last executing test programs: 6m26.76243582s ago: executing program 32 (id=342): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000c80)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2d4}}, 0x4048010) 5m45.441230453s ago: executing program 33 (id=991): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r2}, 0x18) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x70bd2d, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{0x0, 0x300}, 0x93}, [{0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x3000000, 0x40000000}, {0x1, 0x0, 0x0, 0x4000000, 0x7, 0x80000}, {0x8000, 0x5, 0x0, 0xfffffffc, 0x5}, {0x0, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x800000, 0x0, 0x6}, {0x0, 0xc3}, {0x0, 0x5, 0x0, 0x0, 0x5}, {0x5}, {}, {0x0, 0x10}, {0x0, 0x470a, 0x0, 0x8000000}, {}, {0x2, 0x0, 0x0, 0x0, 0x6, 0x6}, {0x0, 0x0, 0x40000}, {}, {0x0, 0x0, 0x0, 0x1, 0x0, 0xfff}, {0x0, 0x0, 0x0, 0x8000000}, {}, {0x0, 0x0, 0x0, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x0, 0x0, 0x0, 0xfffffffc}, {0x20000}, {}, {0x0, 0x7, 0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x3}, {0x0, 0x8000, 0x0, 0x0, 0x5}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x60569add}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x2b25}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xffffffff, 0x9}, {0x0, 0x0, 0x0, 0x0, 0xfffff800}, {0x3, 0x0, 0x0, 0xfff}, {0x0, 0x0, 0x0, 0x800}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0xfffffffd}, {}, {0x0, 0x9, 0x0, 0xffffffff, 0x0, 0x2}, {}, {0x80}, {0x80}, {0x0, 0x0, 0x0, 0x5, 0x5}, {}, {0x0, 0x0, 0x8}, {0x0, 0x2, 0x0, 0x0, 0x9}, {0x62572899, 0x1ff, 0x8, 0x0, 0x3}, {}, {0x0, 0x5}, {0x0, 0x0, 0x0, 0x8510}, {0xffff}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x0, 0xfffefffd}, {0x0, 0x0, 0x0, 0x1}, {}, {0x5}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, {0x0, 0x7, 0x0, 0x20000000}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xb}, {0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x9}, {0x0, 0xfffffffc, 0x200, 0x0, 0x0, 0xfffffffc}, {0x0, 0x0, 0x0, 0x200}, {}, {0x4}, {}, {0x0, 0x0, 0x800}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, {0x0, 0x101, 0x0, 0x0, 0x0, 0xffffffff}, {}, {0x3, 0xfffffffe}, {0x0, 0x0, 0x0, 0x4, 0x9}, {}, {0x0, 0x0, 0x0, 0x0, 0x1, 0x7}, {0x0, 0xb}, {0x0, 0x0, 0x0, 0xffffffff}, {}, {0x0, 0x5, 0x0, 0x0, 0x0, 0xfffffffc}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x56}, {0x0, 0x0, 0x0, 0xec33, 0x0, 0x4}, {}, {0xb, 0x0, 0x0, 0x0, 0x0, 0xfe1}, {0x0, 0x0, 0x0, 0x0, 0x4}, {0x0, 0x0, 0xfffffffc}, {}, {0x0, 0xfffffffd}, {0x6}, {0x7f}, {}, {0x0, 0x8, 0x0, 0x0, 0xfffffffe}, {0x4, 0x2, 0x2000000, 0x2, 0x0, 0xfffffffe}, {0x0, 0x0, 0x0, 0x0, 0xe9d, 0x58a}, {0x2}, {0x2, 0x9, 0x20000000}, {0xfffffffc}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x80}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x292}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0xe600, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, {0x0, 0x5, 0x0, 0x7, 0x1}, {0x0, 0x5, 0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x80}, {0x10000000, 0x0, 0x0, 0x0, 0x1, 0xfffffffd}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x3}, {0x0, 0x0, 0x0, 0x0, 0x3, 0x7fffffff}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {0xfffffffb, 0x0, 0x0, 0x0, 0x8000}, {0x6, 0xffffffff, 0x0, 0x0, 0x0, 0xfffffffe}, {0x2d, 0x0, 0x10000}, {0x0, 0x0, 0x8000}, {0x20000000, 0x8000, 0x0, 0xe}, {0x3, 0x0, 0x10000}, {0x0, 0x80000000, 0x0, 0x7fff800, 0x4}, {0x0, 0x3}, {0xffffffff, 0x0, 0x0, 0x0, 0xd}], [{}, {}, {0x0, 0x1}, {0x1}, {}, {0x3}, {}, {0x0, 0x1}, {}, {}, {0x2}, {}, {}, {}, {0x0, 0x1}, {}, {0x3, 0x1}, {0x0, 0x1}, {}, {0x5, 0x1}, {0x0, 0x1}, {0x4}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {}, {0x4}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x1}, {}, {}, {}, {0x0, 0x1}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {}, {}, {0x0, 0x1}, {0x2}, {0x5}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x2}, {}, {0x0, 0x1}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {0x1}, {}, {0x5}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x2, 0x1}, {}, {}, {}, {}, {0x5, 0x1}, {}, {0x1}, {}, {0x2}, {}, {}, {0x4}, {0x3}, {}, {}, {}, {}, {0x0, 0x1}]}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xe68}}, 0x0) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)=ANY=[@ANYBLOB="640000000206010200000000000000000000000015000300686173683a69702c706f72742c6e6574000000000900020073797a32000000000500040000000000140007800800124000000000050015002200000005000500020000000500010006"], 0x64}}, 0x0) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000680)={&(0x7f0000000640)={0x1c, 0x3, 0x6, 0x401, 0x0, 0x0, {0x7, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x10) 4m47.050743545s ago: executing program 34 (id=2019): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r0, 0x0, 0x10000000}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYRESDEC=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_generic(0x10, 0x3, 0x10) syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/net\x00') r1 = syz_open_procfs$userns(0xffffffffffffffff, &(0x7f0000000180)) sendmsg$GTP_CMD_DELPDP(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000280)={&(0x7f0000000480)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16, @ANYBLOB="200026bd7000fbdbdf250100000008000400e0000001060006000400000005000d000800000008000700", @ANYRES32=r1, @ANYBLOB="3b98fda8e4c7c8d90e3c14472aa52aa44ec7596edadda90888cdaa02fb83eeb7bef15592e79e606fe79969ed7fa80adbe4d119deeffdcda7a6e1284994e265651cc15a5c4cf6e33ef267b9ee10e7f235918740150b47b00851e4f228ebe030fea8"], 0x34}, 0x1, 0x0, 0x0, 0x4000}, 0x10050) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8}, 0x0) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000040)='./bus\x00', 0x0, &(0x7f0000000740)=ANY=[], 0xfd, 0x1212, &(0x7f0000000cc0)="$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") truncate(&(0x7f0000000000)='./file2\x00', 0x0) 24.882929234s ago: executing program 6 (id=6426): r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x7, 0x4, 0x1000, 0x7, 0x3ff}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000240)={r1, 0x8}, 0x8) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r3) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) r4 = syz_open_procfs(r2, &(0x7f0000000040)='pagemap\x00') r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000280)='kfree\x00', r5}, 0x18) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r4, 0x89f2, &(0x7f00000005c0)={'syztnl0\x00', &(0x7f0000000540)={'ip6gre0\x00', 0x0, 0x2f, 0x4, 0x7, 0x5, 0x22, @ipv4={'\x00', '\xff\xff', @private=0xa010100}, @loopback, 0x7800, 0x7800, 0x1, 0x3}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x18, 0x0, &(0x7f00000002c0), &(0x7f0000000300)='GPL\x00', 0x4, 0xbe, &(0x7f00000003c0)=""/190, 0x41100, 0x1a, '\x00', r6, 0x0, r3, 0x8, &(0x7f0000000600)={0x5, 0x1}, 0x8, 0x10, &(0x7f00000006c0)={0x5, 0x8, 0x0, 0xd649}, 0x10, 0x0, 0x0, 0x2, &(0x7f0000000700)=[r3], &(0x7f0000000740)=[{0x1, 0x4, 0x7, 0x3}, {0x3, 0x5, 0x2, 0x7}], 0x10, 0x7}, 0x94) r7 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r7, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a50000000060a0b0400000000000000000200fffe2400048020000180070001006374000014000280080002400000001108000440000000130900010073797a30000000000900020073797a32"], 0x78}, 0x1, 0x0, 0x0, 0x840}, 0x0) syz_usb_disconnect(0xffffffffffffffff) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x10) ioctl$SG_IO(0xffffffffffffffff, 0x2285, &(0x7f00000000c0)={0x53, 0xfffffffe, 0x6, 0x2, @scatter={0x0, 0x40000, 0x0}, &(0x7f0000000080)="0000501effd4", 0x0, 0x800004, 0x10030, 0x1, 0x0}) 23.96245923s ago: executing program 6 (id=6439): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000840)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x199779d0e898bde7}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) r2 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x141301) ioctl$USBDEVFS_CONTROL(r2, 0xc0105500, &(0x7f00000000c0)={0x80, 0xa, 0x303, 0x700, 0x0, 0x6e9, 0x0}) 23.927237425s ago: executing program 6 (id=6441): mknod(&(0x7f0000000040)='./file0\x00', 0x8001422, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x18) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0xb, 0x1514, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x9, 0x5, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000021c0), 0x181000) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000c40)={{0x80}, 'port0\x00', 0x41, 0xfe8ee28a1d9fac77, 0x6, 0x6, 0x2, 0x40, 0x3, 0x0, 0x6, 0x3}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0xc0a85320, &(0x7f00000007c0)={{0x80, 0xea}, 'port0\x00', 0x3c, 0x40000, 0xd, 0x2, 0x20107, 0x6, 0x5, 0x0, 0x4, 0x3}) close(r0) open$dir(&(0x7f0000000140)='./file0\x00', 0x46263, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r2, 0x0, 0x1}, 0x18) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, 0x0) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f0000000080)="580000001400192340834b80040d8c560a067f020004000000000000000058000b4824ca945f64009400ff0325010ebc000b00000000008000f0fffeffe809005300fff5dd000000100001d80cf42098da03870000000000", 0x58}], 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b000000"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/1747], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000003c0)='rss_stat\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 23.056608015s ago: executing program 6 (id=6454): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$cont(0x20, r0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80000001}}, &(0x7f0000000780)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x18) add_key$fscrypt_v1(&(0x7f0000002a00), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000007c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa00", 0x28}, 0x48, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af144ca5418ad9fa255600"}, 0x48, 0xffffffffffffffff) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x101c08a, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x6, 0x2c1, &(0x7f0000001880)="$eJzs3T+LI2UcB/DfZLOTUYuksBLhBrzC6nCvE5sscgfiVh4p1EIX7w5kE4Q7WPAPxqtsbSwsfAWC4Au5xncg2Ap2rrAwMpOZzWSNMZHNyu1+Ps0++8zznfk9k4fsbJEnH748Obqfx8MnX/wSWZZEZxjDOEliEJ1ofBULht8EAPAsOymK+L2Y2SSXRES2vbIAgC1a7+9/d9786VLKAgC26N677729f3Bw550ssrg7+fp4VP5nX/6cHd9/GB/HOB7Ea9GP04jqQWE3qqeFsnm3KIppNy8N4uZkejwqk5MPntbn3/8tosrvRT8GVdfZ00aVf+vgzl4+08pPyzqer68/LPO3ox8vnoUX8reX5GOUxquvtOq/Ff34+aP4JMZxvypinv9yL8/fLL794/P3y/LKfDI9HvWqcXPFziW/NAAAAAAAAAAAAAAAAAAAAAAAXGG36r1zepHfiJuTsqvef2fnNNLy17wxWNyfZ5ZPmhO19wcqimJaxPetLQXzoh44z3fjpW57Y0EAAAAAAAAAAAAAAAAAAAC4vh5/+tnR4Xj84NGFNJrdALoR8ee9iP96nmGr50asHtyrr3k4Hnfq5sKYp2m7J3aaMUnEyjLKSVzQbfm3xnPna24aP/xYTnCTE2atnteXT3B3+/NqVtfRYbL8Wr1oerJ6kXyXRszHpLHmtdJ/OlTEJssvXXqov/Hc0xeqxnTFmEhWFfbGr7M7V/ck52eRVnd1aXy3brTi59bGWq97ZLP4398rkmq3jt723owAAAAAAAAAAAAAAAAAAOCam3/6d8nBJyujncJHgQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAC4Iubf/79BY1qH1xicxqPH//MUAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAuAb+CgAA//8HIVi7") r2 = socket$nl_route(0x10, 0x3, 0x0) unshare(0x20040600) quotactl_fd$Q_SYNC(r2, 0xffffffff80000100, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/../file0\x00', 0x2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000000ac0)) umount2(&(0x7f00000002c0)='./file0/../file0\x00', 0x9) ptrace$cont(0x1f, r0, 0xfcf, 0x9) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x2, {0x5, 0x0, "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", 0x7, 0x7, 0x4, 0xff, 0x6, 0x47, 0xd}}}, 0x128) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r4}, 0x10) mount$tmpfs(0x0, 0x0, 0x0, 0x1ac4a4, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000280), 0x40, r3}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 23.056444495s ago: executing program 35 (id=6453): r0 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$cont(0x20, r0, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000000)='./file0\x00', 0x101c08a, &(0x7f0000000640)=ANY=[@ANYBLOB="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"], 0x6, 0x2c1, &(0x7f0000001880)="$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") r1 = socket$nl_route(0x10, 0x3, 0x0) unshare(0x20040600) quotactl_fd$Q_SYNC(r1, 0xffffffff80000100, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/../file0\x00', 0x2) mount(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='devpts\x00', 0x5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000300)) umount2(&(0x7f00000002c0)='./file0/../file0\x00', 0x9) ptrace$cont(0x1f, r0, 0xfcf, 0x9) write$RDMA_USER_CM_CMD_ACCEPT(0xffffffffffffffff, &(0x7f0000000100)={0x8, 0x120, 0xfa00, {0x2, {0x5, 0x0, "c963665f7dfe08444250eaafc3ca661d6ba763e3060696a191bc47dfb5cffc54dad7e045831b81dd71c89b437e4e142e66dbbaaa38fe8ee0fda7347569c295a0ab91ebeb3b079c5d97364d18e173115e53b128d1e26112b6f16788ae1dfbe6f670a3f525f3ea054cc3098ad888174602bce2bec6c18fe0c637c5c0b89235162c91ff95129f9ccd8b59028f82f6685832ad1be37c45c2afc81918afa045b56d4ea94547de642cba29a2177ed36603476f7d2b370d6969cc0b51032ffa91278ded1b36e12cd6b07d3a118bc0cba9ca9f52b5d5a5ec5a13668081de7a31fa26a09b7bb333e2065fe3283568a058a0a4687d5dfcff497adfddb92e7a027c16867021", 0x7, 0x7, 0x4, 0xff, 0x6, 0x47, 0xd}}}, 0x128) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x0, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) mount$tmpfs(0x0, 0x0, 0x0, 0x1ac4a4, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100), &(0x7f0000000280), 0x40, r2}, 0x38) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00'}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) (fail_nth: 1) 22.900623645s ago: executing program 6 (id=6460): socket$kcm(0x29, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000010c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x46, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) (async) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21081e, &(0x7f0000000380)={[{@noblock_validity}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@jqfmt_vfsv0}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x10}}, {@noblock_validity}, {@usrjquota}]}, 0x1, 0x4f2, &(0x7f0000000600)="$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") (async) r4 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x9, 0x690bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x6, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) (async) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="0500000001000000070000000c"], 0x50) (async, rerun: 32) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000400)={0xffffffffffffffff, 0xe0, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000040)=[0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, &(0x7f0000000100)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x1a, &(0x7f0000000c00)=[{}, {}], 0x10, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0xd9, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) (rerun: 32) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000011c0)={0x11, 0xc, &(0x7f0000001000)=ANY=[@ANYRESOCT, @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000980)='sys_enter\x00', r7}, 0x18) nanosleep(&(0x7f00000001c0), 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x8, 0x5, &(0x7f0000000180)=ANY=[@ANYRES32=r5], &(0x7f0000000080)='syzkaller\x00', 0x2, 0x0, 0x0, 0xeb51a8ffd4e6d429, 0x48, '\x00', 0x0, @fallback=0x2c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r10 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$nfc(&(0x7f00000001c0), r10) sendmsg$NFC_CMD_DEP_LINK_UP(r10, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000700)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="01002abd7000fbdbdf250400000005000a0003000000080001"], 0x3c}, 0x1, 0x0, 0x0, 0x26040041}, 0x40) (async, rerun: 32) ioctl$PERF_EVENT_IOC_SET_BPF(r4, 0x40042408, r9) (async, rerun: 32) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000007000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r12, 0x0, 0x3}, 0x18) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="f9ffffff00e41ca58a59bb90bd4aff8fe01de4ab2649d1f9e25421f754d090ec5135a81a1f6da22b4048af2942ebc27f127698043de7be5228e257588adf61b9a938494d81d5dae53f8517b5da012153e811ce8d01c22ac207687dbe75941fe250c9afbd35462df1043e4e10eef0c7d909f435bb38a191172588164523568f400d1ccab780d99b", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x80000, 0x0, 0x0, 0x0, 0x1d, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r14 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000580)={&(0x7f0000000b00)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0xa, [@type_tag={0x1, 0x0, 0x0, 0x12, 0x4}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{0x6, 0x3}, {0x9, 0x3}, {0xa, 0x5}, {0x9, 0x1}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4, 0x3da}}, @ptr={0x0, 0x0, 0x0, 0x2, 0x1}, @func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xc, 0x1}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x3, 0x4, 0x1ff}}]}, {0x0, [0xa57dfc5d16851dac, 0x61, 0x30, 0x2e, 0x61, 0x2e, 0x0, 0x30]}}, &(0x7f0000000f00)=""/231, 0xaa, 0xe7, 0x0, 0x800, 0x10000}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c80)={0x18, 0x4, &(0x7f00000004c0)=ANY=[@ANYRESDEC=r13], &(0x7f0000000540)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, r14}, 0x94) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000e50003000000000085100000fcffffff250000001000000006000000faffffff95"], &(0x7f0000000140)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000}, 0x94) r15 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r15, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="38000000031401002cbd7000fcdbdf250900020073797a32000000000800410073697700140033006c6f"], 0x38}, 0x1, 0x0, 0x0, 0x44}, 0x810) sendmsg$RDMA_NLDEV_CMD_DELLINK(r15, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=ANY=[@ANYBLOB="18000000041401002dbd7000fedbdf250800010000000000ba30b28e994c1a08d1ca4eb6b8b4889cdd4e786eb807e04eb88b935d785f3d3201c580"], 0x18}, 0x1, 0x0, 0x0, 0x671ec167a4b72164}, 0x0) (async) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000001280)=ANY=[@ANYBLOB="74f297cfc3295a5eee1f4f7670d7605a90214c7a9bf440db18408f51495ec3d00371439b415e2a8f3a91fed1a660dd8a95520bc9b0b4ca0b14ce8bed8b999ee2b32aea74037939efc932947f4ffd7f55ead7f743d7c62e539ecdececd9f8ece31f50b7c8d6eb9df3bba16c10e48bd0b5168fd1801d7b0a4e79ad1c130f5ab074d1367cb19cdceae3293ed8206befde89bdabf9b96af09e41510eb2", @ANYRES32=0x0, @ANYBLOB="6b23a5f192e50a54ed42d40daf33026e09656555f5c1b0e8904a878ae7d54f0f625634faec3b0f4879430d6f5dc11c91e3454cb385702d26", @ANYRES16=r2, @ANYRES16=r8, @ANYRESDEC=r12], 0x20) (async) bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000280)={0x4}, 0x8) 22.590085124s ago: executing program 6 (id=6465): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000ab4000000060a01040000000000000000020000280900010073797a30000000000900020073797a320000000088000480100001800c000100636f756e7465720014000180090001006d6173710000000004000280600001800a0001006c696d6974000000500002800c00014000000000000000080800044000000001"], 0xdc}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRES64=r0], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x4, &(0x7f00000001c0)=ANY=[@ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c0000000206010100000000000000000000000005000100070000000900020073797a300000000014000780050015000000000008001240000000000d000300686173683a6e657400000000050005000a000000050004"], 0x5c}, 0x1, 0x0, 0x0, 0x2040000}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x25) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f0000000700)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0xf0, 0x0, 0x448, 0x448, 0xf0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@local, @ipv4=@dev={0xac, 0x14, 0x14, 0x2d}, 0x32, 0x36, 0x3}}}, {{@ipv6={@mcast1, @loopback, [], [], 'macvtap0\x00', 'ip6tnl0\x00', {}, {}, 0x6, 0x0, 0x5}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@broadcast}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_team\x00', 'syzkaller0\x00', {}, {0xff}, 0x2}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@unspec=@connmark={{0x30}}, @common=@inet=@socket1={{0x28, 'socket\x00', 0x3}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={{0x30}}, @common=@hbh={{0x48}, {0x0, 0x0, 0x0, [0x4, 0x5]}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x32}}}, {{@uncond, 0x0, 0x138, 0x178, 0x0, {}, [@common=@dst={{0x48}, {0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd]}}, @common=@dst={{0x48}, {0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8001]}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@dev}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6f0) sendmsg$IPSET_CMD_DESTROY(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="1c000000030605000000000000000000000000060500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x24040800}, 0x8d0) clock_nanosleep(0x9, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d8000000100081044e81f782db44b904021d006a0f000000e8fe55a1290015000600142603600e120900040044000000a80016000a0003402e60000000000000b94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516337ce06bbace8017cbec4c2ee5a7cef4090000001fb79119d0d68898b8a722a2643a5ee4ce1b14d6d930dfe1d9d3220a7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d9345", 0xd8}], 0x1}, 0x60044084) 22.552456339s ago: executing program 36 (id=6465): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000ab4000000060a01040000000000000000020000280900010073797a30000000000900020073797a320000000088000480100001800c000100636f756e7465720014000180090001006d6173710000000004000280600001800a0001006c696d6974000000500002800c00014000000000000000080800044000000001"], 0xdc}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRES64=r0], 0x48) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x4, &(0x7f00000001c0)=ANY=[@ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c0000000206010100000000000000000000000005000100070000000900020073797a300000000014000780050015000000000008001240000000000d000300686173683a6e657400000000050005000a000000050004"], 0x5c}, 0x1, 0x0, 0x0, 0x2040000}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r7}, 0x25) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r8, 0x29, 0x40, &(0x7f0000000700)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0xf0, 0x0, 0x448, 0x448, 0xf0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@local, @ipv4=@dev={0xac, 0x14, 0x14, 0x2d}, 0x32, 0x36, 0x3}}}, {{@ipv6={@mcast1, @loopback, [], [], 'macvtap0\x00', 'ip6tnl0\x00', {}, {}, 0x6, 0x0, 0x5}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@broadcast}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_team\x00', 'syzkaller0\x00', {}, {0xff}, 0x2}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@unspec=@connmark={{0x30}}, @common=@inet=@socket1={{0x28, 'socket\x00', 0x3}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={{0x30}}, @common=@hbh={{0x48}, {0x0, 0x0, 0x0, [0x4, 0x5]}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x32}}}, {{@uncond, 0x0, 0x138, 0x178, 0x0, {}, [@common=@dst={{0x48}, {0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd]}}, @common=@dst={{0x48}, {0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8001]}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@dev}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6f0) sendmsg$IPSET_CMD_DESTROY(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="1c000000030605000000000000000000000000060500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x24040800}, 0x8d0) clock_nanosleep(0x9, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d8000000100081044e81f782db44b904021d006a0f000000e8fe55a1290015000600142603600e120900040044000000a80016000a0003402e60000000000000b94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516337ce06bbace8017cbec4c2ee5a7cef4090000001fb79119d0d68898b8a722a2643a5ee4ce1b14d6d930dfe1d9d3220a7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d9345", 0xd8}], 0x1}, 0x60044084) 18.986637941s ago: executing program 7 (id=6497): bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x14, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='kfree\x00', r0, 0x0, 0x2}, 0x18) r1 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$UHID_CREATE2(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="0b00000073790101000000000000000000000000000af7f4f0c55de8ca0000000000000000000000000000000000000000f3c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000020000000000000030000000000000000000000004119202532aeecfcdbb73887feb3"], 0x138) write$UHID_DESTROY(r1, &(0x7f0000000340), 0x4) 18.906121172s ago: executing program 7 (id=6498): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) r0 = syz_open_dev$usbfs(&(0x7f00000001c0), 0x800000001fe, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0xfffffffffffffe42, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x82044, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r3, &(0x7f0000004200)='t', 0x1) sendfile(r3, r2, 0x0, 0x3ffff) sendfile(r3, r2, 0x0, 0x7ffff000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendto$inet6(r5, &(0x7f00000005c0)="f5", 0x1, 0x20000880, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) r6 = dup(r0) ioctl$USBDEVFS_CONTROL(r6, 0xc0185500, &(0x7f0000000280)={0x23, 0x3, 0x17, 0x1, 0x0, 0x1, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x18) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r7, 0x5609, &(0x7f0000000040)={0x0, 0x8001, 0x3}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105142, 0x2c) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)=ANY=[], 0x3a) 17.606671586s ago: executing program 7 (id=6508): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000ab4000000060a01040000000000000000020000280900010073797a30000000000900020073797a320000000088000480100001800c000100636f756e7465720014000180090001006d6173710000000004000280600001800a0001006c696d6974000000500002800c00014000000000000000080800044000000001"], 0xdc}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRES64=r0], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c0000000206010100000000000000000000000005000100070000000900020073797a300000000014000780050015000000000008001240000000000d000300686173683a6e657400000000050005000a000000050004"], 0x5c}, 0x1, 0x0, 0x0, 0x2040000}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x25) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r9, 0x29, 0x40, &(0x7f0000000700)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0xf0, 0x0, 0x448, 0x448, 0xf0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@local, @ipv4=@dev={0xac, 0x14, 0x14, 0x2d}, 0x32, 0x36, 0x3}}}, {{@ipv6={@mcast1, @loopback, [], [], 'macvtap0\x00', 'ip6tnl0\x00', {}, {}, 0x6, 0x0, 0x5}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@broadcast}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_team\x00', 'syzkaller0\x00', {}, {0xff}, 0x2}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@unspec=@connmark={{0x30}}, @common=@inet=@socket1={{0x28, 'socket\x00', 0x3}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={{0x30}}, @common=@hbh={{0x48}, {0x0, 0x0, 0x0, [0x4, 0x5]}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x32}}}, {{@uncond, 0x0, 0x138, 0x178, 0x0, {}, [@common=@dst={{0x48}, {0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd]}}, @common=@dst={{0x48}, {0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8001]}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@dev}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6f0) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="1c000000030605000000000000000000000000060500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x24040800}, 0x8d0) clock_nanosleep(0x9, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r10}, 0x18) r11 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d8000000100081044e81f782db44b904021d006a0f000000e8fe55a1290015000600142603600e120900040044000000a80016000a0003402e60000000000000b94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516337ce06bbace8017cbec4c2ee5a7cef4090000001fb79119d0d68898b8a722a2643a5ee4ce1b14d6d930dfe1d9d3220a7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d9345", 0xd8}], 0x1}, 0x60044084) 17.383274785s ago: executing program 7 (id=6516): syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000080)='./bus\x00', 0xa00004, &(0x7f0000000000)=ANY=[], 0x5, 0x81a, &(0x7f0000002540)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='tlb_flush\x00', r0}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 17.332601501s ago: executing program 7 (id=6518): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_emit_ethernet(0x3b6, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) r0 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r0) ptrace$cont(0x19, r0, 0xf, 0x0) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x5) ioctl$TCSBRKP(0xffffffffffffffff, 0x5425, 0x3) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r1, &(0x7f0000000100)={0xa, 0x0, 0x32e0, @initdev={0xfe, 0x88, '\x00', 0xe, 0x0}, 0x80}, 0x20) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xf8625000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) prctl$PR_SET_NAME(0xf, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00'}, 0x10) sendmsg$nl_xfrm(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001100)=ANY=[@ANYBLOB="84010000100001002bbd700000000000fc010000000000000000000000000000000000000000000000000000000000000000ecdf00"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"/316], 0x184}}, 0x4050) 16.654070677s ago: executing program 7 (id=6528): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r0}, &(0x7f0000000740), &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x14, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="0b00000073790101000000000000000000000000000af7f4f0c55de8ca0000000000000000000000000000000000000000f3c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000020000000000000030000000000000000000000004119202532aeecfcdbb73887feb3"], 0x138) write$UHID_DESTROY(r2, &(0x7f0000000340), 0x4) 16.610853053s ago: executing program 37 (id=6528): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r0}, &(0x7f0000000740), &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x14, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="0b00000073790101000000000000000000000000000af7f4f0c55de8ca0000000000000000000000000000000000000000f3c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000020000000000000030000000000000000000000004119202532aeecfcdbb73887feb3"], 0x138) write$UHID_DESTROY(r2, &(0x7f0000000340), 0x4) 13.353841326s ago: executing program 9 (id=6567): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x5}, 0x18) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/devices\x00', 0x0, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4094, 0xffe}], 0x1, 0xf0, 0xd215) 13.335143228s ago: executing program 9 (id=6568): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x50) r0 = syz_open_dev$usbfs(&(0x7f00000001c0), 0x800000001fe, 0x2) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0xfffffffffffffe42, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000400000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) syz_mount_image$ext4(&(0x7f00000003c0)='ext4\x00', &(0x7f00000002c0)='./bus\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@min_batch_time={'min_batch_time', 0x3d, 0x4}}]}, 0x1, 0x5d8, &(0x7f0000000c00)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x82044, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000004400)='./bus\x00', 0x1c1202, 0x0) write(r3, &(0x7f0000004200)='t', 0x1) sendfile(r3, r2, 0x0, 0x3ffff) sendfile(r3, r2, 0x0, 0x7ffff000) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r5, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x1}, 0x8) sendto$inet6(r5, &(0x7f00000005c0)="f5", 0x1, 0x20000880, &(0x7f0000000240)={0xa, 0x4e20, 0xfffffffc, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, 0x1c) r6 = dup(r0) ioctl$USBDEVFS_CONTROL(r6, 0xc0185500, &(0x7f0000000280)={0x23, 0x3, 0x17, 0x1, 0x0, 0x1, 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0, 0xffffffffffffffff, 0x0, 0x2}, 0x18) socket$nl_route(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) r7 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$VT_RESIZE(r7, 0x5609, &(0x7f0000000040)={0x0, 0x8001, 0x3}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105142, 0x2c) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$eJzs3c1vVFUbAPDnzkwLpe9rKzEqLkyjIZAoLS1g8GMBe0LwY+fGSgtBho/QGi2aWBLcmBg3LkhcuRD/CyW6dWXiwoUbV4akGsNGY3TMnbkzDO1MOy0dbu39/ZLbOeeeOz3nQp85Z+49ZyaAwhpLf5Qi9kTE5SRipK2sElnhWOO4O7+/fzrdkqjVXv0tiSTb1zw+yR6Hsyf/PRLx/TdJ7C6vrHdu4er56Wp19kqWn5i/cHlibuHqgXMXps/Onp29OPXc1NEjh48cnTx4X+dXakufuP7WOyMfnXz9i8/+Sia//OlkEsfi1zONsvbz2CxjMRZ/1GofLN+f/rse3ezKclJu/Z3clSzfwZZVyWJkMCIei5Eot/1vjsSHL+faOKCvaklEDSioRPxDQTXHAc339r29Dy71eVQCPAhLx9OfAx3iv9K4NhijMRARe5c9r8MlvQ1J6/ju25PX0y36dB0O6Gzx2o4stTz+k3psjsbOem7XndI913nTEcCp7DHd/8oG6x9blhf/8OAsXouIxzuN/9eO/zfa4v/NDdYv/gEAAAAAAGDz3DoeEc92uv9Xyu7N7Yyn6vf/ksb9vx/urhA8tgn1r33/r3R7E6oBOlg6HvFSx/m/rTm+o+Us9//GbMDkzLnq7MGIeCgi9sfAjjQ/uUodBz7efaNbWfv8v3RL62/OBczacbuy497nzEzPT9/POQMNS9cinqh0n/+T9v9Je/+fSV8PLvdYx+69N091K1s7/oF+qX0esa9j/5+0jklW/3yOifp4YKI5Kljpyfc++apb/eIf8pP2/7tWj//RpP3zeubW9/sHI+LQQqXWrXyj4//B5LVy8/en3p2en78yGTGYnFi5f2p9bYbtqhkPzXhJ43//06tf/2uN/9vicCgiFnus89F/hn/uVqb/h/yk8T+zrv5//Ympm6Nfd6u/t/7/cL1P35/tcf0PVtdrgObdTgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4LypFxP8iKY230qXS+HjEcEQ8ErtK1Utz88+cufT2xZm0rP79/6XmN/2ONPJJ8/v/R9vyU8vyhyLi4Yj4tDxUz4+fvlSdyfvkAQAAAAAAAAAAAAAAAAAAYIsY7rL+P/VLOe/WAX1XyR7FOxRPJe8GALkR/1Bc4h+KS/xDcYl/KK4Nxr/bBbAN6P+hqAZ6O2xnv9sB5EH/DwAAAAAA28qtF5+/kUTE4gtD9S01mJW1bgwO5dU6oJ9KeTcAyI05vFBcpv5AcfU4+RfYxpJW6s9ap/Lus/+T/jQIAAAAAAAAAAAAAFhh355bP665/h/Ylqz/h+Ky/h+Ky/p/KC7v8YG1VvFb/w8AAAAAAAAAAAAA+ZtbuHp+ulqdvSIhsdUSAxGxBZqRQ2Iw//DM+YUJAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABo+TcAAP//Swsk/Q==") bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000480)=ANY=[], 0x3a) 11.695531616s ago: executing program 9 (id=6586): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r0 = socket$caif_stream(0x25, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000580)='kmem_cache_free\x00', r2}, 0x10) writev(r0, &(0x7f0000000940)=[{&(0x7f00000003c0)="e5", 0x1}], 0x1) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet_sctp(0x2, 0x5, 0x84) close(r3) r4 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r4, 0x84, 0x6f, &(0x7f0000000300)={0x0, 0x10, &(0x7f0000000280)=[@in={0x2, 0x4e24, @private=0xa010100}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000240)=0x8) sendmsg$inet_sctp(r3, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000001c0)='F', 0x1}, {0x0, 0xe0}], 0x2, &(0x7f00000000c0)=[@sndinfo={0x20, 0x84, 0x2, {0xa, 0x4, 0x28, 0x200000b, r5}}], 0x20, 0x2400e044}, 0x0) 10.810871828s ago: executing program 9 (id=6608): syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000080)='./bus\x00', 0xa00004, &(0x7f0000000000)=ANY=[], 0x5, 0x81a, &(0x7f0000002540)="$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") bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 10.736874648s ago: executing program 9 (id=6609): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'batadv0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000380)) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000003c0)={0x0, @initdev, @empty}, &(0x7f0000000400)=0xc) r3 = socket(0x400000000010, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000400)=@newtfilter={0x38, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r5, {0x0, 0x4}, {}, {0x8, 0xf}}, [@filter_kind_options=@f_matchall={{0xd}, {0x4}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000010}, 0x20000010) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="24000000200001032abd7000ffd9df2502000000ff00000800000000080018004e214e21"], 0x24}, 0x1, 0x0, 0x0, 0x240480d4}, 0x4040) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000840)={0xffffffffffffffff, 0xe0, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f00000002c0)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x6, 0x4, &(0x7f0000000400)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000300)=[0x0, 0x0, 0x0, 0x0], 0x0, 0xcf, &(0x7f0000000600)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x48, 0x10, &(0x7f0000000280), &(0x7f00000006c0), 0x8, 0x44, 0x8, 0x8, &(0x7f0000000700)}}, 0x10) r8 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000600), 0x1, 0x0) write$P9_RWALK(r8, &(0x7f0000000640)=ANY=[@ANYBLOB='5\x00'], 0x30) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000400000009000000f8ffffff40000000", @ANYRES32=r8, @ANYBLOB="01000000000000000000000000000000000000006ad08cef48c1189dd5c37b4050f5688ec2d9c9cf89b320f89938b79cb7006d2012cca2a08d6c9bb010c3ba167a843c8d6bbfb25f4526306b0f261019fb2fbb498bff5270196b5dca88e850a4e559cb3d03acc3d8dbab4694", @ANYRES32=r7, @ANYRES32=r8, @ANYBLOB="0400000003000000040000000100"/28], 0x50) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000004c0)={0x0, @remote, @multicast2}, &(0x7f0000000500)=0xc) sendmsg$ETHTOOL_MSG_LINKINFO_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000880)={&(0x7f0000000c00)=ANY=[@ANYBLOB="f0000000", @ANYRES16=0x0, @ANYBLOB="000227bd7000fbdbdf25020000006800018008000100", @ANYRES32=r6, @ANYBLOB="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", @ANYRES16=r1, @ANYBLOB="0820030002000000b50b0200766c616e300000000000000000000800000000000000020076657468305fbb6f5f6873000000000000000000", @ANYRES32=r2, @ANYBLOB="2c036e2d63000000", @ANYRES32=r5, @ANYBLOB="08000100", @ANYRES64=r2, @ANYBLOB="08000100", @ANYRESDEC=r7, @ANYBLOB="08000300000f000008675c0001000000"], 0xf0}, 0x1, 0x0, 0x0, 0x8044}, 0x48081) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000010000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$tmpfs(0x0, &(0x7f00000000c0)='./file0\x00', 0x208a022, 0x0, 0x1, 0x0, &(0x7f0000000000)) pivot_root(&(0x7f00000001c0)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 10.523528385s ago: executing program 9 (id=6610): r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x7, 0x4, 0x1000, 0x7, 0x3ff}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000240)={r1, 0x8}, 0x8) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r3) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) syz_open_procfs(r2, &(0x7f0000000040)='pagemap\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f00000000c0)={0x53, 0xfffffffe, 0x6, 0x2, @scatter={0x0, 0x40000, 0x0}, &(0x7f0000000080)="0000501effd4", 0x0, 0x800004, 0x10030, 0x1, 0x0}) 10.48678183s ago: executing program 38 (id=6610): r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000100)={0x0, 0x7, 0x4, 0x1000, 0x7, 0x3ff}, &(0x7f0000000140)=0x14) setsockopt$inet_sctp_SCTP_AUTH_DELETE_KEY(r0, 0x84, 0x19, &(0x7f0000000240)={r1, 0x8}, 0x8) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000000c0)='task\x00') fchdir(r3) mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) syz_open_procfs(r2, &(0x7f0000000040)='pagemap\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SG_IO(r4, 0x2285, &(0x7f00000000c0)={0x53, 0xfffffffe, 0x6, 0x2, @scatter={0x0, 0x40000, 0x0}, &(0x7f0000000080)="0000501effd4", 0x0, 0x800004, 0x10030, 0x1, 0x0}) 9.745353974s ago: executing program 4 (id=6619): syz_open_dev$usbfs(&(0x7f00000001c0), 0x800000001fe, 0x2) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0xfffffffffffffe42, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0xce56fe61a68fc369, 0x8, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x1800403, &(0x7f0000000940), 0x2, 0x5ad, &(0x7f0000000180)="$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") 9.333320826s ago: executing program 4 (id=6625): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0x65, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x30}, [@initr0]}, &(0x7f0000000000)='GPL\x00'}, 0x80) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'vlan1\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000140)=ANY=[@ANYBLOB="540000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="15020000fe0f00001c00128009000100766c616e000000000c000280060001000000000008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES32, @ANYBLOB="080004"], 0x54}, 0x1, 0xba01, 0x0, 0x11}, 0x4000000) 9.277542903s ago: executing program 4 (id=6628): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18030000000000000000000000000000181100", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0xfd, 0x7ffc0002}]}) rt_sigtimedwait(&(0x7f0000000000)={[0xe]}, 0x0, 0x0, 0x8) 8.414218872s ago: executing program 4 (id=6637): syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000080)='./bus\x00', 0xa00004, &(0x7f0000000000)=ANY=[], 0x5, 0x81a, &(0x7f0000002540)="$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") syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 8.312054715s ago: executing program 4 (id=6639): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000095"], &(0x7f0000000280)='syzkaller\x00'}, 0x90) readahead(r0, 0x1, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r2}, 0x8) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x802, 0x0) ioctl$TUNSETOFFLOAD(r3, 0x2, 0x574b940b860987da) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f00000002c0)={0xffffffffffffffff, 0x20, &(0x7f0000000280)={&(0x7f0000000200)=""/46, 0x2e, 0x0, &(0x7f00000004c0)=""/193, 0xc1}}, 0x10) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000c80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r6}, 0x18) r7 = socket$vsock_stream(0x28, 0x1, 0x0) connect$vsock_stream(r7, &(0x7f0000000140)={0x28, 0x0, 0x0, @my=0x1}, 0x10) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x20, 0xc, &(0x7f00000001c0)=ANY=[@ANYRES32=r3], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r9}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r8}, 0x10) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000700)={r1, 0x58, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, 0x0}}, 0x10) r11 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000001240), 0x0, 0x0) mmap$usbfs(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x2, 0x12, r11, 0x0) ioctl$sock_inet6_SIOCSIFDSTADDR(r11, 0x8918, &(0x7f0000000940)={@remote, 0x6e, r10}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000740)={{0x1, 0x1, 0x18, r2, {0x80000000}}, './file0\x00'}) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0x14, &(0x7f00000005c0)=@raw=[@ldst={0x3, 0x0, 0x2, 0x8, 0xa, 0x10, 0x10}, @exit, @alu={0x4, 0x1, 0x9, 0x8, 0xa, 0x6c, 0x10}, @ldst={0x3, 0x1, 0x6, 0x1, 0x9, 0xffffffffffffffe0, 0xfffffffffffffff0}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xffff}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}}, @map_idx_val={0x18, 0x8, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x9}, @exit], &(0x7f0000000400)='syzkaller\x00', 0x2, 0x0, 0x0, 0x40f00, 0x8, '\x00', r10, @fallback=0x30, r12, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000780)={0x1, 0x0, 0x7, 0x8}, 0x10, r4, r9, 0x8, &(0x7f00000007c0)=[r1, r1, r1, r1], &(0x7f0000000800)=[{0x1, 0x4, 0x8, 0xb}, {0x4, 0x4, 0xb, 0x2}, {0x1, 0x3, 0x4, 0x7}, {0x0, 0x5, 0x6, 0x1}, {0x4, 0x5, 0xa, 0x5}, {0x3, 0x3, 0x1}, {0x2, 0x1, 0x8, 0xc}, {0x1, 0x1, 0x7, 0xc}], 0x10, 0x4}, 0x94) r13 = socket$netlink(0x10, 0x3, 0x0) sendmsg(r13, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000140)="5500000018007f5f00fe01b2a4a2809302060000ff41fd01020400000a00120002002800000019002d007fffffff0022de1330d54400009b84136ef75afb83de066a5900e1baac968300000000f2ff000001000000", 0x55}], 0x1, 0x0, 0x0, 0x7a000000}, 0x0) 7.56653471s ago: executing program 4 (id=6643): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x5}, 0x18) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/devices\x00', 0x0, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4094, 0xffe}], 0x1, 0xf0, 0xd215) 7.56642784s ago: executing program 39 (id=6643): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x5}, 0x18) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/bus/input/devices\x00', 0x0, 0x0) preadv(r2, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4094, 0xffe}], 0x1, 0xf0, 0xd215) 7.463183923s ago: executing program 0 (id=6646): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r0}, &(0x7f0000000740), &(0x7f0000000780)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x14, 0x22c7, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$UHID_CREATE2(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="0b00000073790101000000000000000000000000000af7f4f0c55de8ca0000000000000000000000000000000000000000f3c800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ff00000000000000000000000000000020000000000000030000000000000000000000004119202532aeecfcdbb73887feb3"], 0x138) 7.374798854s ago: executing program 0 (id=6647): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYRES8=0x0], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000013000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000680)='kmem_cache_free\x00', r1}, 0x18) (async) bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x48) (async, rerun: 64) kexec_load(0x0, 0x0, 0x0, 0x0) (async, rerun: 64) creat(0x0, 0xad) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) fstatfs(r2, &(0x7f0000000380)=""/67) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x8, 0x0, 0x0) (async) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000), 0x8) (async, rerun: 64) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000040)={0x11, 0x4, &(0x7f0000000b00)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7d, '\x00', 0x0, 0x2}, 0x94) (rerun: 64) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async, rerun: 32) bpf$MAP_UPDATE_BATCH(0x1a, 0x0, 0x0) (async, rerun: 32) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000080)=ANY=[@ANYBLOB="18112391dfcff87144000000070000009500000000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000080000000000000000000180100002536702500000000690000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000011000000850000000600000095"], &(0x7f0000000100)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x9}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000040)='percpu_alloc_percpu\x00', r4}, 0x10) (async, rerun: 32) r5 = bpf$MAP_CREATE(0x100000000000000, &(0x7f0000000140)=ANY=[@ANYBLOB="0a0000000000b30000007f010002000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) (rerun: 32) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000008000000000000000000004850000006d00000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) getpeername$packet(0xffffffffffffffff, &(0x7f0000000500)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000540)=0x14) (async) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000f00)={r7, 0xe0, &(0x7f0000000e00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000c40)=[0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, &(0x7f0000000c80)=[0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000cc0)=[0x0, 0x0, 0x0, 0x0], 0x0, 0x7f, &(0x7f0000000d00)=[{}], 0x8, 0x10, &(0x7f0000000d40), &(0x7f0000000d80), 0x8, 0xd2, 0x8, 0x8, &(0x7f0000000dc0)}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000fc0)={0x16, 0x5, &(0x7f0000000340)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6}, [@map_val={0x18, 0x1, 0x2, 0x0, r6, 0x0, 0x0, 0x0, 0x101}]}, &(0x7f0000000440)='syzkaller\x00', 0x4, 0x65, &(0x7f0000000480)=""/101, 0x41000, 0x6f, '\x00', r8, @fallback=0x33, 0xffffffffffffffff, 0x8, &(0x7f0000000bc0)={0x7, 0x5}, 0x8, 0x10, &(0x7f0000000c00)={0x4, 0xf, 0x5, 0x7}, 0x10, r9, r3, 0x0, &(0x7f0000000f80)=[r5, r5, r5], 0x0, 0x10, 0x2}, 0x94) (async, rerun: 32) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000380)='kfree\x00', r7}, 0x18) (async, rerun: 32) r10 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r10, 0x6, 0x0, 0x0, 0x0) r11 = fsmount(r10, 0x0, 0x6) symlinkat(&(0x7f0000000400)='./file0/../file0\x00', r11, &(0x7f0000000080)='./file0\x00') (async) set_mempolicy_home_node(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x2, 0x0) (async) readlinkat(r11, &(0x7f00000001c0)='./file0/../file0\x00', &(0x7f0000000200)=""/198, 0xc6) 7.374534934s ago: executing program 0 (id=6648): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x3, 0x13, &(0x7f0000000340)=@framed={{0x18, 0x2, 0x0, 0x0, 0x2}, [@printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x475}}, @printk={@i, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}, {0x85, 0x0, 0x0, 0x73}}]}, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffff0000}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r0, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x48) r1 = socket$inet6_mptcp(0xa, 0x1, 0x106) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @local, 0xb}, 0x1c) listen(r1, 0xfffffffb) syz_emit_ethernet(0x4e, &(0x7f0000001600)={@local, @local, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, '\x00', 0x18, 0x6, 0x0, @remote, @local, {[], {{0x1, 0x4e22, 0x41424344, 0x41424344, 0x0, 0x2, 0x6, 0xc2, 0x0, 0x0, 0x0, {[@mss={0x1e, 0x4, 0x305}]}}}}}}}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_TEST(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0xb, 0x6, 0x801, 0x0, 0x0, {0x6, 0x0, 0x2}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_DATA={0x4}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz1\x00'}]}, 0x2c}}, 0x4800) 7.359076386s ago: executing program 0 (id=6649): syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000080)='./bus\x00', 0xa00004, &(0x7f0000000000)=ANY=[], 0x5, 0x81a, &(0x7f0000002540)="$eJzs3V9oHNe5APBvFNmWlXt9Q+7F1xjHmTi5YIOjrGRHQQRuslmN5ElWu7q7q2BzKYmpZWMsJ8FuoPZDHb+0tKSE0oc+JnnoS/tU+tJSaKCFtk+F9rVvgUAfkpaWFtoSUJmd1T9LK/mPYpv09xPeOTPnzJxvjtbz7WiZmQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIqlNViqjSdTzxtzJtL/aZKs5s0n90vY+KF7+9ugHW/YbkRT/Ymgo9pWL9v3XSvXe4uVQHCjnDsRQMRmKqw/ufejZ/xwcWFp/k4C22+BGCy9fuXrh9MLC/KW7GMhn4Bs/WTP73eG4yZGdzhp5u5nPVKezNG8304nx8cpTJ6ba6VRez9qn2p1sJq21smqn2UoP144s/sfExLE0GznVnGtMT1brWTpYO5KOTkw88+RYpTKevjgym1Vb7WbjqRdH2rUTeb2eN6aLFdOiumjzTPFGfCnvpJ2sOpOmZ88vzB9bG9LudUEWjUbXLPl0cfXcgSce+ujND/98fn5sq90dq4yNjY6OjY2OJxFRqQyuLHh64ulnKpXByg1iXYu7+qblPrTtx3C4XQO9/B/1yKMRc3Ey0g1/ajEZrWjGTKy8gVfX9/QS/wf/89Qffr1Zv++U+f/6qkgO7FuZ2R/d/H+wnDvYL/+Xfe/c1Sfmz+pnZf8vx5W4GhfidCzEQszHpdXtdi2X9txZf8n2xT5wa+2Ht6ifjiwakUc7mpHHTFS7S9LekjQmYjzGoxKvxImYinakMRV51COLdpyKdnQi676jatGKLKrRiWa0Io3DUYsjkcZoTMREHIs0shiJU9GMuWjEdExGtbuVs3G+O+7Hbohr71de/fG533z0bve3tdRodLMhfiui2+hPmzRal8zlf25ZRPx8G47ccOcWl/I/AAAA8LmVdL9jL87/d8Qj3dJUXs/+f4u1BouXt+5OhAAAAMCd6n7zf6CY7ChKj0RSnP9X1jb6/o57ExwAAACwLZLuNXZJRAzHo2Vp6XKpyr2ODQAAANge3e//DxaT4Yhru5cWO/8HAACAz5GXf9gr3HiP/Q9fLGaTJAZmdyU//WO0WjuS4++dfCK5WC0qqhcfKNfrTV5e3mJnan8SvRsKdrc1Pnj1wWJ+sJatXEfw6a5y+kn3df/gcsXaOJ7v/UUiSZIigOuzfQOINQHs6e3FcgDduXg7HivbPHamnJ5ZqinvKDw8ldezkVqz/uxoVKt7BjrZyc6br53/cnR3/+uNmT1JnD2/MD/yxdcXznRj6d7A+PrF3v6uu4/iJrEs9kYgHll/d+NiUzu6F2L0+h0u+62s3v+By3uKwsAt9PnVOPRv3TaHhsu2w2v3f6joc3Sk394Pl/s3um7PB9e9r3pRnOrN3RDF4+XSxw8/Xk42iGJssyiKsRhbHUVvEG5tLDaMIh6KiHcfu3byr79oJtmxraI4dodRANwrZ7t3/SmyUJmOyiz0j8VSkf9brR07Y03eKVe42aNc0u2l9ySfc29vfCf/m8/uf1/c5Ih+uGxzuPw8Mbh/g7xS2eCI/sb5N37ZO6If/9533vvCwV/94Lbz+tBSk+XvUh7+2YMD0Y1idy+Kq72a1o7km8uZpMyq7xfL3+/bb7s+lhQfFx740sU3Yu/lK1efPH/x9Ln5c/OvjY0dG68cr1SeTpLeL2+x+4lB7gFgA4fiYJnI+z5jp89TeLofAMrcfXyzs+oHInl4+ZKCIie+HgtxJo52rzaIiEc37ne4XOcvxaeSo3GobPt/vaBvOGsdXvWEl6NbnFvujOi1Hduy7fCqx8us+O9vfYa/DgC4Kw5tkYf75v9V5+5HtzjvHl51SeHROFK2PbIUQf9cHhHP3d3RAIB/DVnrk2S487Wk1cpnXxmdmBitdk5kaatZeylt5ZPTWZo3OlkrBquN6SydbTU7zVqzXhReziezdtqem51ttjrpVLOVzjbb+cnuk9/T3qPf29lMtdHJa+3ZelZtZ2mt2ehUa510Mm/X0tm5F+p5+0TW6q7cns1q+VReq3byZiNtN+datWwkTdtZtqphPpk1OvlUXhQb6Wwrn6m2rkdEfW4mSyezdq2Vz3aa5QaX+sobU83WTHezv99zr0cbAO4Pl69cvXB6YWH+0k0Vvh0Ra5b87mbW6t/7kBsLA8A9sJKlP/73G+v88R0AAAAAAAAAAAAAAO4Pt3b9300Udm/vBof6VP3vnoX5S4vXItZXJYuLi7fQxe7Yos3O3lBt80DdlcL1bdnOQGw0zvdPIelf9epzz13ot/oL1/ad6POWKC0v2fJ/ymDRurzU9a2Pd/7onbLq+dvanYFbX+u3EXEbfS0mm7S5d8ckAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOjnnwEAAP//vWJmIg==") syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) 