last executing test programs: 1m30.876593634s ago: executing program 1 (id=76): ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) socket$kcm(0x2, 0xa, 0x2) write$tun(0xffffffffffffffff, &(0x7f0000000700)={@val={0xa}, @void, @eth={@multicast, @empty, @void, {@ipv6={0x86dd, @generic={0x7, 0x6, "f8463b", 0x20, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x1f}, @private2={0xfc, 0x2, '\x00', 0x1}, {[@hopopts={0x0, 0x2, '\x00', [@calipso={0x7, 0x8, {0x0, 0x0, 0x0, 0x147}}, @calipso={0x7, 0x8, {0x0, 0x0, 0xb, 0xf}}]}]}}}}}}, 0x5a) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000b40)={@empty, 0xfffffffd, 0x0, 0x3, 0xd, 0x52, 0x14}, 0x20) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0100000002000000e27f000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r2}, 0x10) syz_emit_ethernet(0x2a, &(0x7f0000000140)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @multicast, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x2, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x0, 0x8}}}}}, 0x0) 1m30.837726277s ago: executing program 1 (id=78): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'batadv_slave_1\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000040)={'batadv0\x00', 0x0}) syz_clone(0x42164000, 0x0, 0x0, 0x0, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x5d032, 0xffffffffffffffff, 0x0) fchmod(0xffffffffffffffff, 0x10b) sendmsg$nl_route(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000380)=ANY=[@ANYBLOB="4400000010000104000002000000000000000000", @ANYRES32=0x0, @ANYBLOB="0380000000000000140012800b0001006970766c616e00000400028008000500", @ANYRES32=r1, @ANYBLOB='\b\x00\n\x00', @ANYRES16=r2], 0x44}, 0x1, 0x0, 0x0, 0x240008c4}, 0x4054) 1m30.266319054s ago: executing program 1 (id=86): shmctl$SHM_STAT_ANY(0x0, 0xf, &(0x7f0000000240)=""/204) (fail_nth: 1) 1m30.249819435s ago: executing program 1 (id=87): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000980)='./file1\x00', 0x280809a, &(0x7f0000000f40)=ANY=[], 0xd, 0x2c0, &(0x7f0000001a80)="$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") mkdir(&(0x7f00000000c0)='./bus\x00', 0x18e) chdir(&(0x7f00000001c0)='./bus\x00') mknod$loop(&(0x7f0000001b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) r1 = creat(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1e0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000900), r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000940)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f0000000a80)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000a40)={&(0x7f00000009c0)={0x58, r2, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x7c, 0x1e}}}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x2}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2e}, @NL80211_ATTR_MAC={0xa, 0x6, @random="9de2288d0edf"}, @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, @random=0x1716}, @NL80211_ATTR_WANT_1X_4WAY_HS={0x4}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x30004001) renameat2(0xffffffffffffff9c, &(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f00000004c0)='./bus\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x533201, 0x80) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x194) getdents(r5, &(0x7f0000001fc0)=""/184, 0xb8) r6 = socket$inet(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) setsockopt$inet_opts(r6, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) connect$inet(r6, &(0x7f0000000480)={0x2, 0x4e1e, @local}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r9) ptrace$setopts(0x4200, r9, 0x58880000000, 0x300051) connect$can_bcm(r7, &(0x7f00000000c0)={0x1d, r8}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x137b32d1, 0x0, 0xffffffffffffffff, 0x6, '\x00', r8, r1, 0x3, 0x3, 0x5}, 0x50) syz_clone(0x2000, &(0x7f0000000200)="0a7ed46a3f78317585163ce4c4", 0xd, &(0x7f0000000580), &(0x7f0000000600), &(0x7f0000000640)="6c3bcede16a6de3fb3729f5f36f71ea5e7416e05b09b32d34b83c5f015ef48a63e834020c24a7c4fc6d9878e9845890ff9f471c242a50e956d00f90da74901e7058d80775c5beaa6d59c1b2d3b6d61ff43a3f01c295a8831a1cab4cee19806a9c748161a2290c73856beb1805b794ad62fb1361ab7e23937ce6f704c2ee948a280bb37810645193ca25e5e21a122e04be8d2880188e3b0e06825f1ee0c511d3002f93f24ca73e4f9743e0bf7e03d3b0c7dfa94d1c04a126316dfb9306dcbdbb5056cabc07c8b50ae570fa13add291b5c2b180590db047d0dd560929c0ef33ef1acf3") 1m29.333353449s ago: executing program 1 (id=94): socket$packet(0x11, 0xa, 0x300) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="05000000030000000400000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000fe, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001600)={{r0}, &(0x7f0000001580), &(0x7f00000015c0)='%pi6 \x00'}, 0x20) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 1m25.515203448s ago: executing program 1 (id=137): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x214810, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES16], 0x1, 0x11ff, &(0x7f0000000d80)="$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") ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc0189374, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x404c081) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f}}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x2082) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x2, 0x41001, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x300, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64=r7], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000004c0)='kmem_cache_free\x00', r8}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@mb_optimize_scan}, {@data_err_ignore}]}, 0x3, 