caif_netlink_parms(): no params data found [ 861.097427][T31123] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 861.126511][T15388] bridge0: port 1(bridge_slave_0) entered blocking state [ 861.126538][T15388] bridge0: port 1(bridge_slave_0) entered disabled state [ 861.126772][T15388] bridge_slave_0: entered allmulticast mode [ 861.127436][T15388] bridge_slave_0: entered promiscuous mode [ 861.155554][T31123] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 861.165775][T15388] bridge0: port 2(bridge_slave_1) entered blocking state [ 861.165874][T15388] bridge0: port 2(bridge_slave_1) entered disabled state [ 861.165987][T15388] bridge_slave_1: entered allmulticast mode [ 861.166560][T15388] bridge_slave_1: entered promiscuous mode [ 861.189456][T15388] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 861.205878][T31123] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 861.217306][T15388] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 861.237346][T15388] team0: Port device team_slave_0 added [ 861.238653][T31123] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 861.246491][T15388] team0: Port device team_slave_1 added [ 861.302516][T15388] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 861.302529][T15388] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 861.302586][T15388] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 861.303735][T31123] bridge_slave_1: left allmulticast mode [ 861.352505][T31123] bridge_slave_1: left promiscuous mode [ 861.358316][T31123] bridge0: port 2(bridge_slave_1) entered disabled state [ 861.367193][T31123] bridge_slave_0: left allmulticast mode [ 861.367212][T31123] bridge_slave_0: left promiscuous mode [ 861.367300][T31123] bridge0: port 1(bridge_slave_0) entered disabled state [ 861.516067][T31123] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 861.525032][T31123] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 861.525904][T31123] bond0 (unregistering): Released all slaves [ 861.535130][T15388] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 861.547522][T15388] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 861.573438][T15388] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 861.601679][T15409] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 861.620216][T31123] tipc: Left network mode [ 861.647251][T15409] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 861.658479][T31123] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 861.666047][T31123] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 861.676494][T31123] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 861.683912][T31123] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 861.696024][T31123] veth1_macvtap: left promiscuous mode [ 861.701621][T31123] veth0_macvtap: left promiscuous mode [ 861.709619][T15412] netlink: 24 bytes leftover after parsing attributes in process `syz.6.14504'. [ 861.740869][T31123] team0 (unregistering): Port device team_slave_1 removed [ 861.750212][T31123] team0 (unregistering): Port device C removed [ 861.778947][T15388] hsr_slave_0: entered promiscuous mode [ 861.785204][T15388] hsr_slave_1: entered promiscuous mode [ 861.791337][T15388] debugfs: 'hsr0' already exists in 'hsr' [ 861.797048][T15388] Cannot create hsr debugfs directory [ 861.804306][T15409] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 861.867080][T15409] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 861.886048][T15415] netlink: 4 bytes leftover after parsing attributes in process `syz.0.14505'. [ 861.923579][T15415] netlink: 16 bytes leftover after parsing attributes in process `syz.0.14505'. [ 861.932788][T15415] netlink: 24 bytes leftover after parsing attributes in process `syz.0.14505'. [ 862.007595][T15430] ip6gre4: entered allmulticast mode [ 862.097464][T15438] netlink: 'syz.6.14512': attribute type 22 has an invalid length. [ 862.111667][T15438] netlink: 'syz.6.14512': attribute type 22 has an invalid length. [ 862.119774][T31118] netdevsim netdevsim6 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 862.130378][T31118] netdevsim netdevsim6 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 862.161515][T31114] netdevsim netdevsim6 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 862.202563][T31114] netdevsim netdevsim6 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 862.223179][T15445] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 862.257896][T15388] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 862.276907][T15445] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 862.310777][T15388] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 862.327814][T15388] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 862.348845][T15445] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 862.362072][T15388] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 862.391918][T15445] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 862.407430][ T29] kauditd_printk_skb: 1721 callbacks suppressed [ 862.407445][ T29] audit: type=1326 audit(1900.051:186758): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15459 comm="syz.6.14520" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f19f908ebe9 code=0x7ffc0000 [ 862.443716][ T29] audit: type=1326 audit(1900.051:186759): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15459 comm="syz.6.14520" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f19f908ebe9 code=0x7ffc0000 [ 862.463489][T15388] 8021q: adding VLAN 0 to HW filter on device bond0 [ 862.467055][ T29] audit: type=1400 audit(1900.051:186760): avc: denied { map_create } for pid=15459 comm="syz.6.14520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 862.478048][T15388] 8021q: adding VLAN 0 to HW filter on device team0 [ 862.492644][ T29] audit: type=1400 audit(1900.051:186761): avc: denied { map_read map_write } for pid=15459 comm="syz.6.14520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 862.510034][T31145] bridge0: port 1(bridge_slave_0) entered blocking state [ 862.519415][ T29] audit: type=1326 audit(1900.051:186762): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15459 comm="syz.6.14520" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f19f908ebe9 code=0x7ffc0000 [ 862.526462][T31145] bridge0: port 1(bridge_slave_0) entered forwarding state [ 862.549709][ T29] audit: type=1326 audit(1900.051:186763): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15459 comm="syz.6.14520" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f19f908ebe9 code=0x7ffc0000 [ 862.569840][T15388] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 862.580344][ T29] audit: type=1400 audit(1900.051:186764): avc: denied { prog_load } for pid=15459 comm="syz.6.14520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 862.590676][T15388] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 862.609499][ T29] audit: type=1400 audit(1900.051:186765): avc: denied { bpf } for pid=15459 comm="syz.6.14520" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 862.609522][ T29] audit: type=1400 audit(1900.051:186766): avc: denied { perfmon } for pid=15459 comm="syz.6.14520" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 862.660992][ T29] audit: type=1400 audit(1900.051:186767): avc: denied { prog_run } for pid=15459 comm="syz.6.14520" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 862.682080][T31145] bridge0: port 2(bridge_slave_1) entered blocking state [ 862.689310][T31145] bridge0: port 2(bridge_slave_1) entered forwarding state [ 862.709523][T15469] ip6gre4: entered allmulticast mode [ 862.747825][T31118] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 862.787569][T31118] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 862.820628][T31118] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 862.838138][T31118] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 862.893507][T15388] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 863.095197][T21893] IPVS: starting estimator thread 0... [ 863.181105][T15499] IPVS: using max 2160 ests per chain, 108000 per kthread [ 863.273600][T15388] veth0_vlan: entered promiscuous mode [ 863.302490][T15388] veth1_vlan: entered promiscuous mode [ 863.331713][T15388] veth0_macvtap: entered promiscuous mode [ 863.362810][T15388] veth1_macvtap: entered promiscuous mode [ 863.421071][T15388] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 863.439346][T15388] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 863.455373][T31123] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 863.471125][T31123] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 863.491733][T31123] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 863.515302][T31123] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 863.740832][T31145] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 863.760309][T15541] netlink: 'syz.0.14537': attribute type 10 has an invalid length. [ 863.771457][T31145] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 863.780385][T15541] dummy0: entered promiscuous mode [ 863.789096][T31145] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 863.802971][T31145] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 863.874414][T15551] bridge_slave_0: left allmulticast mode [ 863.880242][T15551] bridge_slave_0: left promiscuous mode [ 863.885905][T15551] bridge0: port 1(bridge_slave_0) entered disabled state [ 863.897469][T15551] bridge_slave_1: left allmulticast mode [ 863.903238][T15551] bridge_slave_1: left promiscuous mode [ 863.909166][T15551] bridge0: port 2(bridge_slave_1) entered disabled state [ 863.922710][T15551] bond0: (slave bond_slave_0): Releasing backup interface [ 863.936268][T15551] bond0: (slave bond_slave_1): Releasing backup interface [ 863.964851][T15551] team0: Port device team_slave_0 removed [ 863.978768][T15551] team0: Port device team_slave_1 removed [ 863.987433][T15551] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 863.994876][T15551] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 864.006703][T15551] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 