7.286993175s ago: executing program 0 (id=6650): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1600000000000000040000000700000000000000", @ANYRES32=0x1], 0x50) socket$kcm(0xa, 0x5, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x2, 0x1, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000380)="c9", 0x1}], 0x1}, 0x865) openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$inet(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bond0\x00', 0x0}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)=@newqdisc={0xa4, 0x24, 0xf0b, 0x70bd2b, 0x0, {0x0, 0x0, 0x12, r4, {}, {0xffff, 0xffff}, {0x2, 0xd}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x74, 0x2, [@TCA_TAPRIO_ATTR_FLAGS={0x8, 0xa, 0x2}, @TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x2, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1], 0x0, [0x8, 0x6, 0x3c, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x6], [0x0, 0x8, 0x0, 0x0, 0x0, 0x3, 0x401]}}, @TCA_TAPRIO_ATTR_SCHED_ENTRY_LIST={0x10, 0x2, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@TCA_TAPRIO_SCHED_ENTRY_INTERVAL={0x8, 0x4, 0x4000000}]}]}]}}]}, 0xa4}}, 0x0) 5.35889018s ago: executing program 0 (id=6663): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x4040850) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a54000000030a0fdb00000000000000000a0060050900030073797a30000000000900010073797a310000000014000480080002403cb140bb08000140000000030a000700726f757465000000080005400000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r3, &(0x7f00000003c0)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x280020}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000540)='\x00', 0x1}], 0x1}}], 0x1, 0x20008050) 5.347315091s ago: executing program 40 (id=6663): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40001}, 0x4040850) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000700000a54000000030a0fdb00000000000000000a0060050900030073797a30000000000900010073797a310000000014000480080002403cb140bb08000140000000030a000700726f757465000000080005400000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000840) r3 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r3, &(0x7f00000003c0)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x280020}, 0x1c, &(0x7f00000000c0)=[{&(0x7f0000000540)='\x00', 0x1}], 0x1}}], 0x1, 0x20008050) 5.158962635s ago: executing program 5 (id=6667): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000004c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}]}, @NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d103"}]}]}]}]}, @NFT_MSG_DELSETELEM={0x2c, 0xe, 0xa, 0x201, 0x0, 0x0, {0xa}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0xd8}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x5, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x304}, "db748d6b120426ad", "4fe429faa1e90c473725b5e429ac42fa", "917e060b", "92816af8b4efb2ad"}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100003}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "cc320e4a27cb5791", "1fd33c81cf7995313c09de00fd6ded74", "62266bd8", "1e00040000000100"}, 0x28) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000640)=@ethtool_gstrings={0x1b, 0x4, 0x5, "b388af7537"}}) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x5, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8abbf8ff00000000bfa20000000000000702009b85eb48e6d6002c00550a2908face29dc1cbd6b1700f8ffffffb7030000fa76b44aec8d2f904088833cf300000000b70400000000007937ab3cecfb19"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r5}, 0x18) setregid(0x0, 0xee01) 5.107675792s ago: executing program 5 (id=6668): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$L2TP_CMD_SESSION_DELETE(r0, &(0x7f00000002c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000c40)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="00022abd7000feaf943292ea048fdbdf250600000006001a004e1500000c001000000000000000000014001f00fe8100000000000000f2ff00000000000100"/89], 0x58}}, 0x4000000) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r3, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) sendmsg$DEVLINK_CMD_RATE_GET(r0, &(0x7f0000000500)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000d80)=ANY=[@ANYBLOB="14010000", @ANYRES16=r3, @ANYBLOB="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"], 0x114}, 0x1, 0x0, 0x0, 0x4000000}, 0x4008014) syz_genetlink_get_family_id$team(&(0x7f0000000580), r2) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = openat(0xffffffffffffffff, &(0x7f0000000b40)='./file0\x00', 0x26201, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000c00)={0x1ff, 0x0}, 0x8) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000b00)={@fallback=r5, r0, 0x28, 0x2020, 0x0, @void, @void, @value=r6}, 0x20) r7 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r8}, 0x10) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="580000001000030400"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000300012800e00010069703665727370616e0000001c00028014000700fe8000000000001800000000000000420400120008000a"], 0x58}}, 0x8000) sendmsg$BATADV_CMD_SET_MESH(r4, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000880)={0x34, r7, 0x1, 0x4070bd28, 0x1, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}, @BATADV_ATTR_BONDING_ENABLED={0x5}, @BATADV_ATTR_FRAGMENTATION_ENABLED={0x5}]}, 0x34}}, 0x18) r10 = socket(0x1, 0x803, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000002c0)=0x14) r11 = socket(0x10, 0x3, 0x0) connect$netlink(r11, &(0x7f0000000280)=@proc={0x10, 0x0, 0x1}, 0xc) sendmsg$nl_route_sched(r11, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000000940)=@newtaction={0x18, 0x32, 0x829, 0x0, 0x0, {0x0, 0x0, 0x2}, [{0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4010}, 0x0) r12 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f00000000c0)={'bond0\x00', 0x0}) sendmsg$nl_route(r12, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)=@newlink={0x44, 0x10, 0x401, 0x20000, 0x2000000, {0x0, 0x0, 0x0, 0x0, 0x18603}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macvtap={{0xc}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r13}, @IFLA_MASTER={0x8, 0xa, r13}]}, 0x44}, 0x1, 0x0, 0x0, 0x20004885}, 0x4054) unshare(0x6a040000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, 0xffffffffffffffff, 0x0) 2.064102517s ago: executing program 5 (id=6700): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b0000000700000008000000a6ad6a1a05"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000100)=@ethtool_coalesce={0x12, 0x0, 0x9, 0x6, 0xf, 0xc, 0x0, 0xc0000000, 0x3, 0x32, 0x5, 0x4, 0x7ff, 0x6, 0x2, 0xfffffffc, 0x0, 0x2, 0x80000000, 0x5, 0x1ff, 0x0, 0x8}}) 2.050288289s ago: executing program 5 (id=6701): unshare(0x2a020400) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xe7fd}, 0x100002, 0x3, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r3, 0x6, 0x0, 0x0, 0x0) 2.025219692s ago: executing program 5 (id=6703): socket$inet6_tcp(0xa, 0x1, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000ab4000000060a01040000000000000000020000280900010073797a30000000000900020073797a320000000088000480100001800c000100636f756e7465720014000180090001006d6173710000000004000280600001800a0001006c696d6974000000500002800c00014000000000000000080800044000000001"], 0xdc}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) socket$nl_route(0x10, 0x3, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYRES64=r0], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x4, &(0x7f00000001c0)=ANY=[@ANYRES16=r0], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="5c0000000206010100000000000000000000000005000100070000000900020073797a300000000014000780050015000000000008001240000000000d000300686173683a6e657400000000050005000a000000050004"], 0x5c}, 0x1, 0x0, 0x0, 0x2040000}, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r8}, 0x25) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r9, 0x29, 0x40, &(0x7f0000000700)=@mangle={'mangle\x00', 0x64, 0x6, 0x690, 0xf0, 0x0, 0x448, 0x448, 0xf0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x5c0, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv4=@local, @ipv4=@dev={0xac, 0x14, 0x14, 0x2d}, 0x32, 0x36, 0x3}}}, {{@ipv6={@mcast1, @loopback, [], [], 'macvtap0\x00', 'ip6tnl0\x00', {}, {}, 0x6, 0x0, 0x5}, 0x0, 0xa8, 0xe8}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@broadcast}}}, {{@ipv6={@mcast2, @loopback, [], [], 'veth0_to_team\x00', 'syzkaller0\x00', {}, {0xff}, 0x2}, 0x0, 0x100, 0x128, 0x0, {}, [@common=@unspec=@connmark={{0x30}}, @common=@inet=@socket1={{0x28, 'socket\x00', 0x3}}]}, @common=@unspec=@CONNSECMARK={0x28, 'CONNSECMARK\x00', 0x0, {0x1}}}, {{@uncond, 0x0, 0x120, 0x148, 0x0, {}, [@common=@frag={{0x30}}, @common=@hbh={{0x48}, {0x0, 0x0, 0x0, [0x4, 0x5]}}]}, @inet=@DSCP={0x28, 'DSCP\x00', 0x0, {0x32}}}, {{@uncond, 0x0, 0x138, 0x178, 0x0, {}, [@common=@dst={{0x48}, {0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd]}}, @common=@dst={{0x48}, {0x0, 0x0, 0x0, [0x0, 0x0, 0x0, 0x8001]}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@dev}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x6f0) sendmsg$IPSET_CMD_DESTROY(r6, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000540)=ANY=[@ANYBLOB="1c000000030605000000000000000000000000060500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x24040800}, 0x8d0) clock_nanosleep(0x9, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r10}, 0x18) r11 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r11, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000040)="d8000000100081044e81f782db44b904021d006a0f000000e8fe55a1290015000600142603600e120900040044000000a80016000a0003402e60000000000000b94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a98516337ce06bbace8017cbec4c2ee5a7cef4090000001fb79119d0d68898b8a722a2643a5ee4ce1b14d6d930dfe1d9d3220a7c9f8775730d16a4683f1aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d9345", 0xd8}], 0x1}, 0x60044084) 1.900630948s ago: executing program 5 (id=6711): r0 = bpf$TOKEN_CREATE(0x24, 0x0, 0x0) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0x0, 0xffffffffffffffff}}, './file0\x00'}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x40c00, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x0, 0xff7fffff, 0x0, 0x15, "ff000000000000d5ca70497566ed5f00"}) ioctl$TIOCPKT(r2, 0x5420, &(0x7f0000000200)=0x2) r3 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x100000000000009, 0x3c033, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x0, 0x3fff8000}, 0x8312, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0x400000000, 0xffffffffffffffff, 0x0) r4 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_STAT_GET(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={0x20, 0x1411, 0x1, 0x4, 0x25dfdbfd, "", [@RDMA_NLDEV_ATTR_STAT_MODE={0x8}, @RDMA_NLDEV_ATTR_STAT_RES={0x8, 0x4b, 0x13}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000800}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000180)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r5) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000006f40), 0x2002, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), r6) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00'}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000000c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x74, r8, {}, {}, {0x6}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x40d5}, 0x0) r9 = syz_open_pts(r2, 0x0) pselect6(0x40, &(0x7f0000000100)={0x0, 0x8, 0x2, 0x800000000d, 0x2, 0x2, 0x0, 0x4}, 0x0, &(0x7f0000000240)={0x1d, 0x2, 0x0, 0x1fd, 0x1000000802, 0x0, 0x0, 0x6}, 0x0, 0x0) ioctl$TIOCSTI(r9, 0x5412, &(0x7f0000000000)=0x13) truncate(&(0x7f00000001c0)='./file0\x00', 0x8) quotactl$Q_GETQUOTA(0xffffffff80000700, &(0x7f0000000140)=@nullb, r1, &(0x7f0000000240)) creat(&(0x7f00000000c0)='./file0\x00', 0xc9028ba210c11f8b) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$team(0x0, 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_team(r10, 0x8933, &(0x7f0000000240)={'team0\x00', 0x0}) sendmsg$TEAM_CMD_OPTIONS_SET(r10, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000004b80)={&(0x7f00000047c0)=ANY=[@ANYBLOB, @ANYRES16=r11, @ANYBLOB="050427bd7000fedbdf250100000008000100", @ANYRES32=r12], 0x60}, 0x1, 0x0, 0x0, 0x4000084}, 0x44084) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 1.41365868s ago: executing program 2 (id=6728): r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x141301) unshare(0x24020400) ioctl$USBDEVFS_CONTROL(r0, 0xc0105500, &(0x7f00000000c0)={0x80, 0xa, 0x303, 0xec, 0x0, 0x6e9, 0x0}) 1.41335159s ago: executing program 2 (id=6729): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b0000000700000008000000a6ad6a1a05"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000100)=@ethtool_coalesce={0x12, 0x0, 0x9, 0x6, 0xf, 0xc, 0x0, 0xc0000000, 0x3, 0x32, 0x5, 0x4, 0x7ff, 0x6, 0x2, 0xfffffffc, 0x0, 0x2, 0x80000000, 0x5, 0x1ff, 0x0, 0x8}}) 1.41318497s ago: executing program 2 (id=6730): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1600000000000000040000000700000000000000", @ANYRES32=0x1], 0x50) socket$kcm(0xa, 0x5, 0x0) r2 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r2, &(0x7f00000002c0)={&(0x7f0000000180)={0x2, 0x1, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000380)="c9", 0x1}], 0x1}, 0x865) write$selinux_context(0xffffffffffffffff, &(0x7f0000000080)='system_u:object_r:semanage_read_lock_t:s0\x00', 0x2a) 1.382301284s ago: executing program 2 (id=6731): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r2, &(0x7f00000003c0)=[{{0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000540)='\x00', 0x1}], 0x1}}], 0x1, 0x20008050) 1.381633324s ago: executing program 8 (id=6732): r0 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b40500000000000071101b000000000006000000000000009500000000000000"], &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd96, &(0x7f0000000080)=""/201, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xfffffffffffffd56, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) getpeername$packet(0xffffffffffffffff, &(0x7f0000000340)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000b40)={r0, 0xe0, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000500)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, &(0x7f0000000580)=[0x0], &(0x7f0000000740)=[0x0, 0x0], 0x0, 0xbd, &(0x7f0000000780)=[{}], 0x8, 0x10, &(0x7f00000007c0), &(0x7f0000000800), 0x8, 0x91, 0x8, 0x3, &(0x7f00000005c0)}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000dc0)={0x16, 0xb, &(0x7f0000000180)=ANY=[@ANYRESOCT], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r1, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kmem_cache_free\x00', r4}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x6, 0x7ffc1ffb}]}) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1809049, 0x0, 0xfe, 0x0, 0x0) r6 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000840)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffd) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000080)={'batadv0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000700)={&(0x7f00000000c0)=@newtfilter={0x24, 0x11, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x74, r8, {0xd}, {0x7ffc}, {0x6, 0xfff3}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x40d5}, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000093850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r9}, 0x10) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f0000000bc0)="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", 0x12d, r6) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000900)=ANY=[@ANYRESHEX=r5, @ANYRES32=r8, @ANYRESHEX=r10, @ANYRESHEX, @ANYRES32=r10, @ANYRESHEX=r8], 0x0, 0x4, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x94) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000f00)='kfree\x00', r11, 0x0, 0x4}, 0x18) openat$nci(0xffffffffffffff9c, &(0x7f00000001c0), 0x5400, 0x0) lgetxattr(&(0x7f0000003040)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(&(0x7f00000003c0), 0xffffffffffffffff) r12 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000480)=[{{0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=[@cred={{0x1c}}], 0x20, 0x40044}}, {{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000300)="06", 0x1}], 0x1, 0x0, 0x0, 0x4004}}], 0x2, 0x4) r13 = geteuid() mount$9p_fd(0x0, &(0x7f00000002c0)='./file0\x00', &(0x7f0000000380), 0x180a0, &(0x7f0000000a00)=ANY=[@ANYBLOB="6472616e733d66642c7266646e6f3dace96c726900fd62f8a24fc5fb313a7c662b97efc131baf21a08cae928f63631e8154a39cb51d2e43c60d0b4eb2a8e678473cf15db20943d33f3bb3c0e1f9b69b6bd7bb5cda752075a79cd9a7e77c6db494d17912bf2134ef19ca2", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',version=9p2000,fsname=/dev/', @ANYBLOB=',appraise_type=i', @ANYRESDEC=0x0, @ANYBLOB=',rootcontext=staff_u,uid', @ANYRESDEC, @ANYBLOB, @ANYRESDEC=r13, @ANYBLOB=',smackfsroot=batadv0\x00,\x00']) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r12, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x20000805}, 0x1004) 1.33897252s ago: executing program 2 (id=6733): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) unshare(0x6a040000) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000000)={0x2, 0x9e09}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x8031, r2, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x4040800) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a05000000000000000000010000000900010073797a300000000048000000030a05020000000000000000010000000900030073797a320000000014000480080002400000000008000140000000000900010073797a3000000000080007006e6174"], 0xcc}, 0x1, 0x0, 0x0, 0x880}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x1, 0x0, 0x0, 0x41100, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000080)='kfree\x00', r4}, 0x18) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000006c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="1c00000005002bbd700004460e0000e59230c5c000"], 0x1c}}, 0x0) 1.275666927s ago: executing program 8 (id=6734): syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x20081e, &(0x7f0000000840)={[{@grpjquota}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0xa30}}, {@grpquota}]}, 0x1, 0x52a, &(0x7f0000001440)="$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") r0 = socket(0x11, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'gre0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r2}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000240)=0xe9, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f0000000440)=ANY=[@ANYBLOB="02017d29"], 0xdd12}], 0x1}, 0x0) r3 = creat(&(0x7f0000000080)='./bus\x00', 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x80642, 0x150) pwrite64(r4, &(0x7f0000000140)='2', 0xfdef, 0xfecc) fallocate(r3, 0x0, 0xbf5, 0x2000402) sendmsg$ETHTOOL_MSG_RINGS_SET(r1, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000280)={0x94, 0x0, 0x400, 0x70bd26, 0x25dfdbfd, {}, [@ETHTOOL_A_RINGS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6gre0\x00'}]}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0x8}, @ETHTOOL_A_RINGS_TX={0x8, 0x9, 0xfffffff8}, @ETHTOOL_A_RINGS_RX={0x8, 0x6, 0x3ff}, @ETHTOOL_A_RINGS_HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x6}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}]}]}, 0x94}, 0x1, 0x0, 0x0, 0x85}, 0x4) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000006c0)={0x18, 0x4, &(0x7f0000000980)=ANY=[@ANYBLOB="18010000fcff0000000000006dfeff00850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sched_setscheduler(0x0, 0x0, 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYRES8=0x0], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r8}, 0x10) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x4000000000001f2, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000680)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x401, 0x0, 0x0, {0x1, 0x0, 0x8003}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x101, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}, @NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @exthdr={{0xb}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_EXTHDR_DREG={0x8, 0x1, 0x1, 0x0, 0xc}, @NFTA_EXTHDR_TYPE={0x5, 0x2, 0x83}, @NFTA_EXTHDR_OP={0x8, 0x6, 0x1, 0x0, 0x4}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0xcc}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r5, 0x0, 0x404}, 0x18) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0xc, r3, 0x0, 0x0, 0x0, 0xfffffffffdffffff}) 1.119189307s ago: executing program 8 (id=6736): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000500)={0x11, 0x4, 0x0, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x18) r1 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r1, 0x402, 0x18) fcntl$notify(r1, 0x402, 0x300) 926.963282ms ago: executing program 8 (id=6737): unshare(0x2a020400) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xe7fd}, 0x100002, 0x3, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r3, 0x6, 0x0, 0x0, 0x0) 673.520374ms ago: executing program 8 (id=6741): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b0000000700000008000000a6ad6a1a05"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000100)=@ethtool_coalesce={0x12, 0x0, 0x9, 0x6, 0xf, 0xc, 0x0, 0xc0000000, 0x3, 0x32, 0x5, 0x4, 0x7ff, 0x6, 0x2, 0xfffffffc, 0x0, 0x2, 0x80000000, 0x5, 0x1ff, 0x0, 0x8}}) 623.85266ms ago: executing program 8 (id=6744): bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000340)={'bridge_slave_0\x00'}) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x81}, 0x0) r0 = socket(0x10, 0x80002, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e21}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, 0x0, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f"], 0x48) pipe2(0x0, 0x0) fcntl$setpipe(0xffffffffffffffff, 0x407, 0x0) 584.746085ms ago: executing program 3 (id=6746): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000002780)=ANY=[], &(0x7f0000000280)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000580)={0x3, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="186d7fb08f092984da0000000000000018110000", @ANYRESHEX=r0, @ANYRESDEC], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000080018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0, 0x0, 0x0, 0x0, 0x41000}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) r3 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000540)=0x710, 0x4) syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000080)='./file1\x00', 0x1008014, &(0x7f0000000000)=ANY=[], 0x3, 0x7e9, &(0x7f0000001f80)="$eJzs3U1sHPXZAPBnHDsfRm+EeF/lRVEIk0ClIAWz3kColQMs67EzdL1r7a6rRFVFEXGQhQMIilpygagStFWrqqf2Rrly661VpVZqpdJTpXLopTckThWV+iVQVcnVzO46a8cfwUkcKL+flf3Pzj7/+T8z3syzs96dCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgkvp0pTKZRCNvLpxLN1efbrfmtnh8sLxfrWnWeHzNuBFJ8S/274+P/t6b939XHz5U3ByPI717R2J/0eyPy3ccuvPM/46ODPpvkdBOHbvOuCTix/1klxdfWv/ovpuf2C303V984i4frxS3s1kz70Q+V5vN0rzTSqdOn648dHamk87kjaxzvtPN5tJ6O6t1W+30RP2BdHJq6lSaTZxvLTRnp2uNbDDz0Qerlcrp9MmJ+azW7rSaDz0ZnfrZvNHIm7NlTLXyjShiHk3rg6dIbS5NLy4tL57aLtUiaHLtrD1x9TY9cv+dH7zy/t+WFosn5GYLSfqjVicnq9XJ049MPfJopTJarVSrMTRjT0RUhkURUXaJkYiiyy150vIZcnN23HATjPTrfzQij2YsxLlIN/gZi3pMRztaMVfc/+PYNRF9g/r/hYf+8vutxh2u/4Mqf/fVhw9HWf+P9u4d3az+b5jrbv68HK/G5Xguno7lWI7FeOm2Z7TNz8iNLiFZc282smhGHp1oRR5zUSvnpP05aUzF6TgdlXgqzsZMdCKNmcijEVl04nx0ohtZ+YyqRzuyqEU3WtGONE5EPR6INCZjKqbiVKSRxUScj1YsRDNmYzpq5VIuxlK53U+ty/LQgfj5s3/44K1iejVocqvVer14IReL8dctglaL+XD9XzNjuPavrBSvF9ZHqP+fd7dgLw47szKo/wAAAMB/raR89704/h+Le8qpmbyRfWXLLh+vlHYvSQAAAOCGlH/5P1I0Y8XUPZEUx/+VDSLf2/XcAAAAgJsjKb9jl0TEeNzbm7oYS/F6LMZGbwIAAAAAn0Hl3/+PFs14xGvljMHpUiq9jwQAAAAAn3Xf3uwc++8PzrHbmd+X/HIsIsaSK/Pn7k8u1Yq42qU9vX795surS+zOHE4O9hdSNqdHL9+RRMRoPTuSDM5++e99vfbD8vbw6Gr3zc71n7TbWyYQWydQ3ovvxbFezLELZXNHv8to0htlfCZvZBP1VuNMeUrE4l/3leeXvhlRjP6d5tzBJC4uLS9OPPPC8oUylytF9ysH+idQvOY8ilvkstLfAnHPxms8Vn4Roz/ueG/cyvD6j/S6j2w9ZjI85htxvBdzfLzXjg8e6Y25vxhzcuLMZNRqB0e62bnuKytDa9/PYnJ1zceuXNrBmr8R9/Vi7jtxX6/ZIIvqmiyevzaL6tD2v85tMXiWbZvFW8deO/fP37aS7NR2WZzaKIvRjbNY2ROxflsA3C4Xy7P+XK1CB8oq9K+V/il+kiR6dbcoVrVeQN82+9piL/ePq6Osvso40P+jwlCtG4311f3qHvT6qvtK9PbofSd6rydGD29QVyob7NFfXHrx3f4e/eF3fvSTrx793U/LcXdU3d6JB3ox/Sbu+vW6LM68u7C3yKJY5++vq6pvFz3e3nTcTqOaxJWIPV+/9GIcevnVyw8uXXr62cX/WXy+WtSghyuVR6p71/2CNs0UgM+v7a+xs2nEoM4kD687qo4La+vuXasfKZiIZ+KFWI4LcbL8tkFE3LvxuONDH0M4uc1R6/jQFV5ObnNseTW2em1sEpvEnhraYv//w7L56Jb8OgBgVxzfoA7/pn9h223q/+o78yfjRC9ik+PutbV83dFxbF7LN/LFoWlXLQKAncnaHybj3TeTdjuff2pyamqy1j2bpe1W/UtpO5+ezdK9zW7Wrp+tNWezdL445K8P3jiezjppZ2F+vtXupjOtdhojnfxceeX3tLO/HzNXa3bzeme+kdU6WVpvNbu1ejedzjv1dH7hiUbeOZu1y86d+ayez+T1WjdvNdNOa6FdzybStJNlQ4H5dNbs5jN5MdlM59v5XK19JSIaC3NZOp116u18vtvqLXAwVt6cabXnysVOXLv6f97NbQ0AnxYvv3r5uaeXlxdf2tnEn64n+HavIwCwlioNAAAAAAAAAAAAAACffquf/79zMFHMvYFvBH6yiX1xfcFjcQNjrfRPFHTrV+dTNXHNKg8u53i7E9vNia899thzQ3MODMc88drdZ69vOXG935SNNw9G7P3ZD3pzHt88+Fs39XfxXsRO/oOsJFvErNlN7N3FXRIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAbOo/AQAA//86f0/X") symlinkat(0x0, 0xffffffffffffff9c, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8d}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x0, &(0x7f0000000080)}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pivot_root(&(0x7f0000000000)='.