0x457, &(0x7f0000000740)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f0000000300), &(0x7f00000006c0)=ANY=[], 0xfe37, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@rights={{0x10}}], 0x10, 0x14}, 0x4000) r9 = socket$key(0xf, 0x3, 0x2) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r11}, 0x10) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x4f0, 0x340, 0x25, 0x148, 0x0, 0x60, 0x458, 0x2a8, 0x2a8, 0x458, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x8000, 'syz0\x00', {0x481c}}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x550) sendmsg$key(r9, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001f80)=ANY=[@ANYBLOB="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"], 0xd8}}, 0x0) socket$rxrpc(0x21, 0x2, 0x2) unlink(&(0x7f0000000240)='./file1\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0xffffffff, @loopback, 0xfffffffd}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) close(r0) 1m25.501212769s ago: executing program 32 (id=137): syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file1\x00', 0x214810, &(0x7f0000000a40)=ANY=[@ANYBLOB="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", @ANYRES16], 0x1, 0x11ff, &(0x7f0000000d80)="$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") ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc0189374, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x404c081) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000540), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000480)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000002c0)={0xffffffffffffffff}, 0x13f}}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = syz_open_dev$sg(&(0x7f00000002c0), 0x0, 0x2082) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x2, 0x41001, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x300, 0x0, 0x0, 0x0}) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r6, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0), 0x100}, 0x0) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES64=r7], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000004c0)='kmem_cache_free\x00', r8}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x404, &(0x7f0000000580)={[{@orlov}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@mb_optimize_scan}, {@data_err_ignore}]}, 0x3, 0x457, &(0x7f0000000740)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f0000000300), &(0x7f00000006c0)=ANY=[], 0xfe37, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@rights={{0x10}}], 0x10, 0x14}, 0x4000) r9 = socket$key(0xf, 0x3, 0x2) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x18, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r11}, 0x10) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x4f0, 0x340, 0x25, 0x148, 0x0, 0x60, 0x458, 0x2a8, 0x2a8, 0x458, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'geneve0\x00', {0x44, 0x0, 0x9, 0x0, 0x0, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x0, 0x6, './file0\x00'}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x6, 'syz0\x00'}}}, {{@ip={@broadcast, @multicast1, 0x0, 0x0, 'veth1_to_bond\x00', 'veth0\x00', {0xff}}, 0x0, 0xd0, 0x118, 0x0, {}, [@common=@unspec=@cgroup0={{0x28}, {0x4}}, @common=@unspec=@statistic={{0x38}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x8000, 'syz0\x00', {0x481c}}}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x550) sendmsg$key(r9, &(0x7f00005f5000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000001f80)=ANY=[@ANYBLOB="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"], 0xd8}}, 0x0) socket$rxrpc(0x21, 0x2, 0x2) unlink(&(0x7f0000000240)='./file1\x00') write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000100)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0xffffffff, @loopback, 0xfffffffd}, {0xa, 0x0, 0x0, @remote}, r1}}, 0x48) close(r0) 1m24.179823066s ago: executing program 2 (id=155): socket$packet(0x11, 0xa, 0x300) mbind(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x6, &(0x7f0000000000)=0x9, 0x8, 0x0) get_mempolicy(0x0, 0x0, 0x5, &(0x7f0000484000/0x2000)=nil, 0x3) r0 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r0, 0x0, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10}, 0x40808) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000003, 0x4031, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="05000000030000000400000002"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000fe, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r3}, 0x10) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001600)={{r1}, &(0x7f0000001580), &(0x7f00000015c0)='%pi6 \x00'}, 0x20) syz_emit_ethernet(0x36, &(0x7f0000001540)=ANY=[@ANYBLOB="1380c20000000180c200000e86dd6cbdc6f500006cfffc010000000000000000000000000000ff020000000000000000000000000001"], 0x0) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) r4 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 1m23.785622379s ago: executing program 2 (id=164): r0 = creat(&(0x7f0000000200)='./file2\x00', 0x102) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x1, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sendmsg$rds(r0, &(0x7f0000000600)={&(0x7f0000000180)={0x2, 0x4e24, @rand_addr=0x64010100}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/140, 0x8c}], 0x1, &(0x7f0000000500)=[@zcopy_cookie={0x18, 0x114, 0xc, 0xf37}, @rdma_dest={0x73, 0x114, 0x2, {0x393, 0x6}}, @rdma_dest={0x18, 0x114, 0x2, {0x400, 0x400}}, @mask_fadd={0x58, 0x114, 0x8, {{0xfffffffb, 0x9}, &(0x7f0000000280)=0xa9, &(0x7f00000002c0)=0x7fffffff, 0x34cf, 0x7, 0xe122, 0x5, 0x10, 0x1}}, @mask_fadd={0x58, 0x114, 0x8, {{0x8, 0xd}, &(0x7f0000000400), &(0x7f00000004c0)=0x63, 0x7, 0x28b806a3, 0x7fffffff, 0x6, 0x31}}], 0xf8, 