864.014563][T15551] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 864.169256][T15576] lo speed is unknown, defaulting to 1000 [ 864.466593][T15594] FAULT_INJECTION: forcing a failure. [ 864.466593][T15594] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 864.479751][T15594] CPU: 1 UID: 0 PID: 15594 Comm: syz.6.14560 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 864.479779][T15594] Tainted: [W]=WARN [ 864.479784][T15594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 864.479874][T15594] Call Trace: [ 864.479880][T15594] [ 864.479887][T15594] __dump_stack+0x1d/0x30 [ 864.479905][T15594] dump_stack_lvl+0xe8/0x140 [ 864.479921][T15594] dump_stack+0x15/0x1b [ 864.479934][T15594] should_fail_ex+0x265/0x280 [ 864.479951][T15594] should_fail+0xb/0x20 [ 864.479980][T15594] should_fail_usercopy+0x1a/0x20 [ 864.480074][T15594] _copy_to_user+0x20/0xa0 [ 864.480096][T15594] __se_sys_newfstatat+0x207/0x260 [ 864.480135][T15594] __x64_sys_newfstatat+0x55/0x70 [ 864.480218][T15594] x64_sys_call+0x135a/0x2ff0 [ 864.480236][T15594] do_syscall_64+0xd2/0x200 [ 864.480259][T15594] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 864.480281][T15594] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 864.480383][T15594] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 864.480437][T15594] RIP: 0033:0x7f19f908ebe9 [ 864.480453][T15594] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 864.480470][T15594] RSP: 002b:00007f19f7af7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000106 [ 864.480492][T15594] RAX: ffffffffffffffda RBX: 00007f19f92b5fa0 RCX: 00007f19f908ebe9 [ 864.480506][T15594] RDX: 0000200000000100 RSI: 00002000000000c0 RDI: ffffffffffffff9c [ 864.480519][T15594] RBP: 00007f19f7af7090 R08: 0000000000000000 R09: 0000000000000000 [ 864.480531][T15594] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 864.480544][T15594] R13: 00007f19f92b6038 R14: 00007f19f92b5fa0 R15: 00007fff416789a8 [ 864.480596][T15594] [ 864.728802][T15607] ip6gre5: entered allmulticast mode [ 864.798469][T15611] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 864.853115][T15611] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 864.897565][T15611] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 864.917107][T15619] FAULT_INJECTION: forcing a failure. [ 864.917107][T15619] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 864.930296][T15619] CPU: 0 UID: 0 PID: 15619 Comm: syz.7.14565 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 864.930326][T15619] Tainted: [W]=WARN [ 864.930332][T15619] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 864.930401][T15619] Call Trace: [ 864.930407][T15619] [ 864.930414][T15619] __dump_stack+0x1d/0x30 [ 864.930433][T15619] dump_stack_lvl+0xe8/0x140 [ 864.930448][T15619] dump_stack+0x15/0x1b [ 864.930461][T15619] should_fail_ex+0x265/0x280 [ 864.930519][T15619] should_fail+0xb/0x20 [ 864.930534][T15619] should_fail_usercopy+0x1a/0x20 [ 864.930552][T15619] _copy_from_user+0x1c/0xb0 [ 864.930613][T15619] get_itimerspec64+0xf9/0x1a0 [ 864.930630][T15619] __x64_sys_timer_settime+0x9a/0x160 [ 864.930656][T15619] x64_sys_call+0x17f0/0x2ff0 [ 864.930674][T15619] do_syscall_64+0xd2/0x200 [ 864.930717][T15619] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 864.930737][T15619] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 864.930807][T15619] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 864.930825][T15619] RIP: 0033:0x7ff66ef6ebe9 [ 864.930839][T15619] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 864.930902][T15619] RSP: 002b:00007ff66d995038 EFLAGS: 00000246 ORIG_RAX: 00000000000000df [ 864.930919][T15619] RAX: ffffffffffffffda RBX: 00007ff66f196180 RCX: 00007ff66ef6ebe9 [ 864.930929][T15619] RDX: 0000200000000300 RSI: 236bd4336e4642df RDI: 0000000000000000 [ 864.930940][T15619] RBP: 00007ff66d995090 R08: 0000000000000000 R09: 0000000000000000 [ 864.930950][T15619] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 864.930960][T15619] R13: 00007ff66f196218 R14: 00007ff66f196180 R15: 00007ffc3d5a72c8 [ 864.930976][T15619] [ 865.136887][T15611] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 865.442043][T15641] __nla_validate_parse: 14 callbacks suppressed [ 865.442090][T15641] netlink: 4 bytes leftover after parsing attributes in process `syz.6.14574'. [ 865.469164][T15641] netlink: 12 bytes leftover after parsing attributes in process `syz.6.14574'. [ 865.726005][T15656] netlink: 4 bytes leftover after parsing attributes in process `syz.7.14579'. [ 865.842263][T15661] SELinux: Context system_u:object_r:src_t:s0 is not valid (left unmapped). [ 865.854456][T15663] 9pnet_fd: Insufficient options for proto=fd [ 866.065863][T15676] FAULT_INJECTION: forcing a failure. [ 866.065863][T15676] name failslab, interval 1, probability 0, space 0, times 0 [ 866.078629][T15676] CPU: 0 UID: 0 PID: 15676 Comm: syz.7.14589 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 866.078677][T15676] Tainted: [W]=WARN [ 