last executing test programs: 9m40.886536564s ago: executing program 0 (id=2088): syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="666c7573682c73686f72746e616d653d6c6f7765722c73686f72746e616d653d6d697865642c756e695f786c6174653d302c6e6f6e756d7461696c3d302c6e6f6e756d7461696c3d302c73686f72746e616d653d77696e6e742c00a56dc300a96c9b20f3fabdcb10cad696323259cc0500e5f91620d7b9dc000000000057c51b98cfb3b59f8db941abb77112000000b8ff"], 0x1, 0x250, &(0x7f00000002c0)="$eJzs2k9rHHUYB/BnYqUxJd2I/2hB+kMP6mVocvIgkiAtiAFFG6EK0qmZ6JJxN2SWwIrYeNGLB1+CZ/HoTZCKFy+5+Ao8eMslxx7EkXbTNhtWyKJxS/P5XPZhn/0uz/AMw+8wu69888n6Wp2vFb2YyrKYWoztuJXFXEzFXdvx0gtXf332navvvbG0vHzp7ZQuL12ZX0gpnb3w0/ufff/czd6Zd384++Pp2Jn7YHfviz92nt45t/vXlY/bdWrXqdPtpSJd73Z7xfWqTKvtej1P6a2qLOoytTt1uTnUX6u6Gxv9VHRWZ2c2Nsu6TkWnn9bLfup1U2+zn4qPinYn5XmeZmeCf2Plu1tNE3vNo9ciu/vd7O/RiuzxlD2xmD11LXtmOzu31zStyQ7KMbm3/6ZpHvs2zty0/xPlwEN9OqL6amtla2XwOegvrUU7qijjYrTiz7h9m+wb1JdfX750Md0xF19WN/bzN7ZWHhnOz0cr5kbn5wf5NJw/HTMH8wvRiidH5xdG5qfjxecP5PNoxW8fRjeqWI3b2fv5z+dTeu3N5UP583d+BwDwsMnTPSPPb3n+T/1Bfozz4aHz1ak4f2qy105E3f90vaiqclMxTnFh3NT05GeeeHH8N1uTRTwIV3qk4pefX335ARhjv1g8vJ1JP5n4P9xf+lET08c7EAAAAAAAAAAAAEfy371F+PX+Pw61snHeLAMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAE6mvwMAAP//cOvMBw==") r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000100000000000000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000340)={0x38, 0x0, 0x1, 0x401, 0x0, 0x0, {0x2}, [@CTA_TUPLE_ORIG={0x24, 0x1, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @multicast2=0xe0000001}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) ioctl$sock_SIOCSIFVLAN_SET_VLAN_NAME_TYPE_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000140)={0x6, 'veth0_macvtap\x00', {0x1}, 0x401}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, &(0x7f0000000180)={0x0, 'veth0_virt_wifi\x00', {0x2}, 0x5}) socket$inet6(0xa, 0x3, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x1b, 0xc, 0x0, 0x0, 0x7a, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac14140f00000000000000001400020002000000ffffff53a2513743897e44000d0001007564703aa3"], 0x54}}, 0x0) 9m40.777647459s ago: executing program 0 (id=2089): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) socket(0x10, 0x803, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'team_slave_1\x00'}) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000880)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xd, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r4, &(0x7f0000000000)={0x1f, 0x0, @any, 0x0, 0x1}, 0xe) listen(r4, 0x372) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000280)='sched_switch\x00', r3}, 0x18) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8946, &(0x7f0000000080)) ioctl$BTRFS_IOC_SPACE_INFO(0xffffffffffffffff, 0xc0109414, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000004bc311ec8500000075000000a70000000800000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) fcntl$setlease(r5, 0x400, 0x1) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) fallocate(r6, 0x50, 0x6, 0x6) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000004c0)={@loopback, @dev}, &(0x7f0000000500)=0xc) sendmsg$ETHTOOL_MSG_WOL_SET(r5, 0x0, 0x0) fremovexattr(r5, &(0x7f0000000040)=@known='system.posix_acl_default\x00') 9m40.723154491s ago: executing program 0 (id=2090): r0 = socket$tipc(0x1e, 0x5, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x41}, 0x10) bind$tipc(r0, 0x0, 0x0) 9m40.686333413s ago: executing program 0 (id=2091): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) sendmsg$NL80211_CMD_REGISTER_BEACONS(0xffffffffffffffff, &(0x7f0000000740)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[], 0x1c}}, 0x20040094) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000d00)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000000c0)='kfree\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) r2 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$KEYCTL_MOVE(0x1e, r2, 0xfffffffffffffffe, r2, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) mount$bind(&(0x7f0000000200)='.\x00', &(0x7f00000004c0)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(&(0x7f0000000040)='.\x00', &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x2a05404, 0x0) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f0000000040)='.\x00', 0x2) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r4, 0x800448d5, &(0x7f0000000200)="fa000000261e5af15d3b6c919ed7e2740080aebc00400ce534cfd1e9d41d80f292476869307821cc54d0419dc212a81bdc97d37cfea48ac60c9d1691bd56a425a7950064fac849c7225d7c26d408113d975708413cf62da654cf1cb8189b159df43dba2ba0e04ff5fd5a02073dde1bee6a232b71230a0688b0e5cd9baef41788b3c84ac7bff353650fcfb2e7a7c999c16e0ebf572d10684289d47e518b5d465051d8a554f81fb8e406a5275c940520d918270ccdd037691a3e72ee6e983399de14fecf9964d0afb1b623365c5bdebbdeab898101") 9m40.605044586s ago: executing program 0 (id=2093): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = socket$inet(0x2, 0x2, 0x0) setsockopt$inet_msfilter(r1, 0x0, 0x29, &(0x7f0000000040)=ANY=[@ANYBLOB="e00000027f0000010000000003"], 0x1c) syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), r0) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket(0x400000000010, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000000)={'ipvlan0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x78, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0xffe0, 0xf}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x6, 0x3, 0xc06a2f6, 0x1, 0x7}, 0x6, 0x0, 0xa, 0x4, 0x6, 0x27, 0x19, 0x9, 0x3, 0x8, {0x0, 0x2, 0x9, 0x800, 0x8704, 0x27000000}}}}]}, 0x78}}, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r7, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r7, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000200)=ANY=[@ANYBLOB="500000001000370400"/20, @ANYRES32=r8, @ANYBLOB="83040500010000003000128008000100677265002400028008000700ac"], 0x50}}, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)=@newlink={0x48, 0x10, 0x439, 0x0, 0x3, {0x0, 0x0, 0x0, r8, 0x9801}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @gre={{0x8}, {0x14, 0x2, 0x0, 0x1, [@IFLA_GRE_REMOTE={0x8, 0x7, @dev}, @IFLA_GRE_FWMARK={0x8, 0x14, 0x2}]}}}, @IFLA_MTU={0x8, 0x4, 0x4}]}, 0x48}, 0x1, 0x0, 0x0, 0x2000c801}, 0x4) r9 = socket$nl_route(0x10, 0x3, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000c"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r11, 0x0, 0x471}, 0x18) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000500)=@newqdisc={0x60, 0x24, 0x4ee4e6a52ff56541, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, r12, {0x0, 0x4}, {0xffff, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x30, 0x2, {{0x6, 0x9, 0x80, 0x0, 0xffffffff, 0x91b1}, [@TCA_NETEM_JITTER64={0xc, 0xb, 0x3}, @TCA_NETEM_ECN={0x8}]}}}]}, 0x60}, 0x1, 0x0, 0x0, 0x4000400}, 0x0) 9m40.485680312s ago: executing program 0 (id=2096): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, 0x0, &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x6, &(0x7f0000002000)={0x1}) (fail_nth: 6) 9m40.469092632s ago: executing program 32 (id=2096): r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, 0x0, &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r2}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$lock(r3, 0x6, &(0x7f0000002000)={0x1}) (fail_nth: 6) 7m26.696602334s ago: executing program 4 (id=3810): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="16000000000000000400000005"], 0x50) r1 = socket$kcm(0xa, 0x922000000003, 0x11) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async, rerun: 64) sendmsg$inet(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x2, 0x4e23, @remote}, 0x10, 0x0}, 0x0) (rerun: 64) r2 = socket$inet6(0xa, 0x1, 0x6) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, 0x0, 0x18) r3 = bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000001700000001"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x18) r6 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={0x2, 0xa, 0x9, 0x9, 0x3, 0x0, 0x70bd2a, 0x25dfdbff, [@sadb_x_nat_t_type={0x1, 0x14, 0xe}]}, 0x18}}, 0x800) (async) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000001c0)={r3, &(0x7f0000000140)="a77ec05cfb448ba2f6062603d0b326d5", 0x0}, 0x20) (async, rerun: 64) setsockopt$sock_attach_bpf(r1, 0x29, 0x24, &(0x7f0000000080), 0x4) (async, rerun: 64) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r7, 0x0, 0x0) (async, rerun: 64) sendmsg$kcm(r1, &(0x7f0000000000)={&(0x7f00000007c0)=@l2tp6={0xa, 0x0, 0x8, @mcast1, 0x3, 0xffffffff}, 0x80, &(0x7f0000001880)=[{&(0x7f0000000600)="f4000900062b2c25fe80000000000000dc8b850f238466cc00007a000000ad6f911b51430437121d", 0x28}], 0x1}, 0x0) (async, rerun: 64) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r8 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r8, &(0x7f0000003140)=[{{&(0x7f0000000400)={0x2, 0x4e23, @empty}, 0x10, &(0x7f0000000700)=[{&(0x7f0000000440)="f1", 0x1}], 0x1}}], 0x1, 0xc810) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000002c0)='sched_process_fork\x00', r9}, 0x10) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xf, &(0x7f0000000440)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [], {{}, {0x7, 0x0, 0xb, 0x2, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r11}, 0x10) (async) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e, 0x0}, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 7m26.617736418s ago: executing program 4 (id=3812): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fa540000850000008200000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x18) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000001400), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000380)={0xffffffffffffffff}, 0x106, 0x8}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f0000000000)={0x13, 0x10, 0xfa00, {&(0x7f0000000180), r3, 0x1}}, 0x18) 7m26.617437528s ago: executing program 4 (id=3813): prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, 0x0}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xaf1}, 0x8) bind$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x1, @loopback, 0x1}, 0x70, &(0x7f0000000580)=[{&(0x7f0000001680)='\t', 0x1}], 0x1}}], 0x1, 0x0) 7m25.763317594s ago: executing program 4 (id=3822): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000040)={0x1, &(0x7f00000000c0)=[{0x525b, 0x0, 0x0, 0x7ffc1ff9}]}) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x2c, &(0x7f0000000140)=[@in={0x2, 0x4e23, @private=0xa010102}, @in6={0xa, 0x4e23, 0x400, @private1={0xfc, 0x1, '\x00', 0x1}, 0x1ff}]}, &(0x7f0000000100)=0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x85, &(0x7f0000000000)={r2, @in={{0x2, 0x0, @empty}}, 0x27c0}, 0x90) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x85, &(0x7f0000000400)={r2, @in={{0x2, 0x4e22, @empty}}, 0x0, 0xfffc}, 0x90) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000001c40)={0xffffffffffffffff, 0x20, &(0x7f0000001c00)={&(0x7f0000001ac0)=""/235, 0xeb, 0x0, &(0x7f0000001bc0)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x94) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000280)='./file1\x00', 0x0, &(0x7f0000000240)=ANY=[], 0x1, 0x1237, &(0x7f00000006c0)="$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") r5 = inotify_init() r6 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r6) ptrace$getregset(0x4204, r6, 0x2, &(0x7f0000000740)={0x0, 0x20}) inotify_add_watch(r5, &(0x7f0000000000)='.\x00', 0x400017e) r7 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x100) getdents64(r7, 0x0, 0x0) sendmsg$TIPC_NL_NET_SET(r7, &(0x7f0000000680)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000640)={&(0x7f0000001900)=ANY=[@ANYBLOB="04010000", @ANYRES16=0x0, @ANYBLOB="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"], 0x104}, 0x1, 0x0, 0x0, 0x240080c1}, 0x4040800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4, 0x0, 0x7}, 0x18) r8 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r8, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) recvmsg$inet_nvme(r7, &(0x7f00000005c0)={&(0x7f00000002c0)=@qipcrtr, 0x80, &(0x7f0000000500)=[{&(0x7f0000000240)=""/49, 0x31}, {&(0x7f0000000340)=""/215, 0xd7}], 0x2, &(0x7f0000000540)=""/101, 0x65}, 0x20) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1d459d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x183, 0x6}, 0x6025, 0x4005, 0xb, 0x0, 0x1, 0x1, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet_sctp(0xffffffffffffffff, 0x0, 0x0, 0x0) getsockopt$X25_QBITINCL(r7, 0x106, 0x1, &(0x7f0000001a40), &(0x7f0000001a80)=0x4) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r9, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)={0x2c, r10, 0x1, 0x70bd2d, 0x0, {0x10}, [@ETHTOOL_A_COALESCE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bond\x00'}]}]}, 0x2c}}, 0x4044890) statfs(&(0x7f0000000200)='.\x00', &(0x7f0000000440)=""/137) 7m25.316666783s ago: executing program 4 (id=3828): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x18) creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x80002, 0x9c) flock(r1, 0x5) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r2, 0x1) flock(r2, 0x2) dup3(r2, r1, 0x0) 7m25.114874892s ago: executing program 4 (id=3831): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x18) creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x80002, 0x9c) flock(r1, 0x5) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r2, 0x1) flock(r2, 0x2) dup3(r2, r1, 0x0) 7m25.114678852s ago: executing program 33 (id=3831): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='kmem_cache_free\x00', r0}, 0x18) creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) r1 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x80002, 0x9c) flock(r1, 0x5) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0) flock(r2, 0x1) flock(r2, 0x2) dup3(r2, r1, 0x0) 6m1.693582409s ago: executing program 6 (id=5264): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpid() r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000540), 0x80000, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB], 0x48) sendmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)=[@cred={{0x1c, 0x1, 0x2, {r1}}}, @rights={{0x18, 0x1, 0x1, [r2, r3]}}], 0x38}, 0x8841) 6m1.623568732s ago: executing program 6 (id=5265): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r0}, 0x18) r1 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000140)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, 0x0, 0x26, 0x0, 0x1}, 0x28) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x6, 0x3, &(0x7f0000000200)=@framed, &(0x7f0000000280)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, r1, 0x8, 0x0, 0x0, 0x10, &(0x7f00000004c0), 0x10}, 0x94) 6m1.560392845s ago: executing program 6 (id=5266): prctl$PR_SET_MM_MAP(0x23, 0xe, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000040)={0x0, 0xaf1}, 0x8) bind$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000000200)=[{{&(0x7f00000000c0)={0xa, 0x4e23, 0x1, @loopback, 0x1}, 0x70, &(0x7f0000000580)=[{&(0x7f0000001680)='\t', 0x1}], 0x1}}], 0x1, 0x0) 6m0.707916692s ago: executing program 6 (id=5281): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', 0x0}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8006, 0x0, 0x5) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x2}, 0x18) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0x3000010, &(0x7f0000000100)={[{@resuid}, {@nobh}]}, 0x1, 0x519, &(0x7f00000009c0)="$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") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000004000000008000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='mm_page_free\x00', r4, 0x0, 0x4}, 0x18) syz_clone(0x2008400, 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r0, 0x6, 0x3) recvmmsg(0xffffffffffffffff, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x40002100, 0x0) 5m59.273558013s ago: executing program 6 (id=5290): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r1}, 0x10) r2 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x2082) r3 = fcntl$dupfd(r2, 0x0, r2) ioctl$SG_IO(r3, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x2, 0x41001, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x300, 0x0, 0x0, 0x0}) 5m59.095180021s ago: executing program 6 (id=5292): sendmsg$inet(0xffffffffffffffff, 0x0, 0x2400c080) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="1e000000000000000100000007"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1, 0x0, 0x1000000005}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) get_robust_list(0x0, 0x0, 0x0) 5m59.045879513s ago: executing program 34 (id=5292): sendmsg$inet(0xffffffffffffffff, 0x0, 0x2400c080) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000d00)=ANY=[@ANYBLOB="1e000000000000000100000007"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1, 0x0, 0x1000000005}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) get_robust_list(0x0, 0x0, 0x0) 5m46.025360952s ago: executing program 7 (id=5442): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r0}, 0x18) futex(0x0, 0x3, 0x0, 0x0, 0x0, 0xfffffffd) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x44, r2, 0x1, 0x4070bd28, 0x1, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}, @BATADV_ATTR_ISOLATION_MARK={0x8, 0x2b, 0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_AGGREGATED_OGMS_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}]}, 0x44}}, 0x18) 5m45.997620114s ago: executing program 7 (id=5444): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1}, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents(r0, &(0x7f0000000f40)=""/243, 0xf3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00'}) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/locks\x00', 0x0, 0x0) pread64(r2, &(0x7f0000001440)=""/126, 0x7e, 0x41) removexattr(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)=@known='trusted.overlay.upper\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000018000"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x6a, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x1}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}]}, 0x7b}, 0x1, 0x0, 0x0, 0x200048c0}, 0x24048810) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{}, 0x354c}}}]}, 0x78}}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x12, 0x1, 0x4, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r8}, &(0x7f0000000040), &(0x7f0000000140)=r7}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r8}, &(0x7f0000000580)=0x2, &(0x7f00000000c0)=r7}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r8, &(0x7f0000000040)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r9}, 0x4) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r10, 0x0, 0x4}, 0x18) 5m45.923945707s ago: executing program 7 (id=5447): bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000080)={0x1}, 0x4) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') getdents(r0, &(0x7f0000000f40)=""/243, 0xf3) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000200)={'batadv_slave_1\x00'}) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/locks\x00', 0x0, 0x0) pread64(r2, &(0x7f0000001440)=""/126, 0x7e, 0x41) removexattr(&(0x7f00000001c0)='./file1\x00', &(0x7f0000000200)=@known='trusted.overlay.upper\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000018000"/20, @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x6a, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x18) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = socket(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket(0x10, 0x803, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r6) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000380)={&(0x7f0000000280)={0x1c, 0x2, 0x6, 0x101, 0x0, 0x0, {0x1}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x1}]}, 0x7b}, 0x1, 0x0, 0x0, 0x200048c0}, 0x24048810) sendmsg$nl_route(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeffff11feffffff000000", @ANYRES32, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000005840)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000001240)=@newqdisc={0x78, 0x24, 0x5820a61ca228651, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{}, 0x354c}}}]}, 0x78}}, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=@base={0x12, 0x1, 0x4, 0x2}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000180)={{r8}, &(0x7f0000000040), &(0x7f0000000140)=r7}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r8}, &(0x7f0000000580)=0x2, &(0x7f00000000c0)=r7}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000080)={r8, &(0x7f0000000040)}, 0x20) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r9}, 0x4) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r10, 0x0, 0x4}, 0x18) 5m45.790967523s ago: executing program 7 (id=5448): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', 0x0}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8006, 0x0, 0x5) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='kfree\x00', r1, 0x0, 0x2}, 0x18) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0x3000010, &(0x7f0000000100)={[{@resuid}, {@nobh}]}, 0x1, 0x519, &(0x7f00000009c0)="$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") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000004000000008000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='mm_page_free\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) syz_clone(0x2008400, 0x0, 0x0, 0x0, 0x0, 0x0) lseek(r0, 0x6, 0x3) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r4, &(0x7f0000000080)={0x1f, 0xffff, 0x2}, 0x3d) recvmmsg(r4, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x40002100, 0x0) 5m44.44441136s ago: executing program 7 (id=5465): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000080)={'syztnl1\x00', 0x0}) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffffd, 0x0, @perf_config_ext={0x3fffffffc}, 0x0, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x8006, 0x0, 0x5) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x2}, 0x18) syz_mount_image$ext4(&(0x7f0000000340)='ext4\x00', &(0x7f0000000980)='./file0\x00', 0x3000010, &(0x7f0000000100)={[{@resuid}, {@nobh}]}, 0x1, 0x519, &(0x7f00000009c0)="$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") r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a00000004000000008000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1}, &(0x7f0000000080), &(0x7f0000000180)}, 0x20) recvmmsg(0xffffffffffffffff, &(0x7f0000000440)=[{{0x0, 0x0, 0x0}, 0x8}], 0x1, 0x40002100, 0x0) 5m44.257184188s ago: executing program 7 (id=5471): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r0 = fsopen(&(0x7f0000000140)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x1, 0x0) (fail_nth: 3) 5m44.173759052s ago: executing program 35 (id=5471): prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) r0 = fsopen(&(0x7f0000000140)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x1, 0x0) (fail_nth: 3) 5m8.467749748s ago: executing program 2 (id=5948): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x9, 0x4) r1 = socket(0x2, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001240)={'syztnl0\x00', 0x0}) sendto$packet(r0, &(0x7f00000010c0)="377724404c9781f77dc0b1dbd7663a96f7f7e422466ee9bad7051b1510dcc661023862d1efc4383f5b11f8dc0839eb1500c6a95ecda0148cb20a1a5498c16c447d0e85c6915b3915063fde0f44caae6593c16b5c773b8282ce528040849f6909b56b9b5ff5657441f8eca7de861cc10022fb16eca8f9fc75243725d35de507cb18e5c68b5dcaac21b7023737ccbb9567d3b900f7dcea2de0889c8bdda11ff8a0da975e7f493d2d9faf56b746be1998", 0xaf, 0x1, &(0x7f0000001280)={0x11, 0x2, 0x0, 0x1, 0x1, 0x6, @random="dbdbcd2391d1"}, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x61, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='rxrpc_recvmsg\x00', r4, 0x0, 0x1}, 0x18) r5 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r5, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x106) recvmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x100) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x68, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0xd, @link='broadcast-link\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) fsopen(0x0, 0x0) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}) sendto$packet(r0, &(0x7f0000000140)="280320000a00140000007ef506be00000000000000000000000000143baa111f1f858ce632f47042195eb3cf545a41b6d78839980700e67bee78895e16f37fe8", 0xffa9, 0x400c010, &(0x7f0000000080)={0x11, 0x3, r2, 0x1, 0xe5, 0x6, @random="76caa646ae4c"}, 0x14) syz_read_part_table(0x104a, &(0x7f0000000000)="$eJzsz7sJAkEABNDZ+3qBYGJVxvaj7diCoZmd2IOgcLeXmIsI70Uzu8zChp+aujXVsBtrPyRps+mnNElu13tXTskwfL5wfvTzpFn7ksvSnq/9tl6UzNuxJPWoPV6+9zMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+B/vAAAA////eAif") r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r8, 0x0, &(0x7f0000001700)=""/53}, 0x20) syz_open_dev$sg(&(0x7f0000001080), 