0xc8}, 0x20000000) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000800), 0x8000, 0x0) r6 = dup(r5) ioctl$GIO_UNISCRNMAP(r6, 0x43403d0e, &(0x7f0000000080)=""/96) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r7}, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r8, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYBLOB="010000000000000000000100000024000180060005004e230000060001000200000008000300ac1414aa0800060001"], 0x38}, 0x1, 0x0, 0x0, 0x4000011}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="14000000", @ANYRES16=r9, @ANYBLOB="010028bd7000fcdbdf2504"], 0x14}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) setreuid(0xee01, 0x0) ioprio_get$uid(0x3, 0xee01) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file2\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0x1, 0x120d, &(0x7f0000001280)="$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") 1m22.90941247s ago: executing program 2 (id=175): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$MAP_CREATE(0x0, 0x0, 0x50) socket$inet_udp(0x2, 0x2, 0x0) accept4$unix(0xffffffffffffffff, 0x0, 0x0, 0x80000) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x3, &(0x7f0000000740)=@framed, &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r3 = socket(0x11, 0x2, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = memfd_create(&(0x7f0000000480)='y\x105\xfb\xf7u\x83%\x1f\xe09@:r\xc2\xb9x0\x90P\x03\x00\x00\x00\x00\x00\x00\x00\xfe,\x1c\xf1\xdd\xcf]\xac\xbc\t\xbb\xfc\xa4j\x9f\xceX\x8f5=\xaa\xd5\xe9n\xab s\xa5\x00\x8d\tV\t\x91\x18\x06O\xb0=D\xda\xb6F\x1a\xc82\x8b\xc0l\xd0\x89d\xe6\xb7\xd8\x97\xb8\xde\xa3\x89\"%/u\x17\xdam\x8d\x01Lh\x1e^\x9ej\x1c\xc5\xf0\xf6\x92\x05\x9aH\x00\'\xd4\x94d[\v\xfc\xad\x0f\xa8\xc5\xad\x001\x8b%\xaa?\x00\x00\x00\x00\x00\x00\x00\nj\x8c\xef\x90\xc0Z\xfa\x1a\xb3\xf0wVq\xe9d\xf8N\x80\xd1g\xd8e\xc8\x16\xad1\x02\xab\xce3\xb2\xb0\xd1\x11\xf0\xc2Gj+kV', 0x2) ftruncate(r5, 0xffff) lseek(r5, 0x5, 0x3) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f00000005c0)={'gre0\x00', 0x0}) bind$packet(r3, &(0x7f0000000180)={0x11, 0x0, r6, 0x1, 0x1, 0x6, @multicast}, 0x14) sendmsg$netlink(r3, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000001}, 0x20040051) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/keys\x00', 0x0, 0x0) ioctl$MON_IOCX_GET(r7, 0x40189206, &(0x7f0000000140)={&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @iso}, &(0x7f0000000200)=""/192, 0xc0}) r8 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='memory.events\x00', 0x26e1, 0x0) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r11}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r9}, &(0x7f0000000a00), &(0x7f0000000a40)=r8}, 0x20) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000b00)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010329bd7000fcdbdf252400000018000180140002007465616d5f736c6176655f30"], 0x2c}}, 0x0) syslog(0x2, &(0x7f0000000000)=""/49, 0x31) 1m22.831053256s ago: executing program 2 (id=178): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000980)='./file1\x00', 0x280809a, &(0x7f0000000f40)=ANY=[], 0xd, 0x2c0, &(0x7f0000001a80)="$eJzs3U+LG2UYAPBnstnsrD1kES+K4IAePC1dr142ygrFnJQI6kGDbUGSUOhCoCuY7qmfwO/iR/DixW9Q8Cp4aw8rIzOTyZ8yqVGzivb3Oz08b573fWfe3SSXPPPl65PR7XtJXD55HGmaROs0TuNpEkfRitrDaAcA8P/xNM/j17wMk7yyZWW7da0bAwCuTfX5/6c++AGA/7iPP/3sw16/f/ZRlqXxavfRdJBExOTRdFCN9+7G1zGOO3EzunEVkS9U8Qe3+mfRzgpH8dZkNh0UlZMvfpzP3/sloqw/2evGUXP9SVZZqZ9NB/vxUmTRu7tfb7UbrzTXv9NQH4NOvP3myv6Poxs/fRX3Yhy3o6hd1n97kmXv5989+ebzYpmiPmnF4KB8XSn3BQkAAAAAAAAAAAAAAAAAAAAAgN06zrKkat9T9u8pUvP+O3tX5fhxVjta789T1Sf1RFV/oLzuljNL5/lb/bObWZblSZSDy/p2vNb2YAEAAAAAAAAAAAAAAAAAAAAonD94fGM4Ht+5f/7gYvS3g7obQP2z/r86z+lK5o24GA33Nk948OxQPIxonnm120Cx1+duI9rt2NFtaQ4uF5nDYj87X+IgFplPogqqgznc7XW9/F51Ry9Gw6w+grnRMPmjtdL64L5fHepsOMHtg7z8k7jK1880XWx1vaqzo7vRubHMHC6HfsvzfLt53v25OqN5JilbbGy3+v48aLzAIkiLs0gX//jF0A+bJ9z4lrG3g7cdAAAAAAAAAAAAAAAAAACgwfJHvw2Dl88tbV3bpgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADgH7Z8/n8dpBGxnimC1mpmNi9+5jVNQSfun//LlwgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMAL4PcAAAD//28ZVAA=") mkdir(&(0x7f00000000c0)='./bus\x00', 0x18e) chdir(&(0x7f00000001c0)='./bus\x00') mknod$loop(&(0x7f0000001b80)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) r1 = creat(&(0x7f0000000e00)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1e0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000900), r1) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000940)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CONNECT(r1, &(0x7f0000000a80)={&(0x7f00000008c0)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000a40)={&(0x7f00000009c0)={0x58, r2, 0x100, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r3}, @val={0xc, 0x99, {0x7c, 0x1e}}}}, [@NL80211_ATTR_AUTH_TYPE={0x8, 0x35, 0x2}, @NL80211_ATTR_WIPHY_EDMG_CHANNELS={0x5, 0x118, 0x2e}, @NL80211_ATTR_MAC={0xa, 0x6, @random="9de2288d0edf"}, @NL80211_ATTR_WIPHY_FREQ_HINT={0x8, 0xc9, @random=0x1716}, @NL80211_ATTR_WANT_1X_4WAY_HS={0x4}, @NL80211_ATTR_BG_SCAN_PERIOD={0x6, 0x98, 0x9}]}, 0x58}, 0x1, 0x0, 0x0, 0x10}, 0x30004001) renameat2(0xffffffffffffff9c, &(0x7f0000000380)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffff9c, &(0x7f0000000480)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x2) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xe, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, r1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mkdir(&(0x7f00000004c0)='./bus\x00', 0x0) chdir(&(0x7f00000001c0)='./bus\x00') openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x533201, 0x80) r5 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x194) getdents(r5, &(0x7f0000001fc0)=""/184, 