866.078684][T15676] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 866.078696][T15676] Call Trace: [ 866.078704][T15676] [ 866.078713][T15676] __dump_stack+0x1d/0x30 [ 866.078734][T15676] dump_stack_lvl+0xe8/0x140 [ 866.078753][T15676] dump_stack+0x15/0x1b [ 866.078770][T15676] should_fail_ex+0x265/0x280 [ 866.078939][T15676] should_failslab+0x8c/0xb0 [ 866.078963][T15676] kmem_cache_alloc_noprof+0x50/0x310 [ 866.078989][T15676] ? alloc_vfsmnt+0x2d/0x300 [ 866.079032][T15676] alloc_vfsmnt+0x2d/0x300 [ 866.079150][T15676] clone_mnt+0x46/0x630 [ 866.079177][T15676] ? file_open_name+0xfa/0x120 [ 866.079206][T15676] mnt_clone_internal+0x39/0x80 [ 866.079269][T15676] __se_sys_acct+0x26f/0x490 [ 866.079297][T15676] __x64_sys_acct+0x1f/0x30 [ 866.079355][T15676] x64_sys_call+0x2f2b/0x2ff0 [ 866.079375][T15676] do_syscall_64+0xd2/0x200 [ 866.079402][T15676] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 866.079502][T15676] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 866.079572][T15676] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 866.079593][T15676] RIP: 0033:0x7ff66ef6ebe9 [ 866.079609][T15676] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 866.079626][T15676] RSP: 002b:00007ff66d9d7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a3 [ 866.079648][T15676] RAX: ffffffffffffffda RBX: 00007ff66f195fa0 RCX: 00007ff66ef6ebe9 [ 866.079661][T15676] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000080 [ 866.079709][T15676] RBP: 00007ff66d9d7090 R08: 0000000000000000 R09: 0000000000000000 [ 866.079720][T15676] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 866.079732][T15676] R13: 00007ff66f196038 R14: 00007ff66f195fa0 R15: 00007ffc3d5a72c8 [ 866.079748][T15676] [ 866.287268][T31145] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 866.307297][T31145] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 866.323972][T31123] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 866.332574][T31123] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 866.425386][T15689] 9pnet_fd: Insufficient options for proto=fd [ 866.516408][T15699] FAULT_INJECTION: forcing a failure. [ 866.516408][T15699] name failslab, interval 1, probability 0, space 0, times 0 [ 866.529253][T15699] CPU: 1 UID: 0 PID: 15699 Comm: syz.6.14598 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 866.529283][T15699] Tainted: [W]=WARN [ 866.529290][T15699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 866.529302][T15699] Call Trace: [ 866.529309][T15699] [ 866.529317][T15699] __dump_stack+0x1d/0x30 [ 866.529394][T15699] dump_stack_lvl+0xe8/0x140 [ 866.529521][T15699] dump_stack+0x15/0x1b [ 866.529555][T15699] should_fail_ex+0x265/0x280 [ 866.529576][T15699] should_failslab+0x8c/0xb0 [ 866.529600][T15699] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 866.529646][T15699] ? sidtab_sid2str_get+0xa0/0x130 [ 866.529665][T15699] kmemdup_noprof+0x2b/0x70 [ 866.529736][T15699] sidtab_sid2str_get+0xa0/0x130 [ 866.529753][T15699] security_sid_to_context_core+0x1eb/0x2e0 [ 866.529786][T15699] security_sid_to_context+0x27/0x40 [ 866.529806][T15699] avc_audit_post_callback+0x10f/0x520 [ 866.529831][T15699] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 866.529882][T15699] common_lsm_audit+0x1b8/0x230 [ 866.529959][T15699] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 866.529986][T15699] slow_avc_audit+0x104/0x140 [ 866.530013][T15699] avc_has_perm+0x13a/0x180 [ 866.530035][T15699] selinux_uring_allowed+0x74/0x80 [ 866.530116][T15699] security_uring_allowed+0x2c/0x60 [ 866.530202][T15699] __se_sys_io_uring_setup+0xe1/0x210 [ 866.530225][T15699] ? fput+0x8f/0xc0 [ 866.530248][T15699] ? ksys_write+0x192/0x1a0 [ 866.530266][T15699] __x64_sys_io_uring_setup+0x31/0x40 [ 866.530364][T15699] x64_sys_call+0x2b21/0x2ff0 [ 866.530385][T15699] do_syscall_64+0xd2/0x200 [ 866.530489][T15699] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 866.530512][T15699] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 866.530611][T15699] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 866.530644][T15699] RIP: 0033:0x7f19f908ebe9 [ 866.530658][T15699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 866.530675][T15699] RSP: 002b:00007f19f7af6fc8 EFLAGS: 00000206 ORIG_RAX: 00000000000001a9 [ 866.530694][T15699] RAX: ffffffffffffffda RBX: 00007f19f92b5fa0 RCX: 00007f19f908ebe9 [ 866.530734][T15699] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000000000003c0c [ 866.530748][T15699] RBP: 0000200000000400 R08: 0000000000000000 R09: 0000000000000000 [ 866.530759][T15699] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 866.530770][T15699] R13: 0000000000000000 R14: 0000000000003c0c R15: 0000000000000000 [ 866.530786][T15699] [ 866.973302][T15727] 9pnet_fd: Insufficient options for proto=fd [ 867.086562][T15739] netlink: 12 bytes leftover after parsing attributes in process `syz.7.14613'. [ 867.110686][T15739] FAULT_INJECTION: forcing a failure. [ 867.110686][T15739] name failslab, interval 1, probability 0, space 0, times 0 [ 