\x00', &(0x7f00000004c0)='./file1\x00') mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) r4 = getpid() madvise(&(0x7f0000a5e000/0x1000)=nil, 0x1000, 0x64) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000007c0)={{r5}, &(0x7f0000000740), &(0x7f0000000780)}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='kfree\x00', r6, 0x0, 0x2}, 0x18) process_vm_readv(r4, &(0x7f0000008400)=[{&(0x7f0000000300)=""/54, 0x7ffff000}, {&(0x7f0000006180)=""/152, 0x98}], 0x2, &(0x7f0000008640)=[{&(0x7f0000008480)=""/95, 0x7ffff000}], 0x286, 0x0) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r7 = getgid() lchown(0x0, 0x0, r7) syz_open_dev$tty1(0xc, 0x4, 0x4) r8 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000040)={'bridge_slave_0\x00'}) socket$caif_stream(0x25, 0x1, 0x4) 583.027515ms ago: executing program 2 (id=6748): mknod(&(0x7f0000000040)='./file0\x00', 0x8001422, 0x0) open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x18) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0xb, 0x1514, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x9, 0x5, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000021c0), 0x181000) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0xc0a85320, &(0x7f0000000c40)={{0x80}, 'port0\x00', 0x41, 0xfe8ee28a1d9fac77, 0x6, 0x6, 0x2, 0x40, 0x3, 0x0, 0x6, 0x3}) ioctl$SNDRV_SEQ_IOCTL_DELETE_PORT(r0, 0xc0a85320, &(0x7f00000007c0)={{0x80, 0xea}, 'port0\x00', 0x3c, 0x40000, 0xd, 0x2, 0x20107, 0x6, 0x5, 0x0, 0x4, 0x3}) close(r0) open$dir(&(0x7f0000000140)='./file0\x00', 0x46263, 0x0) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r2, 0x0, 0x1}, 0x18) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x7, &(0x7f0000000280)={0x1, &(0x7f0000000000)=[{0x6, 0x81, 0x7, 0x7ffc0001}]}) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0x0) writev(0xffffffffffffffff, &(0x7f0000000140)=[{0x0}], 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000010000000000000000030000850000007b000000"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x2}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, &(0x7f0000000000), 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x3, 0x16, &(0x7f0000000240)=ANY=[@ANYBLOB="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"/1747], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0xffffffffffffffd2}, 0x48) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000003c0)='rss_stat\x00', 0xffffffffffffffff, 0x0, 0x9}, 0x18) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) 422.510356ms ago: executing program 3 (id=6750): socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000004c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x44, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x4}]}, @NFT_MSG_NEWSETELEM={0x40, 0xc, 0xa, 0x101, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0x14, 0x3, 0x0, 0x1, [{0x10, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0xc, 0x1, 0x0, 0x1, [@NFTA_DATA_VALUE={0x6, 0x1, "d103"}]}]}]}]}, @NFT_MSG_DELSETELEM={0x2c, 0xe, 0xa, 0x201, 0x0, 0x0, {0xa}, [@NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0xd8}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x5, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000040)=@gcm_128={{0x304}, "db748d6b120426ad", "4fe429faa1e90c473725b5e429ac42fa", "917e060b", "92816af8b4efb2ad"}, 0x28) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100003}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) setsockopt$inet6_tcp_TLS_TX(r2, 0x11a, 0x1, &(0x7f0000000080)=@gcm_128={{0x304}, "cc320e4a27cb5791", "1fd33c81cf7995313c09de00fd6ded74", "62266bd8", "1e00040000000100"}, 0x28) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000003c0)={'gre0\x00', &(0x7f0000000640)=@ethtool_gstrings={0x1b, 0x4, 0x5, "b388af7537"}}) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x5, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8abbf8ff00000000bfa20000000000000702009b85eb48e6d6002c00550a2908face29dc1cbd6b1700f8ffffffb7030000fa76b44aec8d2f904088833cf300000000b70400000000007937ab3cecfb19"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00'}, 0x18) setregid(0x0, 0xee01) 414.631847ms ago: executing program 3 (id=6751): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00"/11], 0x48) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040)={0x0, r0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x60, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff9ce}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="5c00000002060108000100000000000000004000050005000a000000050001000700000005000400000000000900020073797a310000000016000300686173683a6e"], 0x5c}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB], 0x0}, 0x94) r3 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r3, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0xbe, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x0) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, 0x0, 0x0, 0x7}, 0x94) sched_setscheduler(0x0, 0x0, &(0x7f0000000080)=0x8) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0x0, 0x0, 0x0, 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x300000a, 0x12, r5, 0x852ac000) sendmsg$IPSET_CMD_ADD(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x74}, 0x1, 0x0, 0x0, 0x10040003}, 0x0) r6 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0, r6}, 0x18) r7 = socket$igmp(0x2, 0x3, 0x2) socket(0x10, 0x3, 0x0) setsockopt$MRT_INIT(r7, 0x0, 0xc8, &(0x7f0000003d40), 0x4) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="05000000040000000900000044"], 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r9}, 0x18) r10 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000240)='hugetlb.1GB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) readahead(r10, 0x2, 0xd5ac) setsockopt$MRT_ADD_VIF(r7, 0x0, 0xca, &(0x7f0000003d80)={0x0, 0x4, 0x0, 0x0, @vifc_lcl_addr=@local, @dev={0xac, 0x14, 0x14, 0xff}}, 0x10) close(r7) 403.673988ms ago: executing program 1 (id=6752): unshare(0x2a020400) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0xe7fd}, 0x100002, 0x3, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r3, 0x6, 0x0, 0x0, 0x0) 378.716591ms ago: executing program 1 (id=6753): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1600000000000000040000000700000000000000", @ANYRES32=0x1], 0x50) socket$kcm(0xa, 0x5, 0x0) r2 = openat$selinux_context(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$selinux_context(r2, &(0x7f0000000080)='system_u:object_r:semanage_read_lock_t:s0\x00', 0x2a) 352.709974ms ago: executing program 1 (id=6754): socket$packet(0x11, 0xa, 0x300) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0xb}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r1}, 0x10) socket$packet(0x11, 0xa, 0x300) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 266.977975ms ago: executing program 3 (id=6755): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b0000000700000008000000a6ad6a1a05"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000ebff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$inet6(0xa, 0x2, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x89f0, &(0x7f0000000080)={'bridge0\x00', &(0x7f0000000100)=@ethtool_coalesce={0x12, 0x0, 0x9, 0x6, 0xf, 0xc, 0x0, 0xc0000000, 0x3, 0x32, 0x5, 0x4, 0x7ff, 0x6, 0x2, 0xfffffffc, 0x0, 0x2, 0x80000000, 0x5, 0x1ff, 0x0, 0x8}}) 266.676265ms ago: executing program 3 (id=6756): syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) syz_emit_ethernet(0xfdef, &(0x7f0000000140)={@random="5b1a033f2511", @remote, @void, {@ipv4={0x800, @udp={{0x6, 0x4, 0x0, 0x0, 0x4578, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x0, 0x64, 0x0, @wg=@response={0x10, 0x0, 0x0, "fdcdae25a7a296872a8a5290e48e30acf8afc7e67d70a62c979cefa10a0028bd", "ae0000000000000000e400", {"35f3c07eeca4a20a9858ac1500", "63081fe8fe001a08ed082ad7121d696f"}}}}}}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r3}, 0x10) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4, 0xffffffffffffffff}, 0x4) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000a40)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000000)='kmem_cache_free\x00', r6}, 0x10) mlock(&(0x7f0000ff9000/0x4000)=nil, 0x4000) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0xb, &(0x7f0000000680)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb703000008000000b703000000000020850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000280)='sched_switch\x00', r7}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x8001000000000000, 0x40, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000740)={{r10}, &(0x7f00000006c0), &(0x7f0000000700)=r9}, 0x20) recvmsg$unix(r9, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000002380)=[{&(0x7f0000002480)=""/195, 0xc3}], 0x1}, 0x2000) ptrace$getregset(0x4204, 0xffffffffffffffff, 0x202, 0x0) sendmsg$inet(r8, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0x1}], 0x1}, 0x0) mlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r11}, 0x10) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdk5v', @ANYRESHEX=r1, @ANYBLOB=',\x00']) 255.682207ms ago: executing program 1 (id=6757): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) chroot(0x0) (fail_nth: 5) 191.940825ms ago: executing program 1 (id=6758): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000010000000a00000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendmmsg$inet6(r2, &(0x7f00000003c0)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x280020}, 0x1c, 0x0}}], 0x1, 0x20008050) 124.203384ms ago: executing program 1 (id=6759): r0 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0x500000e, 0x20010, 0xffffffffffffffff, 0x8000000) syz_io_uring_setup(0x49b, &(0x7f0000000380)={0x0, 0xf36c, 0x1000, 0x5, 0x20e}, &(0x7f0000000200)=0x0, &(0x7f0000000680)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r1, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r1, r2, &(0x7f00000002c0)=@IORING_OP_LINKAT={0x27, 0xa, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x400, 0x1}) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x72, 0x0, 0x7fff0000}]}) lsm_list_modules(&(0x7f0000000440)=[0x0, 0x0], &(0x7f0000000480)=0x10, 0x0) r3 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000080)={'ip6tnl0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=@newqdisc={0x24, 0x24, 0x8, 0x0, 0x0, {0x0, 0x0, 0x0, r4, {0xb, 0x1}, {0xffff, 0xffff}, {0x6}}}, 0x24}, 0x1, 0x0, 0x0, 0x2}, 0x20004844) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x2}) r6 = socket(0x10, 0x803, 0x0) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f00000005c0)=ANY=[@ANYRESOCT=r4], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r7}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x5, 0x0, 0x0, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xce9d8d60ab13d530, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r8, 0x8946, &(0x7f0000000400)='{\x05T\x82\x89\x98Yi:') lsm_list_modules(&(0x7f00000004c0)=[0x0], &(0x7f0000000500)=0x8, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000a40)=@newqdisc={0x2c, 0x24, 0x4ee4e6a52ff5653f, 0x70bd2d, 0x25dfdbfc, {0x0, 0x0, 0x0, r9, {0x0, 0x9}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}, 0x1, 0x0, 0x0, 0x81}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000001c0)=@newtfilter={0x44, 0x2c, 0xd27, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, r9, {0xc, 0xffe0}, {0x0, 0x9}, {0xfff3, 0x9}}, [@filter_kind_options=@f_flower={{0xb}, {0x14, 0x2, [@TCA_FLOWER_KEY_ETH_TYPE={0x6, 0x8, 0x8848}, @TCA_FLOWER_KEY_MPLS_TC={0x5, 0x45, 0xfe}]}}]}, 0x44}}, 0x0) syz_io_uring_submit(r0, r2, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x6000, @fd_index=0x4, 0x10, 0x0, 0x0, 0xd3704c10d17f2a6d, 0x0, {0x1}}) syz_emit_ethernet(0x4e, &(0x7f0000000140)=ANY=[@ANYBLOB="ff9fd19b33ff844fe586aaaaaaaa86dd6000200000183adf00000000000000000000ffff0a010100fe800000000000000000d99016c95111b5cf907800000000fe8000000000000000000001000000aa0000"], 0x0) 0s ago: executing program 3 (id=6760): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETOBJ(r0, 0x0, 0x800) (async, rerun: 32) socket$qrtr(0x2a, 0x2, 0x0) (rerun: 32) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x759, &(0x7f0000000700)={[{@nogrpid}, {@noblock_validity}, {@discard}, {@errors_remount}, {@mblk_io_submit, 0x0}, {@noauto_da_alloc}, {@noload}, {@journal_checksum}, {@mblk_io_submit}, {@i_version}, {@usrjquota}, {@data_journal}, {@journal_dev={'journal_dev', 0x3d, 0x3}}, {@norecovery}, {@nobarrier}, {@data_writeback}, {@resgid}], [{@fsname={'fsname', 0x3d, '\\$'}}, {@context={'context', 0x3d, 'user_u'}}], 0x2c}, 0x2, 0x505, &(0x7f0000001c80)="$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") (async) pipe2(0x0, 0x0) (async) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r1, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) (async) setsockopt$inet_MCAST_MSFILTER(r1, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) (async, rerun: 64) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00"/14], 0x50) (async, rerun: 64) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x0, 0x40}, 0x4) (async) socket$nl_xfrm(0x10, 0x3, 0x6) (async) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000008c0)=@updpolicy={0xb8, 0x15, 0x1, 0x800000, 0x300, {{@in=@multicast1=0xe0000002, @in6=@empty, 0x0, 0x7, 0x0, 0x0, 0xa, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x7fffffff, 0x0, 0xfffffffffffffffc, 0x5}, {0x81}, 0x0, 0xffffffff}}, 0xb8}}, 0x90) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xf, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000002000000000000000100000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000100000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x6, 0x0, 0x0, 0x41000, 0x4, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r4}, 0x18) (async) r5 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r5, 0x0, 0x2a, 0x0, 0x0) (async, rerun: 32) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async, rerun: 32) r6 = socket$inet_sctp(0x2, 0x1, 0x84) (async) getsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(0xffffffffffffffff, 0x84, 0x22, &(0x7f0000000040)={0x2, 0x9, 0x2, 0x2, 0x0}, &(0x7f0000000240)=0x10) setsockopt$inet_sctp_SCTP_RTOINFO(r6, 0x84, 0x0, &(0x7f0000000300)={r7, 0x2, 0x101, 0x7f}, 0x10) (async) socket$nl_route(0x10, 0x3, 0x0) (async) r8 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x0) getdents64(r8, &(0x7f0000000f80)=""/4096, 0x1000) kernel console output (not intermixed with test programs): ubj=root:sysadm_r:sysadm_t pid=28837 comm="syz.6.6301" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6d3a0af749 code=0x7ffc0000 [ 408.671729][T21491] bridge0: port 1(bridge_slave_0) entered blocking state [ 408.698350][T21491] bridge0: port 1(bridge_slave_0) entered forwarding state [ 408.740632][T28730] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 408.751043][T28730] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 408.762789][T28846] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 408.772073][ T29] audit: type=1326 audit(2000000462.901:98145): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=28837 comm="syz.6.6301" exe="/root/syz-executor" sig=0 arch=c000003e syscall=106 compat=0 ip=0x7f6d3a0af749 code=0x7ffc0000 [ 408.776014][T28838] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 408.800548][T28846] ext4 filesystem being mounted at /314/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 408.823813][T21491] bridge0: port 2(bridge_slave_1) entered blocking state [ 408.830908][T21491] bridge0: port 2(bridge_slave_1) entered forwarding state [ 408.866007][T28819] loop3: detected capacity change from 0 to 1024 [ 408.887259][T22596] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 408.899207][T28819] EXT4-fs (loop3): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 408.913516][T28819] EXT4-fs (loop3): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 408.944120][T28819] JBD2: no valid journal superblock found [ 408.952034][T28819] EXT4-fs (loop3): Could not load journal inode [ 408.962030][T24391] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 408.976115][T28730] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 409.000677][T28873] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6309'. [ 409.104439][T28730] veth0_vlan: entered promiscuous mode [ 409.114022][T28730] veth1_vlan: entered promiscuous mode [ 409.135708][T28730] veth0_macvtap: entered promiscuous mode [ 409.145222][T28730] veth1_macvtap: entered promiscuous mode [ 409.160827][T28730] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 409.173480][T28730] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 409.181267][T28893] xt_CT: You must specify a L4 protocol and not use inversions on it [ 409.196077][T21452] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.222206][T21452] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.253170][T18579] hid-generic 0000:3000000:0000.00AB: hidraw0: HID v0.00 Device [sy] on syz0 [ 409.269338][T21452] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.292868][T21452] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 409.377016][T28906] FAULT_INJECTION: forcing a failure. [ 409.377016][T28906] name failslab, interval 1, probability 0, space 0, times 0 [ 409.389719][T28906] CPU: 0 UID: 0 PID: 28906 Comm: syz.7.6318 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 409.389784][T28906] Tainted: [W]=WARN [ 409.389796][T28906] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 409.389811][T28906] Call Trace: [ 409.389819][T28906] [ 409.389828][T28906] __dump_stack+0x1d/0x30 [ 409.389881][T28906] dump_stack_lvl+0x95/0xd0 [ 409.389906][T28906] dump_stack+0x15/0x1b [ 409.389928][T28906] should_fail_ex+0x265/0x280 [ 409.389969][T28906] should_failslab+0x8c/0xb0 [ 409.389994][T28906] kmem_cache_alloc_lru_noprof+0x6d/0x4c0 [ 409.390021][T28906] ? __d_alloc+0x37/0x340 [ 409.390051][T28906] __d_alloc+0x37/0x340 [ 409.390076][T28906] ? security_inode_permission+0x4a/0xb0 [ 409.390173][T28906] d_alloc_parallel+0x54/0xcd0 [ 409.390246][T28906] ? __rcu_read_unlock+0x4f/0x70 [ 409.390269][T28906] ? __d_lookup+0x316/0x340 [ 409.390329][T28906] path_openat+0x8c6/0x23b0 [ 409.390373][T28906] do_filp_open+0x109/0x230 [ 409.390406][T28906] ? __pfx_kfree_link+0x10/0x10 [ 409.390434][T28906] do_sys_openat2+0xa6/0x150 [ 409.390479][T28906] __x64_sys_openat+0xf2/0x120 [ 409.390514][T28906] x64_sys_call+0x2b07/0x3000 [ 409.390539][T28906] do_syscall_64+0xca/0x2b0 [ 409.390581][T28906] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 409.390630][T28906] RIP: 0033:0x7f6bcea6df90 [ 409.390645][T28906] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 69 95 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 bc 95 02 00 8b 44 [ 409.390661][T28906] RSP: 002b:00007f6bcd4cef60 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 409.390678][T28906] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f6bcea6df90 [ 409.390690][T28906] RDX: 0000000000000000 RSI: 00007f6bceaf407e RDI: 00000000ffffff9c [ 409.390701][T28906] RBP: 00007f6bceaf407e R08: 0000000000000000 R09: 0000000000000000 [ 409.390763][T28906] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 409.390777][T28906] R13: 00007f6bcecc6038 R14: 00007f6bcecc5fa0 R15: 00007ffd059b1d28 [ 409.390795][T28906] [ 409.661693][T28909] loop7: detected capacity change from 0 to 2048 [ 409.701788][T28909] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 409.744664][T28909] ext4 filesystem being mounted at /321/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 409.872695][T24391] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 409.934063][T28914] EXT4-fs error (device loop6): ext4_acquire_dquot:6986: comm syz.6.6320: Failed to acquire dquot type 0 [ 409.946766][T28918] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 409.967889][T28914] EXT4-fs error (device loop6): mb_free_blocks:2037: group 0, inode 13: block 144:freeing already freed block (bit 9); block bitmap corrupt. [ 409.990475][T28914] EXT4-fs error (device loop6): ext4_do_update_inode:5617: inode #13: comm syz.6.6320: corrupted inode contents [ 410.027076][T28914] EXT4-fs error (device loop6): ext4_dirty_inode:6502: inode #13: comm syz.6.6320: mark_inode_dirty error [ 410.038823][T28914] EXT4-fs error (device loop6): ext4_do_update_inode:5617: inode #13: comm syz.6.6320: corrupted inode contents [ 410.061733][T28914] EXT4-fs error (device loop6): __ext4_ext_dirty:206: inode #13: comm syz.6.6320: mark_inode_dirty error [ 410.099225][T28900] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 410.112965][T28900] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 410.142097][T28934] netlink: 'syz.7.6326': attribute type 1 has an invalid length. [ 410.144737][T28914] EXT4-fs error (device loop6): ext4_do_update_inode:5617: inode #13: comm syz.6.6320: corrupted inode contents [ 410.163800][T28914] EXT4-fs error (device loop6) in ext4_orphan_del:303: Corrupt filesystem [ 410.169205][T28934] 8021q: adding VLAN 0 to HW filter on device bond3 [ 410.172662][T28914] EXT4-fs error (device loop6): ext4_do_update_inode:5617: inode #13: comm syz.6.6320: corrupted inode contents [ 410.186670][T28080] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 410.200236][T28914] EXT4-fs error (device loop6): ext4_truncate:4635: inode #13: comm syz.6.6320: mark_inode_dirty error [ 410.205699][T28900] JBD2: no valid journal superblock found [ 410.217588][T28900] EXT4-fs (loop4): Could not load journal inode [ 410.222827][T28914] EXT4-fs error (device loop6) in ext4_process_orphan:345: Corrupt filesystem [ 410.224900][T28937] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6326'. [ 410.253534][T28914] EXT4-fs (loop6): 1 truncate cleaned up [ 410.259936][T28914] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 410.275174][T28937] bond3 (unregistering): Released all slaves [ 410.329368][T22596] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 410.422222][T28951] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #3: comm syz.4.6331: pblk 24 bad header/extent: invalid extent entries - magic f30a, entries 3, max 4(4), depth 0(0) [ 410.441531][T28951] EXT4-fs error (device loop4): ext4_quota_enable:7180: comm syz.4.6331: Bad quota inode: 3, type: 0 [ 410.453534][T28951] EXT4-fs warning (device loop4): ext4_enable_quotas:7221: Failed to enable quota tracking (type=0, err=-117, ino=3). Please run e2fsck to fix. [ 410.468634][T28951] EXT4-fs (loop4): mount failed [ 410.492632][ T3427] hid-generic 0000:3000000:0000.00AC: hidraw0: HID v0.00 Device [sy] on syz0 [ 410.529287][T28962] netlink: 56 bytes leftover after parsing attributes in process `syz.7.6335'. [ 410.546471][T28962] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 410.618378][T28964] netlink: 'syz.7.6335': attribute type 4 has an invalid length. [ 410.626246][T28964] netlink: 152 bytes leftover after parsing attributes in process `syz.7.6335'. [ 410.666833][T28971] EXT4-fs (loop4): ext4_check_descriptors: Block bitmap for group 0 overlaps block group descriptors [ 410.677791][T28971] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (38281!=20869) [ 410.691258][T28971] EXT4-fs (loop4): stripe (65535) is not aligned with cluster size (16), stripe is disabled [ 410.703857][T28971] EXT4-fs error (device loop4): ext4_ext_check_inode:523: inode #3: comm syz.4.6338: pblk 82 bad header/extent: invalid extent entries - magic f30a, entries 2, max 4(4), depth 0(0) [ 410.731842][T28971] EXT4-fs (loop4): no journal found [ 410.737097][T28971] EXT4-fs (loop4): can't get journal size [ 410.749517][T28971] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 410.775390][T28730] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 410.795399][T28979] syzkaller1: entered promiscuous mode [ 410.800934][T28979] syzkaller1: entered allmulticast mode [ 410.850856][T28542] hid-generic 0000:3000000:0000.00AD: hidraw0: HID v0.00 Device [sy] on syz0 [ 410.907204][T28988] netlink: 56 bytes leftover after parsing attributes in process `syz.7.6346'. [ 410.911588][T18579] hid-generic 0000:3000000:0000.00AE: hidraw0: HID v0.00 Device [sy] on syz0 [ 410.947794][T28991] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6347'. [ 410.960111][T28988] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 411.051415][T28997] netlink: 28 bytes leftover after parsing attributes in process `syz.7.6349'. [ 411.097820][T29002] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6351'. [ 411.255511][T28542] hid_parser_main: 151 callbacks suppressed [ 411.255566][T28542] hid-generic 0000:3000000:0000.00AF: unknown main item tag 0x4 [ 411.269179][T28542] hid-generic 0000:3000000:0000.00AF: unknown main item tag 0x2 [ 411.291381][T28542] hid-generic 0000:3000000:0000.00AF: unknown main item tag 0x0 [ 411.299124][T28542] hid-generic 0000:3000000:0000.00AF: unknown main item tag 0x0 [ 411.306816][T28542] hid-generic 0000:3000000:0000.00AF: unknown main item tag 0x0 [ 411.314569][T28542] hid-generic 0000:3000000:0000.00AF: unknown main item tag 0x0 [ 411.322293][T28542] hid-generic 0000:3000000:0000.00AF: unknown main item tag 0x0 [ 411.329945][T28542] hid-generic 0000:3000000:0000.00AF: unknown main item tag 0x0 [ 411.337742][T28542] hid-generic 0000:3000000:0000.00AF: unknown main item tag 0x0 [ 411.345433][T28542] hid-generic 0000:3000000:0000.00AF: unknown main item tag 0x0 [ 411.353852][T28542] hid-generic 0000:3000000:0000.00AF: hidraw0: HID v0.00 Device [sy] on syz0 [ 411.530893][T29008] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 411.542374][T29008] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 411.557527][T29008] JBD2: no valid journal superblock found [ 411.563867][T29008] EXT4-fs (loop7): Could not load journal inode [ 411.622643][T28542] hid-generic 0000:3000000:0000.00B0: hidraw0: HID v0.00 Device [sy] on syz0 [ 411.884303][T29026] netlink: 56 bytes leftover after parsing attributes in process `syz.7.6360'. [ 411.897748][T29026] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 412.268300][T18579] hid-generic 0000:3000000:0000.00B1: hidraw0: HID v0.00 Device [sy] on syz0 [ 412.314057][T29044] set_capacity_and_notify: 7 callbacks suppressed [ 412.314073][T29044] loop6: detected capacity change from 0 to 512 [ 412.331923][T29044] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 412.421392][T22596] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 412.459362][T29048] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 412.527491][T29049] netlink: 'syz.6.6368': attribute type 4 has an invalid length. [ 412.556774][T29051] loop6: detected capacity change from 0 to 1024 [ 412.571869][T29051] loop6: detected capacity change from 0 to 1024 [ 412.581038][T29051] EXT4-fs error (device loop6): ext4_orphan_get:1417: comm syz.6.6369: bad orphan inode 134217728 [ 412.592780][T29051] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 412.750094][T22596] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 412.793856][T28542] hid-generic 0000:3000000:0000.00B2: hidraw0: HID v0.00 Device [sy] on syz0 [ 413.063530][T29075] loop3: detected capacity change from 0 to 512 [ 413.070317][T29075] EXT4-fs: quotafile must be on filesystem root [ 413.074675][T29076] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 413.124633][T29075] loop3: detected capacity change from 0 to 2048 [ 413.140043][T29082] netlink: 'syz.4.6379': attribute type 4 has an invalid length. [ 413.148874][T29075] GPT:first_usable_lbas don't match. [ 413.154247][T29075] GPT:34 != 290 [ 413.157708][T29075] GPT: Use GNU Parted to correct GPT errors. [ 413.158203][T29083] netdevsim netdevsim2: loading /lib/firmware/. failed with error -22 [ 413.163894][T29075] loop3: p1 p2 p3 [ 413.171966][T29083] netdevsim netdevsim2: Direct firmware load for . failed with error -22 [ 413.188811][T29082] .