0xb8) r6 = socket$inet(0x2, 0x1, 0x0) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f0000000040)='vcan0\x00', 0x10) setsockopt$inet_opts(r6, 0x0, 0x4, &(0x7f0000000080)="441f0801000000e8c94ef56491ee54be0e1c2074ed27c1c6fe76cef3e2", 0x1d) connect$inet(r6, &(0x7f0000000480)={0x2, 0x4e1e, @local}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r4}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r7, 0x8933, &(0x7f0000000100)={'vcan0\x00', 0x0}) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r9) ptrace$setopts(0x4200, r9, 0x58880000000, 0x300051) connect$can_bcm(r7, &(0x7f00000000c0)={0x1d, r8}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)={0x1b, 0x0, 0x0, 0x137b32d1, 0x0, 0xffffffffffffffff, 0x6, '\x00', r8, r1, 0x3, 0x3, 0x5}, 0x50) syz_clone(0x2000, &(0x7f0000000200)="0a7ed46a3f78317585163ce4c4", 0xd, &(0x7f0000000580), &(0x7f0000000600), &(0x7f0000000640)="6c3bcede16a6de3fb3729f5f36f71ea5e7416e05b09b32d34b83c5f015ef48a63e834020c24a7c4fc6d9878e9845890ff9f471c242a50e956d00f90da74901e7058d80775c5beaa6d59c1b2d3b6d61ff43a3f01c295a8831a1cab4cee19806a9c748161a2290c73856beb1805b794ad62fb1361ab7e23937ce6f704c2ee948a280bb37810645193ca25e5e21a122e04be8d2880188e3b0e06825f1ee0c511d3002f93f24ca73e4f9743e0bf7e03d3b0c7dfa94d1c04a126316dfb9306dcbdbb5056cabc07c8b50ae570fa13add291b5c2b180590db047d0dd560929c0ef33ef1acf3") 1m21.965543706s ago: executing program 2 (id=190): r0 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r0, &(0x7f0000000380), 0x10) readv(r0, &(0x7f00000000c0)=[{&(0x7f00000003c0)=""/115, 0x73}], 0x1) sendmsg$can_bcm(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB="05000000030800"/16, @ANYRES64=0x0, @ANYRES64=0x2710], 0x80}, 0x1, 0x0, 0x0, 0x4014}, 0x0) 1m21.681234479s ago: executing program 2 (id=191): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000000206030000000000fffff0000000000016000300686173683a6e65742c706f72742c6e6574000000050004000000000005000500020000000900020073797a3200000000050001000700000014000780080013400000000008001240"], 0x64}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x17, 0xdc, &(0x7f0000000080)="afac8026a6dd87d5e249cf08ac15ec77d86568c8a5a320", &(0x7f00000003c0)=""/220, 0x80, 0x0, 0x3c, 0xeb, &(0x7f00000000c0)="9f1e2a697f9159c94d4bf12bb78bb901ae0f5c7262880db6b8c333ab4999ce8b72afcab206ff5ac7741f8ee09729b60e75aae32c19c76e4b320a7b92", &(0x7f0000000540)="098674cc170e1cc4c66c3eececb338e11ff18bd0f5fd390cd5838f86965722221ce253f174055093ba700c6fc9d1c9dc08aadd6aae0ae526d4b927aac0bf5fe1839b1c11a9407a47f523f0d8b8582f4eccc58aff9608df6edcd0f6d359ec0dfb89cb0086740d8c76b95f7aa8057a90658775234dabfb46a9c7debfe4212d6501f587a725646139ffe7c60a38eae7f38e90ea85c14f1e09fc6e5c969cf03bdf9520acacb06b5620728a10e84afc0347495e4ee0659949903f38ed98c76c478f334ca8d94cb79d1e695b183818f73ae743117b688391239f589de8f8153c3ef5951d732f59fb50fe1032a5ea", 0x1, 0x0, 0x315e}, 0x50) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x3, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40841}, 0x4) utime(0x0, 0x0) 1m21.623875094s ago: executing program 33 (id=191): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = dup(r0) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000000206030000000000fffff0000000000016000300686173683a6e65742c706f72742c6e6574000000050004000000000005000500020000000900020073797a3200000000050001000700000014000780080013400000000008001240"], 0x64}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r3}, 0x10) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x17, 0xdc, &(0x7f0000000080)="afac8026a6dd87d5e249cf08ac15ec77d86568c8a5a320", &(0x7f00000003c0)=""/220, 0x80, 0x0, 0x3c, 0xeb, &(0x7f00000000c0)="9f1e2a697f9159c94d4bf12bb78bb901ae0f5c7262880db6b8c333ab4999ce8b72afcab206ff5ac7741f8ee09729b60e75aae32c19c76e4b320a7b92", &(0x7f0000000540)="098674cc170e1cc4c66c3eececb338e11ff18bd0f5fd390cd5838f86965722221ce253f174055093ba700c6fc9d1c9dc08aadd6aae0ae526d4b927aac0bf5fe1839b1c11a9407a47f523f0d8b8582f4eccc58aff9608df6edcd0f6d359ec0dfb89cb0086740d8c76b95f7aa8057a90658775234dabfb46a9c7debfe4212d6501f587a725646139ffe7c60a38eae7f38e90ea85c14f1e09fc6e5c969cf03bdf9520acacb06b5620728a10e84afc0347495e4ee0659949903f38ed98c76c478f334ca8d94cb79d1e695b183818f73ae743117b688391239f589de8f8153c3ef5951d732f59fb50fe1032a5ea", 0x1, 0x0, 0x315e}, 0x50) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x3, 0x6, 0x201, 0x0, 0x0, {0x2, 0x0, 0xa}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x40841}, 0x4) utime(0x0, 0x0) 52.687716719s ago: executing program 5 (id=722): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)) munmap(&(0x7f0000ff3000/0xb000)=nil, 0xb000) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x2000008, 0x1a2930, 0xffffffffffffffff, 0x0) memfd_create(&(0x7f0000000180)='\x00\xac=W[[\x87\x12\x04\xd5\xbc\x80K\x06\xcd]4(\xa2\xee2A7:n\x8c\xa7P\x1a\x87\xd9c\xecR\xd6\xe8\xf3Y\x12\"p^\xc1\x0f\x00\x00\x00\x00\x00\x00\x00t\x00\x00\x00\x00\x00\x00\x00\x05\x00\x00\x00\x19M\xc2N%\x93t[\xf3\xee\xa4\xb4\xfbf\x8dz7\\\x8e\xac\x18\x00\xfd\x89\xe1d\xfa\xcfb\xf3\xdc\xd4CY\x9a\xef\xa3\\\xa7\xa9^\xafL:[\x8e\x83U\xff\xfd\xff\xfa\xdaL\xa99\x9b\xcfA\xe4n\xa0^\n\x1c\x84\x04\xc5a\xdf\xe5\xd4Hyn\xba:/\xa5\xf4\xaa\xfa\xcd\xc7T\x83\xe5N^\xf2n\xd0=\xb9\t\xdd-F\xacb\xac \xd3\xccj\x13\xa2\x9fLu\'\xed\x91\x867\xaa\xf5\xa0]\xb6\xaa\xea\xfd\xde\xa6\xec\b\x16\x86l:;\xf9\xdb\xcf\x88\"\xca\xe0E\xdb\xec\xf9\xb3\xed\a\x00\x00\x00\x00\x00\x00\x00\xd6.\xf7\x92\xc42\xdf\xefE\xce}\x1b\xda\xdd?