867.123397][T15739] CPU: 1 UID: 0 PID: 15739 Comm: syz.7.14613 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 867.123485][T15739] Tainted: [W]=WARN [ 867.123491][T15739] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 867.123502][T15739] Call Trace: [ 867.123508][T15739] [ 867.123515][T15739] __dump_stack+0x1d/0x30 [ 867.123534][T15739] dump_stack_lvl+0xe8/0x140 [ 867.123551][T15739] dump_stack+0x15/0x1b [ 867.123597][T15739] should_fail_ex+0x265/0x280 [ 867.123619][T15739] should_failslab+0x8c/0xb0 [ 867.123643][T15739] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 867.123667][T15739] ? debugfs_alloc_inode+0x34/0x40 [ 867.123692][T15739] ? lookup_noperm+0xc9/0x180 [ 867.123717][T15739] ? __pfx_debugfs_alloc_inode+0x10/0x10 [ 867.123798][T15739] debugfs_alloc_inode+0x34/0x40 [ 867.123822][T15739] alloc_inode+0x40/0x170 [ 867.123844][T15739] new_inode+0x1d/0xe0 [ 867.123866][T15739] __debugfs_create_file+0x109/0x330 [ 867.123909][T15739] debugfs_create_file_full+0x3f/0x60 [ 867.123934][T15739] ? __pfx_tun_setup+0x10/0x10 [ 867.123958][T15739] ref_tracker_dir_debugfs+0x100/0x1e0 [ 867.123997][T15739] alloc_netdev_mqs+0x1a2/0xa30 [ 867.124079][T15739] tun_set_iff+0x42c/0x890 [ 867.124104][T15739] __tun_chr_ioctl+0x5f0/0x14c0 [ 867.124199][T15739] ? __pfx_tun_chr_ioctl+0x10/0x10 [ 867.124266][T15739] tun_chr_ioctl+0x27/0x40 [ 867.124288][T15739] __se_sys_ioctl+0xce/0x140 [ 867.124303][T15739] __x64_sys_ioctl+0x43/0x50 [ 867.124331][T15739] x64_sys_call+0x1816/0x2ff0 [ 867.124426][T15739] do_syscall_64+0xd2/0x200 [ 867.124450][T15739] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 867.124470][T15739] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 867.124495][T15739] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 867.124568][T15739] RIP: 0033:0x7ff66ef6ebe9 [ 867.124585][T15739] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 867.124601][T15739] RSP: 002b:00007ff66d9d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 867.124644][T15739] RAX: ffffffffffffffda RBX: 00007ff66f195fa0 RCX: 00007ff66ef6ebe9 [ 867.124657][T15739] RDX: 0000200000000100 RSI: 00000000400454ca RDI: 0000000000000008 [ 867.124671][T15739] RBP: 00007ff66d9d7090 R08: 0000000000000000 R09: 0000000000000000 [ 867.124681][T15739] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 867.124692][T15739] R13: 00007ff66f196038 R14: 00007ff66f195fa0 R15: 00007ffc3d5a72c8 [ 867.124708][T15739] [ 867.124716][T15739] debugfs: out of free dentries, can not create file 'netdev@ffff88815a154550' [ 867.178110][ T29] kauditd_printk_skb: 1834 callbacks suppressed [ 867.178126][ T29] audit: type=1400 audit(1905.069:188602): avc: denied { map_create } for pid=15745 comm="syz.5.14615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 867.405389][ T29] audit: type=1400 audit(1905.080:188603): avc: denied { map_read map_write } for pid=15745 comm="syz.5.14615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 867.425358][ T29] audit: type=1326 audit(1905.080:188604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15735 comm="syz.7.14610" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7ff66ef6ebe9 code=0x7ffc0000 [ 867.448770][ T29] audit: type=1400 audit(1905.122:188605): avc: denied { open } for pid=15738 comm="syz.0.14614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 867.468101][ T29] audit: type=1400 audit(1905.122:188606): avc: denied { perfmon } for pid=15738 comm="syz.0.14614" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 867.488874][ T29] audit: type=1400 audit(1905.122:188607): avc: denied { write } for pid=15738 comm="syz.0.14614" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 867.508248][ T29] audit: type=1400 audit(1905.122:188608): avc: denied { prog_load } for pid=15745 comm="syz.5.14615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 867.527248][ T29] audit: type=1400 audit(1905.122:188609): avc: denied { bpf } for pid=15745 comm="syz.5.14615" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 867.547779][ T29] audit: type=1400 audit(1905.122:188610): avc: denied { perfmon } for pid=15745 comm="syz.5.14615" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 867.568748][ T29] audit: type=1400 audit(1905.132:188611): avc: denied { prog_run } for pid=15745 comm="syz.5.14615" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 867.656913][T15755] netlink: 4 bytes leftover after parsing attributes in process `syz.6.14616'. [ 867.725621][T15758] ip6gre4: entered allmulticast mode [ 867.790014][T15762] syzkaller0: entered promiscuous mode [ 867.795586][T15762] syzkaller0: entered allmulticast mode [ 867.808348][T15764] 9pnet_fd: Insufficient options for proto=fd [ 868.001589][T15785] sctp: [Deprecated]: syz.4.14624 (pid 15785) Use of int in max_burst socket option deprecated. [ 868.001589][T15785] Use struct sctp_assoc_value instead [ 868.132442][T15793] netlink: 8 bytes leftover after parsing attributes in process `syz.7.14630'. [ 868.132836][T15791] netlink: 4 bytes leftover after parsing