`: renamed from bond0 (while UP) [ 413.198056][ T3486] IPVS: starting estimator thread 0... [ 413.221299][T29086] syzkaller0: entered promiscuous mode [ 413.226823][T29086] syzkaller0: entered allmulticast mode [ 413.310423][T29084] IPVS: using max 2400 ests per chain, 120000 per kthread [ 413.321390][ T29] kauditd_printk_skb: 163 callbacks suppressed [ 413.321559][ T29] audit: type=1326 audit(2000000467.701:98307): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29074 comm="syz.3.6380" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90a953f749 code=0x7ffc0000 [ 413.351458][ T29] audit: type=1326 audit(2000000467.701:98308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29074 comm="syz.3.6380" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f90a953f749 code=0x7ffc0000 [ 413.384364][ T29] audit: type=1400 audit(2000000467.761:98309): avc: denied { kexec_image_load } for pid=29089 comm="syz.4.6386" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 413.455194][T29094] netlink: 'syz.4.6386': attribute type 1 has an invalid length. [ 413.488962][T29097] loop7: detected capacity change from 0 to 1024 [ 413.501668][ T29] audit: type=1400 audit(2000000467.881:98310): avc: denied { create } for pid=29098 comm="syz.2.6389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 413.512339][T29097] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 413.521420][ T29] audit: type=1400 audit(2000000467.881:98311): avc: denied { write } for pid=29098 comm="syz.2.6389" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 413.521552][ T29] audit: type=1400 audit(2000000467.881:98312): avc: denied { ioctl } for pid=29098 comm=2B935B40 path="socket:[77132]" dev="sockfs" ino=77132 ioctlcmd=0x48cb scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 413.521583][ T29] audit: type=1400 audit(2000000467.881:98313): avc: denied { bind } for pid=29098 comm="" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 413.597299][T29097] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 413.608955][ T29] audit: type=1400 audit(2000000467.981:98314): avc: denied { create } for pid=29098 comm="" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 413.609359][T29097] JBD2: no valid journal superblock found [ 413.628906][T29099] __nla_validate_parse: 6 callbacks suppressed [ 413.628920][T29099] netlink: 56 bytes leftover after parsing attributes in process `'. [ 413.634761][T29097] EXT4-fs (loop7): Could not load journal inode [ 413.653781][ T29] audit: type=1400 audit(2000000468.001:98315): avc: denied { write } for pid=29098 comm="" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 413.675227][ T29] audit: type=1400 audit(2000000468.001:98316): avc: denied { nlmsg_write } for pid=29098 comm="" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 413.736120][T29103] loop6: detected capacity change from 0 to 512 [ 413.742966][T29103] EXT4-fs: Ignoring removed i_version option [ 413.755428][T29103] EXT4-fs (loop6): orphan cleanup on readonly fs [ 413.769728][T29103] EXT4-fs warning (device loop6): ext4_xattr_inode_get:560: inode #11: comm syz.6.6391: EA inode hash validation failed [ 413.782461][T29103] EXT4-fs warning (device loop6): ext4_expand_extra_isize_ea:2857: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 413.795579][T29103] EXT4-fs error (device loop6): ext4_xattr_inode_update_ref:1037: inode #11: comm syz.6.6391: EA inode 11 ref wraparound: ref_count=0 ref_change=-1 [ 413.826575][T29103] EXT4-fs (loop6): Remounting filesystem read-only [ 413.833153][T29103] EXT4-fs warning (device loop6): ext4_xattr_inode_dec_ref_all:1230: inode #11: comm syz.6.6391: ea_inode dec ref err=-117 [ 413.846566][T29103] EXT4-fs warning (device loop6): ext4_evict_inode:273: xattr delete (err -30) [ 413.855702][T29103] EXT4-fs (loop6): 1 orphan inode deleted [ 413.862058][T29103] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: none. [ 413.961758][T29114] netlink: 56 bytes leftover after parsing attributes in process `syz.3.6395'. [ 413.974915][T29114] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 414.038719][T29116] netlink: 'syz.3.6395': attribute type 4 has an invalid length. [ 414.046531][T29116] netlink: 152 bytes leftover after parsing attributes in process `syz.3.6395'. [ 414.061568][T29116] .`: renamed from bond0 (while UP) [ 414.224425][T29126] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6400'. [ 414.233580][T29126] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 414.245133][T29126] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 414.464526][T29134] loop4: detected capacity change from 0 to 1024 [ 414.479486][T29134] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 414.490826][T29134] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 414.506941][T29134] JBD2: no valid journal superblock found [ 414.513301][T29134] EXT4-fs (loop4): Could not load journal inode [ 414.607311][T29143] loop4: detected capacity change from 0 to 1024 [ 414.617938][T29143] EXT4-fs error (device loop4): ext4_acquire_dquot:6986: comm syz.4.6406: Failed to acquire dquot type 0 [ 414.630453][T29143] EXT4-fs error (device loop4): mb_free_blocks:2037: group 0, inode 13: block 144:freeing already freed block (bit 9); block bitmap corrupt. [ 414.646468][T22596] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 414.650481][T29143] EXT4-fs error (device loop4): ext4_do_update_inode:5617: inode #13: comm syz.4.6406: corrupted inode contents [ 414.671801][T29143] EXT4-fs error (device loop4): ext4_dirty_inode:6502: inode #13: comm syz.4.6406: mark_inode_dirty error [ 414.684066][T29143] EXT4-fs error (device loop4): ext4_do_update_inode:5617: inode #13: comm syz.4.6406: corrupted inode contents [ 414.711307][T29149] loop7: detected capacity change from 0 to 2048 [ 414.715208][T29151] can0: slcan on ttyS3. [ 414.722710][T29143] EXT4-fs error (device loop4): __ext4_ext_dirty:206: inode #13: comm syz.4.6406: mark_inode_dirty error [ 414.734319][T29143] EXT4-fs error (device loop4): ext4_do_update_inode:5617: inode #13: comm syz.4.6406: corrupted inode contents [ 414.746775][T29143] EXT4-fs error (device loop4) in ext4_orphan_del:303: Corrupt filesystem [ 414.755552][T29143] EXT4-fs error (device loop4): ext4_do_update_inode:5617: inode #13: comm syz.4.6406: corrupted inode contents [ 414.762635][T29151] can0 (unregistered): slcan off ttyS3. [ 414.767704][T29143] EXT4-fs error (device loop4): ext4_truncate:4635: inode #13: comm syz.4.6406: mark_inode_dirty error [ 414.795615][T29143] EXT4-fs error (device loop4) in ext4_process_orphan:345: Corrupt filesystem [ 414.795931][T29149] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 414.805116][T29143] EXT4-fs (loop4): 1 truncate cleaned up [ 414.823127][T29143] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 414.836199][T29154] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 414.856368][T29149] ext4 filesystem being mounted at /350/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 414.916754][T28730] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 414.937278][T24391] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 414.995071][T29160] msdos: Unknown parameter 'dqbug' [ 415.045272][T29167] netlink: 'syz.6.6414': attribute type 1 has an invalid length. [ 415.059858][T29167] 8021q: adding VLAN 0 to HW filter on device bond7 [ 415.101640][T29174] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 415.112604][T29174] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 415.134921][T29176] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6414'. [ 415.203903][T29174] JBD2: no valid journal superblock found [ 415.209661][T29174] EXT4-fs (loop7): Could not load journal inode [ 415.229849][T29176] bond7 (unregistering): Released all slaves [ 415.323294][T29189] FAULT_INJECTION: forcing a failure. [ 415.323294][T29189] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 415.336630][T29189] CPU: 1 UID: 0 PID: 29189 Comm: syz.6.6422 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 415.336667][T29189] Tainted: [W]=WARN [ 415.336674][T29189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 415.336687][T29189] Call Trace: [ 415.336694][T29189] [ 415.336702][T29189] __dump_stack+0x1d/0x30 [ 415.336784][T29189] dump_stack_lvl+0x95/0xd0 [ 415.336807][T29189] dump_stack+0x15/0x1b [ 415.336893][T29189] should_fail_ex+0x265/0x280 [ 415.336980][T29189] should_fail_alloc_page+0xf2/0x100 [ 415.337007][T29189] __alloc_frozen_pages_noprof+0x109/0x360 [ 415.337057][T29189] alloc_pages_mpol+0xb3/0x260 [ 415.337088][T29189] alloc_pages_noprof+0x90/0x130 [ 415.337194][T29189] get_free_pages_noprof+0xc/0x40 [ 415.337223][T29189] selinux_genfs_get_sid+0x33/0x180 [ 415.337288][T29189] inode_doinit_with_dentry+0x5fd/0x7a0 [ 415.337312][T29189] selinux_d_instantiate+0x27/0x40 [ 415.337331][T29189] security_d_instantiate+0x7a/0xa0 [ 415.337390][T29189] __d_obtain_alias+0xd2/0x580 [ 415.337420][T29189] ? unlock_new_inode+0x70/0xa0 [ 415.337441][T29189] ? kernfs_put+0x1d3/0x220 [ 415.337487][T29189] d_obtain_alias+0x1a/0x30 [ 415.337511][T29189] kernfs_fh_to_dentry+0xce/0x100 [ 415.337533][T29189] exportfs_decode_fh_raw+0xba/0x4d0 [ 415.337613][T29189] ? __pfx_vfs_dentry_acceptable+0x10/0x10 [ 415.337643][T29189] ? kstrtouint+0x76/0xc0 [ 415.337670][T29189] ? should_failslab+0x8c/0xb0 [ 415.337710][T29189] do_handle_to_path+0x6c/0xe0 [ 415.337785][T29189] do_handle_open+0x500/0x710 [ 415.337892][T29189] __x64_sys_open_by_handle_at+0x44/0x50 [ 415.337995][T29189] x64_sys_call+0x2b6a/0x3000 [ 415.338022][T29189] do_syscall_64+0xca/0x2b0 [ 415.338052][T29189] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 415.338075][T29189] RIP: 0033:0x7f6d3a0af749 [ 415.338147][T29189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 415.338238][T29189] RSP: 002b:00007f6d38b17038 EFLAGS: 00000246 ORIG_RAX: 0000000000000130 [ 415.338313][T29189] RAX: ffffffffffffffda RBX: 00007f6d3a305fa0 RCX: 00007f6d3a0af749 [ 415.338327][T29189] RDX: 0000000000408100 RSI: 0000200000000100 RDI: 0000000000000005 [ 415.338340][T29189] RBP: 00007f6d38b17090 R08: 0000000000000000 R09: 0000000000000000 [ 415.338352][T29189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 415.338365][T29189] R13: 00007f6d3a306038 R14: 00007f6d3a305fa0 R15: 00007fffc6a16df8 [ 415.338386][T29189] [ 415.338853][T29187] netlink: 'syz.3.6419': attribute type 1 has an invalid length. [ 416.060593][T29205] FAULT_INJECTION: forcing a failure. [ 416.060593][T29205] name failslab, interval 1, probability 0, space 0, times 0 [ 416.073265][T29205] CPU: 0 UID: 0 PID: 29205 Comm: syz.2.6428 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 416.073323][T29205] Tainted: [W]=WARN [ 416.073329][T29205] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 416.073340][T29205] Call Trace: [ 416.073347][T29205] [ 416.073355][T29205] __dump_stack+0x1d/0x30 [ 416.073383][T29205] dump_stack_lvl+0x95/0xd0 [ 416.073452][T29205] dump_stack+0x15/0x1b [ 416.073474][T29205] should_fail_ex+0x265/0x280 [ 416.073500][T29205] should_failslab+0x8c/0xb0 [ 416.073584][T29205] kmem_cache_alloc_noprof+0x69/0x4b0 [ 416.073654][T29205] ? skb_clone+0x151/0x1f0 [ 416.073672][T29205] skb_clone+0x151/0x1f0 [ 416.073688][T29205] __netlink_deliver_tap+0x2c9/0x500 [ 416.073739][T29205] netlink_unicast+0x66b/0x690 [ 416.073756][T29205] netlink_sendmsg+0x58b/0x6b0 [ 416.073775][T29205] ? __pfx_netlink_sendmsg+0x10/0x10 [ 416.073814][T29205] __sock_sendmsg+0x145/0x180 [ 416.073827][T29205] ____sys_sendmsg+0x31e/0x4a0 [ 416.073923][T29205] ___sys_sendmsg+0x17b/0x1d0 [ 416.073946][T29205] __x64_sys_sendmsg+0xd4/0x160 [ 416.074030][T29205] x64_sys_call+0x17ba/0x3000 [ 416.074044][T29205] do_syscall_64+0xca/0x2b0 [ 416.074119][T29205] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 416.074139][T29205] RIP: 0033:0x7f319cdbf749 [ 416.074150][T29205] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 416.074222][T29205] RSP: 002b:00007f319b81f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 416.074235][T29205] RAX: ffffffffffffffda RBX: 00007f319d015fa0 RCX: 00007f319cdbf749 [ 416.074243][T29205] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000003 [ 416.074250][T29205] RBP: 00007f319b81f090 R08: 0000000000000000 R09: 0000000000000000 [ 416.074258][T29205] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 416.074265][T29205] R13: 00007f319d016038 R14: 00007f319d015fa0 R15: 00007ffc7ece64f8 [ 416.074277][T29205] [ 416.315477][T29210] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6430'. [ 416.408610][T29219] EXT4-fs: quotafile must be on filesystem root [ 416.470861][ T4100] hid_parser_main: 54 callbacks suppressed [ 416.470879][ T4100] hid-generic 0000:3000000:0000.00B3: unknown main item tag 0x4 [ 416.484452][ T4100] hid-generic 0000:3000000:0000.00B3: unknown main item tag 0x2 [ 416.493146][T29219] GPT:first_usable_lbas don't match. [ 416.498585][T29219] GPT:34 != 290 [ 416.502069][T29219] GPT: Use GNU Parted to correct GPT errors. [ 416.508343][T29219] loop3: p1 p2 p3 [ 416.512379][ T4100] hid-generic 0000:3000000:0000.00B3: unknown main item tag 0x0 [ 416.520215][ T4100] hid-generic 0000:3000000:0000.00B3: unknown main item tag 0x0 [ 416.527956][ T4100] hid-generic 0000:3000000:0000.00B3: unknown main item tag 0x0 [ 416.535767][ T4100] hid-generic 0000:3000000:0000.00B3: unknown main item tag 0x0 [ 416.543446][ T4100] hid-generic 0000:3000000:0000.00B3: unknown main item tag 0x0 [ 416.551214][ T4100] hid-generic 0000:3000000:0000.00B3: unknown main item tag 0x0 [ 416.559019][ T4100] hid-generic 0000:3000000:0000.00B3: unknown main item tag 0x0 [ 416.566785][ T4100] hid-generic 0000:3000000:0000.00B3: unknown main item tag 0x0 [ 416.580883][ T4100] hid-generic 0000:3000000:0000.00B3: hidraw0: HID v0.00 Device [sy] on syz0 [ 416.612788][T29231] pim6reg: entered allmulticast mode [ 416.659273][T29240] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6444'. [ 417.130052][T29257] EXT4-fs: Ignoring removed nomblk_io_submit option [ 417.137007][ T4100] hid-generic 0000:0000:0000.00B4: hidraw0: HID v0.00 Device [syz1] on syz0 [ 417.142159][T29257] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 417.157268][T29257] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 417.181492][T28080] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 417.231559][T28080] FAT-fs (loop3): error, corrupted directory (invalid entries) [ 417.239311][T28080] FAT-fs (loop3): Filesystem has been set read-only [ 417.246238][T28080] FAT-fs (loop3): error, corrupted directory (invalid entries) [ 417.509406][T29267] set_capacity_and_notify: 6 callbacks suppressed [ 417.509423][T29267] loop6: detected capacity change from 0 to 256 [ 417.649467][T22596] FAT-fs (loop6): error, corrupted directory (invalid entries) [ 417.657170][T22596] FAT-fs (loop6): Filesystem has been set read-only [ 417.674807][T22596] FAT-fs (loop6): error, corrupted directory (invalid entries) [ 417.841230][T29297] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 417.850953][T29297] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6462'. [ 417.921880][ T3486] hid-generic 0000:3000000:0000.00B5: hidraw0: HID v0.00 Device [sy] on syz0 [ 417.937617][T29277] lo speed is unknown, defaulting to 1000 [ 418.005245][T21427] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.073175][T21427] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.115445][T29277] chnl_net:caif_netlink_parms(): no params data found [ 418.142243][T21427] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.184375][T21427] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.207536][T29277] bridge0: port 1(bridge_slave_0) entered blocking state [ 418.215047][T29277] bridge0: port 1(bridge_slave_0) entered disabled state [ 418.242850][T29277] bridge_slave_0: entered allmulticast mode [ 418.249430][T29277] bridge_slave_0: entered promiscuous mode [ 418.262214][T29277] bridge0: port 2(bridge_slave_1) entered blocking state [ 418.269325][T29277] bridge0: port 2(bridge_slave_1) entered disabled state [ 418.276670][T29277] bridge_slave_1: entered allmulticast mode [ 418.283836][T29277] bridge_slave_1: entered promiscuous mode [ 418.309689][T29265] loop7: detected capacity change from 0 to 1024 [ 418.341601][T29265] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 418.353738][T29265] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 418.378249][T29265] JBD2: no valid journal superblock found [ 418.384547][T29265] EXT4-fs (loop7): Could not load journal inode [ 418.463129][ T29] kauditd_printk_skb: 204 callbacks suppressed [ 418.463145][ T29] audit: type=1400 audit(2000000472.841:98519): avc: denied { bind } for pid=29327 comm="syz.7.6469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 418.490485][T21427] .` (unregistering): (slave bond_slave_0): Releasing backup interface [ 418.501020][ T29] audit: type=1400 audit(2000000472.871:98520): avc: denied { setopt } for pid=29327 comm="syz.7.6469" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 418.523462][T21427] .` (unregistering): (slave bond_slave_1): Releasing backup interface [ 418.533088][T21427] .` (unregistering): Released all slaves [ 418.541736][T21427] bond0 (unregistering): Released all slaves [ 418.550912][T21427] bond1 (unregistering): Released all slaves [ 418.560331][T21427] bond2 (unregistering): Released all slaves [ 418.569555][T21427] bond3 (unregistering): Released all slaves [ 418.579259][T21427] bond4 (unregistering): Released all slaves [ 418.588099][T21427] bond5 (unregistering): Released all slaves [ 418.597955][T21427] bond6 (unregistering): Released all slaves [ 418.607782][T29277] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 418.619232][T29277] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 418.647791][T29328] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.658697][T21427] tipc: Disabling bearer [ 418.663693][T21427] tipc: Left network mode [ 418.664154][T29312] lo speed is unknown, defaulting to 1000 [ 418.681252][T29331] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.699362][T29277] team0: Port device team_slave_0 added [ 418.706709][T29277] team0: Port device team_slave_1 added [ 418.743086][T29328] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.755605][T21427] hsr_slave_0: left promiscuous mode [ 418.764743][T21427] veth1_macvtap: left promiscuous mode [ 418.770363][T21427] veth0_macvtap: left promiscuous mode [ 418.775877][T21427] veth1_vlan: left promiscuous mode [ 418.781323][T21427] veth0_vlan: left promiscuous mode [ 418.844344][T21462] smc: removing ib device syz! [ 418.865060][T29277] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 418.872066][T29277] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 418.897994][T29277] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 418.913157][T29328] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 418.924452][T29277] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 418.931525][T29277] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 418.957489][T29277] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 419.006414][T29331] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 419.036329][T29336] netlink: 76 bytes leftover after parsing attributes in process `syz.4.6472'. [ 419.051369][T29328] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 419.116259][T29331] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 419.165035][T29277] hsr_slave_0: entered promiscuous mode [ 419.178435][T29277] hsr_slave_1: entered promiscuous mode [ 419.186551][T29277] debugfs: 'hsr0' already exists in 'hsr' [ 419.192318][T29277] Cannot create hsr debugfs directory [ 419.236728][T21462] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 419.262908][T29331] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 419.291128][T21462] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 419.314708][ T29] audit: type=1400 audit(2000000473.681:98521): avc: denied { ioctl } for pid=29346 comm="syz.7.6474" path="socket:[78550]" dev="sockfs" ino=78550 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 419.321281][T29347] netlink: 4 bytes leftover after parsing attributes in process `syz.7.6474'. [ 419.365115][T29347] loop7: detected capacity change from 0 to 512 [ 419.366953][T21420] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 419.387545][T29347] EXT4-fs warning (device loop7): dx_probe:846: Directory (ino: 2) htree depth 0x0002 exceedsupported value [ 419.399127][T29347] EXT4-fs warning (device loop7): dx_probe:849: Enable large directory feature to access it [ 419.409353][T29347] EXT4-fs warning (device loop7): dx_probe:934: inode #2: comm syz.7.6474: Corrupt directory, running e2fsck is recommended [ 419.424536][T21420] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 419.439140][T29347] EXT4-fs (loop7): Cannot turn on journaled quota: type 1: error -2 [ 419.448278][T29347] EXT4-fs error (device loop7): ext4_iget_extra_inode:5073: inode #15: comm syz.7.6474: corrupted in-inode xattr: invalid ea_ino [ 419.461943][T29347] EXT4-fs error (device loop7): ext4_orphan_get:1396: comm syz.7.6474: couldn't read orphan inode 15 (err -117) [ 419.474605][T29347] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 419.487603][T29353] netlink: 'syz.4.6475': attribute type 12 has an invalid length. [ 419.495758][T21420] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 419.506491][T29312] chnl_net:caif_netlink_parms(): no params data found [ 419.525542][T24391] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 419.525993][T29355] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6476'. [ 419.545047][T21420] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 419.576077][T21420] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 419.611983][T21420] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 419.632849][T29362] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6479'. [ 419.642087][ T29] audit: type=1400 audit(2000000474.011:98522): avc: denied { bind } for pid=29360 comm="syz.4.6479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 419.661912][ T29] audit: type=1400 audit(2000000474.011:98523): avc: denied { name_bind } for pid=29360 comm="syz.4.6479" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 419.684213][ T29] audit: type=1400 audit(2000000474.011:98524): avc: denied { node_bind } for pid=29360 comm="syz.4.6479" src=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 419.705312][ T29] audit: type=1400 audit(2000000474.011:98525): avc: denied { bind } for pid=29360 comm="syz.4.6479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 419.727374][T29365] netlink: 'syz.2.6480': attribute type 178 has an invalid length. [ 419.761036][T29312] bridge0: port 1(bridge_slave_0) entered blocking state [ 419.768129][T29312] bridge0: port 1(bridge_slave_0) entered disabled state [ 419.778481][T29312] bridge_slave_0: entered allmulticast mode [ 419.785829][T29312] bridge_slave_0: entered promiscuous mode [ 419.795236][T29277] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 419.804161][T29277] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 419.814533][T29277] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 419.824250][T29312] bridge0: port 2(bridge_slave_1) entered blocking state [ 419.831577][T29312] bridge0: port 2(bridge_slave_1) entered disabled state [ 419.831952][ T29] audit: type=1400 audit(2000000474.201:98526): avc: denied { create } for pid=29371 comm="syz.4.6482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 419.839209][T29312] bridge_slave_1: entered allmulticast mode [ 419.865414][T29312] bridge_slave_1: entered promiscuous mode [ 419.871500][ T29] audit: type=1400 audit(2000000474.251:98527): avc: denied { ioctl } for pid=29371 comm="syz.4.6482" path="socket:[79097]" dev="sockfs" ino=79097 ioctlcmd=0x7453 