0x0, 0x412040) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0xfffffffffffffdd0, 0x0, 0x41000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) 5m8.032918826s ago: executing program 2 (id=5956): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000002400)=0x0) io_submit(r3, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="0200ffff0000", 0x6, 0x0, 0x0, 0x2}]) 5m7.902411122s ago: executing program 2 (id=5961): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080), 0x67, 0x52b, &(0x7f0000000a00)="$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") r0 = fspick(0xffffffffffffff9c, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) migrate_pages(0x0, 0xfc, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x10) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r2, 0x400448cb, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) getdents64(r5, &(0x7f0000000500)=""/45, 0x2d) r6 = bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) msync(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x8000000) getdents64(r5, 0x0, 0x18) fcntl$getownex(r1, 0x10, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r5, 0x29, 0x23, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, 0x0, &(0x7f0000000580)='GPL\x00', 0xc, 0x0, 0x0, 0x41000, 0x2c, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r7, 0x0, 0x7fff}, 0x18) fstat(r6, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x1000040, &(0x7f0000000200)={[{@barrier}, {@nodioread_nolock}, {@noquota}, {@resgid={'resgid', 0x3d, r8}}, {@auto_da_alloc}, {@noquota}]}, 0x1, 0x59c, &(0x7f0000001840)="$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") sendmsg$unix(r5, &(0x7f0000000f40)={&(0x7f0000000300)=@file={0x0, './bus\x00'}, 0x6e, 0x0, 0x0, 0x0, 0x0, 0x40044}, 0x800) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), r5) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r3}, &(0x7f00000003c0), &(0x7f0000000400)=r4}, 0x20) bind$bt_hci(r2, 0x0, 0x0) 5m7.745524549s ago: executing program 2 (id=5962): socket$inet_mptcp(0x2, 0x1, 0x106) socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x63, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0xffffffff, 0xfd}, 0x0, 0x0, 0x800000, 0x6, 0x2, 0x8000, 0xffff, 0x0, 0xffffffff, 0x0, 0xc0}, 0x0, 0xfff7ffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$inet_mptcp(0x2, 0x1, 0x106) sendmmsg(r0, 0x0, 0x0, 0x20044000) openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, 0x0, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x16) connect$inet(r2, &(0x7f0000000480)={0x2, 0x0, @multicast2}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x1c) 5m7.557797027s ago: executing program 2 (id=5966): mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) mount$bpf(0x200000000000, &(0x7f0000000780)='./file0/../file0\x00', 0x0, 0xa06002, 0x0) 5m7.199446302s ago: executing program 2 (id=5971): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000002400)=0x0) io_submit(r3, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="0200ffff0000", 0x6, 0x0, 0x0, 0x2}]) 4m52.13033021s ago: executing program 36 (id=5971): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000005c0)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000280)={0x1f, 0xffff, 0x3}, 0x6) io_setup(0x8f0, &(0x7f0000002400)=0x0) io_submit(r3, 0x1, &(0x7f0000000340)=[&(0x7f0000000100)={0x2000000000, 0x4, 0x0, 0x1, 0x0, r2, &(0x7f0000000040)="0200ffff0000", 0x6, 0x0, 0x0, 0x2}]) 2.692472255s ago: executing program 8 (id=10867): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001bc0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) 2.651563176s ago: executing program 8 (id=10869): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x47, 0x4616, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x0, 0x7a3}, 0x0, 0x3, 0xb, 0x1, 0x8, 0x2020005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002f40)=ANY=[@ANYBLOB="40000000210a010800000000000000000a0000010900020073797a31000000000900010073797a31000000001400038010"], 0x40}, 0x1, 0x0, 0x0, 0x24000801}, 0x8000) syz_clone(0x80012880, &(0x7f0000000240)="c8442e96d30685b8a326b5b522d7063bd95fbaf19d5b23696e2aa43c6b4cd7d151d1fb3b93e9eeb33447b7b6ba2d99a506040b7edfaf64725abb6566554a6cf6041ca38c7b50f8dd31", 0x49, &(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000340)="fa8e9dc0eae48c821ee6bec918f29a917aaac1fb4a01b6a898575de8729dc475") r1 = socket(0x10, 0x803, 0x0) setsockopt$sock_int(r1, 0x1, 0x10, &(0x7f0000000040)=0x3, 0x4) sendto(r1, &(0x7f00000000c0)="120000001200e7ef007b00000000000000a1", 0x12, 0x0, 0x0, 0x0) setsockopt$sock_int(r1, 0x1, 0x22, &(0x7f0000000000)=0x3, 0x4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000009c0)=@newtfilter={0x48, 0x2c, 0xd2b, 0x70bd2b, 0x25dfdbfb, {0x0, 0x0, 0x0, r2, {0xf}, {}, {0x7, 0xfff3}}, [@filter_kind_options=@f_flower={{0xb}, {0x18, 0x2, [@TCA_FLOWER_KEY_CT_LABELS={0x14, 0x61, "7750939af8543bbe741ddea0b3675c3a"}]}}]}, 0x48}}, 0x24040084) read$hidraw(0xffffffffffffffff, &(0x7f0000000240)=""/88, 0x58) bpf$MAP_CREATE(0x0, 0x0, 0x48) linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x1000) memfd_create(&(0x7f0000002080)='\x00\xac=W[[\x87\x12\x04\xd5\xbc\x80K\x06\xcd]4(\xa2\xee2A7:n\x8c\xa7P\x1a\x87\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x19M\xc2N%\x93t[\xf3\xee\xa4\xb4\xfbf\x8dz7\\\x8e\xac\x18\x00\xfd\x89\xe1d\xfa\xcfb\xf3\xdc\xd4CY\x9a\xef\xa3\\\xa7\xa9^\xafL:[\x8e\x83U\xff\xfd\xff\xfa\xdaL\xa99\x9b\xcfA\xe4n\xa0^\n\x1c\x84\x04\xc5a\xdf\xe5\xd4Hyn\xba:/\xa5\xf4\xaa\xfa\xcd\xc7T\x83\xf5N^\xf2n\xd0=\xb9\t\xdd-F\xacb\xac \xd3\xccj\x13\xa2\x9fLu\'\xed\x91\x867\xaa\xf5\xa0]\xb6\xaa\xea\xfd\xde\xa6\xec\b\x16\x86l:;\xf9\xdb\xcf\x88\"\xca\xe0E\xdb\xec\xf9\xb3\xed\a\x00\x00\x00\x00\x00\x00\x00\xd6.\xf7\x92\xc42\xdf\xefE\xce}\x1b\xda\xdd?\n6\xe1\xb1\xd8Y\x960\xd1\x00\x00\x00\x00\x00\x00MW\x8f\xc6\x82\xe4\x15\xf7\xe9\xd8\xc5b\x0e\x91\xc5\xc76$\x18\xa4\xbe\xe8V\x8d-\xe3\x8fC\xd5\xf5\xd6L\xe3\xce\xa1\x8dz\xce\xa7\xa5\xc8\xcbhM\x1b\xf8\x98\xc4\xfbD6\x88\xfd\xe5i\x8a\xd8\xcfm\x81Z\x19\xf0\xef\xc15\xe8\xcb\xf5\t\t\x00\x17\xfa\x1fqb\xe7\"\xcb4\xb8\xe5/\xd52\x17\x12\x1d\xd8\x87\xb9|\x8d\x83\xea\xcc\x94\xebZ\xae\xaf\x19\xa4\xb2\xc6\xe1\x926B\xb6\x89Z\xa9\xb5/\xbb\x9d&\xeeO\xb3\xb3\xd4\bB\xa9f\x84\xad\t\x1a\xc2\xd5\x88\xbfo\x80V\x93\x9fl\xd7\xff\x03\xb7J\xed\x183\xe3\x7f\xfaq,\xca\x06\xb0\xc9\x92\x93\xa5I\x89\xb7\x85\x90\xb7\x1b0\xce\xd7!\x8fD\x96\xe1 ^>\x9f\x04\x89<\xb7S\x7f\x1a\x88\xab$\xd3y\xc2\xe1\x99\xbch\xd3\x83\xcd\x7f\xc5n\xb1\xc1X \x90\xbb\x1f\x01\x90\xb1O\x8d\x7f\xa8\xd4\xdbO\xef\x99\xf3\xd3M\x0f\t\x7f\n,\x84\x1f\xfa\xe2\xc8\x99\x97Oq\xae\x9b\x86h\xfa3\xb9\xfd\xbb\xd4^\xc0t\xa7]Y\xe9\x7f[\x11\xb1\xf3m\x17F\x9d\x18\xe2\xe1\x01\xb6f=-?\xbcI\xf2\xd9\xc4>-\xc0E\x9a\x82\xcc7S\xd4\xb6\'\xd2DY\xa5\x83,\xd1\xbc\xc7\xf6\xe0\x1f o\x06\xc2t\x14\xc2\xe0\x92\xc1\x8a\x85>@\xc9\xb0% \xc7\x13l\x8bJ\xe5\xec\x1dE\xf5\xc5\xe2\xe3\x10G7r#\xbc\x95&\x14\x1e\x97\xce\x83>Q@\xfb\xeb=\x1e\xb3\xd5H\x02\x86\xc6\xf3\xe1i\\\x1d\xf4\xc1\xacJC+\xc8}\x1b{\x86\x17\x00\n\"\xec\xa5x\xe6\xb1i\xeb\xb3\xb7I\x90\x9eai\xde\x01\xdc\xfeA\x05Sn\xe6\xe8^\xdf\x8c`\x17\xca\xbd\\QG\xb15\x82*=\xbd\xe9\xaf\x12<\xd7\xe1$\xa4\xdaU\xfb^\xd8!\xacxy\xd5X\xef\x03\xa7\x10\xa1C#S~\x13\x17\t>X\\mv0\x9eZ\x89\xf4\xae\a\xc8\x16\xd2o\x16\xf3X%Q\xbd\xe9\x86V\xf2\x99^0\xe8xI(\xde-\x04s\x15\x06#2\xef\xef@\xa3t0d^^\xad\xf6\xad\xe0\x16\xf6\xa8\x99!\x0e\x9d+;D&\xebN\x94\x12\x04\x95o\xd6\x9fl\xcb\x16gc\xf5(\xaa_\xec\x9aiE\f\xd4\xc6\xf2\xae\x85n\x995\xcd\xa7\xbb\xf0pz\xff\x0f\x00\x00\x00\x00\x00\x00Li\r\x95Z\x89\"_\xe4\xba\xd4\x93\xab\xe1\xb9\xd8E[\xbb\xc9.M+\xbe\x81N\xd2\xae\xf4\x18\xd0\xe7\x98\x90,\xce\ft\xc4\xc7\x02\xaa\xc7\xeb1;\x86b)\x12{k#c\x1d@\xc31\x00\xd2}f\x8cX\xce\xed\xa4\xe4\xca\x00\x00\x00\x00\x00\x03\xfcWZ!<\x16a5ZL.\xe6\x15]\xebY\xaa\xbea\x8e\xdc\xc52r\"\xea\x9e\x03\x11&\xc3JU\xa7\xd6\x8a\xf8\xae>S\xdeQ\xed\'\xc1C\xad\x82\x10\xd4\xc4P\x8ch\xcd-\x03R\x04\x10\x03-[\xe7\xe2\x90\xaa\xcf\x11\xd7\x85\xb6\nJ', 0x2) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/../file0\x00', &(0x7f00000000c0), 0x21010, &(0x7f0000000280)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="8ce64a6f6e6f3d", @ANYBLOB=',access=', @ANYRESDEC, @ANYBLOB=',cache=none,dfltuid=', @ANYRESHEX, @ANYBLOB=',debug=0x0000000000000007,noextend,afid=0x0000000000000008,\x00']) rmdir(&(0x7f0000000240)='./cgroup/../file0\x00') 2.56655151s ago: executing program 8 (id=10871): sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0xfc, 0x0, 0x7ffc0002}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000019240)=@IORING_OP_SENDMSG={0x9, 0xc, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xe3d08660d3cd4684}) io_uring_enter(0xffffffffffffffff, 0x40092, 0x0, 0x8, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB], 0x2c}, 0x1, 0x0, 0x0, 0x50}, 0x4886) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x7, &(0x7f0000000440)) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000440)={'wg1\x00'}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x4004944) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000019480)={&(0x7f0000019200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000019440)={&(0x7f0000000c80)=ANY=[@ANYBLOB="00ff0f5abca16c6a415a907335b85550b9800ac7eb61831c62acc96d9f748bc67dc6db0ea5a8595f31c1499eee28c4d925f0d71049b3413e8803a5f3456fc4e49490498a8f952a7b7285666a34f4a3336134c6c6773c85074d65675edbca84ebb499cbdf788a0f54f68e6530530bdad8a7b93e810b436d2842ae82700270391faf7e53998f77643d9390de5cdf33b0", @ANYRES16=0x0, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x880}, 0x20000800) sendmsg$NFT_BATCH(r3, &(0x7f0000019280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000194c0)=ANY=[@ANYRES8=0x0, @ANYRES16=r0, @ANYRES8, @ANYRES16], 0x64}}, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) read$ptp(r4, 0x0, 0x0) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 2.446626935s ago: executing program 8 (id=10873): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc080003400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000001c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d103"}]}, @NFTA_SET_ELEM_TIMEOUT={0xc, 0x4, 0x1, 0x0, 0x2df31ab3}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x68}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r0, 0x0, 0x20040084) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00'}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r3, 0x0, 0xfffffffffffffffd}, 0x18) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x30044f1, &(0x7f0000000640)=ANY=[@ANYRES8, @ANYRES64, @ANYRES64, @ANYRES64, @ANYRES8=0x0, @ANYBLOB="9a91a5a3a592bafb94ffece9d27c1c575d6c718de75e6815e3362fad71091ef0b4d831be0f31d33cfd5786a337da031adcc6aabcf77d403c9704c4024b72ff31e30211aeab913360da7d845e34350b569a0487e4f670be55ed44400835754aeddfc79546890cab813647b69c8ce61d428fcdad9face3c716afb3ffb974efa9736f21d7195ec28d"], 0x0, 0x23e, &(0x7f0000000bc0)="$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") r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x18) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) close(r6) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a4c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc080003400000001408000c4000000e45400000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a310000000014000380100000800c00018006000100d103000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) sendmsg$NFT_BATCH(r6, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000001c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a480000001e0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c000380180000800c000180060001"], 0x70}, 0x1, 0x0, 0x0, 0x4451099e661a63b1}, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r8, 0xa02000000000000, 0x60, &(0x7f0000000000)={'filter\x00', 0xb001, 0x4, 0x3e8, 0x0, 0x0, 0x130, 0x300, 0x300, 0x300, 0x7fffffe, 0x0, {[{{@arp={@local, @empty=0xffffff7f, 0x0, 0x0, 0x0, 0x0, {}, {@mac=@local}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pimreg\x00', 'veth0_to_bridge\x00'}, 0xc0, 0x130}, @unspec=@NFLOG={0x70, 'NFLOG\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, "f67b23ffdfa27f907a03732da3acbc6518e62a77ca06f258762e88c0d9f9d2f413b94a105f4bdf01425ce81c5d000000000000000500ffffffff00"}}}, {{@arp={@multicast2, @empty, 0x0, 0x0, 0x0, 0x0, {}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'veth0_to_team\x00', 'ip6tnl0\x00'}, 0xc0, 0xe8}, @unspec=@CLASSIFY={0x28}}, {{@uncond, 0xc0, 0xe8}, @unspec=@NFQUEUE3={0x28}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x438) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=@newqdisc={0x4c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {0x0, 0xb}, {0xffff, 0xffff}, {0x0, 0xfff3}}, [@qdisc_kind_options=@q_netem={{0xa}, {0x1c, 0x2, {{0x100, 0x7, 0x6361, 0x5, 0xffffffed, 0x6}}}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x20000001}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=@newqdisc={0x78, 0x24, 0x4ee4e6a52ff56541, 0x70b923, 0x80000, {0x0, 0x0, 0x0, r10, {0x0, 0xc}, {0x3, 0xb}, {0xa, 0x5}}, [@qdisc_kind_options=@q_sfq={{0x8}, {0x4c, 0x2, {{0x80, 0x0, 0x5, 0x1, 0xc}, 0xb, 0x40, 0x5, 0x5, 0x9, 0x2, 0x9, 0xd, 0x5, 0x1, {0xffff1c72, 0x3, 0x1000, 0x101, 0xfffffffe, 0x7}}}}]}, 0x78}, 0x1, 0x0, 0x0, 0x8840}, 0x4008000) 2.307219901s ago: executing program 5 (id=10874): timer_create(0x2, 0x0, &(0x7f00000001c0)) r0 = socket$inet_sctp(0x2, 0x5, 0x84) socket$nl_rdma(0x10, 0x3, 0x14) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000668700"/28], 0x50) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000840)=0xffffffffffffffff, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1a, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000001c0)='sched_switch\x00', r3}, 0x10) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/devices\x00', 0x0, 0x0) preadv(r4, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4078, 0xe0}], 0x1, 0xf3, 0x3) r5 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYRESHEX=r4], &(0x7f0000000300)='syzkaller\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x41000, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, r3}, 0x94) getsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000005c0)={0x0, 0x8}, &(0x7f0000000740)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000000800)={&(0x7f0000000440)=@in={0x2, 0x4e20, @remote}, 0x10, &(0x7f0000000580)=[{&(0x7f0000000480)="fb25e4bfc5197e9347b0756031dbcc44230cc27ccffb2c50007601cb6af2c5ffe9a023db366138db77e7f2889e42805c3b6caeaeac47668d0d32132bcb84d85e5ae481d005c499679c4b21e1bbb71f08e2dba80e905c3a15b445390ec74a2c9762f11c0a48c767ce3dd6406c565e0c1bdbe12bc3eee5f8c2d909bcafe9f419aecdb6c4adbeb7224751080275601e677a182eaa7d", 0x94}, {&(0x7f0000000640)="807a3989e7d59f8ac939d1146707e122277bf0a1bcb39e715a5a13226c58e66c5d48a41fbc61b4e81b0ba7beee9ee334b7ee6b8b28142443650794dee6b5bba7f35eae2fd7c39b25cd0a2961c7ebc7c1f59a649b254447aa3258f1f6c7594cdf1199c0cc0f3fb549b8dcc252fea6735d1085b8c0b25828314ba7476ed1e8ab8ef44b8882e35f2a9aea33767e35f3f93d9b910657c785feb5e57168d3356d04dceb7b234e70c1e70ce883a1da408f4afb6316d79dcf24195ce876ed6d8f30129d2928", 0xc2}], 0x2, &(0x7f0000000780)=[@sndrcv={0x30, 0x84, 0x1, {0x5, 0x7162, 0x8402, 0x7ff, 0x2, 0xfffffff8, 0xe8, 0x5, r6}}, @init={0x18, 0x84, 0x0, {0x101, 0x9, 0xf2ef}}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x7}}], 0x60, 0x800}, 0x24000882) sendmmsg$inet_sctp(r0, &(0x7f0000002880)=[{&(0x7f0000000880)=@in={0x2, 0x4e24, @loopback}, 0x10, &(0x7f00000009c0)=[{&(0x7f00000008c0)="d3e17192d6a486f7cfdfb22df584556f6ec9f244b7bf5af8d54db5610524d93c4a855110c8fd40fbf2a7562906bdcc723220bfbce1634c3413d7980531d85f06705ef8a6f0273ac4bf9462e418d5362c407ee558ef9aa27b28722be5349e7f2419", 0x61}, {&(0x7f0000000940)="bc38dbb5c8d69005ffc944851704b09006a823ff577789dac0534c4758a73ab7521df962a92bdb7397482772475e461f93b5b48a96339e7611b3eac7d8735d7568c349c1082b954b4b2ac3d85e24", 0x4e}], 0x2, &(0x7f0000000a00)=[@sndinfo={0x20, 0x84, 0x2, {0x3ff, 0x8001, 0x6, 0x9, r6}}], 0x20, 0x4000}, {&(0x7f0000000a40)=@in={0x2, 0x4e23, @broadcast}, 0x10, &(0x7f0000000b80)=[{&(0x7f0000000a80)="d002a2709343fc6a55130d9fdc33e55bd0945f100a3865dbd5381fed99a6907bd354", 0x22}, {&(0x7f0000000ac0)="1bbf9327fc03dc8df1f4c4ebb34dd32582f21638ec28e03b3dae834e355e9ceb6ef606090b5256887753e7c3dc245de5ee2a576ea317d25deb700e6438b12329f0be5038ff622bf3cb46a22b6c2da7a737bde335ff86b7fc12adef404f3c85a91f04050a2610924f7cab6ae671047ac228f1efc2c6f453c89d2a6fa0817c27ba8b082273f7d854aeb27e211c8efa36d3abf244", 0x93}], 0x2, &(0x7f0000000bc0)=[@dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x64010101}], 0x18, 0x4000040}, {&(0x7f0000000c00)=@in6={0xa, 0x4e20, 0xa, @private0, 0x5}, 0x1c, &(0x7f0000000e00)=[{&(0x7f0000000c40)="056e5f0212ad30afd1a80cd3f2c9779bbbb710cf016f2e4f314d6db4fc5c0538d480ec363b49c2c8e07787db90d44935a9f752507d4bbcb109822e501f89d7ed98b797583a349f9bf0720e588664f16ec65f839ef9f68f7c376e0b4689e9a5a118900be27420a6a78748904fe431ff0f27632f870954c53a9eca3b965b9984049b8295f4bef7320aa6f83c2680db9c719a7c75a290f85c04b174b3131a8b860afb30cd024b21023aa5a5b127b2e3369b82e4d2520efb072b60a25c48ff87ec86b232f949adbc97e8109697f753ba3ab4b903e2df86665efd354c643e0cf5d0ae844be79e8ae2fbc5c4a87f522eebd2", 0xef}, {&(0x7f0000000d40)='$', 0x1}, {&(0x7f0000000d80)}, {&(0x7f0000000dc0)="6f73ab61c3872c3feeff9f6bbf6a5abebb6dec44cfaed835240115b6", 0x1c}], 0x4, 0x0, 0x0, 0x4}, {&(0x7f0000000e40)=@in={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1e}}, 0x10, &(0x7f00000011c0)=[{&(0x7f0000000e80)="2bb55c723ddb19f60c66d1394b4d0815caedf012590b9cd234bd157152c938f598f7d1378529e2f9cd79f7166255d562975a3f0de8fa7de99e82e51ff013fdd98ce31825aff43c3874023967a7f7ee6bcb199d9031632da0c32fa992f89b8424ff6ae4f07454011e63b1b461ca71349ab335c2e872b676f400023ad955a1a97a8e8d688d4b10c925c6d952766ae158f39b6f0695f923b1dd44026af8acd8b0632fb3c10324fa6272729c39e1653e6271aa248db37a929ff0b38a560dae1c3177702f8ef056a9adfafa79c3ea20252542048b0ff528897d1334", 0xd9}, {&(0x7f0000000f80)="77c06d1cd9e0d8fbe67aa359cb7a08ec4b41a7ab94edd58b775fbf9f155edf4d0708f61cd96e66fe537baf2c47a9c0c2b52e7bfb8b83cbd9a1c1e050a38ed92dfa7a3051eb6d094c79d3fba14093bf281f82780a9ea4cbc400fcc49db1dd49f88590a507b0050e3c6aed32516a8ab92169b2dcdd5014bea9f9f829e52fc753b6b363a8f7eef96abd190950c5585a87e4c6973674960dc36b5465c2c87de650ae575aed6b08be7b4cd217588f850ce4aef9fb4931c21edc4dbf4b1ff188f6615bcb2f1cf6bdd706612f7e274d60daf729efdfe3565c6bda42dfc16cfceee73fc9dac24314e55d37a73f009c9a20818da12fb157d71d21", 0xf6}, {&(0x7f0000001080)="8d442fdfcdcbd1e5285086e461d40f7d140f30462dab0eb30fa97eb270d72bb5202f5c5cad598f52aa3edcf8f92ce281480e44ebfcfd693002cdbbc459c195ea26843a2d6bd4921f5a08986bff2f2d9d29ed203ea32e44ed64d5ee0c58594e1b28ac31c642a876c562e7c6535864887da2e7bcced1b262bbfeea8b84499c851125175862cef2850acf8c0793ad87fb8413ef364c00009e03bc7972e5de0cc4c8b6db85836dccdaadff8cce6c68444894375f8f4275fcb2042dbd85c547cc63464f00f7116a2bd4c2f7d5d614da448b42fb8494f4", 0xd4}, {&(0x7f0000001180)="52b99be7105b6737c5", 0x9}], 0x4, &(0x7f0000001200)=[@prinfo={0x18, 0x84, 0x5, {0x0, 0x2}}], 0x18, 0x20004080}, {&(0x7f0000001240)=@in6={0xa, 0x4e24, 0x9, @private0={0xfc, 0x0, '\x00', 0x1}, 0xfffffff9}, 0x1c, &(0x7f0000002780)=[{&(0x7f0000001280)="ecf5ebf6cd332ef25433b02658e76372d8327474fc261892a1f896", 0x1b}, {&(0x7f00000012c0)="b51be90185ada6742038c1ce410aac8662793dea5349183e97217fb3f156f5b8459c0c247bf457b61b3d22819f99a5055b80afcfe5533fc9be8178abcf2ef4b76d0e7cb428e3dbe83c41fc1bad1fb96ab21ac4f9eb48f001c1525e012291a8b486ca178b5e8629bd656392c5252efb19340d64e0ee2b8697c4571b184395eb5d26092b73372c454558d5106d8b6e8243a9356d8ad483365178a06a81cb8c94879fd426ebd3833d846be1b35b4778126cfbb189e17b1880401621774504ee3387fbe89af084abb0b45aa95cb7fe", 0xcd}, {&(0x7f00000013c0)="287a65b6c4f518c1b7457ba9800954de8b0bed0441d36fee718f3b026b8d0f65cf34d8c3fb4d254c5a7b522e2bda1637cbb9ce430cb753be93158189375f6a8111c90147382deca710ba59425ce33a5ddd3a975f41951ea683c7004d7fc33b1d09cc816df8", 0x65}, {&(0x7f0000001440)="c64b834f2dae4db5aed9331fa7100960f81ade25045e819ef6490675e00b6423f6812cf9181750bb376ddf1dbb80321686fb80cad6b4b102bc1e3616ba8c2353aa85a136f36a1b5fee221abd393d46af44f51e5dc1b95b4e44ec5d83d7c0aae72c14a3e120ed2a812e34bab6", 0x6c}, {&(0x7f00000014c0)="5c68d103397451976413a667d372cf085073a22db45ce67ccee66e9668ee3fe1361c9ba4e411de9c3214c9540235cc3fe714eaebd1b4b155ce22ad40ad82283b67c2ae57e6d455cc4bb4621fc848cd156b720583fd6074e0c801b744342b3312826b44f85d9a1b9e893bae7a0e9f5c4e349d63c324d1419a78df0812aa8de28ca39dad56b49d3f261389c39f1d0fe4e6bc598ed132", 0x95}, {&(0x7f0000002600)="7938f6c16c64c6bea05e1a7f34768596b027860ca794a43721f39a1375b5c32c37bae04a8c22877f845cb84f6e04c49db33575583367d3beca3706af7120cb6df69fc942b10b11423f90cd0741cf996f76e09ef2ff1179060531bca0ee8cb570c85cc0a08567b3a8e72929305101d958dc9bf22ea5ff", 0x76}, {&(0x7f0000002680)="aec7d225ca1c051d2f2b31c65a9c8c6db4066752e357ffb0dc4a4e849375d6a58e37b4e87afc3bc23c3f3d8b2f7b1197bd2458764036f4ff048f381431b979b3082c2f227269dd6b1fda4df34b8651814c2660ca7572", 0x56}, {&(0x7f0000002700)="8b98bf4dac7428a4e289fc4bcea39a72d59ffeba4f11a9defa1ac27572a6c2f344bed79fa6a443e81856d7bdf11eb21e77c7e1f07ed2574c95903cbfa01b46ad11b9bdb98912181cb148aa0e8cbd6169f6ca195fe762ca3774234ad41f453e00bc2783b90f2e903fb5fbac513f227aedccd49ac88579419137", 0x79}, {&(0x7f0000001580)="5ce976c220363b3d7c7d088a131c34f01c4e1d5013bd99101ad9ff2010e2a44d0e54671163368191cbd79f68552348685195904a7b", 0x35}], 0x9, &(0x7f0000002840)=[@dstaddrv4={0x18, 0x84, 0x7, @remote}, @init={0x18, 0x84, 0x0, {0xb43, 0x10, 0x5d7, 0xd}}], 0x30, 0x8000}], 0x5, 0x4) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) r8 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f00000001c0)={r5, r7, 0x5, 0x0, @void}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000080)=r8, 0x4) bpf$BPF_LINK_UPDATE(0x1d, &(0x7f0000000040)={r8, r5, 0x4, r5}, 0x6) socket$nl_generic(0x10, 0x3, 0x10) r9 = openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r9, 0x8010661b, &(0x7f0000000380)) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$ipvs(&(0x7f00000018c0), r10) sendmsg$IPVS_CMD_NEW_DAEMON(r10, &(0x7f0000001ac0)={0x0, 0x0, &(0x7f0000001a80)={&(0x7f00000004c0)=ANY=[@ANYBLOB='x\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="01002abd7000ffdbdf25090000006400038008000100010000000800030004000000140002007665744e315f6d616376746170000000060004000200000008000500e0000000140002006970766c616e31"], 0x78}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) r12 = syz_io_uring_setup(0x5ef9, &(0x7f0000000280)={0x0, 0x3df, 0x1, 0x3, 0x14}, &(0x7f0000000240)=0x0, &(0x7f0000000600)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r13, 0x11c, &(0x7f0000000180)=0xfffffffd, 0x0, 0x4) io_uring_enter(r12, 0x7dd6, 0x8029, 0x1, 0x0, 0x0) io_uring_enter(r12, 0x0, 0xe875, 0x9, 0x0, 0x0) 2.251091114s ago: executing program 8 (id=10875): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) syz_usb_connect(0x2, 0x0, 0x0, 0x0) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="02070005020000002dbd7000ffdbdf25819f9dc3c357f2f32ef0eb05de55273f71a6fb25f1020ca5b43972a14e35684b5f79f999e7af48b785cd29db68093eb43b18997b67482b74e132ed14ede60cc185cce0c46dd08fb635734daf4547ef5fcb77defab46da6c734944ffa3ee3a478d47b93d0b3e241ee3f35cf6868e0a9dc693ad7ea1d7262d701fadceec059c9b194119cb8479b4f8f8e20f089e5370500000000000000000000000000f87c8a1d7552308da8801c310aef883f9dae0c4482335e187c006f2f8af3addd85eb101fa671c3dde06f6277be49a710d7cbc6e392b3e433f9a41e35c31f379195708cbc2f7e416ec8b8df5f418320f03115c145160625dde78c0466d2"], 0x10}}, 0x4040014) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\a\x00\x00\x00\b'], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$packet(0x11, 0x3, 0x300) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r4}, &(0x7f0000000000), 0x0}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) lsetxattr$security_selinux(&(0x7f0000000900)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000940), &(0x7f00000003c0)='system_u:object_r:netutils_exec_t:s0\x00', 0x25, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000ff0f00000000000000feffff180100002020752500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000000600000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) getrusage(0x1, 0x0) r5 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000000)=@filter={'filter\x00', 0x4, 0x4, 0x538, 0xffffffff, 0x398, 0xe8, 0x398, 0xfeffffff, 0xffffffff, 0x468, 0x468, 0x468, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@dev={0xfe, 0x80, '\x00', 0x29}, @private2, [0xffffffff, 0xff000000, 0xff, 0xffffff00], [0xffffff00, 0xffffffff, 0xff000000, 0xffffffff], 'hsr0\x00', 'sit0\x00', {}, {}, 0x87, 0x3, 0x4, 0x5}, 0x2f2, 0xa8, 0xe8}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x5, {0x7}}}}, {{@ipv6={@private2, @empty, [0xff], [0x0, 0x0, 0xff000000], 'sit0\x00', 'batadv_slave_1\x00', {}, {}, 0x0, 0x0, 0x6}, 0x0, 0x270, 0x2b0, 0x0, {}, [@common=@srh1={{0x90}, {0x2, 0xe, 0x6, 0x5, 0x9, @remote, @local, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0x0, 0xff, 0xffffff00, 0xffffff00], [0xff, 0xffffff00, 0xff, 0xffffff00], [0x0, 0xffffffff, 0x0, 0xff], 0x4000, 0x11}}, @common=@rt={{0x138}, {0x401, [0xfffffffe], 0x1, 0x2, 0x3, [@remote, @empty, @remote, @remote, @remote, @mcast1, @mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, @empty, @mcast2, @private0={0xfc, 0x0, '\x00', 0x1}, @ipv4={'\x00', '\xff\xff', @private=0xa010101}, @remote, @rand_addr=' \x01\x00', @mcast1, @private1={0xfc, 0x1, '\x00', 0x1}], 0x9}}]}, @common=@unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz1\x00', 0x0, 0x1, {0x2000010}}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x598) setsockopt$packet_fanout(r3, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x8001}, 0x4) r6 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$P9_RLERROR(r6, &(0x7f0000000700)={0x13, 0x7, 0x1, {0xa, '\'&*.