attributes in process `syz.6.14631'. [ 868.181231][T15797] FAULT_INJECTION: forcing a failure. [ 868.181231][T15797] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 868.194679][T15797] CPU: 1 UID: 0 PID: 15797 Comm: syz.7.14632 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 868.194701][T15797] Tainted: [W]=WARN [ 868.194705][T15797] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 868.194712][T15797] Call Trace: [ 868.194717][T15797] [ 868.194785][T15797] __dump_stack+0x1d/0x30 [ 868.194798][T15797] dump_stack_lvl+0xe8/0x140 [ 868.194808][T15797] dump_stack+0x15/0x1b [ 868.194920][T15797] should_fail_ex+0x265/0x280 [ 868.194933][T15797] should_fail_alloc_page+0xf2/0x100 [ 868.194956][T15797] __alloc_frozen_pages_noprof+0xff/0x360 [ 868.194978][T15797] alloc_pages_mpol+0xb3/0x250 [ 868.195006][T15797] alloc_pages_noprof+0x90/0x130 [ 868.195041][T15797] pte_alloc_one+0x2d/0x120 [ 868.195055][T15797] __pte_alloc+0x32/0x2b0 [ 868.195071][T15797] handle_mm_fault+0x1c55/0x2c20 [ 868.195157][T15797] do_user_addr_fault+0x636/0x1090 [ 868.195177][T15797] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 868.195191][T15797] exc_page_fault+0x62/0xa0 [ 868.195205][T15797] asm_exc_page_fault+0x26/0x30 [ 868.195216][T15797] RIP: 0033:0x7ff66ee30ba3 [ 868.195241][T15797] Code: 1f 84 00 00 00 00 00 3d 00 01 00 00 75 29 45 31 f6 48 83 c4 18 44 89 f0 5b 5d 41 5c 41 5d 41 5e 41 5f c3 0f 1f 40 00 49 8b 0f <44> 88 34 01 49 83 47 10 01 eb 92 66 90 8d 90 ff fe ff ff 83 fa 1c [ 868.195251][T15797] RSP: 002b:00007ff66d9d63f0 EFLAGS: 00010202 [ 868.195260][T15797] RAX: 0000000000000000 RBX: 00007ff66d9d6490 RCX: 00007ff6655b7000 [ 868.195267][T15797] RDX: 00007ff66d9d6630 RSI: 0000000000000003 RDI: 00007ff66d9d6530 [ 868.195274][T15797] RBP: 000000000000012b R08: 0000000000000007 R09: 000000000000004a [ 868.195327][T15797] R10: 0000000000000064 R11: 00007ff66d9d6490 R12: 00007ff66d9d6490 [ 868.195334][T15797] R13: 00007ff66f00da20 R14: 000000000000000b R15: 00007ff66d9d6530 [ 868.195344][T15797] [ 868.195352][T15797] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 868.300754][T15801] 9pnet_fd: Insufficient options for proto=fd [ 868.696499][T15812] netlink: 4 bytes leftover after parsing attributes in process `syz.7.14638'. [ 868.763947][T15815] netlink: 68 bytes leftover after parsing attributes in process `syz.7.14638'. [ 868.781515][T15815] netlink: 12 bytes leftover after parsing attributes in process `syz.7.14638'. [ 869.259867][T15839] 9pnet_fd: Insufficient options for proto=fd [ 869.406276][T15847] FAULT_INJECTION: forcing a failure. [ 869.406276][T15847] name failslab, interval 1, probability 0, space 0, times 0 [ 869.419128][T15847] CPU: 1 UID: 0 PID: 15847 Comm: syz.6.14650 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 869.419156][T15847] Tainted: [W]=WARN [ 869.419208][T15847] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 869.419220][T15847] Call Trace: [ 869.419226][T15847] [ 869.419233][T15847] __dump_stack+0x1d/0x30 [ 869.419254][T15847] dump_stack_lvl+0xe8/0x140 [ 869.419341][T15847] dump_stack+0x15/0x1b [ 869.419354][T15847] should_fail_ex+0x265/0x280 [ 869.419373][T15847] ? audit_log_d_path+0x8d/0x150 [ 869.419401][T15847] should_failslab+0x8c/0xb0 [ 869.419421][T15847] __kmalloc_cache_noprof+0x4c/0x320 [ 869.419449][T15847] audit_log_d_path+0x8d/0x150 [ 869.419493][T15847] audit_log_d_path_exe+0x42/0x70 [ 869.419517][T15847] audit_log_task+0x1e9/0x250 [ 869.419540][T15847] audit_seccomp+0x61/0x100 [ 869.419561][T15847] ? __seccomp_filter+0x68c/0x10d0 [ 869.419625][T15847] __seccomp_filter+0x69d/0x10d0 [ 869.419645][T15847] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 869.419666][T15847] ? vfs_write+0x7e8/0x960 [ 869.419734][T15847] __secure_computing+0x82/0x150 [ 869.419754][T15847] syscall_trace_enter+0xcf/0x1e0 [ 869.419802][T15847] do_syscall_64+0xac/0x200 [ 869.419823][T15847] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 869.419841][T15847] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 869.419864][T15847] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 869.419884][T15847] RIP: 0033:0x7f19f908ebe9 [ 869.419908][T15847] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 869.419922][T15847] RSP: 002b:00007f19f7af7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 869.419939][T15847] RAX: ffffffffffffffda RBX: 00007f19f92b5fa0 RCX: 00007f19f908ebe9 [ 869.419952][T15847] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000006 [ 869.419964][T15847] RBP: 00007f19f7af7090 R08: 0000000000000000 R09: 0000000000000000 [ 869.419976][T15847] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 869.420058][T15847] R13: 00007f19f92b6038 R14: 00007f19f92b5fa0 R15: 00007fff416789a8 [ 869.420074][T15847] [ 870.088678][T15887] FAULT_INJECTION: forcing a failure. [ 870.088678][T15887] name failslab, interval 1, probability 0, space 0, times 0 [ 870.102872][T15887] CPU: 0 UID: 0 PID: 15887 Comm: syz.4.14665 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 870.102899][T15887] Tainted: [W]=WARN [ 870.102905][T15887] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 870.102915][T15887] Call Trace: [ 870.102920][T15887] [ 870.102927][T15887] __dump_stack+0x1d/0x30 [ 870.102944][T15887] dump_stack_lvl+0xe8/0x140 [ 870.102960][T15887] dump_stack+0x15/0x1b [ 870.102973][T15887] should_fail_ex+0x265/0x280 [ 870.102990][T15887] should_failslab+0x8c/0xb0 [ 870.103009][T15887] kmem_cache_alloc_noprof+0x50/0x310 [ 870.103034][T15887] ? vm_area_alloc+0x2c/0xb0 [ 870.103058][T15887] vm_area_alloc+0x2c/0xb0 [ 870.103078][T15887] mmap_region+0xaa2/0x1630 [ 870.103118][T15887] do_mmap+0x9b3/0xbe0 [ 870.103150][T15887] vm_mmap_pgoff+0x17a/0x2e0 [ 870.103179][T15887] ksys_mmap_pgoff+0xc2/0x310 [ 870.103204][T15887] ? __x64_sys_mmap+0x49/0x70 [ 870.103223][T15887] x64_sys_call+0x14a3/0x2ff0 [ 870.103244][T15887] do_syscall_64+0xd2/0x200 [ 870.103268][T15887] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 870.103286][T15887] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 870.103306][T15887] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 870.103324][T15887] RIP: 0033:0x7f2351a9ec23 [ 870.103338][T15887] Code: f7 d8 64 89 01 48 83 c8 ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 00 41 89 ca 41 f7 c1 ff 0f 00 00 75 14 b8 09 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 25 c3 0f 1f 40 00 48 c7 c0 a8 ff ff ff 64 c7 [ 870.103352][T15887] RSP: 002b:00007f23504fee18 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 870.103367][T15887] RAX: ffffffffffffffda RBX: 0000000000000474 RCX: 00007f2351a9ec23 [ 870.103378][T15887] RDX: 0000000000000003 RSI: 0000000008400000 RDI: 0000000000000000 [ 870.103389][T15887] RBP: 0000200000000542 R08: 00000000ffffffff R09: 0000000000000000 [ 870.103400][T15887] R10: 0000000000000022 R11: 0000000000000246 R12: 0000000000000008 [ 870.103410][T15887] R13: 00007f23504feef0 R14: 00007f23504feeb0 R15: 0000200000000380 [ 870.103424][T15887] [ 870.771410][T15904] __nla_validate_parse: 5 callbacks suppressed [ 870.771426][T15904] netlink: 4 bytes leftover after parsing attributes in process `syz.7.14671'. [ 870.907158][T15907] netlink: 8 bytes leftover after parsing attributes in process `syz.0.14672'. [ 870.971330][T15912] FAULT_INJECTION: forcing a failure. [ 870.971330][T15912] name failslab, interval 1, probability 0, space 0, times 0 [ 870.984179][T15912] CPU: 1 UID: 0 PID: 15912 Comm: syz.5.14675 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 870.984276][T15912] Tainted: [W]=WARN [ 870.984282][T15912] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 870.984292][T15912] Call Trace: [ 870.984305][T15912] [ 870.984313][T15912] __dump_stack+0x1d/0x30 [ 870.984330][T15912] dump_stack_lvl+0xe8/0x140 [ 870.984346][T15912] dump_stack+0x15/0x1b [ 870.984360][T15912] should_fail_ex+0x265/0x280 [ 870.984483][T15912] ? audit_log_d_path+0x8d/0x150 [ 870.984506][T15912] should_failslab+0x8c/0xb0 [ 870.984526][T15912] __kmalloc_cache_noprof+0x4c/0x320 [ 870.984554][T15912] audit_log_d_path+0x8d/0x150 [ 870.984687][T15912] audit_log_d_path_exe+0x42/0x70 [ 870.984712][T15912] audit_log_task+0x1e9/0x250 [ 870.984784][T15912] audit_seccomp+0x61/0x100 [ 870.984805][T15912] ? __seccomp_filter+0x68c/0x10d0 [ 870.984824][T15912] __seccomp_filter+0x69d/0x10d0 [ 870.984916][T15912] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 870.985010][T15912] ? vfs_write+0x7e8/0x960 [ 870.985039][T15912] __secure_computing+0x82/0x150 [ 870.985058][T15912] syscall_trace_enter+0xcf/0x1e0 [ 870.985078][T15912] do_syscall_64+0xac/0x200 [ 870.985155][T15912] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 870.985249][T15912] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 870.985273][T15912] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 870.985294][T15912] RIP: 0033:0x7f6d8ad3ebe9 [ 870.985309][T15912] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 870.985326][T15912] RSP: 002b:00007f6d897a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000049 [ 870.985424][T15912] RAX: ffffffffffffffda RBX: 00007f6d8af65fa0 RCX: 00007f6d8ad3ebe9 [ 870.985456][T15912] RDX: 0000000000000000 RSI: 0000000000000002 RDI: 0000000000000006 [ 870.985469][T15912] RBP: 00007f6d897a7090 R08: 0000000000000000 R09: 0000000000000000 [ 870.985480][T15912] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 870.985490][T15912] R13: 00007f6d8af66038 R14: 00007f6d8af65fa0 R15: 00007ffdd95da8a8 [ 870.985507][T15912] [ 871.313354][T15928] pim6reg: entered allmulticast mode [ 871.327082][T15927] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 871.383119][T15927] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 871.437142][T15939] netlink: 4 bytes leftover after parsing attributes in process `syz.7.14681'. [ 871.457373][T15927] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 871.477019][T15934] netlink: 68 bytes leftover after parsing attributes in process `syz.7.14681'. [ 871.495103][T15934] netlink: 12 bytes leftover after parsing attributes in process `syz.7.14681'. [ 