\n6\xe1\xb1\xd8Y\x960\xd1\x00\x00\x00\x00\x00\x00MW\x8f\xc6\x82\xe4\x15\xf7\xe9\xd8\xc5b\x0e\x91\xc5\xc76$\x18\xa4\xbe\xe8V\x8d-\xe3\x8fC\xd5\xf5\xd6L\xe3\xce\xa1\x8dz\xce\xa7\xa5\xc8\xcbhM\x1b\xf8\x98\xc4\xfbD6\x88\xfd\xe5i\x8a\xd8\xcfm\x81Z\x19\xf0\xef\xc15\xe8\xcb\xf5\t\t\x00\x17\xfa\x1fqb\xe7\"\xcb4\xb8\xe5/\xd52\x17\x12\x1d\x04\x00\xb9|\x8d\x83\xea\xcc\x94\xebZ\xae\xaf\x19\xa4\xb2\xc6\xe1\x926B\xb6\x89Z\xa9\xb5/\xbb\x9d&\xeeO\xb3\xb3\xd4\bB\xa9f\x84\xad\t\x1a\xc2\xd5\x88\xbfo\x80V\x93\x9fl\xd7\xff\x03\xb7J\xed\x183\xe3\x7f\xfaq,\xca\x06\xb0\xc9\x92\x93\xa5I\x89\xb7\x85\x90\xb7\x1b0\xce\xd7!\x8fD\x96\xe1 ^>\x9f\x04\x89<\xb7S\x7f\x1a\x88\xab$\xd3y\xc2\xe1\x99\xbch\xd3\x83\xcd\x7f\xc5n\xb1\xc1X \x90\xbb\x1f\x01\x90\xb1O\x8d\x7f\xa8\xd4\xdbO\xef\x99\xf3\xd1M\x0f\t\x7f\n,\x84\x1f\xfa\xe2\xc8\x99\x97Oq\xae\x9b\x86h\xfa3\xb9\xfd\xbb\xd4^\xc0t\xa7]Y\xe9\x7f[\x11\xb1\xf3m\x17F\x9d\x18\xe2\xe1\x01\xb6f=-?\xbcI\xf2\xd9\xc4>-\xc0E\x9a\x82\xcc7S\xd4\xb6\'\xd2DY\xa5\x83,\xd1\xbc\xc7\xf6\xe0\x1f o\x06\xc2t\x14\xc2\xe0\x92\xc1\x8a\x85>@\xc9\xb0% \xc7\x13l\x8bJ\xe5\xec\x1dE\xf5\xc5\xe2\xe3\x10G7r#\xbc\x95&\x14\x1e\x97\xce\x83>Q@\xfb\xeb=\x1e\xb3\xd5H\x02\x86\xc6\xf3\xe1i\\\x1d\xf4\xc1\xacJC+\xc8}\x1b{\x86\x17\x00\n\"\xec\xa5x\xe6\xb1i\xeb\xb3\xb7I\x90\x9eai\xde\x01\xdcG\xb15\x82*=\xbd\xe9\xaf\x12<\xd7\xe1$\xa4\xdaU\xfb^\xd8!\xacxy\xd5X\xef\x03\xa7\x10\xa1C#S~\x0f\x17\t>X\\mv0\x9eZ\x89\xf4\xae\a\xc8\x16\xd2o\x16\xf3X%Q\xbd\xe9\x86V\xf2\x99^0\xe8xI(\xde-\x04s\x15\x06#2\xef\xef@\xa3t0d^^\xad\xf6\xad\xe0\x16\xf6\xa8\x99!\x0e\x9d+;D&\xebN\x94\x12\x04\x95o\xd6\x9fl\xcb\x16gc\xf5(\xaa_\xec\x9aiE\f\xd4\xc6\xf2\xae\x85n\x995\xcd\xa7\xbb\xf0pz\xff\x0f\x00\x00\x00\x00\x00\x00Li\r\x95Z\x89\"_\xe4\xba\xd4\x93\xab\xe1\xb9\xd8E[\xbb\xc9.M+\xbe\x81N\xd2\xae\xf4\x18\xd0\xe7\x98\x90,\xce\ft\xc4\xc7\x02\xaa\xc7\xeb1;\x86b)\x12{k#c\x1d@\xc31\x00\xd2}f\x8cX\xce\xed\xa4\xe4\xca\x00\x00\x00\x00\x00\x03\xfcWZ!<\x16a5ZL.\xe6\x15]\xebY\xaa\xbea\x8e\xdc\xc52r\"\xea\x9e\x03\x11&\xc3JU\xa7\xd6\x8a\xf8\xae>S\xdew\x94\x01\x88K\xe6\x86\xaf)hW\xc8\\/Pl\x9b\x1b\xf2\xf1_\xbb\xaa\xc9?\xf7\xae\x13\xc2\f=\x059\x1c\xb7\x1ca\xe4\xb8C[\x06\x8c\f%l\x19I\x1fq9y)\xaf~~\xa8\xaf\'S\xf0kA\xa8\x93\x8a\xd3\x98\xbf[5\x0f\x05\"\xbd4h\xd9\xd4\xb8\x17P\xb4\xa7\xd6\x03\x86\xe6\xb0\x90W\xc3\xbd\xcb\x1er\xc4e\xc2\x96\r\x15\x84\xda\x16m\xc7\x19g\x83O\a=\xcb\'\xb7E\xc2\xd3L\xd5\xe5\xc2&L\xebjb\xfaOBc\x95\xb7\x97[\xcd$n\xbcO\x81\x03\xc3e:C&\"\x06B:\xa4\xe9\xab\x95DG(^\xd7\xb4\x8e5\x1a\xdb\xcf\x12\xccV\xb7\x98i\xfb\xadv\xb3\xb4Krn\xa0\xe1\xf7.&\xc5\xf0\xd0\x86\xf1\x95\xb9\x95\x8d\xc17\t8o\xbbO\x12\xe7R\xc5I\xaa\xbf\xabx\xa1\xf7<\x1fA\x92\xbbh\xb5\x03\xab\x1bt,Vv^\x00|\xaf\xf9\xe6\x8c}seR&&\x9a\v\x19\xd2\x18\xe8\xcc\xa6\xee\xa9\xd8\b$\xcas\x1e\x7fz\v\xbc\xd2\x1c\t\xfd\xeb\xe2\v\v4\xabv^\xef\f\xec\xd8\xd38$\x14wn=\xca\xd2\xfc\x01\xb8\x96k\x84#\x94\xc5\xa3\xf9\xd4\x05/\x80u\xe1\x0f\xd9{=\x9e\x00'/1335, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000001a40)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x20000, 0x100) symlinkat(&(0x7f0000000a40)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', r0, &(0x7f0000004040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0/file0\x00') r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r5, 0x29, 0x20, &(0x7f0000000280)={@ipv4={'\x00', '\xff\xff', @multicast1}, 0x800, 0x0, 0xff, 0x9}, 0x20) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r5, 0x84, 0x6b, &(0x7f00000006c0)=[@in6={0xa, 0x4e20, 0x8, @remote, 0x2}, @in={0x2, 0x4e24, @multicast2}], 0x2c) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r4, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000003c0)=ANY=[@ANYBLOB="14000000", @ANYRES16=r3, @ANYBLOB="330300000000294cb1021f"], 0x14}}, 0x40) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2, 0x0, 0x4}, 0x18) execve(&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x0) prlimit64(0x0, 0x0, &(0x7f0000000140)={0x8, 0x87}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffffff, 0x84, 0x9, &(0x7f0000000740)={0x0, @in6={{0xa, 0x4e21, 0x0, @private0, 0x2}}, 0x5, 0x3, 0x200, 0xfffffffb, 0x82, 0x73, 0xf7}, 0x9c) r6 = getpid() sched_setscheduler(r6, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) recvmmsg(r7, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r8 = socket(0x40000000015, 0x5, 0x0) connect$inet(r8, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(r8, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(r8, 0x0, 0x0, 0x0, 0x0, 0x0) 52.653575191s ago: executing program 5 (id=724): socket$packet(0x11, 0xa, 0x300) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="05000000030000"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000fe, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xe5, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000001600)={{r0}, &(0x7f0000001580), &(0x7f00000015c0)='%pi6 \x00'}, 0x20) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000540)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x9}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x560b0000, &(0x7f0000000000)="219a53f271a76d2608004c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 52.469604216s ago: executing program 5 (id=726): socket$nl_route(0x10, 0x3, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000080)=ANY=[@ANYBLOB="18090000002300810000000000000000850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffff7}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) socket$inet(0x2, 0x2, 0x1) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0x6}, 0x100002, 0x0, 0xfffffffc, 0x3, 0x4, 0x7, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES64=r1], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = io_uring_setup(0x560d, &(0x7f0000000680)={0x0, 0xb586, 0x2, 0xfffffffe, 0x3bd}) close_range(r3, 0xffffffffffffffff, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) preadv(r4, &(0x7f0000000240)=[{&(0x7f0000033a80)=""/102373, 