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 419.897947][ T29] audit: type=1400 audit(2000000474.271:98528): avc: denied { create } for pid=29371 comm="syz.4.6482" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 419.898444][T29277] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 419.928531][T29376] loop7: detected capacity change from 0 to 512 [ 419.935566][T29376] EXT4-fs: quotafile must be on filesystem root [ 419.956585][T29376] loop7: detected capacity change from 0 to 2048 [ 420.004920][T29376] GPT:first_usable_lbas don't match. [ 420.010239][T29376] GPT:34 != 290 [ 420.013789][T29376] GPT: Use GNU Parted to correct GPT errors. [ 420.020020][T29376] loop7: p1 p2 p3 [ 420.025270][T29312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 420.061909][T29312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 420.082724][T29277] 8021q: adding VLAN 0 to HW filter on device bond0 [ 420.335700][T29388] bridge0: port 2(bridge_slave_1) entered disabled state [ 420.342914][T29388] bridge0: port 1(bridge_slave_0) entered disabled state [ 420.481370][T29398] netlink: 28 bytes leftover after parsing attributes in process `syz.7.6488'. [ 420.702280][T29388] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 420.975002][T29312] team0: Port device team_slave_0 added [ 420.985090][T29394] bridge0: port 3(batadv1) entered blocking state [ 420.991661][T29394] bridge0: port 3(batadv1) entered disabled state [ 420.998344][T29394] batadv1: entered allmulticast mode [ 421.004212][T29394] batadv1: entered promiscuous mode [ 421.012127][T21420] netdevsim netdevsim4 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 421.022781][T29312] team0: Port device team_slave_1 added [ 421.029946][T21420] netdevsim netdevsim4 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 421.041962][T29277] 8021q: adding VLAN 0 to HW filter on device team0 [ 421.067358][T21427] netdevsim netdevsim4 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 421.082951][T29408] GUP no longer grows the stack in syz.4.6492 (29408): 200000004000-200000008000 (200000002000) [ 421.093505][T29408] CPU: 0 UID: 0 PID: 29408 Comm: syz.4.6492 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 421.093590][T29408] Tainted: [W]=WARN [ 421.093595][T29408] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 421.093603][T29408] Call Trace: [ 421.093607][T29408] [ 421.093613][T29408] __dump_stack+0x1d/0x30 [ 421.093630][T29408] dump_stack_lvl+0x95/0xd0 [ 421.093699][T29408] dump_stack+0x15/0x1b [ 421.093711][T29408] __get_user_pages+0x1979/0x1ed0 [ 421.093732][T29408] ? __rcu_read_unlock+0x4f/0x70 [ 421.093752][T29408] get_user_pages_remote+0x1d5/0x6c0 [ 421.093824][T29408] __access_remote_vm+0x15c/0x590 [ 421.093844][T29408] access_remote_vm+0x32/0x40 [ 421.093861][T29408] proc_pid_cmdline_read+0x32b/0x6c0 [ 421.093912][T29408] ? __pfx_proc_pid_cmdline_read+0x10/0x10 [ 421.093927][T29408] vfs_readv+0x3fb/0x690 [ 421.093946][T29408] __x64_sys_preadv+0xfd/0x1c0 [ 421.093975][T29408] x64_sys_call+0x2805/0x3000 [ 421.093989][T29408] do_syscall_64+0xca/0x2b0 [ 421.094039][T29408] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 421.094128][T29408] RIP: 0033:0x7f19c9e9f749 [ 421.094138][T29408] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 421.094149][T29408] RSP: 002b:00007f19c8907038 EFLAGS: 00000246 ORIG_RAX: 0000000000000127 [ 421.094236][T29408] RAX: ffffffffffffffda RBX: 00007f19ca0f5fa0 RCX: 00007f19c9e9f749 [ 421.094244][T29408] RDX: 0000000000000001 RSI: 0000200000001040 RDI: 0000000000000005 [ 421.094251][T29408] RBP: 00007f19c9f23f91 R08: 0000000000000007 R09: 0000000000000000 [ 421.094259][T29408] R10: 0000000000000300 R11: 0000000000000246 R12: 0000000000000000 [ 421.094266][T29408] R13: 00007f19ca0f6038 R14: 00007f19ca0f5fa0 R15: 00007ffec4283208 [ 421.094276][T29408] [ 421.096533][T21427] netdevsim netdevsim4 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 421.167142][T29409] netlink: 56 bytes leftover after parsing attributes in process `syz.7.6491'. [ 421.178812][T29312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 421.238114][T29412] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 421.242400][T29312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 421.258561][T29411] loop4: detected capacity change from 0 to 512 [ 421.266367][T29312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 421.268007][T21420] bridge0: port 1(bridge_slave_0) entered blocking state [ 421.280477][T29411] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 421.286408][T21420] bridge0: port 1(bridge_slave_0) entered forwarding state [ 421.297944][T29277] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 421.302346][T29411] EXT4-fs (loop4): feature flags set on rev 0 fs, running e2fsck is recommended [ 421.397731][T29277] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 421.419659][T29411] EXT4-fs (loop4): failed to initialize system zone (-117) [ 421.428006][T29312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 421.435025][T29312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 421.435087][T29411] EXT4-fs (loop4): mount failed [ 421.460991][T29312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 421.477970][T29412] netlink: 'syz.7.6491': attribute type 4 has an invalid length. [ 421.485739][T29412] netlink: 152 bytes leftover after parsing attributes in process `syz.7.6491'. [ 421.494825][T21462] batman_adv: batadv1: No IGMP Querier present - multicast optimizations disabled [ 421.504121][T21462] batman_adv: batadv1: No MLD Querier present - multicast optimizations disabled [ 421.521966][T21420] bridge0: port 2(bridge_slave_1) entered blocking state [ 421.529047][T21420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 421.569591][T29312] hsr_slave_0: entered promiscuous mode [ 421.584014][T29312] hsr_slave_1: entered promiscuous mode [ 421.589993][T29312] debugfs: 'hsr0' already exists in 'hsr' [ 421.595801][T29312] Cannot create hsr debugfs directory [ 421.645739][T29431] loop7: detected capacity change from 0 to 1024 [ 421.652557][T29431] EXT4-fs: Ignoring removed orlov option [ 421.655248][T29428] netlink: 'syz.4.6495': attribute type 1 has an invalid length. [ 421.669831][T29431] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 421.679760][T29277] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 421.776123][T29312] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 421.790917][T29312] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 421.828381][T29312] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 421.844349][T29312] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 421.959025][T29312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 421.967442][T29277] veth0_vlan: entered promiscuous mode [ 421.975670][T29277] veth1_vlan: entered promiscuous mode [ 421.997996][T29312] 8021q: adding VLAN 0 to HW filter on device team0 [ 422.006331][T29277] veth0_macvtap: entered promiscuous mode [ 422.015471][T29277] veth1_macvtap: entered promiscuous mode [ 422.028384][T21466] bridge0: port 1(bridge_slave_0) entered blocking state [ 422.035499][T21466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 422.053302][T21466] bridge0: port 2(bridge_slave_1) entered blocking state [ 422.060399][T21466] bridge0: port 2(bridge_slave_1) entered forwarding state [ 422.079277][T29277] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 422.102719][T29277] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 422.117176][T21462] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 422.156862][T21462] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 422.172079][T21466] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 422.185739][T21466] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 422.304624][T29312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 422.335427][T29467] netlink: 28 bytes leftover after parsing attributes in process `syz.8.6499'. [ 422.399104][T29471] raw_sendmsg: syz.8.6500 forgot to set AF_INET. Fix it! [ 422.509630][T29481] loop8: detected capacity change from 0 to 512 [ 422.537325][T29481] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 422.618261][T29484] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6502'. [ 422.652880][T29312] veth0_vlan: entered promiscuous mode [ 422.662364][T29312] veth1_vlan: entered promiscuous mode [ 422.717111][T29484] loop4: detected capacity change from 0 to 128 [ 422.766877][T29277] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 422.795727][T29502] loop8: detected capacity change from 0 to 1024 [ 422.796887][ T3413] hid_parser_main: 23 callbacks suppressed [ 422.796906][ T3413] hid-generic 0000:3000000:0000.00B6: unknown main item tag 0x4 [ 422.803619][T29312] veth0_macvtap: entered promiscuous mode [ 422.808023][ T3413] hid-generic 0000:3000000:0000.00B6: unknown main item tag 0x2 [ 422.833834][T29312] veth1_macvtap: entered promiscuous mode [ 422.844693][T29502] loop8: detected capacity change from 0 to 1024 [ 422.857674][T29312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 422.862983][ T3413] hid-generic 0000:3000000:0000.00B6: unknown main item tag 0x0 [ 422.867660][T29312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 422.872620][ T3413] hid-generic 0000:3000000:0000.00B6: unknown main item tag 0x0 [ 422.887440][ T3413] hid-generic 0000:3000000:0000.00B6: unknown main item tag 0x0 [ 422.895125][ T3413] hid-generic 0000:3000000:0000.00B6: unknown main item tag 0x0 [ 422.902795][ T3413] hid-generic 0000:3000000:0000.00B6: unknown main item tag 0x0 [ 422.910547][ T3413] hid-generic 0000:3000000:0000.00B6: unknown main item tag 0x0 [ 422.918216][ T3413] hid-generic 0000:3000000:0000.00B6: unknown main item tag 0x0 [ 422.925898][ T3413] hid-generic 0000:3000000:0000.00B6: unknown main item tag 0x0 [ 422.935418][ T3413] hid-generic 0000:3000000:0000.00B6: hidraw0: HID v0.00 Device [sy] on syz0 [ 422.935987][T29502] EXT4-fs error (device loop8): ext4_orphan_get:1417: comm syz.8.6507: bad orphan inode 134217728 [ 422.958714][T21462] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 422.959397][T24391] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 422.973161][T21462] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 422.991275][T21462] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.003893][T21462] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 423.019773][T29506] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6509'. [ 423.066128][ T3427] hid-generic 0000:3000000:0000.00B7: hidraw0: HID v0.00 Device [sy] on syz0 [ 423.084619][T29508] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 423.107228][T29518] IPv6: NLM_F_CREATE should be specified when creating new route [ 423.120219][T29518] loop9: detected capacity change from 0 to 1024 [ 423.127430][T29518] EXT4-fs: Ignoring removed orlov option [ 423.145080][T29509] hid-generic 0000:3000000:0000.00B8: hidraw0: HID v0.00 Device [sy] on syz0 [ 423.145712][T29524] loop8: detected capacity change from 0 to 512 [ 423.162321][T29508] netlink: 'syz.7.6508': attribute type 4 has an invalid length. [ 423.187486][T29528] loop7: detected capacity change from 0 to 764 [ 423.194736][T29528] rock: directory entry would overflow storage [ 423.200972][T29528] rock: sig=0x4654, size=5, remaining=4 [ 423.214335][T29518] xt_CT: You must specify a L4 protocol and not use inversions on it [ 423.242447][T29531] FAULT_INJECTION: forcing a failure. [ 423.242447][T29531] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 423.255749][T29531] CPU: 0 UID: 0 PID: 29531 Comm: syz.2.6517 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 423.255782][T29531] Tainted: [W]=WARN [ 423.255788][T29531] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 423.255805][T29531] Call Trace: [ 423.255811][T29531] [ 423.255872][T29531] __dump_stack+0x1d/0x30 [ 423.255894][T29531] dump_stack_lvl+0x95/0xd0 [ 423.255915][T29531] dump_stack+0x15/0x1b [ 423.255932][T29531] should_fail_ex+0x265/0x280 [ 423.255952][T29531] should_fail+0xb/0x20 [ 423.256017][T29531] should_fail_usercopy+0x1a/0x20 [ 423.256038][T29531] _copy_from_iter+0xcf/0xe70 [ 423.256060][T29531] ? __alloc_skb+0x396/0x4b0 [ 423.256080][T29531] ? __alloc_skb+0x228/0x4b0 [ 423.256181][T29531] netlink_sendmsg+0x471/0x6b0 [ 423.256210][T29531] ? __pfx_netlink_sendmsg+0x10/0x10 [ 423.256249][T29531] __sock_sendmsg+0x145/0x180 [ 423.256267][T29531] ____sys_sendmsg+0x31e/0x4a0 [ 423.256294][T29531] ___sys_sendmsg+0x17b/0x1d0 [ 423.256338][T29531] __x64_sys_sendmsg+0xd4/0x160 [ 423.256424][T29531] x64_sys_call+0x17ba/0x3000 [ 423.256446][T29531] do_syscall_64+0xca/0x2b0 [ 423.256499][T29531] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 423.256596][T29531] RIP: 0033:0x7f319cdbf749 [ 423.256611][T29531] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 423.256627][T29531] RSP: 002b:00007f319b81f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 423.256645][T29531] RAX: ffffffffffffffda RBX: 00007f319d015fa0 RCX: 00007f319cdbf749 [ 423.256678][T29531] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000005 [ 423.256690][T29531] RBP: 00007f319b81f090 R08: 0000000000000000 R09: 0000000000000000 [ 423.256702][T29531] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 423.256779][T29531] R13: 00007f319d016038 R14: 00007f319d015fa0 R15: 00007ffc7ece64f8 [ 423.256797][T29531] [ 423.273579][T29524] EXT4-fs: quotafile must be on filesystem root [ 423.347969][ T3427] hid-generic 0000:3000000:0000.00B9: hidraw0: HID v0.00 Device [sy] on syz0 [ 423.426882][T29534] loop8: detected capacity change from 0 to 2048 [ 423.497455][ T29] kauditd_printk_skb: 209 callbacks suppressed [ 423.497468][ T29] audit: type=1326 audit(2000000477.871:98738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29522 comm="syz.8.6515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe6d3caf749 code=0x7ffc0000 [ 423.509474][T29540] loop4: detected capacity change from 0 to 1024 [ 423.527501][ T29] audit: type=1326 audit(2000000477.871:98739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29522 comm="syz.8.6515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe6d3caf749 code=0x7ffc0000 [ 423.602255][T29534] GPT:first_usable_lbas don't match. [ 423.605694][ T3486] hid-generic 0000:3000000:0000.00BA: hidraw0: HID v0.00 Device [sy] on syz0 [ 423.607572][T29534] GPT:34 != 290 [ 423.607583][T29534] GPT: Use GNU Parted to correct GPT errors. [ 423.627240][T29534] loop8: p1 p2 p3 [ 423.634560][ T29] audit: type=1400 audit(2000000478.011:98740): avc: denied { create } for pid=29547 comm="syz.2.6525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 423.663578][ T29] audit: type=1400 audit(2000000478.011:98741): avc: denied { connect } for pid=29547 comm="syz.2.6525" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 423.683423][ T29] audit: type=1326 audit(2000000478.041:98742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29522 comm="syz.8.6515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe6d3caf749 code=0x7ffc0000 [ 423.707236][ T29] audit: type=1326 audit(2000000478.041:98743): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29522 comm="syz.8.6515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe6d3caf749 code=0x7ffc0000 [ 423.731220][ T29] audit: type=1326 audit(2000000478.041:98744): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29522 comm="syz.8.6515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe6d3caf749 code=0x7ffc0000 [ 423.754985][ T29] audit: type=1326 audit(2000000478.041:98745): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29522 comm="syz.8.6515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe6d3caf749 code=0x7ffc0000 [ 423.776150][T29548] lo speed is unknown, defaulting to 1000 [ 423.778730][ T29] audit: type=1326 audit(2000000478.041:98746): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29522 comm="syz.8.6515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fe6d3caf749 code=0x7ffc0000 [ 423.808038][ T29] audit: type=1326 audit(2000000478.041:98747): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29522 comm="syz.8.6515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe6d3caf749 code=0x7ffc0000 [ 424.003398][T21452] netdevsim netdevsim7 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 424.016710][T29563] loop8: detected capacity change from 0 to 512 [ 424.031020][T29563] EXT4-fs (loop8): mounting ext3 file system using the ext4 subsystem [ 424.050223][T29563] EXT4-fs (loop8): invalid journal inode [ 424.056601][T29563] EXT4-fs (loop8): can't get journal size [ 424.064499][T21452] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 424.261278][T29563] EXT4-fs (loop8): 1 truncate cleaned up [ 424.293800][T21452] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 424.355018][T21452] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 424.411376][T29555] loop9: detected capacity change from 0 to 1024 [ 424.432339][T29555] EXT4-fs (loop9): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 424.443896][T29555] EXT4-fs (loop9): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 424.500593][T29580] __nla_validate_parse: 5 callbacks suppressed [ 424.500611][T29580] netlink: 28 bytes leftover after parsing attributes in process `syz.4.6533'. [ 424.555758][T29566] lo speed is unknown, defaulting to 1000 [ 424.598873][T29555] JBD2: no valid journal superblock found [ 424.605145][T29555] EXT4-fs (loop9): Could not load journal inode [ 424.743718][T21452] bridge_slave_1: left allmulticast mode [ 424.749399][T21452] bridge_slave_1: left promiscuous mode [ 424.755105][T21452] bridge0: port 2(bridge_slave_1) entered disabled state [ 424.799358][T21452] bridge_slave_0: left allmulticast mode [ 424.805065][T21452] bridge_slave_0: left promiscuous mode [ 424.810750][T21452] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.101880][T21452] .` (unregistering): (slave bond_slave_0): Releasing backup interface [ 425.111573][T21452] .` (unregistering): (slave bond_slave_1): Releasing backup interface [ 425.121078][T21452] .` (unregistering): Released all slaves [ 425.129254][T21452] bond0 (unregistering): left promiscuous mode [ 425.138600][T21452] bond0 (unregistering): Released all slaves [ 425.147973][T21452] bond1 (unregistering): Released all slaves [ 425.156824][T21452] bond2 (unregistering): Released all slaves [ 425.163368][T29603] ext4: Unknown parameter 'obj_type' [ 425.183281][ T36] infiniband syb2: ib_query_port failed (-19) [ 425.207500][T29609] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=29609 comm=syz.8.6541 [ 425.208033][T29585] lo speed is unknown, defaulting to 1000 [ 425.241677][T21452] IPVS: stopping master sync thread 24666 ... [ 425.261402][T21452] hsr_slave_0: left promiscuous mode [ 425.261933][T29609] netlink: 12 bytes leftover after parsing attributes in process `syz.8.6541'. [ 425.275817][T21452] hsr_slave_1: left promiscuous mode [ 425.281818][T21452] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 425.289300][T21452] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 425.298139][T21452] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 425.305692][T21452] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 425.313448][T21452] batman_adv: batadv0: Interface deactivated: dummy0 [ 425.320174][T21452] batman_adv: batadv0: Removing interface: dummy0 [ 425.329630][T21452] veth1_macvtap: left promiscuous mode [ 425.335373][T21452] veth0_macvtap: left promiscuous mode [ 425.392550][T21452] team0 (unregistering): Port device team_slave_1 removed [ 425.403014][T21452] team0 (unregistering): Port device team_slave_0 removed [ 425.430463][T29617] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6541'. [ 425.457836][ T3485] lo speed is unknown, defaulting to 1000 [ 425.463637][ T3485] infiniband syz2: ib_query_port failed (-19) [ 425.480478][T29566] chnl_net:caif_netlink_parms(): no params data found [ 425.501906][T29619] netlink: 28 bytes leftover after parsing attributes in process `syz.8.6543'. [ 425.579543][T29566] bridge0: port 1(bridge_slave_0) entered blocking state [ 425.586772][T29566] bridge0: port 1(bridge_slave_0) entered disabled state [ 425.607394][T29566] bridge_slave_0: entered allmulticast mode [ 425.621470][T29566] bridge_slave_0: entered promiscuous mode [ 425.653280][T29625] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 425.670037][T29566] bridge0: port 2(bridge_slave_1) entered blocking state [ 425.677359][T29566] bridge0: port 2(bridge_slave_1) entered disabled state [ 425.701047][T29566] bridge_slave_1: entered allmulticast mode [ 425.714510][T29566] bridge_slave_1: entered promiscuous mode [ 425.741742][T29629] bond_slave_0: entered promiscuous mode [ 425.747426][T29629] bond_slave_1: entered promiscuous mode [ 425.755469][T29629] macvtap1: entered allmulticast mode [ 425.760891][T29629] bond0: entered allmulticast mode [ 425.766008][T29629] bond_slave_0: entered allmulticast mode [ 425.771897][T29629] bond_slave_1: entered allmulticast mode [ 425.801278][T29629] 8021q: adding VLAN 0 to HW filter on device macvtap1 [ 425.820818][T29629] bond0: left allmulticast mode [ 425.825749][T29629] bond_slave_0: left allmulticast mode [ 425.831231][T29629] bond_slave_1: left allmulticast mode [ 425.836692][T29629] bond_slave_0: left promiscuous mode [ 425.842071][T29629] bond_slave_1: left promiscuous mode [ 425.864553][T29628] netlink: 20 bytes leftover after parsing attributes in process `syz.4.6545'. [ 425.898526][T29625] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 425.975520][T29566] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 425.995999][T29625] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.029119][T29566] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 426.056580][T29625] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.153477][T29566] team0: Port device team_slave_0 added [ 426.168547][T29566] team0: Port device team_slave_1 added [ 426.222847][T29566] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 426.229896][T29566] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 426.255849][T29566] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 426.314089][T21466] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 426.322955][T29566] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 426.330002][T29566] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 426.356026][T29566] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 426.374705][T21466] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 426.388923][T21466] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 426.419879][T21466] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 426.441384][T29566] hsr_slave_0: entered promiscuous mode [ 426.447586][T29566] hsr_slave_1: entered promiscuous mode [ 426.453920][T29566] debugfs: 'hsr0' already exists in 'hsr' [ 426.459664][T29566] Cannot create hsr debugfs directory [ 426.564939][T29650] netlink: 'syz.2.6552': attribute type 1 has an invalid length. [ 426.602669][T29633] EXT4-fs (loop9): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 426.616719][T29633] EXT4-fs (loop9): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 426.631955][T29633] JBD2: no valid journal superblock found [ 426.638195][T29633] EXT4-fs (loop9): Could not load journal inode [ 426.955649][T29509] hid-generic 0000:0000:0000.00BB: hidraw0: HID v0.00 Device [syz1] on syz0 [ 426.966254][T29675] ext4: Unknown parameter 'obj_type' [ 426.997079][T29566] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 427.006080][T29566] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 427.016048][T29566] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 427.027595][T29566] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 427.068672][T29566] 8021q: adding VLAN 0 to HW filter on device bond0 [ 427.083603][T29566] 8021q: adding VLAN 0 to HW filter on device team0 [ 427.093984][T21466] bridge0: port 1(bridge_slave_0) entered blocking state [ 427.101112][T21466] bridge0: port 1(bridge_slave_0) entered forwarding state [ 427.112335][T21420] bridge0: port 2(bridge_slave_1) entered blocking state [ 427.119428][T21420] bridge0: port 2(bridge_slave_1) entered forwarding state [ 427.211206][T29566] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 427.277836][T29713] EXT4-fs: Ignoring removed orlov option [ 427.280853][T29566] veth0_vlan: entered promiscuous mode [ 427.291828][T29566] veth1_vlan: entered promiscuous mode [ 427.314093][T29566] veth0_macvtap: entered promiscuous mode [ 427.322152][T29566] veth1_macvtap: entered promiscuous mode [ 427.334520][T29566] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 427.347246][T29566] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 427.359426][T21465] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 427.365555][T29721] FAULT_INJECTION: forcing a failure. [ 427.365555][T29721] name failslab, interval 1, probability 0, space 0, times 0 [ 427.380807][T29721] CPU: 0 UID: 0 PID: 29721 Comm: syz.2.6569 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 427.380842][T29721] Tainted: [W]=WARN [ 427.380904][T29721] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 427.380917][T29721] Call Trace: [ 427.380923][T29721] [ 427.380931][T29721] __dump_stack+0x1d/0x30 [ 427.380961][T29721] dump_stack_lvl+0x95/0xd0 [ 427.380983][T29721] dump_stack+0x15/0x1b [ 427.381005][T29721] should_fail_ex+0x265/0x280 [ 427.381216][T29721] should_failslab+0x8c/0xb0 [ 427.381241][T29721] kmem_cache_alloc_node_noprof+0x6b/0x4c0 [ 427.381268][T29721] ? __alloc_skb+0x2ff/0x4b0 [ 427.381295][T29721] __alloc_skb+0x2ff/0x4b0 [ 427.381381][T29721] ? __alloc_skb+0x228/0x4b0 [ 427.381403][T29721] audit_log_start+0x3a0/0x720 [ 427.381447][T29721] ? kstrtouint+0x76/0xc0 [ 427.381468][T29721] audit_seccomp+0x48/0x100 [ 427.381499][T29721] ? __seccomp_filter+0x832/0x1260 [ 427.381533][T29721] __seccomp_filter+0x843/0x1260 [ 427.381573][T29721] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 427.381601][T29721] ? vfs_write+0x7e8/0x960 [ 427.381660][T29721] __secure_computing+0x82/0x150 [ 427.381687][T29721] syscall_trace_enter+0xcf/0x1e0 [ 427.381784][T29721] do_syscall_64+0xa4/0x2b0 [ 427.381819][T29721] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 427.381845][T29721] RIP: 0033:0x7f319cdbf749 [ 427.381861][T29721] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 427.381940][T29721] RSP: 002b:00007f319b81f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000117 [ 427.381970][T29721] RAX: ffffffffffffffda RBX: 00007f319d015fa0 RCX: 00007f319cdbf749 [ 427.381983][T29721] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 427.381995][T29721] RBP: 00007f319b81f090 R08: 0000000000000000 R09: 0000000000000000 [ 427.382007][T29721] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 427.382018][T29721] R13: 00007f319d016038 R14: 00007f319d015fa0 R15: 00007ffc7ece64f8 [ 427.382103][T29721] [ 427.384536][T21465] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 427.608535][T21465] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 427.608623][T21465] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 427.770972][T29734] netlink: 9286 bytes leftover after parsing attributes in process `syz.2.6572'. [ 427.896430][T29740] set_capacity_and_notify: 5 callbacks suppressed [ 427.896444][T29740] loop8: detected capacity change from 0 to 2048 [ 427.926747][T29740] ext4 filesystem being mounted at /20/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 427.933196][T29745] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6576'. [ 427.946098][T29745] netlink: 'syz.4.6576': attribute type 4 has an invalid length. [ 427.953843][T29745] netlink: 'syz.4.6576': attribute type 1 has an invalid length. [ 428.122060][T29745] sch_tbf: burst 22 is lower than device lo mtu (65550) ! [ 428.128744][T20280] hid_parser_main: 71 callbacks suppressed [ 428.128763][T20280] hid-generic 0000:3000000:0000.00BC: unknown main item tag 0x4 [ 428.143068][T20280] hid-generic 0000:3000000:0000.00BC: unknown main item tag 0x2 [ 428.180581][T20280] hid-generic 0000:3000000:0000.00BC: unknown main item tag 0x0 [ 428.188261][T20280] hid-generic 0000:3000000:0000.00BC: unknown main item tag 0x0 [ 428.196133][T20280] hid-generic 0000:3000000:0000.00BC: unknown main item tag 0x0 [ 428.203897][T20280] hid-generic 0000:3000000:0000.00BC: unknown main item tag 0x0 [ 428.211823][T20280] hid-generic 0000:3000000:0000.00BC: unknown main item tag 0x0 [ 428.219532][T20280] hid-generic 0000:3000000:0000.00BC: unknown main item tag 0x0 [ 428.227343][T20280] hid-generic 0000:3000000:0000.00BC: unknown main item tag 0x0 [ 428.235049][T20280] hid-generic 0000:3000000:0000.00BC: unknown main item tag 0x0 [ 428.310635][T20280] hid-generic 0000:3000000:0000.00BC: hidraw0: HID v0.00 Device [sy] on syz0 [ 428.500420][ T29] kauditd_printk_skb: 799 callbacks suppressed [ 428.500435][ T29] audit: type=1400 audit(2000000482.871:99543): avc: denied { write } for pid=29772 comm="syz.1.6584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 428.558796][T29769] loop8: detected capacity change from 0 to 1024 [ 428.589249][T29769] ext4: Unknown parameter 'obj_type' [ 428.598323][T29778] loop1: detected capacity change from 0 to 512 [ 428.620324][ T29] audit: type=1400 audit(2000000482.901:99544): avc: denied { sys_module } for pid=29755 comm="syz.8.6580" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 428.641689][ T29] audit: type=1400 audit(2000000482.911:99545): avc: denied { nlmsg_write } for pid=29772 comm="syz.1.6584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 428.662504][ T29] audit: type=1400 audit(2000000482.931:99546): avc: denied { allowed } for pid=29772 comm="syz.1.6584" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 428.682051][ T29] audit: type=1400 audit(2000000482.931:99547): avc: denied { create } for pid=29772 comm="syz.1.6584" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 428.683963][T29778] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 428.703498][ T29] audit: type=1400 audit(2000000482.931:99548): avc: denied { map } for pid=29772 comm="syz.1.6584" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=82263 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 428.703527][ T29] audit: type=1400 audit(2000000482.931:99549): avc: denied { read write } for pid=29772 comm="syz.1.6584" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=82263 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 428.703551][ T29] audit: type=1400 audit(2000000482.961:99550): avc: denied { mounton } for pid=29755 comm="syz.8.6580" path="/22/file0" dev="tmpfs" ino=139 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 428.703575][ T29] audit: type=1400 audit(2000000482.991:99551): avc: denied { create } for pid=29782 comm="syz.2.6585" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 428.763883][ T29] audit: type=1400 audit(2000000483.111:99552): avc: denied { egress } for pid=21452 comm="kworker/u8:49" saddr=fe80::1c daddr=ff02::16 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 428.810902][T29778] EXT4-fs warning (device loop1): ext4_expand_extra_isize_ea:2857: Unable to expand inode 15. Delete some EAs or run e2fsck. [ 428.848771][T29778] EXT4-fs (loop1): 1 truncate cleaned up [ 428.903911][T29786] loop4: detected capacity change from 0 to 1764 [ 428.965981][T29799] FAULT_INJECTION: forcing a failure. [ 428.965981][T29799] name failslab, interval 1, probability 0, space 0, times 0 [ 428.978713][T29799] CPU: 0 UID: 0 PID: 29799 Comm: syz.2.6590 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 428.978748][T29799] Tainted: [W]=WARN [ 428.978756][T29799] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 428.978793][T29799] Call Trace: [ 428.978800][T29799] [ 428.978838][T29799] __dump_stack+0x1d/0x30 [ 428.978864][T29799] dump_stack_lvl+0x95/0xd0 [ 428.978883][T29799] dump_stack+0x15/0x1b [ 428.978901][T29799] should_fail_ex+0x265/0x280 [ 428.978923][T29799] should_failslab+0x8c/0xb0 [ 428.978996][T29799] kmem_cache_alloc_noprof+0x69/0x4b0 [ 428.979029][T29799] ? skb_clone+0x151/0x1f0 [ 428.979059][T29799] skb_clone+0x151/0x1f0 [ 428.979097][T29799] __netlink_deliver_tap+0x2c9/0x500 [ 428.979150][T29799] netlink_unicast+0x66b/0x690 [ 428.979180][T29799] netlink_sendmsg+0x58b/0x6b0 [ 428.979233][T29799] ? __pfx_netlink_sendmsg+0x10/0x10 [ 428.979268][T29799] __sock_sendmsg+0x145/0x180 [ 428.979286][T29799] ____sys_sendmsg+0x31e/0x4a0 [ 428.979312][T29799] ___sys_sendmsg+0x17b/0x1d0 [ 428.979412][T29799] __x64_sys_sendmsg+0xd4/0x160 [ 428.979447][T29799] x64_sys_call+0x17ba/0x3000 [ 428.979470][T29799] do_syscall_64+0xca/0x2b0 [ 428.979555][T29799] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 428.979580][T29799] RIP: 0033:0x7f319cdbf749 [ 428.979636][T29799] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 428.979656][T29799] RSP: 002b:00007f319b81f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 428.979694][T29799] RAX: ffffffffffffffda RBX: 00007f319d015fa0 RCX: 00007f319cdbf749 [ 428.979709][T29799] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 428.979721][T29799] RBP: 00007f319b81f090 R08: 0000000000000000 R09: 0000000000000000 [ 428.979733][T29799] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 428.979747][T29799] R13: 00007f319d016038 R14: 00007f319d015fa0 R15: 00007ffc7ece64f8 [ 428.979828][T29799] [ 429.196814][T29801] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6591'. [ 429.238040][ T3485] hid-generic 0000:3000000:0000.00BD: hidraw0: HID v0.00 Device [sy] on syz0 [ 429.311256][T29816] netlink: 56 bytes leftover after parsing attributes in process `syz.2.6596'. [ 429.370291][T29823] netlink: 4 bytes leftover after parsing attributes in process `syz.8.6600'. [ 429.394297][T29816] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 429.511938][T29830] netlink: 'syz.2.6596': attribute type 4 has an invalid length. [ 429.519781][T29830] netlink: 152 bytes leftover after parsing attributes in process `syz.2.6596'. [ 429.592938][T29834] netlink: 'syz.8.6604': attribute type 1 has an invalid length. [ 429.698269][T29841] bridge1: entered promiscuous mode [ 429.703668][T29841] bridge1: entered allmulticast mode [ 429.711431][T29841] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6607'. [ 429.764774][T29844] loop9: detected capacity change from 0 to 764 [ 429.774268][T29844] rock: directory entry would overflow storage [ 429.780479][T29844] rock: sig=0x4654, size=5, remaining=4 [ 429.804140][T29842] netlink: 'syz.2.6606': attribute type 1 has an invalid length. [ 430.026318][T21462] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.133978][T21462] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.234243][T21462] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.289197][T21462] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 430.325935][T29851] chnl_net:caif_netlink_parms(): no params data found [ 430.351485][T29863] loop8: detected capacity change from 0 to 512 [ 430.358322][T29863] EXT4-fs (loop8): encrypted files will use data=ordered instead of data journaling mode [ 430.383989][T29863] EXT4-fs (loop8): 1 truncate cleaned up [ 430.396120][T29863] EXT4-fs mount: 14 callbacks suppressed [ 430.396136][T29863] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 430.419622][T21462] bridge_slave_1: left allmulticast mode [ 430.425360][T21462] bridge_slave_1: left promiscuous mode [ 430.431083][T21462] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.446541][T29277] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 430.457173][T21462] bridge_slave_0: left allmulticast mode [ 430.462884][T21462] bridge_slave_0: left promiscuous mode [ 430.468744][T21462] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.543624][T29875] netlink: 56 bytes leftover after parsing attributes in process `syz.2.6616'. [ 430.580138][T29875] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 430.613883][T21462] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 430.632082][T21462] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 430.642586][T21462] bond0 (unregistering): Released all slaves [ 430.650051][T29881] netlink: 'syz.2.6616': attribute type 4 has an invalid length. [ 430.657900][T29881] netlink: 152 bytes leftover after parsing attributes in process `syz.2.6616'. [ 430.669640][T29851] bridge0: port 1(bridge_slave_0) entered blocking state [ 430.676918][T29851] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.684295][T29851] bridge_slave_0: entered allmulticast mode [ 430.690965][T29851] bridge_slave_0: entered promiscuous mode [ 430.701821][T29851] bridge0: port 2(bridge_slave_1) entered blocking state [ 430.709020][T29851] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.732255][T29851] bridge_slave_1: entered allmulticast mode [ 430.738886][T29851] bridge_slave_1: entered promiscuous mode [ 430.762632][T29851] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 430.775519][T21462] hsr_slave_0: left promiscuous mode [ 430.781421][T21462] hsr_slave_1: left promiscuous mode [ 430.787281][T21462] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 430.794703][T21462] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 430.803092][T21462] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 430.810670][T21462] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 430.822382][T21462] veth1_macvtap: left promiscuous mode [ 430.828665][T21462] veth0_macvtap: left promiscuous mode [ 430.834439][T21462] veth1_vlan: left promiscuous mode [ 430.839809][T21462] veth0_vlan: left promiscuous mode [ 430.915804][T21462] team0 (unregistering): Port device team_slave_1 removed [ 430.926633][T21462] team0 (unregistering): Port device team_slave_0 removed [ 430.970276][T29851] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 431.005384][T29887] loop4: detected capacity change from 0 to 1024 [ 431.015932][T29851] team0: Port device team_slave_0 added [ 431.023260][T29851] team0: Port device team_slave_1 added [ 431.041180][T29887] EXT4-fs (loop4): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 431.054360][T29887] EXT4-fs (loop4): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 431.065838][T29851] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 431.072840][T29851] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 431.098922][T29851] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 431.099490][T29887] JBD2: no valid journal superblock found [ 431.109926][T29891] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6621'. [ 431.115767][T29887] EXT4-fs (loop4): Could not load journal inode [ 431.124611][T29891] netlink: 324 bytes leftover after parsing attributes in process `syz.8.6621'. [ 431.130794][T29851] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 431.147133][T29851] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 431.173668][T29851] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 431.199044][T29891] loop8: detected capacity change from 0 to 512 [ 431.214604][T29891] atomic_op ffff88811a485928 conn xmit_atomic 0000000000000000 [ 431.243640][T29903] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6626'. [ 431.272118][T29851] hsr_slave_0: entered promiscuous mode [ 431.278572][T29851] hsr_slave_1: entered promiscuous mode [ 431.286278][T29851] debugfs: 'hsr0' already exists in 'hsr' [ 431.292173][T29851] Cannot create hsr debugfs directory [ 431.299835][T29907] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 431.331810][T29913] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6629'. [ 431.340705][T29913] netlink: 8 bytes leftover after parsing attributes in process `syz.8.6629'. [ 431.359393][T29907] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 431.600492][T29851] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 431.621197][T29851] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 431.630898][T29851] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 431.642971][T29851] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 431.706345][T29851] 8021q: adding VLAN 0 to HW filter on device bond0 [ 431.718783][T29851] 8021q: adding VLAN 0 to HW filter on device team0 [ 431.743664][T21491] bridge0: port 1(bridge_slave_0) entered blocking state [ 431.750831][T21491] bridge0: port 1(bridge_slave_0) entered forwarding state [ 431.759714][T21491] bridge0: port 2(bridge_slave_1) entered blocking state [ 431.765802][T29924] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6631'. [ 431.766789][T21491] bridge0: port 2(bridge_slave_1) entered forwarding state [ 431.797629][T29851] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 431.860258][T29851] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 431.951347][T29851] veth0_vlan: entered promiscuous mode [ 431.969066][T29851] veth1_vlan: entered promiscuous mode [ 431.993971][T29851] veth0_macvtap: entered promiscuous mode [ 432.001587][T29851] veth1_macvtap: entered promiscuous mode [ 432.012710][T29851] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 432.021927][T29851] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 432.043895][T21452] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 432.173149][T29952] loop4: detected capacity change from 0 to 764 [ 432.199619][T29952] rock: directory entry would overflow storage [ 432.205885][T29952] rock: sig=0x4654, size=5, remaining=4 [ 432.216901][T29955] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 432.442670][T29955] netlink: 'syz.8.6638': attribute type 4 has an invalid length. [ 432.497782][T21452] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 432.510161][T29943] bridge2: trying to set multicast query interval below minimum, setting to 100 (1000ms) [ 432.550871][T29943] bridge2: entered promiscuous mode [ 432.556103][T29943] bridge2: entered allmulticast mode [ 432.578125][T29955] .`: renamed from bond0 (while UP) [ 432.590172][T21452] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 432.619487][T21452] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 432.632768][T29969] FAULT_INJECTION: forcing a failure. [ 432.632768][T29969] name failslab, interval 1, probability 0, space 0, times 0 [ 432.645459][T29969] CPU: 0 UID: 0 PID: 29969 Comm: syz.8.6641 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 432.645497][T29969] Tainted: [W]=WARN [ 432.645505][T29969] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 432.645584][T29969] Call Trace: [ 432.645592][T29969] [ 432.645601][T29969] __dump_stack+0x1d/0x30 [ 432.645629][T29969] dump_stack_lvl+0x95/0xd0 [ 432.645653][T29969] dump_stack+0x15/0x1b [ 432.645675][T29969] should_fail_ex+0x265/0x280 [ 432.645713][T29969] should_failslab+0x8c/0xb0 [ 432.645736][T29969] __kmalloc_node_track_caller_noprof+0xb9/0x5b0 [ 432.645765][T29969] ? cond_bools_copy+0x30/0x80 [ 432.645789][T29969] ? __pfx_cond_bools_destroy+0x10/0x10 [ 432.645858][T29969] ? __pfx_cond_bools_destroy+0x10/0x10 [ 432.645940][T29969] kmemdup_noprof+0x2b/0x70 [ 432.646011][T29969] ? __pfx_cond_bools_destroy+0x10/0x10 [ 432.646035][T29969] cond_bools_copy+0x30/0x80 [ 432.646058][T29969] ? __pfx_cond_bools_destroy+0x10/0x10 [ 432.646148][T29969] hashtab_duplicate+0x11e/0x360 [ 432.646178][T29969] ? __pfx_cond_bools_copy+0x10/0x10 [ 432.646201][T29969] cond_policydb_dup+0xd2/0x4e0 [ 432.646298][T29969] security_set_bools+0xa0/0x340 [ 432.646333][T29969] sel_commit_bools_write+0x1ea/0x270 [ 432.646358][T29969] vfs_writev+0x406/0x8b0 [ 432.646465][T29969] ? __pfx_sel_commit_bools_write+0x10/0x10 [ 432.646497][T29969] do_writev+0xe7/0x210 [ 432.646525][T29969] __x64_sys_writev+0x45/0x50 [ 432.646595][T29969] x64_sys_call+0x1ba5/0x3000 [ 432.646699][T29969] do_syscall_64+0xca/0x2b0 [ 432.646759][T29969] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 432.646784][T29969] RIP: 0033:0x7fe6d3caf749 [ 432.646801][T29969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 432.646821][T29969] RSP: 002b:00007fe6d270f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 432.646844][T29969] RAX: ffffffffffffffda RBX: 00007fe6d3f05fa0 RCX: 00007fe6d3caf749 [ 432.646931][T29969] RDX: 0000000000000002 RSI: 00002000000025c0 RDI: 0000000000000003 [ 432.646946][T29969] RBP: 00007fe6d270f090 R08: 0000000000000000 R09: 0000000000000000 [ 432.647013][T29969] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 432.647027][T29969] R13: 00007fe6d3f06038 R14: 00007fe6d3f05fa0 R15: 00007ffc5a00c808 [ 432.647068][T29969] [ 432.937747][T29949] loop0: detected capacity change from 0 to 1024 [ 432.966066][T29971] loop8: detected capacity change from 0 to 1024 [ 432.972901][T29971] EXT4-fs: Ignoring removed orlov option [ 432.989596][T29971] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 433.003011][T29949] EXT4-fs (loop0): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 433.014532][T29949] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 433.033152][T29949] JBD2: no valid journal superblock found [ 433.039312][T29949] EXT4-fs (loop0): Could not load journal inode [ 433.125425][ T3486] hid-generic 0000:3000000:0000.00BE: hidraw0: HID v0.00 Device [sy] on syz0 [ 433.221275][T29999] loop0: detected capacity change from 0 to 764 [ 433.227885][T21427] bridge_slave_1: left allmulticast mode [ 433.233670][T21427] bridge_slave_1: left promiscuous mode [ 433.239318][T21427] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.247212][T29999] rock: directory entry would overflow storage [ 433.253705][T29999] rock: sig=0x4654, size=5, remaining=4 [ 433.259493][T21427] bridge_slave_0: left allmulticast mode [ 433.265228][T21427] bridge_slave_0: left promiscuous mode [ 433.270943][T21427] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.342500][T21427] .` (unregistering): (slave bond_slave_0): Releasing backup interface [ 433.355054][T21427] .` (unregistering): (slave bond_slave_1): Releasing backup interface [ 433.363994][T21427] .` (unregistering): Released all slaves [ 433.372237][T21427] bond0 (unregistering): Released all slaves [ 433.409594][T21427] hsr_slave_0: left promiscuous mode [ 433.415591][T21427] hsr_slave_1: left promiscuous mode [ 433.421275][T21427] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 433.429565][T21427] pim6reg (unregistering): left allmulticast mode [ 433.452937][T21427] team0 (unregistering): Port device team_slave_1 removed [ 433.462689][T21427] team0 (unregistering): Port device team_slave_0 removed [ 433.545676][T29977] chnl_net:caif_netlink_parms(): no params data found [ 433.591719][T29977] bridge0: port 1(bridge_slave_0) entered blocking state [ 433.598895][T29977] bridge0: port 1(bridge_slave_0) entered disabled state [ 433.606458][T29977] bridge_slave_0: entered allmulticast mode [ 433.613145][T29977] bridge_slave_0: entered promiscuous mode [ 433.620563][T29977] bridge0: port 2(bridge_slave_1) entered blocking state [ 433.627660][T29977] bridge0: port 2(bridge_slave_1) entered disabled state [ 433.634946][T29977] bridge_slave_1: entered allmulticast mode [ 433.641435][T29977] bridge_slave_1: entered promiscuous mode [ 433.661364][T29977] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 433.672146][T29977] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 433.694290][T29977] team0: Port device team_slave_0 added [ 433.701297][T29977] team0: Port device team_slave_1 added [ 433.719993][T29977] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 433.726999][T29977] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 433.752984][T29977] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 433.764378][T29977] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 433.771453][T29977] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 433.797457][T29977] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 433.835940][T29277] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 433.838723][T29977] hsr_slave_0: entered promiscuous mode [ 433.851128][T29977] hsr_slave_1: entered promiscuous mode [ 433.873470][T30007] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 433.949425][T30009] netlink: 'syz.8.6651': attribute type 4 has an invalid length. [ 433.973193][T30011] bridge1: entered promiscuous mode [ 433.978416][T30011] bridge1: entered allmulticast mode [ 434.184296][T29977] debugfs: 'netdev@ffff88810d17c558' already exists in 'ref_tracker' [ 434.205058][T29977] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 434.216220][T29977] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 434.225300][T29977] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 434.234180][T29977] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 434.265514][T29977] 8021q: adding VLAN 0 to HW filter on device bond0 [ 434.277816][T29977] 8021q: adding VLAN 0 to HW filter on device team0 [ 434.287794][T21427] bridge0: port 1(bridge_slave_0) entered blocking state [ 434.295009][T21427] bridge0: port 1(bridge_slave_0) entered forwarding state [ 434.307134][T21452] bridge0: port 2(bridge_slave_1) entered blocking state [ 434.314288][T21452] bridge0: port 2(bridge_slave_1) entered forwarding state [ 434.337862][T29977] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 434.348384][T29977] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 434.380115][ T29] kauditd_printk_skb: 8408 callbacks suppressed [ 434.380131][ T29] audit: type=1400 audit(2000000488.751:107959): avc: denied { mount } for pid=30021 comm="syz.8.6653" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 434.434488][T29977] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 434.528637][T29977] veth0_vlan: entered promiscuous mode [ 434.538201][T29977] veth1_vlan: entered promiscuous mode [ 434.555043][T29977] veth0_macvtap: entered promiscuous mode [ 434.562915][T29977] veth1_macvtap: entered promiscuous mode [ 434.576229][T29977] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 434.589032][T29977] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 434.600183][T21445] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 434.616806][T21445] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 434.630727][T21445] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 434.639691][T21445] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 434.674715][ T29] audit: type=1400 audit(2000000489.051:107960): avc: denied { map_create } for pid=30046 comm="syz.5.6644" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 434.697196][ T29] audit: type=1400 audit(2000000489.071:107961): avc: denied { read } for pid=30042 comm="syz.8.6656" name="mISDNtimer" dev="devtmpfs" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 434.720494][ T29] audit: type=1400 audit(2000000489.071:107962): avc: denied { open } for pid=30042 comm="syz.8.6656" path="/dev/mISDNtimer" dev="devtmpfs" ino=249 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 434.745144][ T29] audit: type=1400 audit(2000000489.071:107963): avc: denied { prog_load } for pid=30042 comm="syz.8.6656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 434.764531][ T29] audit: type=1400 audit(2000000489.071:107964): avc: denied { bpf } for pid=30042 comm="syz.8.6656" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 434.785461][ T29] audit: type=1400 audit(2000000489.071:107965): avc: denied { perfmon } for pid=30042 comm="syz.8.6656" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 434.806653][ T29] audit: type=1400 audit(2000000489.081:107966): avc: denied { map_read map_write } for pid=30042 comm="syz.8.6656" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 434.826852][ T29] audit: type=1400 audit(2000000489.081:107967): avc: denied { egress } for pid=21445 comm="kworker/u8:43" daddr=ff02::1:ff00:1c netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 434.850681][ T29] audit: type=1400 audit(2000000489.081:107968): avc: denied { sendto } for pid=21445 comm="kworker/u8:43" daddr=ff02::1:ff00:1c netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 435.095151][T30064] __nla_validate_parse: 6 callbacks suppressed [ 435.095205][T30064] netlink: 56 bytes leftover after parsing attributes in process `syz.5.6661'. [ 435.113519][T30064] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 435.165811][T21452] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 435.177117][T30068] netlink: 'syz.5.6661': attribute type 4 has an invalid length. [ 435.185009][T30068] netlink: 152 bytes leftover after parsing attributes in process `syz.5.6661'. [ 435.206272][T30068] .