($}[]('}}, 0x13) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000240)=ANY=[@ANYBLOB="180300000005000000000000000000001801000011af000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000d5030000020000838500000071000000180100002020752500000000806020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000004000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000140)='kmem_cache_free\x00', r7, 0x0, 0x800000002400}, 0xc) syz_emit_ethernet(0x2e, &(0x7f0000000000)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @random="e43f6642531e", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0xe000, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0xc, 0x0, @gue={{0x1, 0x1, 0x1, 0x10, 0x0, @void}}}}}}}, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x2000, &(0x7f0000000000)='%', 0x0, 0xd01, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 2.245535104s ago: executing program 5 (id=10876): bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffc}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW2(r4, 0x5408, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x2, 0x0, "23f555d9adb42d4408020e90d1beaa82dc1ecf"}) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TCSETSW(r5, 0x5403, &(0x7f0000000040)={0x4, 0xffff, 0x1e, 0x4, 0xf, "db7fa24f5b524e2da29cae9b4215fdf3f1613b"}) syz_clone(0xa0001000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000007c0)=ANY=[@ANYRES32=r2, @ANYRES32=r1, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, &(0x7f0000000000), &(0x7f00000002c0)=r0}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="020e000010000000000000000004830008001200000001000000ff000000400000001ea0abff7f00000000000000d41f9ab9000100700000ebdf000008000000c4fc0000100000000000e2ffff1c004f030006000020080002000080f5008e24ce6e4ae300a5000003000500001e001e02"], 0x80}}, 0x4814) socket$key(0xf, 0x3, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62"], 0x10b8}, 0x106) recvmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x100) 2.192478866s ago: executing program 3 (id=10877): r0 = syz_clone3(&(0x7f0000000300)={0x42000, &(0x7f0000000000)=0xffffffffffffffff, &(0x7f0000000040)=0x0, &(0x7f0000000080), {0x29}, &(0x7f00000000c0)=""/198, 0xc6, &(0x7f00000001c0)=""/195, &(0x7f00000002c0)=[0xffffffffffffffff, 0xffffffffffffffff], 0x2}, 0x58) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f0000000400)={0x2, 0x4e23, @multicast1}, 0x10) r4 = eventfd(0x0) writev(r4, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1, 0x3, 0x8, 0x5}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_emit_ethernet(0x5e, &(0x7f0000000000)={@multicast, @remote, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "122d92", 0x28, 0x3a, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @local, {[], @ndisc_redir={0x92, 0x0, 0x0, '\x00', @private2, @private0}}}}}}, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000640)={0x0, r5}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f00000005c0)=ANY=[@ANYRES32=r5, @ANYRES16=r2, @ANYRES16=r0, @ANYRESHEX=r1, @ANYRESHEX=r1, @ANYRES8, @ANYRESDEC=r1, @ANYRESDEC=r2], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000080)='9p_client_res\x00', r6}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000080)='9p_client_res\x00'}, 0x10) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000540)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r7, @ANYBLOB, @ANYRESHEX=r8]) setsockopt$sock_int(r3, 0x1, 0x29, &(0x7f0000000100)=0xac05, 0x4) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000000000)={0x2, 0x24e23, @loopback}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) socket(0x28, 0x2, 0x0) 1.985992035s ago: executing program 9 (id=10878): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000f00)={0x0, 0x0, 0x0}, 0x2404c044) 1.985455355s ago: executing program 3 (id=10879): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7fff}, 0x18) r2 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_ADD_VIF(r2, 0x0, 0xca, &(0x7f0000000100)={0x0, 0x4, 0x0, 0xffffff81, @vifc_lcl_ifindex, @multicast1}, 0x10) setsockopt$MRT_DEL_VIF(r2, 0x0, 0xcb, &(0x7f0000000340)={0x0, 0x4, 0x8, 0x9ef, @vifc_lcl_ifindex, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) 1.909585058s ago: executing program 9 (id=10880): socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="c714bad3770200000000"], 0x50) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000300)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_io_uring_setup(0xb32, &(0x7f0000000600)={0x0, 0x10086f3, 0x2, 0x1, 0x2de}, &(0x7f0000000000), &(0x7f0000000280)) io_uring_enter(r2, 0x0, 0x0, 0x9, &(0x7f0000000040), 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="480000001000010000000000fddbdf2500000000", @ANYRES32=r4, @ANYBLOB="4000000010800000280012800e0001006970366772657461700000001400028006000e000200"], 0x48}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = socket$inet(0x2, 0x2, 0x1) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f00000002c0)='veth0_macvtap\x00', 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xf, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=""/179, 0xb3) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x19, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x43, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) socket$nl_route(0x10, 0x3, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000035c0)="5c00000013006bcd9e3fe3dc4e48aa31086b8703340000001f00000000000000040014000d000a00140000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x240000c0) sendmsg$inet(r6, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x1000, @empty}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000400)="f92a5f4f2f6d60b8f81d", 0xa}], 0x1, 0x0, 0x0, 0x60000000}, 0x4008040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) 1.889978499s ago: executing program 9 (id=10882): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x12, 0x2000000000000076, &(0x7f00000005c0)=ANY=[@ANYRES8=r1, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRES64=r1], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="07000000faffffffff000000010000002890d021ad5586b57fecefd40be25bc7dadb9735a599edcdbee96bdf7c410c60da8dcbf289c81fca7086150d5cff5b460f60d2e67e063f9ffe39bbd2c2abb99452738d7f59590a323e04f8a09b"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES8=r1, @ANYRES32=r2], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="5aaf886a70645cf1ceeda4a615ced42d77fc40b25947a7fbdf4213926cf6d4cbb13f074cd24a819548917a141bb290119b935fb73b7baef2a829f1b335e7ee372054b4c106ae4fca50e84bbd79db11", 0x4f}, {&(0x7f0000000400)="5b9b9b3bd2b117dc9f58b525d99b53ca508c562cd93164f00d8c097c582a925c2ec1c708f271a77a53826c30b762fcd02b31d691b5993a6eac22fdaa763b3074ff67b0a64ffdfb03c8ffee099f6bc568432d2c6518b6f5976f4606253b79d070dd420bdf1ff1c283a6c65e10ae72544bacf2f02a827590547036d220f9a07e1a2d8d3490ea7bed68c88d4235377f6cc548e4253ef3de4408f73182a3660771a2675aac71bd1f2603415c688532cb107519b83261965af39145281837236e6e9620980a6f96433fbb31bc430f76cfb33e37f6baf2f8786ea985de532057e2c4ca395cf8a4913b120cbd382e00bb3dd6466f52", 0xf2}], 0x2, &(0x7f0000000300)="6441efbed974d10f5a40dd0bd3030a20a7e80ca66e5634e96ad1acb99cb2ad88531476a43cf4e28a589d5922fab78e179773de5a30878f99dc59e950d457af75ffb1450861010b55b5fafb0a4545e4692726c51cce282c2f0797aa4c8d174b26410325dd7045dcd2e62c114b56fca61bbe01fb2772389d597adb91da73f6", 0x7e, 0x400c040}, 0x20000000) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0xfd, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x7, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) r6 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f0000000100)) shutdown(r7, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1, &(0x7f0000000000)=0x9, 0x8, 0x1) futex_waitv(&(0x7f0000001b00)=[{0xffb, &(0x7f0000000240)=0x200000006, 0xa}], 0x1, 0x0, 0x0, 0x1) epoll_wait(r6, &(0x7f0000000000), 0x0, 0xfffc) epoll_create(0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000796000/0x3000)=nil, 0x3000, 0x4, 0x0, 0x8000004, 0x2) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) set_mempolicy_home_node(&(0x7f0000146000/0x1000)=nil, 0x1000, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffb, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r9}, &(0x7f0000000180), &(0x7f00000001c0)=r8}, 0x20) 1.87216503s ago: executing program 3 (id=10884): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f00000004c0)='kmem_cache_free\x00', r1, 0x0, 0x400000}, 0x18) syz_emit_ethernet(0x82, &(0x7f0000000580)=ANY=[@ANYBLOB="cf599d3baed500000000000086dd60f20000004c2c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa00060008"], 0x0) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd6060626000102c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa11000001"], 0x0) 1.812679572s ago: executing program 3 (id=10885): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005e00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000040)=""/65, 0x41}, {&(0x7f0000004080)=""/4110, 0x100e}, {&(0x7f0000003080)=""/4096, 0xffffffffffffffbb}, {&(0x7f0000000140)=""/192, 0xc0}, {&(0x7f0000000400)=""/136, 0x88}, {&(0x7f00000002c0)=""/183, 0xb7}], 0x6) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x9, 0x0, "000080f100df000000a7d9de16c708db7200"}) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0xa4000061) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0102000000000000000002000003300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269576765000900020073797a30000000000900010073797a30"], 0x84}, 0x1, 0x0, 0x0, 0x40044}, 0x20008000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SET_FLAGS(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000640)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01002cbd7000ffdbdf250700000008000400000175080400018004000680"], 0x24}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8923, &(0x7f0000000140)={'wg2\x00', @local}) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[@ANYBLOB="20000000020000"], 0x0) syz_open_pts(r1, 0x43) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x0) 1.727209616s ago: executing program 3 (id=10886): socket(0x10, 0x3, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r0}, 0x18) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r1, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{0x0}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xe7}], 0x1, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='mctp_key_acquire\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) socket$key(0xf, 0x3, 0x2) getsockopt$sock_buf(r3, 0x1, 0x1f, 0x0, &(0x7f0000000100)) 1.613665501s ago: executing program 9 (id=10887): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0xb, 0x31, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) sched_setscheduler(0x0, 0x2, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0xfe, 0x7ffc0002}]}) r4 = memfd_secret(0x80000) fchownat(r4, &(0x7f0000000040)='\x00', 0x0, 0x0, 0x1000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000180)='./bus\x00', 0xc5c, &(0x7f00000005c0), 0x3, 0x445, &(0x7f0000000b00)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r5, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) lseek(r5, 0x3, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, 0x0, 0x0, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x2}, 0x94) 935.90086ms ago: executing program 1 (id=10889): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r1 = socket$nl_generic(0x10, 0x3, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='memory.events\x00', 0x26e1, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0700000004000000080000000100000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000200000000000000000000000000418fa994000000000000"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r4 = semget(0x2, 0x4, 0x200) semop(r4, &(0x7f0000000040)=[{0x1, 0x7fff, 0x1800}], 0x1) semop(r4, &(0x7f0000000500)=[{0x0, 0x0, 0x1800}, {0x1, 0x3}], 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000100)='mm_lru_insertion\x00', r3}, 0x18) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000580)='memory.events\x00', 0x100002, 0x0) write$cgroup_type(r5, &(0x7f0000000180), 0x40010) write(r3, &(0x7f0000000340)="24becf50df98be8f17be36091a8112dd247dc2100c9cfa296e064a4e830ac24adbed0f1419acd93ffbcd82a9a2289c6b44fa57e307ca4c4c32d004745ac6d380fb38d8eb88c9d8713eb876421216abf6d2329f0358ae814347a09043e0655c636f158e8d4ad36ed693105f601d", 0x6d) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300), r1) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xe, 0x6, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0x2f}, [@func={0x85, 0x0, 0x1, 0x0, 0x2}, @call={0x85, 0x0, 0x0, 0xb4}, @exit]}, &(0x7f0000000080)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x70) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000d0000000000010000000000000001410000001c001700000000000000006574683a73797a6b616c6c657230"], 0x38}}, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x100, 0x0) close(r1) socket$unix(0x1, 0x1, 0x0) ioctl$SIOCSIFHWADDR(r7, 0x8923, &(0x7f0000002280)={'syzkaller0\x00', @random="2b0100004ec6"}) 825.570535ms ago: executing program 1 (id=10890): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001bc0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080), 0x4000, 0x0) 825.067395ms ago: executing program 5 (id=10891): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r0) sendmsg$NL80211_CMD_GET_SCAN(r0, &(0x7f0000000f00)={0x0, 0x0, 0x0}, 0x2404c044) 813.947605ms ago: executing program 1 (id=10892): socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="c714bad3770200000000"], 0x50) r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000140), 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000300)=ANY=[], &(0x7f00000000c0)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_io_uring_setup(0xb32, &(0x7f0000000600)={0x0, 0x10086f3, 0x2, 0x1, 0x2de}, &(0x7f0000000000), &(0x7f0000000280)) io_uring_enter(r2, 0x0, 0x0, 0x9, &(0x7f0000000040), 0x18) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000040)={'ip6gretap0\x00', 0x0}) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="480000001000010000000000fddbdf2500000000", @ANYRES32=r4, @ANYBLOB="4000000010800000280012800e0001006970366772657461700000001400028006000e000200"], 0x48}}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r6 = socket$inet(0x2, 0x2, 0x1) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f00000002c0)='veth0_macvtap\x00', 0x10) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000500)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xf, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r7}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) readlink(&(0x7f0000000180)='./file0\x00', &(0x7f0000000280)=""/179, 0xb3) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x19, 0x0, 0x0, &(0x7f0000000040)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x43, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) socket$nl_route(0x10, 0x3, 0x0) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r8, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000035c0)="5c00000013006bcd9e3fe3dc4e48aa31086b8703340000001f00000000000000040014000d000a00140000009ee517d34460bc08eab556a705251e6182949a3651f60a84c9f5d1938837e786a6d0bdd7fcf50e4509c5bb5a00f69853", 0x5c}], 0x1, 0x0, 0x0, 0x1f000801}, 0x240000c0) sendmsg$inet(r6, &(0x7f0000000080)={&(0x7f0000000000)={0x2, 0x1000, @empty}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000400)="f92a5f4f2f6d60b8f81d", 0xa}], 0x1, 0x0, 0x0, 0x60000000}, 0x4008040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) 756.808638ms ago: executing program 5 (id=10893): r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000040)=0x9, 0x4) r1 = socket(0x2, 0x2, 0x1) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000001240)={'syztnl0\x00', &(0x7f0000001180)={'sit0\x00', 0x0, 0x8000, 0x80, 0x9, 0x75, {{0x1a, 0x4, 0x1, 0x7, 0x68, 0x68, 0x0, 0x0, 0x29, 0x0, @dev={0xac, 0x14, 0x14, 0x2f}, @empty, {[@generic={0x82, 0x4, '@`'}, @ssrr={0x89, 0xf, 0x8b, [@broadcast, @dev={0xac, 0x14, 0x14, 0x3b}, @rand_addr=0x64010101]}, @timestamp={0x44, 0x8, 0x5f, 0x0, 0xd, [0x5d]}, @generic={0xa, 0x2}, @rr={0x7, 0x7, 0x47, [@multicast2]}, @timestamp={0x44, 0x8, 0xc9, 0x0, 0x0, [0x2]}, @ra={0x94, 0x4, 0x1}, @timestamp_prespec={0x44, 0x14, 0xf5, 0x3, 0x3, [{@dev={0xac, 0x14, 0x14, 0x19}, 0x3}, {@rand_addr=0x64010100, 0x1ff}]}, @ssrr={0x89, 0xf, 0x2f, [@loopback, @multicast1, @remote]}]}}}}}) sendto$packet(r0, &(0x7f00000010c0)="377724404c9781f77dc0b1dbd7663a96f7f7e422466ee9bad7051b1510dcc661023862d1efc4383f5b11f8dc0839eb1500c6a95ecda0148cb20a1a5498c16c447d0e85c6915b3915063fde0f44caae6593c16b5c773b8282ce528040849f6909b56b9b5ff5657441f8eca7de861cc10022fb16eca8f9fc75243725d35de507cb18e5c68b5dcaac21b7023737ccbb9567d3b900f7dcea2de0889c8bdda11ff8a0da975e7f493d2d9faf56b746be1998", 0xaf, 0x1, &(0x7f0000001280)={0x11, 0x2, r2, 0x1, 0x1, 0x6, @random="dbdbcd2391d1"}, 0x14) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000080)={'bridge0\x00', 0x0}) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x61, '\x00', r2, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x200}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r5, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, 0x0, 0x0, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x106) recvmsg$kcm(r5, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x100) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f0000000000000000850000006d000000850000000800000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SET_LINK_PRI(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)={0x68, 0x0, 0x1, 0x70bd26, 0x25dfdbff, {{}, {}, {0x4c, 0x18, {0xd, @link='broadcast-link\x00'}}}}, 0x68}, 0x1, 0x0, 0x0, 0x4000010}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) fsopen(0x0, 0x0) syz_clone(0xd024100, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(0xffffffffffffffff, 0x4008240b, &(0x7f0000000000)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x4}}) sendto$packet(r0, &(0x7f0000000140)="280320000a00140000007ef506be00000000000000000000000000143baa111f1f858ce632f47042195eb3cf545a41b6d78839980700e67bee78895e16f37fe8", 0xffa9, 0x400c010, &(0x7f0000000080)={0x11, 0x3, r3, 0x1, 0xe5, 0x6, @random="76caa646ae4c"}, 0x14) syz_read_part_table(0x104a, &(0x7f0000000000)="$eJzsz7sJAkEABNDZ+3qBYGJVxvaj7diCoZmd2IOgcLeXmIsI70Uzu8zChp+aujXVsBtrPyRps+mnNElu13tXTskwfL5wfvTzpFn7ksvSnq/9tl6UzNuxJPWoPV6+9zMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA+B/vAAAA////eAif") r8 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r8, 0x0, &(0x7f0000001700)=""/53}, 0x20) syz_open_dev$sg(&(0x7f0000001080), 0x0, 0x412040) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0xfffffffffffffdd0, 0x0, 0x41000}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) 756.144868ms ago: executing program 1 (id=10894): socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000005e00)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) readv(r1, &(0x7f0000000380)=[{&(0x7f0000000040)=""/65, 0x41}, {&(0x7f0000004080)=""/4110, 0x100e}, {&(0x7f0000003080)=""/4096, 0xffffffffffffffbb}, {&(0x7f0000000140)=""/192, 0xc0}, {&(0x7f0000000400)=""/136, 0x88}, {&(0x7f00000002c0)=""/183, 0xb7}], 0x6) ioctl$TCSETS(r1, 0x40045431, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x9, 0x0, "000080f100df000000a7d9de16c708db7200"}) r2 = inotify_init1(0x0) inotify_add_watch(r2, &(0x7f00000000c0)='.\x00', 0xa4000061) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000680)=ANY=[@ANYBLOB="14000000100001000000000000b890c1a000000a80000000160a01030000000000000000020000000900020073797a30000000000900010073797a30000000005400038008000240000000000800014000000000400003801400010076657468315f746f5f6272696467650014000100776732000000000000000000000000001400010076657468305f746f5f7465616d00000014000000110001"], 0xa8}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000180a0102000000000000000002000003300003802c00038014000100776732000000000000000000000000001400010076657468315f746f5f627269576765000900020073797a30000000000900010073797a30"], 0x84}, 0x1, 0x0, 0x0, 0x40044}, 0x20008000) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SET_FLAGS(r5, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000640)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01002cbd7000ffdbdf250700000008000400000175080400018004000680"], 0x24}, 0x1, 0x0, 0x0, 0x20000080}, 0x0) ioctl$SIOCSIFHWADDR(r4, 0x8923, &(0x7f0000000140)={'wg2\x00', @local}) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[@ANYBLOB="20000000020000"], 0x0) syz_open_pts(r1, 0x43) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0x541b, &(0x7f0000000000)={0xffffffffffffffff}) close_range(r7, 0xffffffffffffffff, 0x0) 698.21043ms ago: executing program 1 (id=10895): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f00000004c0)='kmem_cache_free\x00', r1, 0x0, 0x400000}, 0x18) syz_emit_ethernet(0x82, &(0x7f0000000580)=ANY=[@ANYBLOB="cf599d3baed500000000000086dd60f20000004c2c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa00060008"], 0x0) syz_emit_ethernet(0x46, &(0x7f0000000000)=ANY=[@ANYBLOB="ffffffffffffffffffffffff86dd6060626000102c00fe8000000000000000000000000000bbfe8000000000000000000000000000aa11000001"], 0x0) 652.893252ms ago: executing program 1 (id=10896): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES32=0x0, @ANYBLOB="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", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket(0x10, 0x3, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc), 0x0, 0x0, 0x0, 0x0, 0x0) futex(&(0x7f000000cffc)=0x1, 0x1, 0x800001, 0x0, 0x0, 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) mremap(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x5000000, 0x3, &(0x7f0000ffd000/0x1000)=nil) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x50) mlock2(&(0x7f0000ff5000/0x2000)=nil, 0x2000, 0x1) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='mmap_lock_acquire_returned\x00', r0}, 0x18) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="210000000000000000000000000010000004"], 0x48) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x200000a, 0x13, r1, 0x0) r2 = gettid() process_vm_writev(r2, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000002540)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = io_uring_setup(0x17f8, &(0x7f0000000080)={0x0, 0xffffafff, 0x0, 0x0, 0x33d}) io_uring_register$IORING_REGISTER_BUFFERS(r3, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) move_pages(0x0, 0x20a0, &(0x7f0000000040), &(0x7f0000001180), &(0x7f0000000000), 0x0) 598.780215ms ago: executing program 9 (id=10897): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$selinux_load(0xffffffffffffff9c, 0x0, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x12, 0x2000000000000076, &(0x7f00000005c0)=ANY=[@ANYRES8=r1, @ANYRESOCT=r1, @ANYRESOCT=r1, @ANYRES32=r0, @ANYRES64=r1], &(0x7f0000000080)='syzkaller\x00', 0x8, 0x0, 0x0, 0x40f00, 0x8, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="07000000faffffffff000000010000002890d021ad5586b57fecefd40be25bc7dadb9735a599edcdbee96bdf7c410c60da8dcbf289c81fca7086150d5cff5b460f60d2e67e063f9ffe39bbd2c2abb99452738d7f59590a323e04f8a09b"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES8=r1, @ANYRES32=r2], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendmsg$tipc(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000280)="5aaf886a70645cf1ceeda4a615ced42d77fc40b25947a7fbdf4213926cf6d4cbb13f074cd24a819548917a141bb290119b935fb73b7baef2a829f1b335e7ee372054b4c106ae4fca50e84bbd79db11", 0x4f}, {&(0x7f0000000400)="5b9b9b3bd2b117dc9f58b525d99b53ca508c562cd93164f00d8c097c582a925c2ec1c708f271a77a53826c30b762fcd02b31d691b5993a6eac22fdaa763b3074ff67b0a64ffdfb03c8ffee099f6bc568432d2c6518b6f5976f4606253b79d070dd420bdf1ff1c283a6c65e10ae72544bacf2f02a827590547036d220f9a07e1a2d8d3490ea7bed68c88d4235377f6cc548e4253ef3de4408f73182a3660771a2675aac71bd1f2603415c688532cb107519b83261965af39145281837236e6e9620980a6f96433fbb31bc430f76cfb33e37f6baf2f8786ea985de532057e2c4ca395cf8a4913b120cbd382e00bb3dd6466f52", 