871.504307][T15934] netlink: 20 bytes leftover after parsing attributes in process `syz.7.14681'. [ 871.518443][T15927] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 871.580274][T31145] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 871.594910][T31145] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 871.615835][T31145] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 871.628990][T31145] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 871.893191][T15963] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 871.935551][T15963] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 871.954624][ T29] kauditd_printk_skb: 1836 callbacks suppressed [ 871.954693][ T29] audit: type=1400 audit(1910.087:190438): avc: denied { create } for pid=15961 comm="syz.5.14694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 871.981571][ T29] audit: type=1400 audit(1910.087:190439): avc: denied { write } for pid=15961 comm="syz.5.14694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 872.002120][ T29] audit: type=1400 audit(1910.087:190440): avc: denied { read } for pid=15961 comm="syz.5.14694" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 872.039126][ T29] audit: type=1400 audit(1910.087:190441): avc: denied { ioctl } for pid=15961 comm="syz.5.14694" path="socket:[221468]" dev="sockfs" ino=221468 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 872.064835][ T29] audit: type=1400 audit(1910.087:190442): avc: denied { open } for pid=15964 comm="syz.0.14695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 872.083994][ T29] audit: type=1400 audit(1910.087:190443): avc: denied { perfmon } for pid=15964 comm="syz.0.14695" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 872.104698][ T29] audit: type=1400 audit(1910.087:190444): avc: denied { write } for pid=15964 comm="syz.0.14695" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 872.138509][T15963] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 872.159736][ T29] audit: type=1400 audit(1910.297:190445): avc: denied { map_create } for pid=15973 comm="syz.4.14696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 872.178951][ T29] audit: type=1400 audit(1910.297:190446): avc: denied { perfmon } for pid=15973 comm="syz.4.14696" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 872.200090][ T29] audit: type=1400 audit(1910.297:190447): avc: denied { map_read map_write } for pid=15973 comm="syz.4.14696" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 872.230793][T15963] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 872.252171][T15976] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 872.329572][T15976] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 872.355781][T15988] ================================================================== [ 872.363869][T15988] BUG: KCSAN: data-race in io_flush_timeouts / io_issue_sqe [ 872.371134][T15988] [ 872.373437][T15988] read-write to 0xffff888132e8ca10 of 4 bytes by task 15986 on cpu 0: [ 872.381558][T15988] io_issue_sqe+0x19c/0x970 [ 872.386125][T15988] io_wq_submit_work+0x3f7/0x5f0 [ 872.391055][T15988] io_worker_handle_work+0x44e/0x9b0 [ 872.396318][T15988] io_wq_worker+0x22e/0x870 [ 872.400800][T15988] ret_from_fork+0xda/0x150 [ 872.405283][T15988] ret_from_fork_asm+0x1a/0x30 [ 872.410025][T15988] [ 872.412325][T15988] read to 0xffff888132e8ca10 of 4 bytes by task 15988 on cpu 1: [ 872.420198][T15988] io_flush_timeouts+0x56/0x1d0 [ 872.425033][T15988] __io_commit_cqring_flush+0xeb/0x100 [ 872.430480][T15988] io_issue_sqe+0x7cb/0x970 [ 872.434965][T15988] io_wq_submit_work+0x3f7/0x5f0 [ 872.439892][T15988] io_worker_handle_work+0x44e/0x9b0 [ 872.445190][T15988] io_wq_worker+0x22e/0x870 [ 872.449677][T15988] ret_from_fork+0xda/0x150 [ 872.454159][T15988] ret_from_fork_asm+0x1a/0x30 [ 872.459001][T15988] [ 872.461315][T15988] value changed: 0x00000309 -> 0x0000030a [ 872.467005][T15988] [ 872.469316][T15988] Reported by Kernel Concurrency Sanitizer on: [ 872.475447][T15988] CPU: 1 UID: 0 PID: 15988 Comm: iou-wrk-15984 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 872.487064][T15988] Tainted: [W]=WARN [ 872.490868][T15988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 872.500909][T15988] ================================================================== [ 872.520204][T15976] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 872.585982][T15976] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 872.682067][T31118] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 872.692784][T31118] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 872.703820][T31118] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 872.714731][T31118] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 874.910435][T31118] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 874.921650][T31118] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 874.932300][T31118] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 874.943101][T31145] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0