0x18fe5}], 0x1, 0x0, 0x0) 52.362290965s ago: executing program 5 (id=728): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000400000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) vmsplice(r3, &(0x7f00000000c0)=[{&(0x7f0000000180)="77690addcfbe1fbb66ec", 0xff3b}], 0x1, 0x1) close(r3) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'bond_slave_0\x00', 0x0}) r6 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r6, 0x89f3, &(0x7f0000001a80)={'tunl0\x00', &(0x7f0000000680)={'gre0\x00', 0x0, 0x40, 0x20, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x27, 0x2, 0x0, 0x0, 0x0, @empty, @multicast2, {[@ra={0x94, 0x4, 0x1}]}}}}}) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x2840, 0xf9) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="4400000010000100"/18, @ANYRES32=r5], 0x3}}, 0x0) splice(r2, 0x0, r4, 0x0, 0x10d00, 0x0) syz_mount_image$iso9660(&(0x7f0000000080), &(0x7f0000000000)='./file0\x00', 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="636865636b3d7374726963742c756e686964652c63727566742c696f636861727365743d63a08033322c636865636b3d72656c617865642c6e6f6a6f6c6965742c636865636b3d72656c617865642c6e6f6a6f6c6965742c00"], 0x1, 0x566, &(0x7f0000000680)="$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") socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000023c0)=ANY=[@ANYBLOB="1200000024000000080000000b"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r8, 0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000380)=r7}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r9, 0xffffffffffffffff}, &(0x7f0000000300), &(0x7f0000000380)=r10}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000740)={r11, &(0x7f00000006c0)}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r1}, 0x10) r12 = syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) r13 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xfe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x4}, 0x40db, 0x0, 0x4, 0x8, 0xa, 0x100, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r13, 0x40082406, &(0x7f0000000000)='cpu<=0||!') bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000280)={r12, r13, 0x0, 0x2, &(0x7f0000000200)='\\\x00'}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sys_enter\x00', r0}, 0x10) r14 = open(&(0x7f0000000000)='./bus\x00', 0x1050c1, 0x170) fgetxattr(r14, &(0x7f00000003c0)=@known='security.selinux\x00', 0x0, 0x0) membarrier(0x2, 0x0) 52.045196291s ago: executing program 5 (id=732): syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000980)='./file1\x00', 0x280809a, &(0x7f0000000f40)=ANY=[], 0xd, 0x2c0, &(0x7f0000001a80)="$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") mkdir(&(0x7f00000000c0)='./bus\x00', 0x18e) chdir(&(0x7f00000001c0)='./bus\x00') r0 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x194) getdents(r0, 0x0, 0x0) 51.700761709s ago: executing program 5 (id=740): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000006b80)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000340)={0xa, 0x4e24, 0xfff, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="e8020000000000002900000004000000005a"], 0x2e8}}], 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x40800) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f00000003c0)=0x2) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="9a", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)='G', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000002c0)="1a", 0x1}], 0x1}}], 0x3, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) ftruncate(r2, 0x2000009) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000001500), 0x4) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c020000", @ANYRES16=r4, @ANYBLOB="01000000000000000000010000001400020077673100000000000000000000000000f40108807000008048000980282100f8060001000a00000014000200fe8000000000000000000000000000aa05000300000000001c000080060001000200000908000200e0000001050003000000000024000100000000000000000000000000000000000000000000000000000000000000000080010080200004000a004e2000000005200100000000000000000000000000000800000006000500b01f00000800030006000000060005000500000008000a000100000024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff200004000a034e200000040100000000000000000000ffffac14142a06000000240001000000000000000000000000000000000000000000000000000000000000000000d4000980"], 0x21c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40) syz_genetlink_get_family_id$devlink(&(0x7f0000000240), r5) r6 = socket$netlink(0x10, 0x3, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x5, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000000600)='syzkaller\x00', 0x8b4, 0x6, &(0x7f0000000640)=""/6, 0x41100, 0x1, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000006c0)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000700)=[r2, r2, r7, r2, 0x1, r2, r2, r7, r7], &(0x7f0000000740)=[{0x1, 0x2, 0xc, 0x5}, {0x1, 0x2, 0xa, 0x7}, {0x2, 0x5, 0x7, 0x1}, {0x5, 0x1, 0x1, 0x3}, {0x2, 0x5, 0x9, 0x3}], 0x10, 0xffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8, 0x0, 0x3}, 0x18) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8844) rseq(0x0, 0x0, 0x1, 0x0) sendfile(r0, r2, 0x0, 0x7ffff004) 51.700377939s ago: executing program 34 (id=740): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000200)={0x2, 0x4e20, @empty}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b703000007000000850000001100000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x94) r1 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r1, &(0x7f0000006b80)=[{{&(0x7f0000000040)={0xa, 0x4e24, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000340)={0xa, 