0xf2}], 0x2, &(0x7f0000000300)="6441efbed974d10f5a40dd0bd3030a20a7e80ca66e5634e96ad1acb99cb2ad88531476a43cf4e28a589d5922fab78e179773de5a30878f99dc59e950d457af75ffb1450861010b55b5fafb0a4545e4692726c51cce282c2f0797aa4c8d174b26410325dd7045dcd2e62c114b56fca61bbe01fb2772389d597adb91da73f6", 0x7e, 0x400c040}, 0x20000000) r4 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0xfd, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x7, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="040000000400000004000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r4}, 0x20) r6 = epoll_create1(0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f0000000100)) shutdown(r7, 0x0) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x1, &(0x7f0000000000)=0x9, 0x8, 0x1) futex_waitv(&(0x7f0000001b00)=[{0xffb, &(0x7f0000000240)=0x200000006, 0xa}], 0x1, 0x0, 0x0, 0x1) epoll_wait(r6, &(0x7f0000000000), 0x0, 0xfffc) epoll_create(0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000796000/0x3000)=nil, 0x3000, 0x4, 0x0, 0x8000004, 0x2) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x2, &(0x7f0000000000)=0x9, 0x8, 0x0) set_mempolicy_home_node(&(0x7f0000146000/0x1000)=nil, 0x1000, 0x0, 0x0) r8 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffb, 0x0, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r9}, &(0x7f0000000180), &(0x7f00000001c0)=r8}, 0x20) 545.585517ms ago: executing program 3 (id=10898): sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0xfc, 0x0, 0x7ffc0002}]}) syz_io_uring_submit(0x0, 0x0, &(0x7f0000019240)=@IORING_OP_SENDMSG={0x9, 0xc, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xe3d08660d3cd4684}) io_uring_enter(0xffffffffffffffff, 0x40092, 0x0, 0x8, 0x0, 0x0) r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_TSINFO_GET(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="31832abd7000000000001900000018"], 0x2c}, 0x1, 0x0, 0x0, 0x50}, 0x4886) ptrace(0x10, r0) ptrace$setregs(0xd, r0, 0x7, &(0x7f0000000440)) ioctl$sock_inet_SIOCGIFPFLAGS(r1, 0x8935, &(0x7f0000000440)={'wg1\x00'}) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010600000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff1b000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}}, 0x4004944) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, &(0x7f0000019480)={&(0x7f0000019200)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000019440)={&(0x7f0000000c80)=ANY=[@ANYBLOB="00ff0f5abca16c6a415a907335b85550b9800ac7eb61831c62acc96d9f748bc67dc6db0ea5a8595f31c1499eee28c4d925f0d71049b3413e8803a5f3456fc4e49490498a8f952a7b7285666a34f4a3336134c6c6773c85074d65675edbca84ebb499cbdf788a0f54f68e6530530bdad8a7b93e810b436d2842ae82700270391faf7e53998f77643d9390de5cdf33b0", @ANYRES16=0x0, @ANYBLOB="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"], 0x144}, 0x1, 0x0, 0x0, 0x880}, 0x20000800) sendmsg$NFT_BATCH(r3, &(0x7f0000019280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000194c0)=ANY=[@ANYRES8=0x0, @ANYRES16=r0, @ANYRES8, @ANYRES16], 0x64}}, 0x0) creat(&(0x7f0000000040)='./file0\x00', 0x0) r4 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) read$ptp(r4, 0x0, 0x0) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)=0x0) timer_settime(r5, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) 540.683607ms ago: executing program 5 (id=10899): bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x19, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x32, 0xffffffffffffffff, 0x8528c000) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7fff}, 0x18) socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0xc) bind$netlink(r2, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="980000000001010400000000000000000a0000003c0001802c00018014000300fe8000000000000000000000000000aa14000400ff0100000000000000000000000000010c00028005000100000000003c0002802c00018014000300fe8000000000000000000000000000aa14000400fe8800000000000000000000000000010c0002800500010000000000080007"], 0x98}}, 0x0) 493.939219ms ago: executing program 5 (id=10900): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000540)=ANY=[@ANYBLOB="80000000", @ANYRES16=r2, @ANYBLOB="050000000000000000000f00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x80}}, 0x0) r3 = socket(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000b00)=ANY=[@ANYBLOB="14000000f303010000000000000000000a00000a1400"], 0x28}}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000240)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x12941c8}, 0xc, &(0x7f0000000340)={&(0x7f0000000580)=ANY=[@ANYBLOB="54010000", @ANYRES16=r2, @ANYRES32, @ANYRES32=r4, @ANYBLOB="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"], 0x154}, 0x1, 0x0, 0x0, 0x4140}, 0x20000000) capset(&(0x7f0000000000)={0x20071026}, &(0x7f0000000280)={0x220000, 0x3, 0xffffeffe, 0x4, 0xebe, 0xcd}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind$bt_sco(r5, &(0x7f0000000280)={0x1f, @none}, 0x8) listen(r5, 0x7) connect$bt_sco(r5, &(0x7f0000000000)={0x1f, @none}, 0x8) io_setup(0x202, &(0x7f0000000200)) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc3}, 0x0, 0x0, 0xfffffffffffffffa) r6 = socket$kcm(0x1e, 0x4, 0x0) r7 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000240)={0x1, &(0x7f0000000000)=[{0x6, 0x85, 0x7, 0x7ffc0001}]}) shmctl$IPC_RMID(0x0, 0x13) setsockopt$sock_attach_bpf(r6, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r8 = socket$kcm(0x1e, 0x4, 0x0) setsockopt$sock_attach_bpf(r8, 0x10f, 0x87, &(0x7f00000008c0), 0x43) r9 = timerfd_create(0x0, 0x0) timerfd_settime(r9, 0x3, &(0x7f0000000440)={{0x0, 0x989680}}, 0x0) read(r9, &(0x7f0000000240)=""/123, 0x7b) clock_adjtime(0x0, &(0x7f0000000040)={0xd51, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0xe438, 0x0, 0x3}) write$cgroup_subtree(r8, &(0x7f0000000040)=ANY=[], 0x101d0) sendmsg$kcm(r8, &(0x7f00000001c0)={&(0x7f00000000c0)=@tipc=@name={0x1e, 0x2, 0x3, {{0x41}, 0x5}}, 0x80, 0x0, 0x0, &(0x7f0000000900)=ANY=[], 0x1458}, 0x48800) 239.36725ms ago: executing program 8 (id=10901): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) sched_setscheduler(0x0, 0x2, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000009900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0xfe, 0x7ffc0002}]}) memfd_secret(0x80000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x18) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000180)='./bus\x00', 0xc5c, &(0x7f00000005c0), 0x3, 0x445, &(0x7f0000000b00)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r2, &(0x7f00000000c0), 0x0, 0x9000) lseek(r2, 0x3, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x2}, 0x94) 0s ago: executing program 9 (id=10902): bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) socketpair$unix(0x1, 0x1, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000540)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0xffffffffffffffff, 0x8, &(0x7f0000000000)={0xfffffffc}, 0x8, 0x10, &(0x7f0000000000), 0x10}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(0xffffffffffffffff, 0x8983, 0x0) madvise(&(0x7f0000bdc000/0x4000)=nil, 0x86ac726dff2f4713, 0xa) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCSBRKP(r3, 0x5425, 0x0) r4 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW2(r4, 0x5408, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x2, 0x0, "23f555d9adb42d4408020e90d1beaa82dc1ecf"}) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TCSETSW(r5, 0x5403, &(0x7f0000000040)={0x4, 0xffff, 0x1e, 0x4, 0xf, "db7fa24f5b524e2da29cae9b4215fdf3f1613b"}) syz_clone(0xa0001000, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0) bpf$BPF_PROG_DETACH(0x8, &(0x7f00000007c0)=ANY=[@ANYRES32=r2, @ANYRES32=r1, @ANYBLOB='&'], 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r2}, &(0x7f0000000000), &(0x7f00000002c0)=r0}, 0x20) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x10}}, 0x0) sendmsg$key(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000640)=ANY=[@ANYBLOB="020e000010000000000000000004830008001200000001000000ff000000400000001ea0abff7f00000000000000d41f9ab9000100700000ebdf000008000000c4fc0000100000000000e2ffff1c004f030006000020080002000080f5008e24ce6e4ae300a5000003000500001e001e02"], 0x80}}, 0x4814) socket$key(0xf, 0x3, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$kcm(0x21, 0x2, 0x2) sendmsg$kcm(r7, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0x1}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62"], 0x10b8}, 0x106) recvmsg$kcm(r7, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x100) kernel console output (not intermixed with test programs): s an invalid length. [ 693.187627][T16220] bond0: (slave dummy0): Releasing backup interface [ 693.211094][T16220] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 693.236963][T16220] team0: Failed to send options change via netlink (err -105) [ 693.244558][T16220] team0: Port device dummy0 added [ 693.505546][T16272] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=16272 comm=syz.1.9753 [ 693.765236][T16307] netlink: 'syz.5.9758': attribute type 10 has an invalid length. [ 693.796563][T16301] syzkaller0: entered promiscuous mode [ 693.810942][T16310] 8021q: adding VLAN 0 to HW filter on device bond2 [ 693.827206][T16307] bond0: (slave dummy0): Releasing backup interface [ 693.840707][T16307] dummy0: left promiscuous mode [ 693.850017][T16307] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 693.861337][T16307] team0: Failed to send options change via netlink (err -105) [ 693.868878][T16307] team0: Port device dummy0 added [ 693.891419][T16310] xt_TCPMSS: Only works on TCP SYN packets [ 694.192974][T16362] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 694.201971][T16362] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 694.212000][T16366] ªªªªªª: renamed from wg2 (while UP) [ 694.266193][T16362] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 694.276327][T16362] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 694.412045][T16381] FAULT_INJECTION: forcing a failure. [ 694.412045][T16381] name failslab, interval 1, probability 0, space 0, times 0 [ 694.424858][T16381] CPU: 0 UID: 0 PID: 16381 Comm: syz.1.9770 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 694.424975][T16381] Tainted: [W]=WARN [ 694.424994][T16381] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 694.425009][T16381] Call Trace: [ 694.425018][T16381] [ 694.425029][T16381] __dump_stack+0x1d/0x30 [ 694.425052][T16381] dump_stack_lvl+0xe8/0x140 [ 694.425072][T16381] dump_stack+0x15/0x1b [ 694.425147][T16381] should_fail_ex+0x265/0x280 [ 694.425190][T16381] should_failslab+0x8c/0xb0 [ 694.425279][T16381] __kmalloc_node_noprof+0xaa/0x580 [ 694.425319][T16381] ? qdisc_alloc+0x65/0x440 [ 694.425349][T16381] ? __kvmalloc_node_noprof+0x3ce/0x670 [ 694.425449][T16381] qdisc_alloc+0x65/0x440 [ 694.425482][T16381] qdisc_create_dflt+0x7f/0x2d0 [ 694.425533][T16381] mq_init+0x1b6/0x380 [ 694.425604][T16381] ? __rcu_read_unlock+0x4f/0x70 [ 694.425632][T16381] qdisc_create_dflt+0xef/0x2d0 [ 694.425745][T16381] ? dev_activate+0xbb/0x9e0 [ 694.425787][T16381] dev_activate+0xde/0x9e0 [ 694.425852][T16381] ? _raw_spin_unlock_bh+0x36/0x40 [ 694.425889][T16381] __dev_open+0x472/0x530 [ 694.425966][T16381] __dev_change_flags+0x163/0x400 [ 694.426008][T16381] netif_change_flags+0x5a/0xd0 [ 694.426046][T16381] dev_change_flags+0xce/0x180 [ 694.426085][T16381] dev_ifsioc+0x44b/0xaa0 [ 694.426104][T16381] ? __rcu_read_unlock+0x4f/0x70 [ 694.426174][T16381] dev_ioctl+0x70a/0x960 [ 694.426196][T16381] sock_do_ioctl+0x197/0x220 [ 694.426260][T16381] sock_ioctl+0x41b/0x610 [ 694.426291][T16381] ? __pfx_sock_ioctl+0x10/0x10 [ 694.426319][T16381] __se_sys_ioctl+0xce/0x140 [ 694.426360][T16381] __x64_sys_ioctl+0x43/0x50 [ 694.426385][T16381] x64_sys_call+0x1816/0x3000 [ 694.426407][T16381] do_syscall_64+0xd2/0x200 [ 694.426427][T16381] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 694.426510][T16381] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 694.426550][T16381] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 694.426577][T16381] RIP: 0033:0x7f5065a3f749 [ 694.426598][T16381] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 694.426650][T16381] RSP: 002b:00007f50644a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 694.426749][T16381] RAX: ffffffffffffffda RBX: 00007f5065c95fa0 RCX: 00007f5065a3f749 [ 694.426765][T16381] RDX: 0000200000000080 RSI: 0000000000008914 RDI: 0000000000000005 [ 694.426781][T16381] RBP: 00007f50644a7090 R08: 0000000000000000 R09: 0000000000000000 [ 694.426837][T16381] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 694.426858][T16381] R13: 00007f5065c96038 R14: 00007f5065c95fa0 R15: 00007ffee21342a8 [ 694.426884][T16381] [ 694.691370][T16381] syzkaller0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 694.703575][T16381] syzkaller0: entered promiscuous mode [ 694.815412][T16387] 8021q: adding VLAN 0 to HW filter on device bond4 [ 694.934033][T16387] xt_TCPMSS: Only works on TCP SYN packets [ 694.956435][T16404] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=16404 comm=syz.1.9778 [ 694.998229][T16406] pimreg: entered allmulticast mode [ 695.007139][T16406] pimreg: left allmulticast mode [ 695.053805][T16417] IPVS: Error connecting to the multicast addr [ 695.089578][T16422] openvswitch: netlink: Flow key attr not present in new flow. [ 695.188586][T16437] __nla_validate_parse: 20 callbacks suppressed [ 695.188607][T16437] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9789'. [ 695.203948][T16437] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9789'. [ 695.220781][T16441] netlink: 12 bytes leftover after parsing attributes in process `syz.8.9790'. [ 695.259203][T16441] 8021q: adding VLAN 0 to HW filter on device bond7 [ 695.347936][T16456] Process accounting resumed [ 695.365936][T16460] pimreg: entered allmulticast mode [ 695.375074][T16460] pimreg: left allmulticast mode [ 695.412314][T16441] xt_TCPMSS: Only works on TCP SYN packets [ 695.418907][T16441] netlink: 172 bytes leftover after parsing attributes in process `syz.8.9790'. [ 695.457237][T16447] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 695.484573][T16447] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 695.719203][T16516] openvswitch: netlink: Flow key attr not present in new flow. [ 695.760635][T16521] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 695.770084][T16521] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 696.307312][T16606] netlink: 12 bytes leftover after parsing attributes in process `syz.5.9806'. [ 696.333099][T16610] netlink: 'syz.8.9807': attribute type 10 has an invalid length. [ 696.349013][T16606] 8021q: adding VLAN 0 to HW filter on device bond7 [ 696.363875][T16610] bond0: (slave dummy0): Releasing backup interface [ 696.378570][T16610] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 696.400752][T16610] team0: Failed to send options change via netlink (err -105) [ 696.408383][T16610] team0: Port device dummy0 added [ 696.494770][T16606] xt_TCPMSS: Only works on TCP SYN packets [ 696.512197][T16606] netlink: 172 bytes leftover after parsing attributes in process `syz.5.9806'. [ 696.525062][T16626] netlink: 14 bytes leftover after parsing attributes in process `syz.8.9809'. [ 696.537069][T16626] hsr_slave_0: left promiscuous mode [ 696.542969][T16626] hsr_slave_1: left promiscuous mode [ 696.674215][T16640] netlink: 'syz.5.9816': attribute type 10 has an invalid length. [ 696.697973][T16642] netlink: 24 bytes leftover after parsing attributes in process `syz.9.9817'. [ 696.732625][T16642] IPVS: Error connecting to the multicast addr [ 696.765434][ T29] kauditd_printk_skb: 1794 callbacks suppressed [ 696.765454][ T29] audit: type=1400 audit(2000000777.867:199420): avc: denied { getopt } for pid=16617 comm="syz.8.9809" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 696.813768][T16649] FAULT_INJECTION: forcing a failure. [ 696.813768][T16649] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 696.827030][T16649] CPU: 0 UID: 0 PID: 16649 Comm: syz.5.9820 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 696.827066][T16649] Tainted: [W]=WARN [ 696.827072][T16649] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 696.827086][T16649] Call Trace: [ 696.827093][T16649] [ 696.827246][T16649] __dump_stack+0x1d/0x30 [ 696.827271][T16649] dump_stack_lvl+0xe8/0x140 [ 696.827293][T16649] dump_stack+0x15/0x1b [ 696.827314][T16649] should_fail_ex+0x265/0x280 [ 696.827366][T16649] should_fail+0xb/0x20 [ 696.827467][T16649] should_fail_usercopy+0x1a/0x20 [ 696.827492][T16649] _copy_to_user+0x20/0xa0 [ 696.827530][T16649] simple_read_from_buffer+0xb5/0x130 [ 696.827567][T16649] proc_fail_nth_read+0x10e/0x150 [ 696.827688][T16649] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 696.827731][T16649] vfs_read+0x1a8/0x770 [ 696.827764][T16649] ? __rcu_read_unlock+0x4f/0x70 [ 696.827826][T16649] ? __fget_files+0x184/0x1c0 [ 696.827869][T16649] ksys_read+0xda/0x1a0 [ 696.827907][T16649] __x64_sys_read+0x40/0x50 [ 696.827943][T16649] x64_sys_call+0x27c0/0x3000 [ 696.828030][T16649] do_syscall_64+0xd2/0x200 [ 696.828059][T16649] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 696.828099][T16649] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 696.828153][T16649] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 696.828185][T16649] RIP: 0033:0x7f5179cce15c [ 696.828206][T16649] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 696.828287][T16649] RSP: 002b:00007f5178737030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 696.828315][T16649] RAX: ffffffffffffffda RBX: 00007f5179f25fa0 RCX: 00007f5179cce15c [ 696.828333][T16649] RDX: 000000000000000f RSI: 00007f51787370a0 RDI: 0000000000000003 [ 696.828349][T16649] RBP: 00007f5178737090 R08: 0000000000000000 R09: 0000000000000000 [ 696.828387][T16649] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 696.828403][T16649] R13: 00007f5179f26038 R14: 00007f5179f25fa0 R15: 00007ffe99d0eb68 [ 696.828433][T16649] [ 696.828724][ T29] audit: type=1326 audit(2000000777.917:199421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.9814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 697.056129][ T29] audit: type=1326 audit(2000000777.917:199422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.9814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=102 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 697.056172][ T29] audit: type=1326 audit(2000000777.917:199423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.9814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 697.056206][ T29] audit: type=1326 audit(2000000777.917:199424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.9814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 697.056340][ T29] audit: type=1326 audit(2000000777.917:199425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.9814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 697.056372][ T29] audit: type=1326 audit(2000000777.917:199426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.9814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fef0d58df90 code=0x7ffc0000 [ 697.056400][ T29] audit: type=1326 audit(2000000777.937:199427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16429 comm="syz.1.9786" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5065a72005 code=0x7ffc0000 [ 697.200793][ T29] audit: type=1326 audit(2000000777.967:199428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.9814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 697.224732][ T29] audit: type=1326 audit(2000000777.967:199429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16634 comm="syz.3.9814" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 697.308950][T16674] netlink: 12 bytes leftover after parsing attributes in process `syz.9.9826'. [ 697.342883][T16674] 8021q: adding VLAN 0 to HW filter on device bond5 [ 697.501677][T16689] pimreg: entered allmulticast mode [ 697.525101][T16689] pimreg: left allmulticast mode [ 697.544035][T16674] xt_TCPMSS: Only works on TCP SYN packets [ 697.557285][T16674] netlink: 172 bytes leftover after parsing attributes in process `syz.9.9826'. [ 697.590255][T16699] netlink: 'wÞ£ÿ': attribute type 3 has an invalid length. [ 697.703617][T16705] pimreg: entered allmulticast mode [ 697.717776][T16705] pimreg: left allmulticast mode [ 697.864502][T16727] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 697.873702][T16727] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 697.889618][T16729] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=16729 comm=syz.3.9845 [ 698.092430][T16741] 8021q: adding VLAN 0 to HW filter on device bond8 [ 698.237877][T16741] xt_TCPMSS: Only works on TCP SYN packets [ 698.396799][T16747] Process accounting resumed [ 698.567366][T16756] pimreg: entered allmulticast mode [ 698.573410][T16756] pimreg: left allmulticast mode [ 698.835596][T16784] 8021q: adding VLAN 0 to HW filter on device bond3 [ 698.872376][T16789] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 698.896167][T16789] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 699.040530][T16784] xt_TCPMSS: Only works on TCP SYN packets [ 699.184008][T16803] pimreg: entered allmulticast mode [ 699.191798][T16803] pimreg: left allmulticast mode [ 699.249090][T16807] Cannot find set identified by id 0 to match [ 699.418163][T16818] 8021q: adding VLAN 0 to HW filter on device bond4 [ 699.577463][T16818] xt_TCPMSS: Only works on TCP SYN packets [ 699.685317][T16828] Process accounting resumed [ 699.841580][T16856] x_tables: duplicate underflow at hook 2 [ 699.932415][T16864] 8021q: adding VLAN 0 to HW filter on device bond9 [ 700.054360][T16864] xt_TCPMSS: Only works on TCP SYN packets [ 700.179497][T16884] FAULT_INJECTION: forcing a failure. [ 700.179497][T16884] name failslab, interval 1, probability 0, space 0, times 0 [ 700.192302][T16884] CPU: 0 UID: 0 PID: 16884 Comm: syz.8.9894 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 700.192336][T16884] Tainted: [W]=WARN [ 700.192344][T16884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 700.192361][T16884] Call Trace: [ 700.192370][T16884] [ 700.192380][T16884] __dump_stack+0x1d/0x30 [ 700.192479][T16884] dump_stack_lvl+0xe8/0x140 [ 700.192505][T16884] dump_stack+0x15/0x1b [ 700.192528][T16884] should_fail_ex+0x265/0x280 [ 700.192640][T16884] should_failslab+0x8c/0xb0 [ 700.192678][T16884] __kmalloc_cache_node_noprof+0x54/0x4a0 [ 700.192720][T16884] ? __get_vm_area_node+0x106/0x1d0 [ 700.192773][T16884] ? kvm_sched_clock_read+0x11/0x20 [ 700.192811][T16884] __get_vm_area_node+0x106/0x1d0 [ 700.192853][T16884] __vmalloc_node_range_noprof+0x28c/0xed0 [ 700.192925][T16884] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 700.193071][T16884] ? rb_commit+0x3e9/0x420 [ 700.193114][T16884] ? cred_has_capability+0x210/0x280 [ 700.193155][T16884] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 700.193205][T16884] __vmalloc_noprof+0x83/0xc0 [ 700.193244][T16884] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 700.193328][T16884] bpf_prog_alloc_no_stats+0x47/0x3b0 [ 700.193364][T16884] ? bpf_prog_alloc+0x2a/0x150 [ 700.193442][T16884] bpf_prog_alloc+0x3c/0x150 [ 700.193502][T16884] bpf_prog_load+0x506/0x1100 [ 700.193533][T16884] ? security_bpf+0x2b/0x90 [ 700.193560][T16884] __sys_bpf+0x469/0x7c0 [ 700.193591][T16884] __x64_sys_bpf+0x41/0x50 [ 700.193696][T16884] x64_sys_call+0x2aee/0x3000 [ 700.193723][T16884] do_syscall_64+0xd2/0x200 [ 700.193804][T16884] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 700.193834][T16884] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 700.193913][T16884] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 700.194002][T16884] RIP: 0033:0x7ff03d27f749 [ 700.194020][T16884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 700.194044][T16884] RSP: 002b:00007ff03bcdf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 700.194069][T16884] RAX: ffffffffffffffda RBX: 00007ff03d4d5fa0 RCX: 00007ff03d27f749 [ 700.194085][T16884] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 700.194101][T16884] RBP: 00007ff03bcdf090 R08: 0000000000000000 R09: 0000000000000000 [ 700.194124][T16884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 700.194140][T16884] R13: 00007ff03d4d6038 R14: 00007ff03d4d5fa0 R15: 00007ffef55f6848 [ 700.194183][T16884] [ 700.194191][T16884] syz.8.9894: vmalloc error: size 61440, vm_struct allocation failed, mode:0x500dc0(GFP_USER|__GFP_ZERO|__GFP_ACCOUNT), nodemask=(null),cpuset=/,mems_allowed=0 [ 700.458091][T16884] CPU: 0 UID: 0 PID: 16884 Comm: syz.8.9894 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 700.458173][T16884] Tainted: [W]=WARN [ 700.458181][T16884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 700.458194][T16884] Call Trace: [ 700.458203][T16884] [ 700.458214][T16884] __dump_stack+0x1d/0x30 [ 700.458242][T16884] dump_stack_lvl+0xe8/0x140 [ 700.458263][T16884] dump_stack+0x15/0x1b [ 700.458280][T16884] warn_alloc+0x12b/0x1a0 [ 700.458327][T16884] __vmalloc_node_range_noprof+0x2b1/0xed0 [ 700.458424][T16884] ? rb_commit+0x3e9/0x420 [ 700.458485][T16884] ? cred_has_capability+0x210/0x280 [ 700.458527][T16884] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 700.458566][T16884] __vmalloc_noprof+0x83/0xc0 [ 700.458715][T16884] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 700.458760][T16884] bpf_prog_alloc_no_stats+0x47/0x3b0 [ 700.458831][T16884] ? bpf_prog_alloc+0x2a/0x150 [ 700.458945][T16884] bpf_prog_alloc+0x3c/0x150 [ 700.458983][T16884] bpf_prog_load+0x506/0x1100 [ 700.459023][T16884] ? security_bpf+0x2b/0x90 [ 700.459098][T16884] __sys_bpf+0x469/0x7c0 [ 700.459127][T16884] __x64_sys_bpf+0x41/0x50 [ 700.459184][T16884] x64_sys_call+0x2aee/0x3000 [ 700.459213][T16884] do_syscall_64+0xd2/0x200 [ 700.459240][T16884] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 700.459277][T16884] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 700.459408][T16884] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 700.459435][T16884] RIP: 0033:0x7ff03d27f749 [ 700.459451][T16884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 700.459535][T16884] RSP: 002b:00007ff03bcdf038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 700.459560][T16884] RAX: ffffffffffffffda RBX: 00007ff03d4d5fa0 RCX: 00007ff03d27f749 [ 700.459575][T16884] RDX: 0000000000000094 RSI: 00002000000000c0 RDI: 0000000000000005 [ 700.459591][T16884] RBP: 00007ff03bcdf090 R08: 0000000000000000 R09: 0000000000000000 [ 700.459606][T16884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 700.459665][T16884] R13: 00007ff03d4d6038 R14: 00007ff03d4d5fa0 R15: 00007ffef55f6848 [ 700.459686][T16884] [ 700.459706][T16884] Mem-Info: [ 700.678802][T16884] active_anon:18781 inactive_anon:5 isolated_anon:0 [ 700.678802][T16884] active_file:15556 inactive_file:12930 isolated_file:0 [ 700.678802][T16884] unevictable:2 dirty:485 writeback:1 [ 700.678802][T16884] slab_reclaimable:3975 slab_unreclaimable:36898 [ 700.678802][T16884] mapped:39337 shmem:13735 pagetables:1935 [ 700.678802][T16884] sec_pagetables:0 bounce:0 [ 700.678802][T16884] kernel_misc_reclaimable:0 [ 700.678802][T16884] free:1817902 free_pcp:29472 free_cma:0 [ 700.724323][T16884] Node 0 active_anon:75008kB inactive_anon:20kB active_file:62224kB inactive_file:51720kB unevictable:8kB isolated(anon):0kB isolated(file):0kB mapped:157348kB dirty:1940kB writeback:4kB shmem:54940kB kernel_stack:4752kB pagetables:7856kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 700.751949][T16884] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 700.781743][T16884] lowmem_reserve[]: 0 2881 7859 7859 [ 700.787211][T16884] Node 0 DMA32 free:2946728kB boost:0kB min:4132kB low:7060kB high:9988kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2950256kB mlocked:0kB bounce:0kB free_pcp:3528kB local_pcp:3528kB free_cma:0kB [ 700.818660][T16884] lowmem_reserve[]: 0 0 4978 4978 [ 700.823791][T16884] Node 0 Normal free:4309324kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB free_highatomic:0KB active_anon:75116kB inactive_anon:20kB active_file:62224kB inactive_file:51720kB unevictable:8kB writepending:1944kB zspages:0kB present:5242880kB managed:5098240kB mlocked:8kB bounce:0kB free_pcp:114148kB local_pcp:107028kB free_cma:0kB [ 700.857665][T16884] lowmem_reserve[]: 0 0 0 0 [ 700.862196][T16884] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 700.874894][T16884] Node 0 DMA32: 4*4kB (M) 3*8kB (M) 4*16kB (M) 2*32kB (M) 4*64kB (M) 2*128kB (M) 2*256kB (M) 3*512kB (M) 3*1024kB (M) 2*2048kB (M) 717*4096kB (M) = 2946728kB [ 700.891254][T16884] Node 0 Normal: 2481*4kB (UME) 3663*8kB (UM) 1708*16kB (UME) 1233*32kB (UME) 900*64kB (UME) 652*128kB (UME) 466*256kB (UME) 361*512kB (UME) 286*1024kB (UME) 80*2048kB (UM) 806*4096kB (UM) = 4309276kB [ 700.911174][T16884] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 700.920524][T16884] 42227 total pagecache pages [ 700.925219][T16884] 6 pages in swap cache [ 700.929527][T16884] Free swap = 124972kB [ 700.933680][T16884] Total swap = 124996kB [ 700.937851][T16884] 2097051 pages RAM [ 700.941661][T16884] 0 pages HighMem/MovableOnly [ 700.946335][T16884] 81087 pages reserved [ 700.953822][T16889] __nla_validate_parse: 27 callbacks suppressed [ 700.953840][T16889] netlink: 8 bytes leftover after parsing attributes in process `syz.9.9895'. [ 700.969119][T16889] netlink: 8 bytes leftover after parsing attributes in process `syz.9.9895'. [ 701.024833][T16895] netlink: 'syz.8.9896': attribute type 2 has an invalid length. [ 701.043506][T16898] netlink: 8 bytes leftover after parsing attributes in process `syz.3.9898'. [ 701.094086][T16898] netlink: 'syz.3.9898': attribute type 10 has an invalid length. [ 701.102065][T16898] netlink: 40 bytes leftover after parsing attributes in process `syz.3.9898'. [ 701.141451][T16901] netlink: 8 bytes leftover after parsing attributes in process `syz.8.9899'. [ 701.150502][T16901] netlink: 8 bytes leftover after parsing attributes in process `syz.8.9899'. [ 701.189418][T16911] netlink: 12 bytes leftover after parsing attributes in process `syz.1.9903'. [ 701.208416][T16911] openvswitch: netlink: Key 0 has unexpected len 2 expected 0 [ 701.358982][T16930] netlink: 'syz.1.9908': attribute type 10 has an invalid length. [ 701.428822][T16934] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9910'. [ 701.437828][T16934] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9910'. [ 701.530405][T16946] FAULT_INJECTION: forcing a failure. [ 701.530405][T16946] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 701.543537][T16946] CPU: 1 UID: 0 PID: 16946 Comm: syz.5.9914 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 701.543602][T16946] Tainted: [W]=WARN [ 701.543611][T16946] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 701.543628][T16946] Call Trace: [ 701.543636][T16946] [ 701.543675][T16946] __dump_stack+0x1d/0x30 [ 701.543698][T16946] dump_stack_lvl+0xe8/0x140 [ 701.543786][T16946] dump_stack+0x15/0x1b [ 701.543805][T16946] should_fail_ex+0x265/0x280 [ 701.543914][T16946] should_fail+0xb/0x20 [ 701.543929][T16946] should_fail_usercopy+0x1a/0x20 [ 701.543950][T16946] _copy_from_user+0x1c/0xb0 [ 701.543989][T16946] kstrtouint_from_user+0x69/0xf0 [ 701.544078][T16946] ? 0xffffffff81000000 [ 701.544095][T16946] ? selinux_file_permission+0x1e4/0x320 [ 701.544137][T16946] proc_fail_nth_write+0x50/0x160 [ 701.544172][T16946] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 701.544274][T16946] vfs_write+0x269/0x960 [ 701.544299][T16946] ? vfs_read+0x4e6/0x770 [ 701.544329][T16946] ? __rcu_read_unlock+0x4f/0x70 [ 701.544363][T16946] ? __fget_files+0x184/0x1c0 [ 701.544413][T16946] ksys_write+0xda/0x1a0 [ 701.544443][T16946] __x64_sys_write+0x40/0x50 [ 701.544468][T16946] x64_sys_call+0x2802/0x3000 [ 701.544509][T16946] do_syscall_64+0xd2/0x200 [ 701.544529][T16946] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 701.544565][T16946] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 701.544663][T16946] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 701.544684][T16946] RIP: 0033:0x7f5179cce1ff [ 701.544699][T16946] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 701.544723][T16946] RSP: 002b:00007f5178737030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 701.544749][T16946] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5179cce1ff [ 701.544765][T16946] RDX: 0000000000000001 RSI: 00007f51787370a0 RDI: 0000000000000004 [ 701.544795][T16946] RBP: 00007f5178737090 R08: 0000000000000000 R09: 0000000000000000 [ 701.544807][T16946] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 701.544944][T16946] R13: 00007f5179f26038 R14: 00007f5179f25fa0 R15: 00007ffe99d0eb68 [ 701.544964][T16946] [ 701.783366][T16932] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 701.792162][T16932] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 701.837024][ T29] kauditd_printk_skb: 268 callbacks suppressed [ 701.837041][ T29] audit: type=1326 audit(2000000782.937:199698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16952 comm="syz.5.9917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5179ccf749 code=0x7ffc0000 [ 701.867026][ T29] audit: type=1326 audit(2000000782.937:199699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16952 comm="syz.5.9917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5179ccf749 code=0x7ffc0000 [ 701.890739][ T29] audit: type=1326 audit(2000000782.937:199700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16952 comm="syz.5.9917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5179ccf749 code=0x7ffc0000 [ 701.914419][ T29] audit: type=1326 audit(2000000782.937:199701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16952 comm="syz.5.9917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5179ccf749 code=0x7ffc0000 [ 701.938160][ T29] audit: type=1326 audit(2000000782.937:199702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16952 comm="syz.5.9917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5179ccf749 code=0x7ffc0000 [ 701.961927][ T29] audit: type=1326 audit(2000000782.937:199703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16952 comm="syz.5.9917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5179ccf749 code=0x7ffc0000 [ 701.985775][ T29] audit: type=1326 audit(2000000782.937:199704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16952 comm="syz.5.9917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5179ccf749 code=0x7ffc0000 [ 702.009499][ T29] audit: type=1326 audit(2000000782.937:199705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16952 comm="syz.5.9917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5179cce1ff code=0x7ffc0000 [ 702.033231][ T29] audit: type=1326 audit(2000000782.937:199706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16952 comm="syz.5.9917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5179ccf749 code=0x7ffc0000 [ 702.057053][ T29] audit: type=1326 audit(2000000782.937:199707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16952 comm="syz.5.9917" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f5179cce1ff code=0x7ffc0000 [ 702.142391][T16972] netlink: 176 bytes leftover after parsing attributes in process `syz.5.9920'. [ 702.765706][T17038] lo speed is unknown, defaulting to 1000 [ 703.620361][T17111] pimreg: entered allmulticast mode [ 703.626470][T17111] pimreg: left allmulticast mode [ 703.971379][T17132] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 703.987239][T17132] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 704.046827][T17150] Process accounting resumed [ 704.199331][T17159] pimreg: entered allmulticast mode [ 704.205650][T17159] pimreg: left allmulticast mode [ 704.349567][ T4169] Bluetooth: hci0: Frame reassembly failed (-84) [ 704.594653][T17193] pimreg: entered allmulticast mode [ 704.609289][T17193] pimreg: left allmulticast mode [ 704.833519][T17241] netlink: 'syz.9.9966': attribute type 10 has an invalid length. [ 704.844668][T17203] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 704.853860][T17203] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 704.883007][T17249] 8021q: adding VLAN 0 to HW filter on device bond6 [ 705.048802][T17249] xt_TCPMSS: Only works on TCP SYN packets [ 706.111794][T17398] __nla_validate_parse: 14 callbacks suppressed [ 706.111822][T17398] netlink: 4 bytes leftover after parsing attributes in process `syz.5.9982'. [ 706.127787][T17398] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1538 sclass=netlink_route_socket pid=17398 comm=syz.5.9982 [ 706.141009][T17398] netlink: 12 bytes leftover after parsing attributes in process `syz.5.9982'. [ 706.189868][T17400] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9983'. [ 706.329294][T17405] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9984'. [ 706.338275][T17405] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9984'. [ 706.407101][ T7214] Bluetooth: hci0: command 0x1003 tx timeout [ 706.413271][ T7855] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 706.734405][T17432] netlink: 8 bytes leftover after parsing attributes in process `syz.5.9995'. [ 706.967152][ T29] kauditd_printk_skb: 2201 callbacks suppressed [ 706.967207][ T29] audit: type=1326 audit(2000000788.067:201909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17441 comm="syz.9.9997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 706.997209][ T29] audit: type=1326 audit(2000000788.067:201910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17441 comm="syz.9.9997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 707.021085][ T29] audit: type=1326 audit(2000000788.067:201911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17441 comm="syz.9.9997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 707.044847][ T29] audit: type=1326 audit(2000000788.067:201912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17441 comm="syz.9.9997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 707.068587][ T29] audit: type=1326 audit(2000000788.067:201913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17441 comm="syz.9.9997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 707.092368][ T29] audit: type=1326 audit(2000000788.067:201914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17441 comm="syz.9.9997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 707.116213][ T29] audit: type=1326 audit(2000000788.067:201915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17441 comm="syz.9.9997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 707.134356][T17456] ip6t_srh: unknown srh match flags 4000 [ 707.140224][ T29] audit: type=1326 audit(2000000788.067:201916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17441 comm="syz.9.9997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 707.169433][ T29] audit: type=1326 audit(2000000788.067:201917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17441 comm="syz.9.9997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 707.193225][ T29] audit: type=1326 audit(2000000788.067:201918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17441 comm="syz.9.9997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 708.279035][T17603] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10007'. [ 708.668221][T17628] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10015'. [ 708.677755][T17628] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10015'. [ 708.800056][T17628] Process accounting resumed [ 708.825255][T17635] netlink: 'syz.1.10018': attribute type 10 has an invalid length. [ 708.856039][T17637] netlink: 24 bytes leftover after parsing attributes in process `syz.9.10019'. [ 708.892931][T17637] IPVS: Error connecting to the multicast addr [ 709.150507][T17663] lo speed is unknown, defaulting to 1000 [ 709.415805][T17679] ip6t_srh: unknown srh match flags 4000 [ 710.035750][T17725] netlink: 'syz.8.10033': attribute type 1 has an invalid length. [ 710.049273][T17710] Process accounting resumed [ 710.114695][T17725] 8021q: adding VLAN 0 to HW filter on device bond10 [ 710.375483][T17768] IPVS: Error connecting to the multicast addr [ 710.768829][T17829] Process accounting resumed [ 711.122389][T17867] pimreg: entered allmulticast mode [ 711.132339][T17867] pimreg: left allmulticast mode [ 711.153422][T17870] __nla_validate_parse: 5 callbacks suppressed [ 711.153440][T17870] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10050'. [ 711.169866][T17870] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10050'. [ 711.224014][T17877] netlink: 4 bytes leftover after parsing attributes in process `syz.9.10053'. [ 711.274331][T17883] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10055'. [ 711.283426][T17883] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10055'. [ 711.311854][T17870] Process accounting resumed [ 711.398679][T17900] netlink: 20 bytes leftover after parsing attributes in process `syz.1.10061'. [ 711.542414][T17909] pimreg: entered allmulticast mode [ 711.559388][T17909] pimreg: left allmulticast mode [ 711.689371][T17913] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10066'. [ 711.731812][T17913] netlink: 'syz.3.10066': attribute type 10 has an invalid length. [ 711.739854][T17913] netlink: 40 bytes leftover after parsing attributes in process `syz.3.10066'. [ 711.767973][T17919] netlink: 12 bytes leftover after parsing attributes in process `syz.9.10068'. [ 711.847651][T17919] 8021q: adding VLAN 0 to HW filter on device bond7 [ 711.876980][T17925] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10070'. [ 711.935748][T17919] xt_TCPMSS: Only works on TCP SYN packets [ 711.982102][ T29] kauditd_printk_skb: 4556 callbacks suppressed [ 711.982116][ T29] audit: type=1326 audit(2000000793.087:206475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17885 comm="syz.8.10056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ff03d2765e7 code=0x7ffc0000 [ 712.040414][T17938] xt_hashlimit: max too large, truncated to 1048576 [ 712.064420][ T29] audit: type=1326 audit(2000000793.127:206476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17885 comm="syz.8.10056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7ff03d21b829 code=0x7ffc0000 [ 712.088335][ T29] audit: type=1326 audit(2000000793.127:206477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17885 comm="syz.8.10056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ff03d2765e7 code=0x7ffc0000 [ 712.098325][T17941] pimreg: entered allmulticast mode [ 712.112045][ T29] audit: type=1326 audit(2000000793.127:206478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17885 comm="syz.8.10056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7ff03d21b829 code=0x7ffc0000 [ 712.141041][ T29] audit: type=1326 audit(2000000793.127:206479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17885 comm="syz.8.10056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ff03d2765e7 code=0x7ffc0000 [ 712.164738][ T29] audit: type=1326 audit(2000000793.127:206480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17885 comm="syz.8.10056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7ff03d21b829 code=0x7ffc0000 [ 712.188844][ T29] audit: type=1326 audit(2000000793.127:206481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17885 comm="syz.8.10056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ff03d2765e7 code=0x7ffc0000 [ 712.212710][ T29] audit: type=1326 audit(2000000793.127:206482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17885 comm="syz.8.10056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7ff03d21b829 code=0x7ffc0000 [ 712.236490][ T29] audit: type=1326 audit(2000000793.127:206483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17885 comm="syz.8.10056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7ff03d2765e7 code=0x7ffc0000 [ 712.260200][ T29] audit: type=1326 audit(2000000793.127:206484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17885 comm="syz.8.10056" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7ff03d21b829 code=0x7ffc0000 [ 712.303625][T17942] pimreg: left allmulticast mode [ 712.373921][T17955] pimreg: entered allmulticast mode [ 712.389645][T17955] pimreg: left allmulticast mode [ 712.816070][T18004] IPVS: Error connecting to the multicast addr [ 713.409337][T18082] Process accounting resumed [ 713.452017][T18097] Process accounting resumed [ 713.504801][T18102] Process accounting resumed [ 713.864756][T18155] netlink: 'syz.3.10108': attribute type 10 has an invalid length. [ 713.934428][T18162] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18162 comm=syz.9.10109 [ 713.958495][T18164] netlink: 'syz.3.10110': attribute type 10 has an invalid length. [ 713.977583][T18164] bond0: (slave dummy0): Releasing backup interface [ 713.984496][T18162] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=18162 comm=syz.9.10109 [ 714.010757][T18164] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 714.020845][T18164] team0: Failed to send options change via netlink (err -105) [ 714.028412][T18164] team0: Port device dummy0 added [ 714.065179][T18174] FAULT_INJECTION: forcing a failure. [ 714.065179][T18174] name failslab, interval 1, probability 0, space 0, times 0 [ 714.078042][T18174] CPU: 0 UID: 0 PID: 18174 Comm: syz.1.10111 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 714.078083][T18174] Tainted: [W]=WARN [ 714.078090][T18174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 714.078103][T18174] Call Trace: [ 714.078110][T18174] [ 714.078118][T18174] __dump_stack+0x1d/0x30 [ 714.078145][T18174] dump_stack_lvl+0xe8/0x140 [ 714.078284][T18174] dump_stack+0x15/0x1b [ 714.078302][T18174] should_fail_ex+0x265/0x280 [ 714.078341][T18174] ? audit_log_d_path+0x8d/0x150 [ 714.078411][T18174] should_failslab+0x8c/0xb0 [ 714.078440][T18174] __kmalloc_cache_noprof+0x4c/0x4a0 [ 714.078515][T18174] audit_log_d_path+0x8d/0x150 [ 714.078565][T18174] audit_log_d_path_exe+0x42/0x70 [ 714.078594][T18174] audit_log_task+0x1e9/0x250 [ 714.078638][T18174] ? ptrace_regset+0x1a0/0x260 [ 714.078668][T18174] audit_seccomp+0x61/0x100 [ 714.078735][T18174] ? __seccomp_filter+0x82d/0x1250 [ 714.078772][T18174] __seccomp_filter+0x83e/0x1250 [ 714.078863][T18174] ? task_rq_lock+0x47/0xd0 [ 714.078901][T18174] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 714.078936][T18174] ? wait_task_inactive+0x1b5/0x2d0 [ 714.079014][T18174] __secure_computing+0x82/0x150 [ 714.079043][T18174] syscall_trace_enter+0xcf/0x1e0 [ 714.079074][T18174] do_syscall_64+0xac/0x200 [ 714.079167][T18174] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 714.079203][T18174] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 714.079247][T18174] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 714.079365][T18174] RIP: 0033:0x7f5065a3e15c [ 714.079380][T18174] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 714.079398][T18174] RSP: 002b:00007f50644a7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 714.079420][T18174] RAX: ffffffffffffffda RBX: 00007f5065c95fa0 RCX: 00007f5065a3e15c [ 714.079432][T18174] RDX: 000000000000000f RSI: 00007f50644a70a0 RDI: 0000000000000004 [ 714.079468][T18174] RBP: 00007f50644a7090 R08: 0000000000000000 R09: 0000000000000000 [ 714.079484][T18174] R10: 0000200000000740 R11: 0000000000000246 R12: 0000000000000002 [ 714.079499][T18174] R13: 00007f5065c96038 R14: 00007f5065c95fa0 R15: 00007ffee21342a8 [ 714.079525][T18174] [ 714.348908][T18186] pimreg: entered allmulticast mode [ 714.355420][T18186] pimreg: left allmulticast mode [ 714.511449][T18199] Process accounting resumed [ 714.528499][T18205] FAULT_INJECTION: forcing a failure. [ 714.528499][T18205] name failslab, interval 1, probability 0, space 0, times 0 [ 714.541454][T18205] CPU: 0 UID: 0 PID: 18205 Comm: syz.8.10122 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 714.541493][T18205] Tainted: [W]=WARN [ 714.541502][T18205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 714.541518][T18205] Call Trace: [ 714.541526][T18205] [ 714.541612][T18205] __dump_stack+0x1d/0x30 [ 714.541640][T18205] dump_stack_lvl+0xe8/0x140 [ 714.541669][T18205] dump_stack+0x15/0x1b [ 714.541692][T18205] should_fail_ex+0x265/0x280 [ 714.541736][T18205] should_failslab+0x8c/0xb0 [ 714.541827][T18205] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 714.541866][T18205] ? sidtab_sid2str_get+0xa0/0x130 [ 714.541960][T18205] kmemdup_noprof+0x2b/0x70 [ 714.541996][T18205] sidtab_sid2str_get+0xa0/0x130 [ 714.542026][T18205] security_sid_to_context_core+0x1eb/0x2e0 [ 714.542115][T18205] security_sid_to_context+0x27/0x40 [ 714.542145][T18205] selinux_lsmprop_to_secctx+0x67/0xf0 [ 714.542210][T18205] security_lsmprop_to_secctx+0x1a3/0x1c0 [ 714.542242][T18205] audit_log_subj_ctx+0xa4/0x3e0 [ 714.542266][T18205] ? skb_put+0xa9/0xf0 [ 714.542376][T18205] audit_log_task_context+0x48/0x70 [ 714.542408][T18205] audit_log_task+0xf4/0x250 [ 714.542526][T18205] ? kstrtouint+0x76/0xc0 [ 714.542574][T18205] audit_seccomp+0x61/0x100 [ 714.542606][T18205] ? __seccomp_filter+0x82d/0x1250 [ 714.542707][T18205] __seccomp_filter+0x83e/0x1250 [ 714.542821][T18205] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 714.542900][T18205] ? vfs_write+0x7e8/0x960 [ 714.542941][T18205] __secure_computing+0x82/0x150 [ 714.542975][T18205] syscall_trace_enter+0xcf/0x1e0 [ 714.543005][T18205] do_syscall_64+0xac/0x200 [ 714.543065][T18205] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 