`: renamed from bond0 (while UP) [ 435.368150][T30081] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6666'. [ 435.431281][T30071] chnl_net:caif_netlink_parms(): no params data found [ 435.468599][T30091] netlink: 56 bytes leftover after parsing attributes in process `syz.8.6669'. [ 435.481231][T30089] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 435.483957][T30091] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 435.514115][T30071] bridge0: port 1(bridge_slave_0) entered blocking state [ 435.521261][T30071] bridge0: port 1(bridge_slave_0) entered disabled state [ 435.528532][T30071] bridge_slave_0: entered allmulticast mode [ 435.535167][T30071] bridge_slave_0: entered promiscuous mode [ 435.542175][T30071] bridge0: port 2(bridge_slave_1) entered blocking state [ 435.549310][T30071] bridge0: port 2(bridge_slave_1) entered disabled state [ 435.557449][T30071] bridge_slave_1: entered allmulticast mode [ 435.558819][T30097] netlink: 'syz.8.6669': attribute type 4 has an invalid length. [ 435.564975][T30071] bridge_slave_1: entered promiscuous mode [ 435.571353][T30097] netlink: 152 bytes leftover after parsing attributes in process `syz.8.6669'. [ 435.598856][T30089] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 435.629139][T30071] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 435.648508][T30071] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 435.685600][T30071] team0: Port device team_slave_0 added [ 435.703006][T30071] team0: Port device team_slave_1 added [ 435.713513][T30106] loop8: detected capacity change from 0 to 1024 [ 435.720869][T30106] EXT4-fs (loop8): ext4_check_descriptors: Checksum for group 0 failed (24670!=35945) [ 435.731188][T30106] EXT4-fs (loop8): stripe (65535) is not aligned with cluster size (4096), stripe is disabled [ 435.747750][T30106] EXT4-fs (loop8): revision level too high, forcing read-only mode [ 435.748632][T30071] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 435.761523][T30106] EXT4-fs (loop8): Can't support bigalloc feature without extents feature [ 435.761523][T30106] [ 435.762724][T30071] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 435.762778][T30071] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 435.778287][T30071] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 435.799414][T30106] EXT4-fs (loop8): Skipping orphan cleanup due to unknown ROCOMPAT features [ 435.818508][T30106] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 435.825662][T30071] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 435.863913][T30071] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 435.889945][T29277] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 435.907705][T30109] netlink: 'syz.8.6673': attribute type 16 has an invalid length. [ 435.915597][T30109] netlink: 'syz.8.6673': attribute type 17 has an invalid length. [ 435.925041][T30089] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 435.953444][T30109] 8021q: adding VLAN 0 to HW filter on device .` [ 435.963056][T30109] net_ratelimit: 30 callbacks suppressed [ 435.963067][T30109] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 435.986067][T30110] FAULT_INJECTION: forcing a failure. [ 435.986067][T30110] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 435.987719][T30071] hsr_slave_0: entered promiscuous mode [ 435.999145][T30110] CPU: 1 UID: 0 PID: 30110 Comm: syz.8.6673 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 435.999175][T30110] Tainted: [W]=WARN [ 435.999182][T30110] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 435.999196][T30110] Call Trace: [ 435.999203][T30110] [ 435.999236][T30110] __dump_stack+0x1d/0x30 [ 435.999262][T30110] dump_stack_lvl+0x95/0xd0 [ 435.999298][T30110] dump_stack+0x15/0x1b [ 435.999354][T30110] should_fail_ex+0x265/0x280 [ 435.999379][T30110] should_fail+0xb/0x20 [ 435.999399][T30110] should_fail_usercopy+0x1a/0x20 [ 435.999497][T30110] strncpy_from_user+0x27/0x260 [ 435.999531][T30110] __se_sys_memfd_create+0x206/0x6b0 [ 435.999565][T30110] __x64_sys_memfd_create+0x31/0x40 [ 435.999629][T30110] x64_sys_call+0x28cb/0x3000 [ 435.999654][T30110] do_syscall_64+0xca/0x2b0 [ 435.999726][T30110] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 435.999749][T30110] RIP: 0033:0x7fe6d3caf749 [ 435.999765][T30110] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 435.999784][T30110] RSP: 002b:00007fe6d26edd68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 435.999880][T30110] RAX: ffffffffffffffda RBX: 0000000000004080 RCX: 00007fe6d3caf749 [ 435.999893][T30110] RDX: 00007fe6d26eddec RSI: 0000000000000000 RDI: 00007fe6d3d34960 [ 435.999907][T30110] RBP: 0000200000000000 R08: 00007fe6d26edb07 R09: 0000000000000000 [ 435.999921][T30110] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 [ 435.999952][T30110] R13: 00007fe6d26eddec R14: 00007fe6d26eddf0 R15: 00007ffc5a00c808 [ 435.999971][T30110] [ 436.028850][T30112] netlink: 56 bytes leftover after parsing attributes in process `syz.8.6674'. [ 436.045967][T30071] hsr_slave_1: entered promiscuous mode [ 436.104563][T30115] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 436.118159][T30071] debugfs: 'hsr0' already exists in 'hsr' [ 436.183952][T30115] netlink: 'syz.8.6674': attribute type 4 has an invalid length. [ 436.194318][T30071] Cannot create hsr debugfs directory [ 436.213611][T30115] netlink: 152 bytes leftover after parsing attributes in process `syz.8.6674'. [ 436.240676][T30089] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 436.320670][T30124] netlink: 56 bytes leftover after parsing attributes in process `syz.1.6679'. [ 436.349523][T30124] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 436.349947][T30071] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 436.381428][T30122] syzkaller1: entered promiscuous mode [ 436.386923][T30122] syzkaller1: entered allmulticast mode [ 436.423696][T30127] netlink: 'syz.1.6679': attribute type 4 has an invalid length. [ 436.431515][T30127] netlink: 152 bytes leftover after parsing attributes in process `syz.1.6679'. [ 436.442683][T30071] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 436.458346][T30127] .`: renamed from bond0 (while UP) [ 436.502039][T30071] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 436.563508][T30071] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 436.595446][T30133] loop1: detected capacity change from 0 to 8192 [ 436.751220][T30071] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 436.802576][T30071] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 436.832612][T21452] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 436.957413][T30071] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 436.988324][T30071] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 437.081588][T30147] bridge3: entered promiscuous mode [ 437.086837][T30147] bridge3: entered allmulticast mode [ 437.113672][T30071] 8021q: adding VLAN 0 to HW filter on device bond0 [ 437.145969][T30148] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6684'. [ 437.158562][T30071] 8021q: adding VLAN 0 to HW filter on device team0 [ 437.197402][T21423] bridge0: port 1(bridge_slave_0) entered blocking state [ 437.204561][T21423] bridge0: port 1(bridge_slave_0) entered forwarding state [ 437.220426][T21423] bridge0: port 2(bridge_slave_1) entered blocking state [ 437.227589][T21423] bridge0: port 2(bridge_slave_1) entered forwarding state [ 437.255009][T21452] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 437.415055][T21452] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 437.448142][T30071] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 437.473694][ T3485] hid_parser_main: 38 callbacks suppressed [ 437.473714][ T3485] hid-generic 0000:0000:0000.00BF: unknown main item tag 0x0 [ 437.531694][T30161] loop8: detected capacity change from 0 to 512 [ 437.533452][T21452] bridge_slave_1: left allmulticast mode [ 437.538268][T30161] EXT4-fs: quotafile must be on filesystem root [ 437.543692][T21452] bridge_slave_1: left promiscuous mode [ 437.555638][T21452] bridge0: port 2(bridge_slave_1) entered disabled state [ 437.563928][ T3485] hid-generic 0000:0000:0000.00BF: hidraw0: HID v0.00 Device [syz1] on syz0 [ 437.574369][T21452] bridge_slave_0: left allmulticast mode [ 437.580021][T21452] bridge_slave_0: left promiscuous mode [ 437.585759][T21452] bridge0: port 1(bridge_slave_0) entered disabled state [ 437.604598][T30161] loop8: detected capacity change from 0 to 2048 [ 437.655590][T30161] GPT:first_usable_lbas don't match. [ 437.660937][T30161] GPT:34 != 290 [ 437.664407][T30161] GPT: Use GNU Parted to correct GPT errors. [ 437.670560][T30161] loop8: p1 p2 p3 [ 437.699087][T21452] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 437.709334][T21452] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 437.719026][T21452] bond0 (unregistering): Released all slaves [ 437.757126][T21452] hsr_slave_0: left promiscuous mode [ 437.763097][T21452] hsr_slave_1: left promiscuous mode [ 437.768670][T21452] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 437.776240][T21452] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 437.783851][T21452] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 437.791265][T21452] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 437.801973][T21452] veth1_macvtap: left promiscuous mode [ 437.807476][T21452] veth0_macvtap: left promiscuous mode [ 437.813299][T21452] veth1_vlan: left promiscuous mode [ 437.818641][T21452] veth0_vlan: left promiscuous mode [ 437.880106][T30175] loop1: detected capacity change from 0 to 1024 [ 437.924615][T30175] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 437.947016][T21452] team0 (unregistering): Port device team_slave_1 removed [ 437.957809][T21452] team0 (unregistering): Port device team_slave_0 removed [ 437.970085][T30186] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 437.996994][T30071] veth0_vlan: entered promiscuous mode [ 438.005797][T30071] veth1_vlan: entered promiscuous mode [ 438.016567][T29566] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 438.018276][T30071] veth0_macvtap: entered promiscuous mode [ 438.036279][T30187] netlink: 'syz.8.6694': attribute type 4 has an invalid length. [ 438.044345][T30071] veth1_macvtap: entered promiscuous mode [ 438.051587][T30189] FAULT_INJECTION: forcing a failure. [ 438.051587][T30189] name failslab, interval 1, probability 0, space 0, times 0 [ 438.057318][T30071] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 438.064297][T30189] CPU: 0 UID: 0 PID: 30189 Comm: syz.1.6695 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 438.064401][T30189] Tainted: [W]=WARN [ 438.064409][T30189] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 438.064422][T30189] Call Trace: [ 438.064429][T30189] [ 438.064438][T30189] __dump_stack+0x1d/0x30 [ 438.064466][T30189] dump_stack_lvl+0x95/0xd0 [ 438.064487][T30189] dump_stack+0x15/0x1b [ 438.064627][T30189] should_fail_ex+0x265/0x280 [ 438.064651][T30189] should_failslab+0x8c/0xb0 [ 438.064753][T30189] __kmalloc_node_track_caller_noprof+0xb9/0x5b0 [ 438.064793][T30189] ? sidtab_sid2str_get+0xa0/0x130 [ 438.064834][T30189] kmemdup_noprof+0x2b/0x70 [ 438.064867][T30189] sidtab_sid2str_get+0xa0/0x130 [ 438.064898][T30189] security_sid_to_context_core+0x1eb/0x2e0 [ 438.064985][T30189] security_sid_to_context+0x27/0x40 [ 438.065084][T30189] selinux_lsmprop_to_secctx+0x67/0xf0 [ 438.065151][T30189] security_lsmprop_to_secctx+0x1a3/0x1c0 [ 438.065175][T30189] audit_log_subj_ctx+0xa4/0x3e0 [ 438.065264][T30189] ? skb_put+0xa9/0xf0 [ 438.065290][T30189] audit_log_task_context+0x48/0x70 [ 438.065314][T30189] audit_log_task+0xf4/0x250 [ 438.065426][T30189] ? kstrtouint+0x76/0xc0 [ 438.065447][T30189] audit_seccomp+0x61/0x100 [ 438.065477][T30189] ? __seccomp_filter+0x832/0x1260 [ 438.065583][T30189] __seccomp_filter+0x843/0x1260 [ 438.065611][T30189] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 438.065641][T30189] ? vfs_write+0x7e8/0x960 [ 438.065665][T30189] __secure_computing+0x82/0x150 [ 438.065768][T30189] syscall_trace_enter+0xcf/0x1e0 [ 438.065793][T30189] do_syscall_64+0xa4/0x2b0 [ 438.065878][T30189] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 438.065902][T30189] RIP: 0033:0x7fe01351f749 [ 438.065920][T30189] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 438.065939][T30189] RSP: 002b:00007fe011f87038 EFLAGS: 00000246 ORIG_RAX: 0000000000000088 [ 438.065960][T30189] RAX: ffffffffffffffda RBX: 00007fe013775fa0 RCX: 00007fe01351f749 [ 438.065974][T30189] RDX: 0000000000000000 RSI: 0000200000000500 RDI: 0000000000008a1a [ 438.066036][T30189] RBP: 00007fe011f87090 R08: 0000000000000000 R09: 0000000000000000 [ 438.066049][T30189] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 438.066063][T30189] R13: 00007fe013776038 R14: 00007fe013775fa0 R15: 00007fff4e1d4d08 [ 438.066081][T30189] [ 438.320393][T30071] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 438.334911][ T52] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 438.346152][ T52] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 438.365676][ T328] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 438.387898][ T328] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 438.409683][ T328] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 438.440413][ T328] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 438.456485][ T328] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 438.475607][T30201] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 438.490515][ T328] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 438.539113][T30209] netlink: 'syz.1.6699': attribute type 4 has an invalid length. [ 438.578364][T30211] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 438.641224][T30222] netlink: 'syz.5.6703': attribute type 4 has an invalid length. [ 438.691368][T30231] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 438.698783][T30231] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 438.707942][T30231] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 438.715633][T30231] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 438.758359][T30236] loop1: detected capacity change from 0 to 512 [ 438.778423][T30236] EXT4-fs warning (device loop1): ext4_enable_quotas:7221: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 438.805364][T30236] EXT4-fs (loop1): mount failed [ 438.864911][T30244] x_tables: ip6_tables: TPROXY target: used from hooks FORWARD, but only usable from PREROUTING [ 438.932121][T30247] netlink: 'syz.2.6714': attribute type 4 has an invalid length. [ 438.964730][T30251] loop1: detected capacity change from 0 to 512 [ 438.971491][T30251] EXT4-fs: quotafile must be on filesystem root [ 438.995800][T30251] loop1: detected capacity change from 0 to 2048 [ 439.041543][T30251] GPT:first_usable_lbas don't match. [ 439.046914][T30251] GPT:34 != 290 [ 439.050443][T30251] GPT: Use GNU Parted to correct GPT errors. [ 439.056587][T30251] loop1: p1 p2 p3 [ 439.192499][T30287] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 439.199925][T30287] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 439.208748][T30287] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 439.216377][T30287] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 439.294880][T30295] loop8: detected capacity change from 0 to 512 [ 439.302211][T30295] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 439.322889][T30295] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 439.337302][T30295] ext4 filesystem being mounted at /70/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 439.380923][T29277] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 439.389953][ T29] kauditd_printk_skb: 874 callbacks suppressed [ 439.389968][ T29] audit: type=1326 audit(2000000493.761:108841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30216 comm="syz.3.6706" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2af6682005 code=0x7ffc0000 [ 439.420200][ T29] audit: type=1326 audit(2000000493.761:108842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30216 comm="syz.3.6706" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2af6682005 code=0x7ffc0000 [ 439.445012][ T29] audit: type=1326 audit(2000000493.761:108843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30216 comm="syz.3.6706" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2af6682005 code=0x7ffc0000 [ 439.468791][ T29] audit: type=1326 audit(2000000493.771:108844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30216 comm="syz.3.6706" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2af6682005 code=0x7ffc0000 [ 439.492587][ T29] audit: type=1326 audit(2000000493.771:108845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30216 comm="syz.3.6706" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2af6682005 code=0x7ffc0000 [ 439.517147][ T29] audit: type=1326 audit(2000000493.771:108846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30216 comm="syz.3.6706" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2af6682005 code=0x7ffc0000 [ 439.540820][ T29] audit: type=1326 audit(2000000493.771:108847): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30216 comm="syz.3.6706" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2af6682005 code=0x7ffc0000 [ 439.564714][ T29] audit: type=1326 audit(2000000493.771:108848): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30216 comm="syz.3.6706" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2af6682005 code=0x7ffc0000 [ 439.588578][ T29] audit: type=1326 audit(2000000493.771:108849): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30216 comm="syz.3.6706" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2af6682005 code=0x7ffc0000 [ 439.612299][ T29] audit: type=1326 audit(2000000493.771:108850): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30216 comm="syz.3.6706" exe="/root/syz-executor" sig=0 arch=c000003e syscall=230 compat=0 ip=0x7f2af6682005 code=0x7ffc0000 [ 439.643079][T30289] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=5 sclass=netlink_route_socket pid=30289 comm=syz.2.6733 [ 439.671001][T30311] FAULT_INJECTION: forcing a failure. [ 439.671001][T30311] name failslab, interval 1, probability 0, space 0, times 0 [ 439.683820][T30311] CPU: 1 UID: 0 PID: 30311 Comm: syz.1.6739 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 439.683906][T30311] Tainted: [W]=WARN [ 439.683913][T30311] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 439.683924][T30311] Call Trace: [ 439.683930][T30311] [ 439.684005][T30311] __dump_stack+0x1d/0x30 [ 439.684028][T30311] dump_stack_lvl+0x95/0xd0 [ 439.684047][T30311] dump_stack+0x15/0x1b [ 439.684128][T30311] should_fail_ex+0x265/0x280 [ 439.684148][T30311] should_failslab+0x8c/0xb0 [ 439.684168][T30311] kmem_cache_alloc_noprof+0x69/0x4b0 [ 439.684187][T30311] ? fcntl_dirnotify+0x1b9/0x590 [ 439.684271][T30311] fcntl_dirnotify+0x1b9/0x590 [ 439.684291][T30311] ? __rcu_read_unlock+0x4f/0x70 [ 439.684310][T30311] do_fcntl+0x55f/0xf60 [ 439.684336][T30311] __se_sys_fcntl+0xb1/0x120 [ 439.684420][T30311] __x64_sys_fcntl+0x43/0x50 [ 439.684518][T30311] x64_sys_call+0x2d6f/0x3000 [ 439.684611][T30311] do_syscall_64+0xca/0x2b0 [ 439.684710][T30311] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 439.684729][T30311] RIP: 0033:0x7fe01351f749 [ 439.684743][T30311] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 439.684828][T30311] RSP: 002b:00007fe011f87038 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 439.684895][T30311] RAX: ffffffffffffffda RBX: 00007fe013775fa0 RCX: 00007fe01351f749 [ 439.684923][T30311] RDX: 0000000000000300 RSI: 0000000000000402 RDI: 0000000000000003 [ 439.684934][T30311] RBP: 00007fe011f87090 R08: 0000000000000000 R09: 0000000000000000 [ 439.684946][T30311] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 439.684957][T30311] R13: 00007fe013776038 R14: 00007fe013775fa0 R15: 00007fff4e1d4d08 [ 439.684974][T30311] [ 439.970695][T30328] loop3: detected capacity change from 0 to 764 [ 439.979536][T30328] Symlink component flag not implemented [ 439.985359][T30328] Symlink component flag not implemented [ 439.991693][T30328] Symlink component flag not implemented (129) [ 439.997851][T30328] Symlink component flag not implemented (6) [ 440.004532][T30328] rock: directory entry would overflow storage [ 440.010739][T30328] rock: sig=0x4f50, size=4, remaining=3 [ 440.016386][T30328] iso9660: Corrupted directory entry in block 6 of inode 1792 [ 440.154924][T30341] __nla_validate_parse: 16 callbacks suppressed [ 440.154972][T30341] netlink: 12 bytes leftover after parsing attributes in process `syz.3.6751'. [ 440.192262][T30341] pimreg: entered allmulticast mode [ 440.204351][T30341] pimreg: left allmulticast mode [ 440.312485][T30354] FAULT_INJECTION: forcing a failure. [ 440.312485][T30354] name failslab, interval 1, probability 0, space 0, times 0 [ 440.325235][T30354] CPU: 0 UID: 0 PID: 30354 Comm: syz.1.6757 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 440.325284][T30354] Tainted: [W]=WARN [ 440.325291][T30354] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 440.325303][T30354] Call Trace: [ 440.325313][T30354] [ 440.325388][T30354] __dump_stack+0x1d/0x30 [ 440.325483][T30354] dump_stack_lvl+0x95/0xd0 [ 440.325496][T30354] dump_stack+0x15/0x1b [ 440.325557][T30354] should_fail_ex+0x265/0x280 [ 440.325571][T30354] should_failslab+0x8c/0xb0 [ 440.325584][T30354] __kmalloc_cache_noprof+0x65/0x4c0 [ 440.325654][T30354] ? audit_log_d_path+0x8d/0x150 [ 440.325668][T30354] audit_log_d_path+0x8d/0x150 [ 440.325680][T30354] audit_log_d_path_exe+0x42/0x70 [ 440.325770][T30354] audit_log_task+0x1e9/0x250 [ 440.325788][T30354] ? kstrtouint+0x76/0xc0 [ 440.325800][T30354] audit_seccomp+0x61/0x100 [ 440.325941][T30354] ? __seccomp_filter+0x832/0x1260 [ 440.325957][T30354] __seccomp_filter+0x843/0x1260 [ 440.325973][T30354] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 440.325996][T30354] ? vfs_write+0x7e8/0x960 [ 440.326070][T30354] ? __rcu_read_unlock+0x4f/0x70 [ 440.326082][T30354] ? __fget_files+0x184/0x1c0 [ 440.326098][T30354] __secure_computing+0x82/0x150 [ 440.326113][T30354] syscall_trace_enter+0xcf/0x1e0 [ 440.326128][T30354] do_syscall_64+0xa4/0x2b0 [ 440.326217][T30354] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 440.326230][T30354] RIP: 0033:0x7fe01351f749 [ 440.326321][T30354] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 440.326413][T30354] RSP: 002b:00007fe011f87038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a1 [ 440.326426][T30354] RAX: ffffffffffffffda RBX: 00007fe013775fa0 RCX: 00007fe01351f749 [ 440.326447][T30354] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 440.326507][T30354] RBP: 00007fe011f87090 R08: 0000000000000000 R09: 0000000000000000 [ 440.326521][T30354] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 440.326534][T30354] R13: 00007fe013776038 R14: 00007fe013775fa0 R15: 00007fff4e1d4d08 [ 440.326553][T30354] [ 440.339991][T30352] 9pnet_fd: Insufficient options for proto=fd [ 440.571380][T30363] ================================================================== [ 440.579491][T30363] BUG: KCSAN: data-race in mas_state_walk / mas_wmb_replace [ 440.586961][T30363] [ 440.589279][T30363] write to 0xffff8881052c9000 of 8 bytes by task 30362 on cpu 0: [ 440.597147][T30363] mas_wmb_replace+0x208/0xfa0 [ 440.601905][T30363] mas_wr_store_entry+0x13e3/0x2750 [ 440.607115][T30363] mas_store_prealloc+0x760/0xa90 [ 440.612160][T30363] vma_iter_store_new+0x1c5/0x200 [ 440.617173][T30363] mmap_region+0x1193/0x1410 [ 440.621761][T30363] do_mmap+0x9b3/0xbe0 [ 440.625847][T30363] vm_mmap_pgoff+0x17a/0x2e0 [ 440.630426][T30363] ksys_mmap_pgoff+0xc2/0x310 [ 440.635102][T30363] x64_sys_call+0x16bb/0x3000 [ 440.639774][T30363] do_syscall_64+0xca/0x2b0 [ 440.644270][T30363] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 440.650154][T30363] [ 440.652475][T30363] read to 0xffff8881052c9000 of 8 bytes by task 30363 on cpu 1: [ 440.660082][T30363] mas_state_walk+0x485/0x650 [ 440.664757][T30363] mas_walk+0x60/0x150 [ 440.668831][T30363] lock_vma_under_rcu+0x95/0x1b0 [ 440.673759][T30363] do_user_addr_fault+0x233/0x1080 [ 440.678859][T30363] exc_page_fault+0x62/0xa0 [ 440.683356][T30363] asm_exc_page_fault+0x26/0x30 [ 440.688210][T30363] [ 440.690518][T30363] value changed: 0xffff88810a4f5141 -> 0xffff8881052c9000 [ 440.697610][T30363] [ 440.699927][T30363] Reported by Kernel Concurrency Sanitizer on: [ 440.706059][T30363] CPU: 1 UID: 0 PID: 30363 Comm: syz.3.6760 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 440.717412][T30363] Tainted: [W]=WARN [ 440.721202][T30363] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 440.731241][T30363] ==================================================================