0x4e24, 0xfff, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="e8020000000000002900000004000000005a"], 0x2e8}}], 0x2, 0x0) fcntl$setstatus(r0, 0x4, 0x40800) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f00000003c0)=0x2) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @dev={0xac, 0x14, 0x14, 0x18}}, 0x10) sendmmsg$inet(r0, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f0000000380)="9a", 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000100)=[{&(0x7f00000000c0)='G', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000000680)=[{&(0x7f00000002c0)="1a", 0x1}], 0x1}}], 0x3, 0x84) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='blkio.bfq.io_merged_recursive\x00', 0x275a, 0x0) ftruncate(r2, 0x2000009) r3 = syz_init_net_socket$x25(0x9, 0x5, 0x0) setsockopt$X25_QBITINCL(r3, 0x106, 0x1, &(0x7f0000001500), 0x4) r4 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000080), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$WG_CMD_SET_DEVICE(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000cc0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="1c020000", @ANYRES16=r4, @ANYBLOB="01000000000000000000010000001400020077673100000000000000000000000000f40108807000008048000980282100f8060001000a00000014000200fe8000000000000000000000000000aa05000300000000001c000080060001000200000908000200e0000001050003000000000024000100000000000000000000000000000000000000000000000000000000000000000080010080200004000a004e2000000005200100000000000000000000000000000800000006000500b01f00000800030006000000060005000500000008000a000100000024000100dbffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff200004000a034e200000040100000000000000000000ffffac14142a06000000240001000000000000000000000000000000000000000000000000000000000000000000d4000980"], 0x21c}, 0x1, 0x0, 0x0, 0x20000800}, 0x40) syz_genetlink_get_family_id$devlink(&(0x7f0000000240), r5) r6 = socket$netlink(0x10, 0x3, 0x14) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000007c0)={0x18, 0x5, &(0x7f0000000580)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, [@map_idx_val={0x18, 0x3, 0x6, 0x0, 0xb, 0x0, 0x0, 0x0, 0x5}]}, &(0x7f0000000600)='syzkaller\x00', 0x8b4, 0x6, &(0x7f0000000640)=""/6, 0x41100, 0x1, '\x00', 0x0, 0x0, r1, 0x8, &(0x7f00000006c0)={0x3, 0x5}, 0x8, 0x10, 0x0, 0x0, 0x0, 0x0, 0x5, &(0x7f0000000700)=[r2, r2, r7, r2, 0x1, r2, r2, r7, r7], &(0x7f0000000740)=[{0x1, 0x2, 0xc, 0x5}, {0x1, 0x2, 0xa, 0x7}, {0x2, 0x5, 0x7, 0x1}, {0x5, 0x1, 0x1, 0x3}, {0x2, 0x5, 0x9, 0x3}], 0x10, 0xffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8, 0x0, 0x3}, 0x18) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000000)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a2f000000000800410072786500140033007465616d5f736c6176655f30"], 0x38}, 0x1, 0x0, 0x0, 0x1}, 0x8844) rseq(0x0, 0x0, 0x1, 0x0) sendfile(r0, r2, 0x0, 0x7ffff004) 1.192533912s ago: executing program 4 (id=1708): r0 = add_key$fscrypt_v1(&(0x7f0000000580), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f00000002c0)={0x0, "de442bfc7910e10ac69ac014b0fa7807b11d2c99ed1f40d47a6edb3367b5cc888e1fd5102ae2d3d05f251f8d49025ceab4152b6e6d87cd6088e97a9d06d29143", 0xfffffffe}, 0x48, 0xffffffffffffffff) keyctl$read(0xb, r0, &(0x7f0000000080)=""/241, 0xf1) socketpair(0x25, 0xa, 0xdb12, &(0x7f0000000000)) keyctl$chown(0x4, r0, 0xee01, 0xee00) keyctl$unlink(0x9, r0, r0) 1.131927188s ago: executing program 4 (id=1709): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(0xffffffffffffffff, &(0x7f0000001d80)='.\x00', 0x9900, &(0x7f0000001dc0)={0x100030, 0x0, 0x0, {r0}}, 0x20) r1 = syz_clone3(&(0x7f0000001880)={0x100000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) tgkill(r1, r1, 0x21) write$cgroup_pid(r0, &(0x7f0000000000)=r1, 0x12) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r3 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x101005) socketpair(0x18, 0x1, 0x3, &(0x7f00000005c0)) ioctl$SG_IO(r3, 0x2285, 0x0) writev(r3, &(0x7f0000000400)=[{&(0x7f0000000000)="aefdda9d240300005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d76641cb010052f436dd2a", 0x2a}, {&(0x7f0000000040)="aa1d484e240003000000f7c08b0e278ad10ab08ba900b92d276d720984d211fbdf23ea32db0e8f21d5bc27d85e44751170", 0x31}], 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x1, 0x6}, 0x2, 0x0, 0x400, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="b6daab0000000000000000000000000000000000d7f3b6fb00000000"], 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r6, 0x402, 0x5) fcntl$notify(r6, 0x402, 0x848234f1c7d17d2c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r8}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) recvmsg(r0, &(0x7f0000000b00)={&(0x7f0000000340)=@caif, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000240)=""/25, 0x19}, {&(0x7f00000002c0)=""/41, 0x29}, {&(0x7f0000000680)=""/209, 0xd1}, {&(0x7f00000004c0)=""/191, 0xbf}, {&(0x7f0000000600)=""/38, 0x26}, {&(0x7f0000000780)=""/168, 0xa8}], 0x6, &(0x7f0000000940)=""/223, 0xdf}, 0x2000) io_setup(0x401, &(0x7f0000000300)) 1.010103727s ago: executing program 4 (id=1713): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={&(0x7f0000000180)="417f7949f6a309209ffac4a16809bc3256a4a8484094203e88a0e7a8684f8aec7cb5545cf86cca42df80da89a3274ced2735d98f1750a53a8d555e81142ec329be868a8982e79201a40733e1018571df748dc472e689f77843d6a53fd8d85483ab4d4870ee8c2ab837cc7c8fd3930b347f3af8d98e4586ededa4d82a6f145db1c2469b9b1af897527fd99a24f6521d22fad42037fc603f4aa6375496eeaf0d212bcb4e523d0134a5e0e0b8493dba808df51f1da27a4a7e853d65", &(0x7f0000000340)=""/161, &(0x7f0000000000)="08a35e609e2ec56d318b67b09a14083240e76c5ae969749366fbd7b6724851815b2f419dc05a", &(0x7f0000000240)="4ee1fe76b347ecb96138464be3fa82907e491584eebbc12a04f526795b51326c5528416c2b0a73132cd18c997d6164f89b7cc1108a82b468fed1209f86e9ddc9aeb10bb0b274c81111ef2c3026e490b8ad81e31596148d9ea64d9dc1415b82bea864ee21f18cf5c6534b8ed5a192", 