714.543095][T18205] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 714.543129][T18205] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 714.543154][T18205] RIP: 0033:0x7ff03d27f749 [ 714.543175][T18205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 714.543193][T18205] RSP: 002b:00007ff03bcdf038 EFLAGS: 00000246 ORIG_RAX: 00000000000001bb [ 714.543213][T18205] RAX: ffffffffffffffda RBX: 00007ff03d4d5fa0 RCX: 00007ff03d27f749 [ 714.543229][T18205] RDX: 0000000000000000 RSI: ffffffff80000800 RDI: ffffffffffffffff [ 714.543304][T18205] RBP: 00007ff03bcdf090 R08: 0000000000000000 R09: 0000000000000000 [ 714.543337][T18205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 714.543485][T18205] R13: 00007ff03d4d6038 R14: 00007ff03d4d5fa0 R15: 00007ffef55f6848 [ 714.543546][T18205] [ 714.875007][T18226] veth4: entered promiscuous mode [ 714.880165][T18226] veth4: entered allmulticast mode [ 714.931059][T18226] infiniband !yz!: set active [ 714.935815][T18226] infiniband !yz!: added team_slave_0 [ 714.969353][T18226] RDS/IB: !yz!: added [ 714.973453][T18226] smc: adding ib device !yz! with port count 1 [ 714.979724][T18226] smc: ib device !yz! port 1 has no pnetid [ 715.367889][T18248] IPVS: Error connecting to the multicast addr [ 715.548015][T18259] netlink: 'syz.3.10141': attribute type 10 has an invalid length. [ 715.978301][T18290] pimreg: entered allmulticast mode [ 715.984410][T18290] pimreg: left allmulticast mode [ 716.026971][T18295] netlink: 'syz.8.10155': attribute type 10 has an invalid length. [ 716.082354][T18299] lo speed is unknown, defaulting to 1000 [ 716.239461][T18311] __nla_validate_parse: 19 callbacks suppressed [ 716.239489][T18311] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10160'. [ 716.535985][T18331] netlink: 8 bytes leftover after parsing attributes in process `syz.9.10167'. [ 716.545040][T18331] netlink: 8 bytes leftover after parsing attributes in process `syz.9.10167'. [ 716.659051][T18340] netlink: 24 bytes leftover after parsing attributes in process `syz.9.10169'. [ 716.687015][T18340] IPVS: Error connecting to the multicast addr [ 716.986905][ T29] kauditd_printk_skb: 1509 callbacks suppressed [ 716.986922][ T29] audit: type=1326 audit(2000001311.091:207993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18332 comm="syz.5.10168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 717.075431][ T29] audit: type=1326 audit(2000001311.101:207994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18332 comm="syz.5.10168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 717.099352][ T29] audit: type=1326 audit(2000001311.101:207995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18332 comm="syz.5.10168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 717.123176][ T29] audit: type=1326 audit(2000001311.101:207996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18332 comm="syz.5.10168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 717.147219][ T29] audit: type=1326 audit(2000001311.101:207997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18332 comm="syz.5.10168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 717.171078][ T29] audit: type=1326 audit(2000001311.101:207998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18332 comm="syz.5.10168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 717.194951][ T29] audit: type=1326 audit(2000001311.101:207999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18332 comm="syz.5.10168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 717.218744][ T29] audit: type=1326 audit(2000001311.101:208000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18332 comm="syz.5.10168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 717.242560][ T29] audit: type=1326 audit(2000001311.101:208001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18332 comm="syz.5.10168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 717.266394][ T29] audit: type=1326 audit(2000001311.111:208002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18332 comm="syz.5.10168" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 717.375983][T18375] Process accounting resumed [ 717.498275][T18390] netlink: 4 bytes leftover after parsing attributes in process `syz.3.10175'. [ 717.840935][T18422] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10179'. [ 717.877039][T18422] 8021q: adding VLAN 0 to HW filter on device bond3 [ 718.126387][T18422] xt_TCPMSS: Only works on TCP SYN packets [ 718.143064][T18422] netlink: 172 bytes leftover after parsing attributes in process `syz.3.10179'. [ 718.300033][T18459] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10180'. [ 718.309152][T18459] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10180'. [ 718.330301][T18463] Process accounting resumed [ 718.485972][T18486] netlink: 8 bytes leftover after parsing attributes in process `syz.9.10185'. [ 718.509548][T18486] netlink: 'syz.9.10185': attribute type 10 has an invalid length. [ 718.706969][T18490] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 718.727457][T18490] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 719.929047][T18555] Process accounting resumed [ 720.021285][T18569] pimreg: entered allmulticast mode [ 720.031059][T18569] pimreg: left allmulticast mode [ 720.546761][T18596] IPVS: Error connecting to the multicast addr [ 720.706318][T18599] Process accounting resumed [ 721.019303][T18605] lo speed is unknown, defaulting to 1000 [ 721.855084][T18626] lo speed is unknown, defaulting to 1000 [ 722.018772][T18634] __nla_validate_parse: 10 callbacks suppressed [ 722.018791][T18634] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10224'. [ 722.054677][T18634] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10224'. [ 722.095932][T18636] netlink: 4 bytes leftover after parsing attributes in process `syz.9.10225'. [ 722.216015][ T29] kauditd_printk_skb: 666 callbacks suppressed [ 722.216033][ T29] audit: type=1326 audit(2000001316.321:208669): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18640 comm="syz.1.10228" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 722.299408][ T29] audit: type=1326 audit(2000001316.361:208670): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18640 comm="syz.1.10228" exe="/root/syz-executor" sig=0 arch=c000003e syscall=447 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 722.323443][ T29] audit: type=1326 audit(2000001316.361:208671): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18640 comm="syz.1.10228" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 722.347383][ T29] audit: type=1326 audit(2000001316.361:208672): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18640 comm="syz.1.10228" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 722.371346][ T29] audit: type=1326 audit(2000001316.361:208673): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18640 comm="syz.1.10228" exe="/root/syz-executor" sig=0 arch=c000003e syscall=260 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 722.395249][ T29] audit: type=1326 audit(2000001316.361:208674): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18640 comm="syz.1.10228" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 722.419304][ T29] audit: type=1326 audit(2000001316.361:208675): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18640 comm="syz.1.10228" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 722.443155][ T29] audit: type=1326 audit(2000001316.361:208676): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18640 comm="syz.1.10228" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 722.466945][ T29] audit: type=1326 audit(2000001316.361:208677): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18640 comm="syz.1.10228" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 722.490784][ T29] audit: type=1326 audit(2000001316.361:208678): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18640 comm="syz.1.10228" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 723.291060][T18727] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10236'. [ 723.301936][T18727] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10236'. [ 723.383446][T18736] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10237'. [ 723.397078][T18736] netlink: 'syz.1.10237': attribute type 10 has an invalid length. [ 723.405059][T18736] netlink: 40 bytes leftover after parsing attributes in process `syz.1.10237'. [ 723.416059][T18736] batman_adv: batadv0: Adding interface: veth1_vlan [ 723.422840][T18736] batman_adv: batadv0: The MTU of interface veth1_vlan is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 723.449540][T18736] batman_adv: batadv0: Interface activated: veth1_vlan [ 723.488596][T18751] netlink: 24 bytes leftover after parsing attributes in process `syz.1.10238'. [ 723.498212][T18751] IPVS: Error connecting to the multicast addr [ 723.568167][T18763] netlink: 100 bytes leftover after parsing attributes in process `syz.1.10240'. [ 723.577905][T18763] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18763 comm=syz.1.10240 [ 723.609184][T18763] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=18763 comm=syz.1.10240 [ 724.337023][ C1] GRED: Unable to relocate VQ 0x0 after dequeue, screwing up backlog [ 724.370737][T18828] lo speed is unknown, defaulting to 1000 [ 724.591921][T18847] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10250'. [ 724.886516][T18868] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18868 comm=syz.3.10257 [ 724.983962][T18868] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=18868 comm=syz.3.10257 [ 725.101462][T18879] pimreg: entered allmulticast mode [ 725.110468][T18879] pimreg: left allmulticast mode [ 725.207228][T18885] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18885 comm=syz.9.10262 [ 725.269825][T18885] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=18885 comm=syz.9.10262 [ 725.690644][T18916] pimreg: entered allmulticast mode [ 725.697365][T18916] pimreg: left allmulticast mode [ 726.045944][T18943] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=18943 comm=syz.5.10284 [ 726.085533][T18949] pimreg: entered allmulticast mode [ 726.092048][T18949] pimreg: left allmulticast mode [ 726.129974][T18943] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=18943 comm=syz.5.10284 [ 726.162405][T18952] FAULT_INJECTION: forcing a failure. [ 726.162405][T18952] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 726.175829][T18952] CPU: 1 UID: 0 PID: 18952 Comm: syz.8.10285 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 726.175907][T18952] Tainted: [W]=WARN [ 726.175913][T18952] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 726.175924][T18952] Call Trace: [ 726.175930][T18952] [ 726.175938][T18952] __dump_stack+0x1d/0x30 [ 726.175958][T18952] dump_stack_lvl+0xe8/0x140 [ 726.175976][T18952] dump_stack+0x15/0x1b [ 726.176004][T18952] should_fail_ex+0x265/0x280 [ 726.176078][T18952] should_fail+0xb/0x20 [ 726.176093][T18952] should_fail_usercopy+0x1a/0x20 [ 726.176184][T18952] _copy_to_user+0x20/0xa0 [ 726.176208][T18952] simple_read_from_buffer+0xb5/0x130 [ 726.176231][T18952] proc_fail_nth_read+0x10e/0x150 [ 726.176299][T18952] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 726.176326][T18952] vfs_read+0x1a8/0x770 [ 726.176422][T18952] ? __rcu_read_unlock+0x4f/0x70 [ 726.176446][T18952] ? __fget_files+0x184/0x1c0 [ 726.176469][T18952] ? finish_task_switch+0xad/0x2b0 [ 726.176560][T18952] ksys_read+0xda/0x1a0 [ 726.176584][T18952] __x64_sys_read+0x40/0x50 [ 726.176606][T18952] x64_sys_call+0x27c0/0x3000 [ 726.176627][T18952] do_syscall_64+0xd2/0x200 [ 726.176727][T18952] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 726.176752][T18952] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 726.176821][T18952] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 726.176855][T18952] RIP: 0033:0x7ff03d27e15c [ 726.176877][T18952] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 726.176901][T18952] RSP: 002b:00007ff03bcbe030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 726.176924][T18952] RAX: ffffffffffffffda RBX: 00007ff03d4d6090 RCX: 00007ff03d27e15c [ 726.176940][T18952] RDX: 000000000000000f RSI: 00007ff03bcbe0a0 RDI: 0000000000000006 [ 726.177000][T18952] RBP: 00007ff03bcbe090 R08: 0000000000000000 R09: 0000000000000000 [ 726.177014][T18952] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 726.177029][T18952] R13: 00007ff03d4d6128 R14: 00007ff03d4d6090 R15: 00007ffef55f6848 [ 726.177053][T18952] [ 726.540361][T18961] lo speed is unknown, defaulting to 1000 [ 726.931097][T18967] lo speed is unknown, defaulting to 1000 [ 727.340409][T18977] __nla_validate_parse: 12 callbacks suppressed [ 727.340431][T18977] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10294'. [ 727.596660][T18990] FAULT_INJECTION: forcing a failure. [ 727.596660][T18990] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 727.609947][T18990] CPU: 1 UID: 0 PID: 18990 Comm: syz.5.10298 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 727.609985][T18990] Tainted: [W]=WARN [ 727.609992][T18990] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 727.610005][T18990] Call Trace: [ 727.610012][T18990] [ 727.610021][T18990] __dump_stack+0x1d/0x30 [ 727.610049][T18990] dump_stack_lvl+0xe8/0x140 [ 727.610098][T18990] dump_stack+0x15/0x1b [ 727.610116][T18990] should_fail_ex+0x265/0x280 [ 727.610151][T18990] should_fail+0xb/0x20 [ 727.610166][T18990] should_fail_usercopy+0x1a/0x20 [ 727.610197][T18990] _copy_from_user+0x1c/0xb0 [ 727.610231][T18990] kstrtouint_from_user+0x69/0xf0 [ 727.610252][T18990] ? 0xffffffff81000000 [ 727.610265][T18990] ? selinux_file_permission+0x1e4/0x320 [ 727.610300][T18990] proc_fail_nth_write+0x50/0x160 [ 727.610343][T18990] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 727.610413][T18990] vfs_write+0x269/0x960 [ 727.610458][T18990] ? vfs_read+0x4e6/0x770 [ 727.610484][T18990] ? __rcu_read_unlock+0x4f/0x70 [ 727.610510][T18990] ? __fget_files+0x184/0x1c0 [ 727.610632][T18990] ksys_write+0xda/0x1a0 [ 727.610725][T18990] __x64_sys_write+0x40/0x50 [ 727.610759][T18990] x64_sys_call+0x2802/0x3000 [ 727.610789][T18990] do_syscall_64+0xd2/0x200 [ 727.610810][T18990] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 727.610896][T18990] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 727.610936][T18990] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 727.610957][T18990] RIP: 0033:0x7f5179cce1ff [ 727.610971][T18990] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 727.610997][T18990] RSP: 002b:00007f5178737030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 727.611022][T18990] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5179cce1ff [ 727.611038][T18990] RDX: 0000000000000001 RSI: 00007f51787370a0 RDI: 0000000000000003 [ 727.611050][T18990] RBP: 00007f5178737090 R08: 0000000000000000 R09: 0000000000000000 [ 727.611062][T18990] R10: 00000000000000d2 R11: 0000000000000293 R12: 0000000000000001 [ 727.611074][T18990] R13: 00007f5179f26038 R14: 00007f5179f25fa0 R15: 00007ffe99d0eb68 [ 727.611095][T18990] [ 727.887200][T18993] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10299'. [ 727.944904][ T29] kauditd_printk_skb: 2472 callbacks suppressed [ 727.944921][ T29] audit: type=1326 audit(2000002861.047:211149): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18974 comm="syz.3.10293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 727.996330][T18996] netlink: 24 bytes leftover after parsing attributes in process `syz.5.10300'. [ 728.005711][ T29] audit: type=1326 audit(2000002861.047:211150): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18974 comm="syz.3.10293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 728.011507][T18996] IPVS: Unknown mcast interface: ipvlan1 [ 728.030276][ T29] audit: type=1326 audit(2000002861.047:211151): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18974 comm="syz.3.10293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=102 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 728.059631][ T29] audit: type=1326 audit(2000002861.047:211152): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18974 comm="syz.3.10293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 728.083556][ T29] audit: type=1326 audit(2000002861.047:211153): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18974 comm="syz.3.10293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 728.107380][ T29] audit: type=1326 audit(2000002861.047:211154): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18974 comm="syz.3.10293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 728.131188][ T29] audit: type=1326 audit(2000002861.047:211155): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18974 comm="syz.3.10293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 728.155008][ T29] audit: type=1326 audit(2000002861.047:211156): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18974 comm="syz.3.10293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 728.179032][ T29] audit: type=1326 audit(2000002861.047:211157): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18974 comm="syz.3.10293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fef0d58df90 code=0x7ffc0000 [ 728.202878][ T29] audit: type=1326 audit(2000002861.087:211158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18974 comm="syz.3.10293" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 728.282655][T19002] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10301'. [ 728.295614][T19004] netlink: 8 bytes leftover after parsing attributes in process `syz.3.10302'. [ 728.307844][T19004] netlink: 'syz.3.10302': attribute type 10 has an invalid length. [ 728.315911][T19004] netlink: 40 bytes leftover after parsing attributes in process `syz.3.10302'. [ 728.391957][T19013] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10306'. [ 728.495925][T19022] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10310'. [ 728.514907][T19029] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10313'. [ 728.582524][T19037] netlink: 100 bytes leftover after parsing attributes in process `syz.1.10316'. [ 728.606010][T19037] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19037 comm=syz.1.10316 [ 728.663056][T19037] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=19037 comm=syz.1.10316 [ 729.655652][T19106] netlink: 'syz.3.10335': attribute type 10 has an invalid length. [ 729.808750][T19136] netlink: zone id is out of range [ 729.813992][T19136] netlink: zone id is out of range [ 729.827927][T19136] netlink: zone id is out of range [ 729.833500][T19136] netlink: zone id is out of range [ 729.856504][T19136] netlink: set zone limit has 8 unknown bytes [ 729.920313][T19151] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19151 comm=syz.9.10344 [ 729.971697][T19151] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=19151 comm=syz.9.10344 [ 730.037172][T19167] pimreg: entered allmulticast mode [ 730.056943][T19167] pimreg: left allmulticast mode [ 730.279933][T19194] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 730.366906][T19194] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 730.458821][T19194] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 730.521491][T19194] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 730.615219][T13656] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 730.634536][T13656] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 730.651371][T13656] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 730.671391][T13656] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 731.406207][T19304] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 731.981971][T19333] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19333 comm=syz.8.10367 [ 732.014659][T19333] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=19333 comm=syz.8.10367 [ 732.155608][T19343] netlink: 'syz.3.10371': attribute type 10 has an invalid length. [ 732.164241][T19337] Process accounting resumed [ 732.478775][T19371] FAULT_INJECTION: forcing a failure. [ 732.478775][T19371] name failslab, interval 1, probability 0, space 0, times 0 [ 732.491601][T19371] CPU: 1 UID: 0 PID: 19371 Comm: syz.1.10381 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 732.491635][T19371] Tainted: [W]=WARN [ 732.491642][T19371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 732.491653][T19371] Call Trace: [ 732.491661][T19371] [ 732.491670][T19371] __dump_stack+0x1d/0x30 [ 732.491733][T19371] dump_stack_lvl+0xe8/0x140 [ 732.491839][T19371] dump_stack+0x15/0x1b [ 732.491857][T19371] should_fail_ex+0x265/0x280 [ 732.491925][T19371] should_failslab+0x8c/0xb0 [ 732.491985][T19371] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 732.492033][T19371] ? __alloc_skb+0x101/0x320 [ 732.492073][T19371] __alloc_skb+0x101/0x320 [ 732.492128][T19371] ? audit_log_start+0x342/0x720 [ 732.492179][T19371] audit_log_start+0x3a0/0x720 [ 732.492206][T19371] ? kstrtouint+0x76/0xc0 [ 732.492248][T19371] audit_seccomp+0x48/0x100 [ 732.492307][T19371] ? __seccomp_filter+0x82d/0x1250 [ 732.492344][T19371] __seccomp_filter+0x83e/0x1250 [ 732.492432][T19371] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 732.492489][T19371] ? vfs_write+0x7e8/0x960 [ 732.492531][T19371] __secure_computing+0x82/0x150 [ 732.492559][T19371] syscall_trace_enter+0xcf/0x1e0 [ 732.492674][T19371] do_syscall_64+0xac/0x200 [ 732.492713][T19371] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 732.492768][T19371] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 732.492813][T19371] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 732.492842][T19371] RIP: 0033:0x7f5065a3f749 [ 732.492898][T19371] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 732.492916][T19371] RSP: 002b:00007f50644a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000076 [ 732.492939][T19371] RAX: ffffffffffffffda RBX: 00007f5065c95fa0 RCX: 00007f5065a3f749 [ 732.492994][T19371] RDX: 0000200000000280 RSI: 0000200000000240 RDI: 00002000000001c0 [ 732.493011][T19371] RBP: 00007f50644a7090 R08: 0000000000000000 R09: 0000000000000000 [ 732.493053][T19371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 732.493070][T19371] R13: 00007f5065c96038 R14: 00007f5065c95fa0 R15: 00007ffee21342a8 [ 732.493097][T19371] [ 732.754417][T19367] __nla_validate_parse: 21 callbacks suppressed [ 732.754439][T19367] netlink: 8 bytes leftover after parsing attributes in process `syz.9.10378'. [ 732.870136][T19381] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10383'. [ 732.935038][T19385] netlink: 8 bytes leftover after parsing attributes in process `syz.9.10384'. [ 732.955058][T19381] Process accounting resumed [ 732.961509][T19385] netlink: 'syz.9.10384': attribute type 10 has an invalid length. [ 732.969507][T19385] netlink: 40 bytes leftover after parsing attributes in process `syz.9.10384'. [ 733.158336][ T29] kauditd_printk_skb: 1732 callbacks suppressed [ 733.158396][ T29] audit: type=1326 audit(2000003379.276:212887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19384 comm="syz.8.10385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff03d27f749 code=0x7ffc0000 [ 733.188537][ T29] audit: type=1326 audit(2000003379.276:212888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19384 comm="syz.8.10385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff03d27f749 code=0x7ffc0000 [ 733.188624][ T29] audit: type=1326 audit(2000003379.276:212889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19384 comm="syz.8.10385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=102 compat=0 ip=0x7ff03d27f749 code=0x7ffc0000 [ 733.188664][ T29] audit: type=1326 audit(2000003379.276:212890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19384 comm="syz.8.10385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff03d27f749 code=0x7ffc0000 [ 733.188998][ T29] audit: type=1326 audit(2000003379.276:212891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19384 comm="syz.8.10385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=101 compat=0 ip=0x7ff03d27f749 code=0x7ffc0000 [ 733.284072][ T29] audit: type=1326 audit(2000003379.276:212892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19384 comm="syz.8.10385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff03d27f749 code=0x7ffc0000 [ 733.284115][ T29] audit: type=1326 audit(2000003379.276:212893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19384 comm="syz.8.10385" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7ff03d27df90 code=0x7ffc0000 [ 733.335720][ T29] audit: type=1326 audit(2000003379.356:212894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19388 comm="syz.3.10386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 733.359700][ T29] audit: type=1326 audit(2000003379.356:212895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19388 comm="syz.3.10386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=102 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 733.383631][ T29] audit: type=1326 audit(2000003379.356:212896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19388 comm="syz.3.10386" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 733.719286][T19423] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 733.784415][T19428] netlink: 12 bytes leftover after parsing attributes in process `syz.5.10396'. [ 733.894990][T19424] Process accounting resumed [ 734.257212][T19471] netlink: 12 bytes leftover after parsing attributes in process `syz.8.10409'. [ 734.268266][T19473] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10410'. [ 734.309920][T19471] 8021q: adding VLAN 0 to HW filter on device bond11 [ 734.374979][T19471] xt_TCPMSS: Only works on TCP SYN packets [ 734.387417][T19471] netlink: 172 bytes leftover after parsing attributes in process `syz.8.10409'. [ 734.419971][T19473] Process accounting resumed [ 734.564897][T19485] netlink: 52 bytes leftover after parsing attributes in process `syz.8.10413'. [ 734.861633][T19496] netlink: 100 bytes leftover after parsing attributes in process `syz.3.10417'. [ 734.899856][T19496] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19496 comm=syz.3.10417 [ 734.964237][T19496] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=19496 comm=syz.3.10417 [ 735.231870][T19530] FAULT_INJECTION: forcing a failure. [ 735.231870][T19530] name failslab, interval 1, probability 0, space 0, times 0 [ 735.244683][T19530] CPU: 1 UID: 0 PID: 19530 Comm: syz.9.10425 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 735.244776][T19530] Tainted: [W]=WARN [ 735.244784][T19530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 735.244807][T19530] Call Trace: [ 735.244815][T19530] [ 735.244823][T19530] __dump_stack+0x1d/0x30 [ 735.244846][T19530] dump_stack_lvl+0xe8/0x140 [ 735.244890][T19530] dump_stack+0x15/0x1b [ 735.244909][T19530] should_fail_ex+0x265/0x280 [ 735.244947][T19530] should_failslab+0x8c/0xb0 [ 735.244997][T19530] kmem_cache_alloc_noprof+0x50/0x480 [ 735.245061][T19530] ? alloc_empty_file+0x76/0x200 [ 735.245161][T19530] alloc_empty_file+0x76/0x200 [ 735.245277][T19530] path_openat+0x68/0x2170 [ 735.245358][T19530] ? __rcu_read_unlock+0x34/0x70 [ 735.245444][T19530] ? filemap_map_pages+0xd35/0xe30 [ 735.245472][T19530] ? css_rstat_updated+0xb7/0x240 [ 735.245521][T19530] do_filp_open+0x109/0x230 [ 735.245555][T19530] do_sys_openat2+0xa6/0x110 [ 735.245576][T19530] __x64_sys_openat+0xf2/0x120 [ 735.245636][T19530] x64_sys_call+0x2eab/0x3000 [ 735.245661][T19530] do_syscall_64+0xd2/0x200 [ 735.245689][T19530] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 735.245757][T19530] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 735.245807][T19530] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 735.245848][T19530] RIP: 0033:0x7f38984fdf90 [ 735.245866][T19530] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 735.245886][T19530] RSP: 002b:00007f3896f66b70 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 735.245938][T19530] RAX: ffffffffffffffda RBX: 0000000000066002 RCX: 00007f38984fdf90 [ 735.245950][T19530] RDX: 0000000000066002 RSI: 00007f3896f66c10 RDI: 00000000ffffff9c [ 735.245964][T19530] RBP: 00007f3896f66c10 R08: 0000000000000000 R09: 00236e6f6d627375 [ 735.245977][T19530] R10: 0000000000000000 R11: 0000000000000293 R12: cccccccccccccccd [ 735.245990][T19530] R13: 00007f3898756038 R14: 00007f3898755fa0 R15: 00007ffe1a232d18 [ 735.246012][T19530] [ 735.536229][T19541] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19541 comm=syz.3.10430 [ 735.597459][T19541] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=19541 comm=syz.3.10430 [ 735.715750][T19550] Process accounting resumed [ 735.839471][T19560] hub 9-0:1.0: USB hub found [ 735.859253][T19560] hub 9-0:1.0: 8 ports detected [ 735.878539][T19572] netlink: 'syz.8.10440': attribute type 39 has an invalid length. [ 735.974840][T19578] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19578 comm=syz.1.10442 [ 736.017349][T19578] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=19578 comm=syz.1.10442 [ 736.271537][T19598] syzkaller0: entered promiscuous mode [ 736.475531][T19649] netlink: 'syz.5.10452': attribute type 10 has an invalid length. [ 736.718213][T19673] 8021q: adding VLAN 0 to HW filter on device bond8 [ 737.112085][T19673] xt_TCPMSS: Only works on TCP SYN packets [ 737.194105][T19691] pimreg: entered allmulticast mode [ 737.220608][T19691] pimreg: left allmulticast mode [ 737.408642][T19715] FAULT_INJECTION: forcing a failure. [ 737.408642][T19715] name failslab, interval 1, probability 0, space 0, times 0 [ 737.421514][T19715] CPU: 0 UID: 0 PID: 19715 Comm: syz.5.10470 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 737.421597][T19715] Tainted: [W]=WARN [ 737.421604][T19715] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 737.421617][T19715] Call Trace: [ 737.421624][T19715] [ 737.421632][T19715] __dump_stack+0x1d/0x30 [ 737.421657][T19715] dump_stack_lvl+0xe8/0x140 [ 737.421684][T19715] dump_stack+0x15/0x1b [ 737.421754][T19715] should_fail_ex+0x265/0x280 [ 737.421798][T19715] should_failslab+0x8c/0xb0 [ 737.421857][T19715] __kmalloc_noprof+0xa5/0x570 [ 737.421893][T19715] ? security_prepare_creds+0x52/0x120 [ 737.421925][T19715] security_prepare_creds+0x52/0x120 [ 737.421970][T19715] prepare_creds+0x34a/0x4c0 [ 737.422006][T19715] copy_creds+0x8f/0x3f0 [ 737.422086][T19715] copy_process+0x658/0x2000 [ 737.422170][T19715] ? kstrtouint+0x76/0xc0 [ 737.422244][T19715] ? __rcu_read_unlock+0x4f/0x70 [ 737.422282][T19715] kernel_clone+0x16c/0x5c0 [ 737.422320][T19715] ? vfs_write+0x7e8/0x960 [ 737.422351][T19715] __x64_sys_clone+0xe6/0x120 [ 737.422419][T19715] x64_sys_call+0x119c/0x3000 [ 737.422474][T19715] do_syscall_64+0xd2/0x200 [ 737.422577][T19715] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 737.422614][T19715] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 737.422665][T19715] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 737.422693][T19715] RIP: 0033:0x7f5179ccf749 [ 737.422711][T19715] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 737.422730][T19715] RSP: 002b:00007f5178736fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 737.422750][T19715] RAX: ffffffffffffffda RBX: 00007f5179f25fa0 RCX: 00007f5179ccf749 [ 737.422762][T19715] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000640c7000 [ 737.422802][T19715] RBP: 00007f5178737090 R08: 0000000000000000 R09: 0000000000000000 [ 737.422818][T19715] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 737.422834][T19715] R13: 00007f5179f26038 R14: 00007f5179f25fa0 R15: 00007ffe99d0eb68 [ 737.422860][T19715] [ 737.847366][T19730] __nla_validate_parse: 19 callbacks suppressed [ 737.847381][T19730] netlink: 12 bytes leftover after parsing attributes in process `syz.9.10474'. [ 737.924908][T19730] 8021q: adding VLAN 0 to HW filter on device bond9 [ 738.169374][ T29] kauditd_printk_skb: 384 callbacks suppressed [ 738.169397][ T29] audit: type=1326 audit(2000003384.286:213281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.5.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 738.199557][ T29] audit: type=1326 audit(2000003384.286:213282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.5.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 738.257253][T19730] xt_TCPMSS: Only works on TCP SYN packets [ 738.291840][ T29] audit: type=1326 audit(2000003384.286:213283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.5.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 738.302137][T19730] netlink: 172 bytes leftover after parsing attributes in process `syz.9.10474'. [ 738.315766][ T29] audit: type=1326 audit(2000003384.286:213284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.5.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 738.348704][ T29] audit: type=1326 audit(2000003384.286:213285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.5.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 738.372784][ T29] audit: type=1326 audit(2000003384.286:213286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.5.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 738.396684][ T29] audit: type=1326 audit(2000003384.286:213287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.5.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 738.420835][ T29] audit: type=1326 audit(2000003384.296:213288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.5.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 738.444650][ T29] audit: type=1326 audit(2000003384.296:213289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.5.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 738.468468][ T29] audit: type=1326 audit(2000003384.296:213290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19736 comm="syz.5.10476" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f5179d02005 code=0x7ffc0000 [ 738.684925][T19765] netlink: 12 bytes leftover after parsing attributes in process `syz.8.10480'. [ 738.917050][T19789] netlink: 8 bytes leftover after parsing attributes in process `syz.8.10485'. [ 739.064246][T19807] netlink: 8 bytes leftover after parsing attributes in process `syz.8.10487'. [ 739.088546][T19807] netlink: 'syz.8.10487': attribute type 10 has an invalid length. [ 739.096569][T19807] netlink: 40 bytes leftover after parsing attributes in process `syz.8.10487'. [ 739.799663][T19912] netlink: 12 bytes leftover after parsing attributes in process `syz.9.10491'. [ 739.872550][T19917] netlink: 100 bytes leftover after parsing attributes in process `syz.3.10493'. [ 739.882507][T19917] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=19917 comm=syz.3.10493 [ 739.914963][T19917] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=19917 comm=syz.3.10493 [ 740.127487][T19943] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 740.259085][T19956] netlink: 12 bytes leftover after parsing attributes in process `syz.9.10504'. [ 740.373434][T19972] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10510'. [ 740.636126][T19988] Process accounting resumed [ 741.107104][T20059] program syz.8.10526 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 741.232195][T20078] pimreg: entered allmulticast mode [ 741.241557][T20078] pimreg: left allmulticast mode [ 741.262349][T20073] Process accounting resumed [ 741.408236][T20104] ipvlan2: entered promiscuous mode [ 741.519026][T20118] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 741.867254][T20164] Process accounting resumed [ 742.193455][T20209] netlink: 'syz.1.10546': attribute type 10 has an invalid length. [ 742.628040][T20238] Process accounting resumed [ 743.130900][T20285] __nla_validate_parse: 12 callbacks suppressed [ 743.130917][T20285] netlink: 4 bytes leftover after parsing attributes in process `syz.9.10570'. [ 743.159099][T20287] netlink: 8 bytes leftover after parsing attributes in process `syz.8.10571'. [ 743.211295][T20285] Process accounting resumed [ 743.241884][T20291] netlink: 100 bytes leftover after parsing attributes in process `syz.9.10573'. [ 743.251458][T20291] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20291 comm=syz.9.10573 [ 743.284342][T20291] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=20291 comm=syz.9.10573 [ 743.371143][ T29] kauditd_printk_skb: 1922 callbacks suppressed [ 743.371161][ T29] audit: type=1326 audit(2000003902.485:215211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20298 comm="syz.9.10576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 743.401931][ T29] audit: type=1326 audit(2000003902.515:215212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20298 comm="syz.9.10576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=447 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 743.426563][ T29] audit: type=1326 audit(2000003902.515:215213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20298 comm="syz.9.10576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 743.450490][ T29] audit: type=1326 audit(2000003902.515:215214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20298 comm="syz.9.10576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 743.474289][ T29] audit: type=1326 audit(2000003902.515:215215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20298 comm="syz.9.10576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 743.498181][ T29] audit: type=1326 audit(2000003902.515:215216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20298 comm="syz.9.10576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 743.522076][ T29] audit: type=1326 audit(2000003902.515:215217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20298 comm="syz.9.10576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f38984ff783 code=0x7ffc0000 [ 743.545971][ T29] audit: type=1326 audit(2000003902.515:215218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20298 comm="syz.9.10576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f38984fe1ff code=0x7ffc0000 [ 743.703161][ T29] audit: type=1326 audit(2000003902.545:215219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20298 comm="syz.9.10576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f38984ff7d7 code=0x7ffc0000 [ 743.727031][ T29] audit: type=1326 audit(2000003902.545:215220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20298 comm="syz.9.10576" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f38984fdf90 code=0x7ffc0000 [ 743.831578][T20325] netlink: 12 bytes leftover after parsing attributes in process `syz.1.10582'. [ 743.860605][T20325] lo speed is unknown, defaulting to 1000 [ 744.191581][T20334] netlink: 'syz.8.10583': attribute type 3 has an invalid length. [ 744.202580][T20337] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10584'. [ 744.307074][T20337] Process accounting resumed [ 744.328340][T20339] netlink: 8 bytes leftover after parsing attributes in process `syz.8.10585'. [ 744.396362][T20346] FAULT_INJECTION: forcing a failure. [ 744.396362][T20346] name failslab, interval 1, probability 0, space 0, times 0 [ 744.409057][T20346] CPU: 1 UID: 0 PID: 20346 Comm: syz.1.10588 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 744.409097][T20346] Tainted: [W]=WARN [ 744.409106][T20346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 744.409122][T20346] Call Trace: [ 744.409130][T20346] [ 744.409140][T20346] __dump_stack+0x1d/0x30 [ 744.409169][T20346] dump_stack_lvl+0xe8/0x140 [ 744.409231][T20346] dump_stack+0x15/0x1b [ 744.409298][T20346] should_fail_ex+0x265/0x280 [ 744.409340][T20346] should_failslab+0x8c/0xb0 [ 744.409374][T20346] kmem_cache_alloc_noprof+0x50/0x480 [ 744.409482][T20346] ? getname_flags+0x80/0x3b0 [ 744.409521][T20346] getname_flags+0x80/0x3b0 [ 744.409628][T20346] user_path_at+0x28/0x130 [ 744.409649][T20346] do_faccessat+0x380/0x800 [ 744.409687][T20346] __x64_sys_faccessat+0x41/0x50 [ 744.409791][T20346] x64_sys_call+0x950/0x3000 [ 744.409815][T20346] do_syscall_64+0xd2/0x200 [ 744.409842][T20346] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 744.409981][T20346] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 744.410024][T20346] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 744.410046][T20346] RIP: 0033:0x7f5065a3f749 [ 744.410083][T20346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 744.410107][T20346] RSP: 002b:00007f50644a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000010d [ 744.410133][T20346] RAX: ffffffffffffffda RBX: 00007f5065c95fa0 RCX: 00007f5065a3f749 [ 744.410148][T20346] RDX: 0000000000000005 RSI: 0000200000000000 RDI: 0000000000000003 [ 744.410160][T20346] RBP: 00007f50644a7090 R08: 0000000000000000 R09: 0000000000000000 [ 744.410219][T20346] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 744.410233][T20346] R13: 00007f5065c96038 R14: 00007f5065c95fa0 R15: 00007ffee21342a8 [ 744.410257][T20346] [ 744.655180][T20354] pimreg: entered allmulticast mode [ 744.667697][T20354] pimreg: left allmulticast mode [ 744.707109][T20362] 9pnet_fd: Insufficient options for proto=fd [ 745.056961][T20389] netlink: 8 bytes leftover after parsing attributes in process `syz.9.10599'. [ 745.112366][T20399] netlink: 8 bytes leftover after parsing attributes in process `syz.8.10601'. [ 745.281046][T20423] netlink: 100 bytes leftover after parsing attributes in process `syz.9.10602'. [ 745.283082][T20422] netlink: 24 bytes leftover after parsing attributes in process `syz.8.10603'. [ 745.295242][T20423] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20423 comm=syz.9.10602 [ 745.317174][T20422] IPVS: Error connecting to the multicast addr [ 745.355301][T20423] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=20423 comm=syz.9.10602 [ 745.408699][T20432] 9pnet_fd: Insufficient options for proto=fd [ 745.472146][T20443] pimreg: entered allmulticast mode [ 745.478338][T20443] pimreg: left allmulticast mode [ 745.494801][T20446] IPVS: Error connecting to the multicast addr [ 745.577254][T20457] netlink: 'syz.1.10610': attribute type 10 has an invalid length. [ 745.674424][T20471] 8021q: adding VLAN 0 to HW filter on device bond5 [ 745.938986][T20496] IPVS: Error connecting to the multicast addr [ 746.005188][T20471] xt_TCPMSS: Only works on TCP SYN packets [ 746.032120][T20510] 9pnet_fd: Insufficient options for proto=fd [ 746.337360][T20540] netlink: 'syz.1.10623': attribute type 3 has an invalid length. [ 746.355625][T20560] FAULT_INJECTION: forcing a failure. [ 746.355625][T20560] name failslab, interval 1, probability 0, space 0, times 0 [ 746.368361][T20560] CPU: 0 UID: 0 PID: 20560 Comm: syz.9.10625 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 746.368403][T20560] Tainted: [W]=WARN [ 746.368469][T20560] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 746.368485][T20560] Call Trace: [ 746.368494][T20560] [ 746.368504][T20560] __dump_stack+0x1d/0x30 [ 746.368533][T20560] dump_stack_lvl+0xe8/0x140 [ 746.368560][T20560] dump_stack+0x15/0x1b [ 746.368582][T20560] should_fail_ex+0x265/0x280 [ 746.368632][T20560] should_failslab+0x8c/0xb0 [ 746.368676][T20560] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 746.368714][T20560] ? __alloc_skb+0x101/0x320 [ 746.368772][T20560] __alloc_skb+0x101/0x320 [ 746.368804][T20560] ? audit_log_start+0x342/0x720 [ 746.368831][T20560] audit_log_start+0x3a0/0x720 [ 746.368861][T20560] ? kstrtouint+0x76/0xc0 [ 746.368903][T20560] audit_seccomp+0x48/0x100 [ 746.368945][T20560] ? __seccomp_filter+0x82d/0x1250 [ 746.368982][T20560] __seccomp_filter+0x83e/0x1250 [ 746.369103][T20560] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 746.369141][T20560] ? vfs_write+0x7e8/0x960 [ 746.369183][T20560] __secure_computing+0x82/0x150 [ 746.369218][T20560] syscall_trace_enter+0xcf/0x1e0 [ 746.369270][T20560] do_syscall_64+0xac/0x200 [ 746.369297][T20560] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 746.369393][T20560] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 746.369514][T20560] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 746.369542][T20560] RIP: 0033:0x7f38984ff749 [ 746.369558][T20560] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 746.369577][T20560] RSP: 002b:00007f3896f67038 EFLAGS: 00000246 ORIG_RAX: 000000000000003d [ 746.369596][T20560] RAX: ffffffffffffffda RBX: 00007f3898755fa0 RCX: 00007f38984ff749 [ 746.369608][T20560] RDX: 0000000040000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 746.369629][T20560] RBP: 00007f3896f67090 R08: 0000000000000000 R09: 0000000000000000 [ 746.369646][T20560] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 746.369669][T20560] R13: 00007f3898756038 R14: 00007f3898755fa0 R15: 00007ffe1a232d18 [ 746.369697][T20560] [ 746.803310][T20601] 8021q: adding VLAN 0 to HW filter on device bond10 [ 746.812272][T20567] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 746.821409][T20567] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 746.956308][T20601] xt_TCPMSS: Only works on TCP SYN packets [ 747.252091][T20653] 8021q: adding VLAN 0 to HW filter on device bond12 [ 747.289710][T20650] netlink: 'syz.9.10646': attribute type 3 has an invalid length. [ 747.450470][T20653] xt_TCPMSS: Only works on TCP SYN packets [ 747.760258][T20686] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 747.780992][T20686] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 748.126915][T19637] Bluetooth: hci0: Frame reassembly failed (-84) [ 748.128031][T20706] Process accounting resumed [ 748.141909][T20710] __nla_validate_parse: 23 callbacks suppressed [ 748.141924][T20710] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10669'. [ 748.164679][T20710] 8021q: adding VLAN 0 to HW filter on device bond4 [ 748.262216][T20718] netlink: 100 bytes leftover after parsing attributes in process `syz.8.10672'. [ 748.271956][T20718] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20718 comm=syz.8.10672 [ 748.285339][T20710] xt_TCPMSS: Only works on TCP SYN packets [ 748.291706][T20710] netlink: 172 bytes leftover after parsing attributes in process `syz.3.10669'. [ 748.305075][T20718] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=20718 comm=syz.8.10672 [ 748.331490][T20723] netlink: 100 bytes leftover after parsing attributes in process `syz.5.10674'. [ 748.341263][T20723] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20723 comm=syz.5.10674 [ 748.377820][T20723] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=20723 comm=syz.5.10674 [ 748.432980][T20732] pimreg: entered allmulticast mode [ 748.439170][T20732] pimreg: left allmulticast mode [ 748.535208][T20739] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10679'. [ 748.714362][ T29] kauditd_printk_skb: 1240 callbacks suppressed [ 748.714379][ T29] audit: type=1326 audit(2000004933.824:216459): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20752 comm="syz.3.10684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 748.745050][ T29] audit: type=1326 audit(2000004933.824:216460): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20752 comm="syz.3.10684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 748.769204][ T29] audit: type=1326 audit(2000004933.824:216461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20752 comm="syz.3.10684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 748.793069][ T29] audit: type=1326 audit(2000004933.824:216462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20752 comm="syz.3.10684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 748.816985][ T29] audit: type=1326 audit(2000004933.824:216463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20752 comm="syz.3.10684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=426 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 748.840867][ T29] audit: type=1326 audit(2000004933.824:216464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20752 comm="syz.3.10684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 748.864821][ T29] audit: type=1326 audit(2000004933.824:216465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20752 comm="syz.3.10684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 748.888741][ T29] audit: type=1326 audit(2000004933.824:216466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20752 comm="syz.3.10684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 748.912433][ T29] audit: type=1326 audit(2000004933.824:216467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20754 comm="syz.3.10684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7fef0d5c2005 code=0x7ffc0000 [ 748.936384][ T29] audit: type=1326 audit(2000004933.824:216468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20752 comm="syz.3.10684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fef0d58f749 code=0x7ffc0000 [ 749.114029][T20758] netlink: 12 bytes leftover after parsing attributes in process `syz.8.10685'. [ 749.131817][T20758] 8021q: adding VLAN 0 to HW filter on device bond13 [ 749.237668][T20768] netlink: 'syz.5.10689': attribute type 3 has an invalid length. [ 749.264679][T20758] xt_TCPMSS: Only works on TCP SYN packets [ 749.268229][T20771] netlink: 12 bytes leftover after parsing attributes in process `syz.5.10690'. [ 749.270976][T20758] netlink: 172 bytes leftover after parsing attributes in process `syz.8.10685'. [ 749.327073][T20773] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10691'. [ 749.339499][T20773] netlink: 'syz.5.10691': attribute type 10 has an invalid length. [ 749.347567][T20773] netlink: 40 bytes leftover after parsing attributes in process `syz.5.10691'. [ 749.456793][T20786] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20786 comm=syz.8.10695 [ 749.489111][T20786] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=20786 comm=syz.8.10695 [ 749.501254][T20792] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=20792 comm=syz.5.10697 [ 749.533113][T20792] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=20792 comm=syz.5.10697 [ 749.626241][T20807] 8021q: adding VLAN 0 to HW filter on device bond5 [ 749.641912][T20810] netlink: 'syz.8.10703': attribute type 10 has an invalid length. [ 749.746060][T20807] xt_TCPMSS: Only works on TCP SYN packets [ 749.881390][T20826] pimreg: entered allmulticast mode [ 749.889496][T20826] pimreg: left allmulticast mode [ 750.166936][ T7214] Bluetooth: hci0: command 0x1003 tx timeout [ 750.173158][ T7855] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 750.384298][T20848] 8021q: adding VLAN 0 to HW filter on device bond8 [ 750.439753][T20854] IPVS: Error connecting to the multicast addr [ 750.508407][T20848] xt_TCPMSS: Only works on TCP SYN packets [ 750.771682][T20873] Process accounting resumed [ 750.882854][T20879] FAULT_INJECTION: forcing a failure. [ 750.882854][T20879] name failslab, interval 1, probability 0, space 0, times 0 [ 750.895754][T20879] CPU: 0 UID: 0 PID: 20879 Comm: syz.8.10727 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 750.895791][T20879] Tainted: [W]=WARN [ 750.895799][T20879] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 750.895823][T20879] Call Trace: [ 750.895832][T20879] [ 750.895842][T20879] __dump_stack+0x1d/0x30 [ 750.895871][T20879] dump_stack_lvl+0xe8/0x140 [ 750.895958][T20879] dump_stack+0x15/0x1b [ 750.895974][T20879] should_fail_ex+0x265/0x280 [ 750.896006][T20879] should_failslab+0x8c/0xb0 [ 750.896032][T20879] kmem_cache_alloc_noprof+0x50/0x480 [ 750.896094][T20879] ? getname_flags+0x80/0x3b0 [ 750.896124][T20879] getname_flags+0x80/0x3b0 [ 750.896177][T20879] __se_sys_move_mount+0x2d6/0x490 [ 750.896207][T20879] __x64_sys_move_mount+0x67/0x80 [ 750.896281][T20879] x64_sys_call+0xcfe/0x3000 [ 750.896301][T20879] do_syscall_64+0xd2/0x200 [ 750.896326][T20879] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 750.896352][T20879] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 750.896442][T20879] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 750.896462][T20879] RIP: 0033:0x7ff03d27f749 [ 750.896476][T20879] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 750.896580][T20879] RSP: 002b:00007ff03bcdf038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ad [ 750.896598][T20879] RAX: ffffffffffffffda RBX: 00007ff03d4d5fa0 RCX: 00007ff03d27f749 [ 750.896610][T20879] RDX: ffffffffffffff9c RSI: 0000200000002040 RDI: ffffffffffffff9c [ 750.896621][T20879] RBP: 00007ff03bcdf090 R08: 0000000000000000 R09: 0000000000000000 [ 750.896632][T20879] R10: 0000200000000400 R11: 0000000000000246 R12: 0000000000000001 [ 750.896730][T20879] R13: 00007ff03d4d6038 R14: 00007ff03d4d5fa0 R15: 00007ffef55f6848 [ 750.896755][T20879] [ 751.133102][T20883] IPVS: Error connecting to the multicast addr [ 751.214935][T20888] 8021q: adding VLAN 0 to HW filter on device bond14 [ 751.435569][T20888] xt_TCPMSS: Only works on TCP SYN packets [ 751.770608][T20923] IPVS: Error connecting to the multicast addr [ 751.794734][T20910] Process accounting resumed [ 752.202282][T20958] pimreg: entered allmulticast mode [ 752.230698][T20958] pimreg: left allmulticast mode [ 752.270415][T20962] IPVS: Error connecting to the multicast addr [ 752.327829][T20966] pimreg: entered allmulticast mode [ 752.333956][T20966] pimreg: left allmulticast mode [ 752.365762][T20960] Process accounting resumed [ 752.704714][T20987] lo speed is unknown, defaulting to 1000 [ 752.968903][T21007] SELinux: failed to load policy [ 753.001938][T21004] Process accounting resumed [ 753.051723][T21009] 9pnet_fd: Insufficient options for proto=fd [ 753.147041][T21021] __nla_validate_parse: 31 callbacks suppressed [ 753.147060][T21021] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10775'. [ 753.246618][T21028] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10778'. [ 753.256788][T21011] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 753.269750][T21011] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 753.363819][T21034] FAULT_INJECTION: forcing a failure. [ 753.363819][T21034] name failslab, interval 1, probability 0, space 0, times 0 [ 753.376529][T21034] CPU: 1 UID: 0 PID: 21034 Comm: syz.3.10780 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 753.376571][T21034] Tainted: [W]=WARN [ 753.376628][T21034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 753.376641][T21034] Call Trace: [ 753.376650][T21034] [ 753.376661][T21034] __dump_stack+0x1d/0x30 [ 753.376689][T21034] dump_stack_lvl+0xe8/0x140 [ 753.376737][T21034] dump_stack+0x15/0x1b [ 753.376763][T21034] should_fail_ex+0x265/0x280 [ 753.376809][T21034] should_failslab+0x8c/0xb0 [ 753.376847][T21034] __kmalloc_node_noprof+0xaa/0x580 [ 753.376926][T21034] ? __vmalloc_node_range_noprof+0x410/0xed0 [ 753.376980][T21034] __vmalloc_node_range_noprof+0x410/0xed0 [ 753.377100][T21034] ? sel_write_load+0x158/0x380 [ 753.377120][T21034] vmalloc_noprof+0x82/0xc0 [ 753.377159][T21034] ? sel_write_load+0x158/0x380 [ 753.377183][T21034] sel_write_load+0x158/0x380 [ 753.377208][T21034] ? __pfx_sel_write_load+0x10/0x10 [ 753.377240][T21034] vfs_write+0x269/0x960 [ 753.377271][T21034] ? __rcu_read_unlock+0x4f/0x70 [ 753.377316][T21034] ? __fget_files+0x184/0x1c0 [ 753.377347][T21034] ksys_write+0xda/0x1a0 [ 753.377417][T21034] __x64_sys_write+0x40/0x50 [ 753.377450][T21034] x64_sys_call+0x2802/0x3000 [ 753.377476][T21034] do_syscall_64+0xd2/0x200 [ 753.377538][T21034] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 753.377575][T21034] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 753.377695][T21034] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 753.377724][T21034] RIP: 0033:0x7fef0d58f749 [ 753.377797][T21034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 753.377821][T21034] RSP: 002b:00007fef0bfef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 753.377856][T21034] RAX: ffffffffffffffda RBX: 00007fef0d7e5fa0 RCX: 00007fef0d58f749 [ 753.377921][T21034] RDX: 000000000000fffe RSI: 0000200000000000 RDI: 0000000000000006 [ 753.377938][T21034] RBP: 00007fef0bfef090 R08: 0000000000000000 R09: 0000000000000000 [ 753.377959][T21034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 753.377974][T21034] R13: 00007fef0d7e6038 R14: 00007fef0d7e5fa0 R15: 00007ffef18cefd8 [ 753.377995][T21034] [ 753.598751][T21034] syz.3.10780: vmalloc error: size 65536, failed to allocated page array size 128, mode:0xcc2(GFP_KERNEL|__GFP_HIGHMEM), nodemask=(null),cpuset=/,mems_allowed=0 [ 753.609890][T21038] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10781'. [ 753.615071][T21034] CPU: 1 UID: 0 PID: 21034 Comm: syz.3.10780 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 753.615118][T21034] Tainted: [W]=WARN [ 753.615203][T21034] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 753.615222][T21034] Call Trace: [ 753.615232][T21034] [ 753.615245][T21034] __dump_stack+0x1d/0x30 [ 753.615277][T21034] dump_stack_lvl+0xe8/0x140 [ 753.615307][T21034] dump_stack+0x15/0x1b [ 753.615332][T21034] warn_alloc+0x12b/0x1a0 [ 753.615446][T21034] ? should_failslab+0x8c/0xb0 [ 753.615493][T21034] __vmalloc_node_range_noprof+0x4b9/0xed0 [ 753.615559][T21034] ? sel_write_load+0x158/0x380 [ 753.615657][T21034] vmalloc_noprof+0x82/0xc0 [ 753.615763][T21034] ? sel_write_load+0x158/0x380 [ 753.615857][T21034] sel_write_load+0x158/0x380 [ 753.615883][T21034] ? __pfx_sel_write_load+0x10/0x10 [ 753.615910][T21034] vfs_write+0x269/0x960 [ 753.616005][T21034] ? __rcu_read_unlock+0x4f/0x70 [ 753.616044][T21034] ? __fget_files+0x184/0x1c0 [ 753.616167][T21034] ksys_write+0xda/0x1a0 [ 753.616205][T21034] __x64_sys_write+0x40/0x50 [ 753.616311][T21034] x64_sys_call+0x2802/0x3000 [ 753.616344][T21034] do_syscall_64+0xd2/0x200 [ 753.616374][T21034] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 753.616417][T21034] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 753.616516][T21034] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 753.616568][T21034] RIP: 0033:0x7fef0d58f749 [ 753.616589][T21034] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 753.616616][T21034] RSP: 002b:00007fef0bfef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 753.616643][T21034] RAX: ffffffffffffffda RBX: 00007fef0d7e5fa0 RCX: 00007fef0d58f749 [ 753.616662][T21034] RDX: 000000000000fffe RSI: 0000200000000000 RDI: 0000000000000006 [ 753.616736][T21034] RBP: 00007fef0bfef090 R08: 0000000000000000 R09: 0000000000000000 [ 753.616752][T21034] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 753.616770][T21034] R13: 00007fef0d7e6038 R14: 00007fef0d7e5fa0 R15: 00007ffef18cefd8 [ 753.616799][T21034] [ 753.616862][T21034] Mem-Info: [ 753.623944][T21038] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10781'. [ 753.635411][T21034] active_anon:10326 inactive_anon:8 isolated_anon:0 [ 753.635411][T21034] active_file:15556 inactive_file:12952 isolated_file:0 [ 753.635411][T21034] unevictable:0 dirty:502 writeback:0 [ 753.635411][T21034] slab_reclaimable:4377 slab_unreclaimable:45843 [ 753.635411][T21034] mapped:34304 shmem:4198 pagetables:2780 [ 753.635411][T21034] sec_pagetables:0 bounce:0 [ 753.635411][T21034] kernel_misc_reclaimable:0 [ 753.635411][T21034] free:1826740 free_pcp:18215 free_cma:0 [ 753.891087][T21034] Node 0 active_anon:41176kB inactive_anon:32kB active_file:62224kB inactive_file:51808kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:137184kB dirty:2016kB writeback:0kB shmem:16680kB kernel_stack:6384kB pagetables:11200kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 753.918747][T21034] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 753.948449][T21034] lowmem_reserve[]: 0 2881 7859 7859 [ 753.953788][T21034] Node 0 DMA32 free:2946728kB boost:0kB min:4132kB low:7060kB high:9988kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2950256kB mlocked:0kB bounce:0kB free_pcp:3528kB local_pcp:0kB free_cma:0kB [ 753.985037][T21034] lowmem_reserve[]: 0 0 4978 4978 [ 753.990135][T21034] Node 0 Normal free:4335876kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB free_highatomic:0KB active_anon:41292kB inactive_anon:32kB active_file:62224kB inactive_file:51808kB unevictable:0kB writepending:2016kB zspages:0kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:28348kB local_pcp:9516kB free_cma:0kB [ 754.023325][T21034] lowmem_reserve[]: 0 0 0 0 [ 754.027905][T21034] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 754.040716][T21034] Node 0 DMA32: 4*4kB (M) 3*8kB (M) 4*16kB (M) 2*32kB (M) 4*64kB (M) 2*128kB (M) 2*256kB (M) 3*512kB (M) 3*1024kB (M) 2*2048kB (M) 717*4096kB (M) = 2946728kB [ 754.056883][T21034] Node 0 Normal: 1561*4kB (ME) 4088*8kB (UME) 3231*16kB (UME) 2278*32kB (UME) 951*64kB (UME) 554*128kB (UME) 353*256kB (UM) 297*512kB (UME) 289*1024kB (UME) 80*2048kB (UM) 815*4096kB (UM) = 4335764kB [ 754.076682][T21034] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 754.086013][T21034] 32674 total pagecache pages [ 754.090803][T21034] 9 pages in swap cache [ 754.094971][T21034] Free swap = 124960kB [ 754.099489][T21034] Total swap = 124996kB [ 754.104011][T21034] 2097051 pages RAM [ 754.107874][T21034] 0 pages HighMem/MovableOnly [ 754.112571][T21034] 81087 pages reserved [ 754.188261][T21049] netlink: 12 bytes leftover after parsing attributes in process `syz.3.10784'. [ 754.209592][T21047] netlink: 4 bytes leftover after parsing attributes in process `syz.1.10783'. [ 754.226792][T21051] 9pnet_fd: Insufficient options for proto=fd [ 754.232164][T21049] 8021q: adding VLAN 0 to HW filter on device bond7 [ 754.258937][T21047] netlink: 24 bytes leftover after parsing attributes in process `syz.1.10783'. [ 754.289447][T21058] netlink: 8 bytes leftover after parsing attributes in process `syz.5.10787'. [ 754.337575][T21049] xt_TCPMSS: Only works on TCP SYN packets [ 754.356183][T21049] netlink: 172 bytes leftover after parsing attributes in process `syz.3.10784'. [ 754.375307][T21047] Process accounting resumed [ 754.424691][ T29] kauditd_printk_skb: 247 callbacks suppressed [ 754.424706][ T29] audit: type=1326 audit(2000005452.529:216716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21067 comm="syz.1.10790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 754.454966][ T29] audit: type=1326 audit(2000005452.529:216717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21067 comm="syz.1.10790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 754.486778][T21066] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 754.498907][T21066] netlink: 124 bytes leftover after parsing attributes in process `syz.5.10789'. [ 754.538165][ T29] audit: type=1326 audit(2000005452.569:216718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21067 comm="syz.1.10790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 754.562056][ T29] audit: type=1326 audit(2000005452.569:216719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21067 comm="syz.1.10790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 754.585953][ T29] audit: type=1326 audit(2000005452.569:216720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21067 comm="syz.1.10790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 754.609879][ T29] audit: type=1326 audit(2000005452.569:216721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21067 comm="syz.1.10790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 754.633799][ T29] audit: type=1326 audit(2000005452.609:216722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21067 comm="syz.1.10790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 754.657804][ T29] audit: type=1326 audit(2000005452.609:216723): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21067 comm="syz.1.10790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=429 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 754.681695][ T29] audit: type=1326 audit(2000005452.609:216724): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21067 comm="syz.1.10790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 754.705607][ T29] audit: type=1326 audit(2000005452.619:216725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21067 comm="syz.1.10790" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5065a3f749 code=0x7ffc0000 [ 754.755679][T21078] IPVS: Error connecting to the multicast addr [ 754.826616][T21081] 9pnet_fd: Insufficient options for proto=fd [ 754.978531][T21101] tipc: Started in network mode [ 754.983527][T21101] tipc: Node identity ac14140f, cluster identity 4711 [ 755.005155][T21101] tipc: New replicast peer: 255.255.255.83 [ 755.011094][T21101] tipc: Enabled bearer , priority 10 [ 755.065464][T21116] IPVS: Error connecting to the multicast addr [ 755.177382][T21130] FAULT_INJECTION: forcing a failure. [ 755.177382][T21130] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 755.190677][T21130] CPU: 1 UID: 0 PID: 21130 Comm: syz.3.10813 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 755.190712][T21130] Tainted: [W]=WARN [ 755.190718][T21130] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 755.190731][T21130] Call Trace: [ 755.190739][T21130] [ 755.190747][T21130] __dump_stack+0x1d/0x30 [ 755.190771][T21130] dump_stack_lvl+0xe8/0x140 [ 755.190862][T21130] dump_stack+0x15/0x1b [ 755.190881][T21130] should_fail_ex+0x265/0x280 [ 755.190954][T21130] should_fail+0xb/0x20 [ 755.190970][T21130] should_fail_usercopy+0x1a/0x20 [ 755.190992][T21130] _copy_from_user+0x1c/0xb0 [ 755.191030][T21130] __copy_msghdr+0x244/0x300 [ 755.191066][T21130] ___sys_sendmsg+0x109/0x1d0 [ 755.191104][T21130] __x64_sys_sendmsg+0xd4/0x160 [ 755.191130][T21130] x64_sys_call+0x191e/0x3000 [ 755.191219][T21130] do_syscall_64+0xd2/0x200 [ 755.191241][T21130] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 755.191270][T21130] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 755.191305][T21130] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 755.191444][T21130] RIP: 0033:0x7fef0d58f749 [ 755.191460][T21130] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 755.191546][T21130] RSP: 002b:00007fef0bfef038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 755.191566][T21130] RAX: ffffffffffffffda RBX: 00007fef0d7e5fa0 RCX: 00007fef0d58f749 [ 755.191579][T21130] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000003 [ 755.191592][T21130] RBP: 00007fef0bfef090 R08: 0000000000000000 R09: 0000000000000000 [ 755.191604][T21130] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 755.191690][T21130] R13: 00007fef0d7e6038 R14: 00007fef0d7e5fa0 R15: 00007ffef18cefd8 [ 755.191734][T21130] [ 755.427282][T21134] 9pnet_fd: Insufficient options for proto=fd [ 755.493951][T21144] pimreg: entered allmulticast mode [ 755.511219][T21144] pimreg: left allmulticast mode [ 755.553375][T21138] Process accounting resumed [ 755.592614][T21155] IPVS: Error connecting to the multicast addr [ 755.629262][ T3430] kernel write not supported for file [eventfd] (pid: 3430 comm: kworker/1:4) [ 755.712400][T21157] tipc: Enabling of bearer rejected, already enabled [ 755.790061][T21171] pim6reg: entered allmulticast mode [ 755.830335][T21171] pim6reg: left allmulticast mode [ 756.055431][T21188] IPVS: Error connecting to the multicast addr [ 756.077613][ T36] tipc: Node number set to 2886997007 [ 756.101063][T21179] Process accounting resumed [ 756.268121][T21208] netlink: 'syz.5.10839': attribute type 8 has an invalid length. [ 756.562756][T21228] IPVS: Unknown mcast interface: ipvlan1 [ 757.006512][T21266] IPVS: Unknown mcast interface: ipvlan1 [ 757.092629][T21276] pimreg: entered allmulticast mode [ 757.104259][T21276] pimreg: left allmulticast mode [ 757.321519][T21294] 8021q: adding VLAN 0 to HW filter on device bond9 [ 757.437383][T21303] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 757.483032][T21294] xt_TCPMSS: Only works on TCP SYN packets [ 757.498210][T21303] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 757.573361][T21303] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 757.589960][T21312] IPVS: Unknown mcast interface: ipvlan1 [ 757.659914][T21303] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 757.761803][T19637] netdevsim netdevsim9 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.785000][T19637] netdevsim netdevsim9 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.800090][T19637] netdevsim netdevsim9 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.817225][T19637] netdevsim netdevsim9 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 757.839859][T21338] 9pnet_fd: Insufficient options for proto=fd [ 757.904437][T21359] pimreg: entered allmulticast mode [ 757.919204][T21359] pimreg: left allmulticast mode [ 757.944413][T21364] netlink: 'syz.9.10880': attribute type 10 has an invalid length. [ 758.891136][T21474] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 758.902567][T21474] __nla_validate_parse: 26 callbacks suppressed [ 758.902597][T21474] netlink: 124 bytes leftover after parsing attributes in process `syz.1.10888'. [ 758.949884][T21481] tipc: Started in network mode [ 758.954823][T21481] tipc: Node identity 86b380319fe5, cluster identity 4711 [ 758.962383][T21481] tipc: Enabled bearer , priority 0 [ 758.971543][T21480] tipc: Disabling bearer [ 759.061761][T21494] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10892'. [ 759.074408][T21494] netlink: 'syz.1.10892': attribute type 10 has an invalid length. [ 759.082597][T21494] netlink: 40 bytes leftover after parsing attributes in process `syz.1.10892'. [ 759.335122][T21515] netlink: 4 bytes leftover after parsing attributes in process `syz.5.10899'. [ 759.390668][T21521] netlink: 100 bytes leftover after parsing attributes in process `syz.5.10900'. [ 759.411812][T21521] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21521 comm=syz.5.10900 [ 759.444718][ T29] kauditd_printk_skb: 1435 callbacks suppressed [ 759.444760][ T29] audit: type=1326 audit(2000005457.549:218161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21313 comm="syz.8.10875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7ff03d2b2005 code=0x7ffc0000 [ 759.505157][T21524] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=36 sclass=netlink_audit_socket pid=21524 comm=syz.5.10900 [ 759.518308][ T29] audit: type=1326 audit(2000005457.629:218162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21516 comm="syz.9.10897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 759.542310][ T29] audit: type=1326 audit(2000005457.629:218163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21516 comm="syz.9.10897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 759.572255][ T29] audit: type=1326 audit(2000005457.649:218164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21313 comm="syz.8.10875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=231 compat=0 ip=0x7ff03d27f749 code=0x7ffc0000 [ 759.596122][ T29] audit: type=1326 audit(2000005457.669:218165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21516 comm="syz.9.10897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=237 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 759.620023][ T29] audit: type=1326 audit(2000005457.679:218166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21516 comm="syz.9.10897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 759.644252][ T29] audit: type=1326 audit(2000005457.679:218167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21516 comm="syz.9.10897" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38984ff749 code=0x7ffc0000 [ 759.668368][ T29] audit: type=1326 audit(2000005457.679:218168): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21520 comm="syz.5.10900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5179ccf749 code=0x7ffc0000 [ 759.692252][ T29] audit: type=1326 audit(2000005457.679:218169): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21520 comm="syz.5.10900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5179ccf749 code=0x7ffc0000 [ 759.716518][ T29] audit: type=1326 audit(2000005457.679:218170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21520 comm="syz.5.10900" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5179ccf749 code=0x7ffc0000 [ 759.947028][T21512] ================================================================== [ 759.955187][T21512] BUG: KCSAN: data-race in file_update_time / inode_set_ctime_to_ts [ 759.963215][T21512] [ 759.965554][T21512] write to 0xffff8881004bb888 of 4 bytes by task 21509 on cpu 1: [ 759.973287][T21512] inode_set_ctime_to_ts+0x84/0x170 [ 759.978531][T21512] inode_set_ctime_current+0x1d6/0x770 [ 759.984042][T21512] inode_update_timestamps+0x84/0x270 [ 759.989488][T21512] file_update_time+0x20e/0x2b0 [ 759.994367][T21512] fault_dirty_shared_page+0xd9/0x3c0 [ 759.999844][T21512] handle_mm_fault+0x165d/0x2be0 [ 760.004862][T21512] __get_user_pages+0x102a/0x1ed0 [ 760.009898][T21512] __gup_longterm_locked+0x8ef/0xe60 [ 760.015196][T21512] pin_user_pages_remote+0x7e/0xb0 [ 760.020339][T21512] process_vm_rw+0x484/0x960 [ 760.024984][T21512] __x64_sys_process_vm_writev+0x78/0x90 [ 760.030665][T21512] x64_sys_call+0x2a80/0x3000 [ 760.035392][T21512] do_syscall_64+0xd2/0x200 [ 760.039935][T21512] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 760.045865][T21512] [ 760.048212][T21512] read to 0xffff8881004bb888 of 4 bytes by task 21512 on cpu 0: [ 760.055864][T21512] file_update_time+0xec/0x2b0 [ 760.060688][T21512] fault_dirty_shared_page+0xd9/0x3c0 [ 760.066195][T21512] handle_mm_fault+0x165d/0x2be0 [ 760.071202][T21512] __get_user_pages+0x102a/0x1ed0 [ 760.076243][T21512] __gup_longterm_locked+0x2fb/0xe60 [ 760.081545][T21512] gup_fast_fallback+0x1f5/0x1420 [ 760.086711][T21512] pin_user_pages_fast+0x5f/0x90 [ 760.091678][T21512] io_pin_pages+0xba/0x170 [ 760.096107][T21512] io_sqe_buffer_register+0x184/0x1430 [ 760.101599][T21512] io_sqe_buffers_register+0x2b1/0x540 [ 760.107123][T21512] __se_sys_io_uring_register+0x90e/0xf00 [ 760.112949][T21512] __x64_sys_io_uring_register+0x55/0x70 [ 760.118611][T21512] x64_sys_call+0x18a3/0x3000 [ 760.123332][T21512] do_syscall_64+0xd2/0x200 [ 760.127880][T21512] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 760.133805][T21512] [ 760.136131][T21512] value changed: 0x030ea2e0 -> 0x03a73962 [ 760.141861][T21512] [ 760.144189][T21512] Reported by Kernel Concurrency Sanitizer on: [ 760.150445][T21512] CPU: 0 UID: 0 PID: 21512 Comm: syz.1.10896 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 760.161919][T21512] Tainted: [W]=WARN [ 760.165989][T21512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 760.176066][T21512] ==================================================================