0xa1, r0, 0xa94ebad5e8b19b4a}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x80, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0xffffffffffffffc7) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0xfffffffffffffffd}, 0x18) bpf$MAP_CREATE(0x0, 0x0, 0x48) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r4, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 990.672829ms ago: executing program 4 (id=1714): syz_io_uring_setup(0x9e, &(0x7f0000000640)={0x0, 0xec25, 0x0, 0x0, 0x40000333}, &(0x7f00000006c0)=0x0, &(0x7f00000001c0)) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x10, 0xffffffffffffffff, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r0, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0xffffffff, 0x0, 0x0, 0x41100, 0x32, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2279d7d5}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r3, &(0x7f0000000000), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) sendmsg$can_bcm(r3, &(0x7f0000000040)={&(0x7f0000000340)={0x1d, r4}, 0x10, &(0x7f00000000c0)={&(0x7f0000000100)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=r4, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="0000000004"], 0x20000600}, 0x1, 0x0, 0x0, 0x4040040}, 0x0) 921.010765ms ago: executing program 4 (id=1716): mkdir(&(0x7f0000000640)='./file0\x00', 0xc) (async) mkdir(&(0x7f0000000640)='./file0\x00', 0xc) r0 = open(&(0x7f0000000000)='.\x00', 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') (async) chdir(&(0x7f0000000140)='./file0\x00') socket$packet(0x11, 0x3, 0x300) (async) socket$packet(0x11, 0x3, 0x300) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, 0x0, 0x0, 0x100}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) rseq(&(0x7f0000000400)={0x0, 0x0, 0x0, 0x2}, 0x20, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[], 0x48) epoll_create1(0x0) r1 = shmget$private(0x0, 0x13000, 0x1, &(0x7f0000feb000/0x13000)=nil) shmat(r1, &(0x7f0000ff1000/0x3000)=nil, 0x400c) (async) shmat(r1, &(0x7f0000ff1000/0x3000)=nil, 0x400c) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a}, 0x1c) (async) setsockopt$packet_rx_ring(r2, 0x107, 0x5, &(0x7f0000000040)=@req3={0x1000, 0x3a, 0x1000, 0x3a}, 0x1c) setsockopt$packet_int(r2, 0x107, 0x7, &(0x7f00000001c0)=0x7, 0x4) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000300), 0xffffffffffffffff) r4 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r4, &(0x7f0000001640)=[{{0x0, 0x0, &(0x7f0000000040)=[{&(0x7f00000004c0)=""/4096, 0x1e67}, {&(0x7f00000000c0)=""/250, 0x4}], 0x2, 0x0, 0xd64}}], 0x300, 0x34000, 0x0) sendmsg$ETHTOOL_MSG_TSINFO_GET(r4, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000280)=ANY=[@ANYBLOB="18000000", @ANYRES16=r3, @ANYBLOB="a787000000ff000000000b00000404000180"], 0x18}}, 0x0) unlinkat(r0, &(0x7f0000000240)='./file0\x00', 0x200) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x2f, 0xd, 0x8, 0x6, 0x16, @rand_addr=' \x01\x00', @loopback, 0x8000, 0x40, 0x1, 0x4}}) (async) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'ip6_vti0\x00', &(0x7f0000000340)={'syztnl0\x00', 0x0, 0x2f, 0xd, 0x8, 0x6, 0x16, @rand_addr=' \x01\x00', @loopback, 0x8000, 0x40, 0x1, 0x4}}) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000003c0), &(0x7f0000000400)=0xc) (async) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000003c0)={0x0, 0x0}, &(0x7f0000000400)=0xc) sendmsg$nl_xfrm(r0, &(0x7f0000001580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001540)={&(0x7f00000014c0)=@migrate={0x64, 0x21, 0x20, 0x70bd2a, 0x25dfdbfe, {{@in=@dev={0xac, 0x14, 0x14, 0x3b}, @in=@private=0xa010100, 0x4e22, 0x10, 0x4e22, 0x200, 0xa, 0x40, 0xc0, 0x2b, r6, r7}, 0x6e6bbd, 0x2}, [@coaddr={0x14, 0xe, @in6=@private2={0xfc, 0x2, '\x00', 0x1}}]}, 0x64}, 0x1, 0x0, 0x0, 0x48880}, 0x14) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newnexthop={0x38, 0x68, 0x1, 0x100003, 0x7ffffffe, {}, [@NHA_GROUP={0xc, 0x2, [{0x1, 0x14}]}, @NHA_GATEWAY={0x14, 0x6, @in6_addr=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, 0x38}}, 0x4000080) (async) sendmsg$nl_route(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000004c0)=@newnexthop={0x38, 0x68, 0x1, 0x100003, 0x7ffffffe, {}, [@NHA_GROUP={0xc, 0x2, [{0x1, 0x14}]}, @NHA_GATEWAY={0x14, 0x6, @in6_addr=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, 0x38}}, 0x4000080) setxattr(&(0x7f0000000540)='./bus\x00', &(0x7f0000000580)=@known='trusted.overlay.impure\x00', 0x0, 0x0, 0x0) 669.209745ms ago: executing program 3 (id=1718): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x3, 0x8}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newtfilter={0x90, 0x2c, 0xd27, 0x70bd28, 0x6000000, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {}, {0x7, 0xe}}, [@filter_kind_options=@f_fw={{0x7}, {0x5c, 0x2, [@TCA_FW_ACT={0x58, 0x4, [@m_nat={0x54, 0x1, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xfffffc00, 0x8, 0x10000000, 0x200000b, 0xff}, @broadcast, @local, 0xff, 0x1}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x11, 0x8}}]}, 0x90}, 0x1, 0x0, 0x0, 0x4}, 0x4000800) 655.114446ms ago: executing program 4 (id=1719): r0 = creat(&(0x7f0000000200)='./file2\x00', 0x102) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x1, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) sendmsg$rds(r0, &(0x7f0000000600)={&(0x7f0000000180)={0x2, 0x4e24, @rand_addr=0x64010100}, 0x10, &(0x7f00000001c0)=[{&(0x7f0000000340)=""/140, 0x8c}], 0x1, &(0x7f0000000500)=[@zcopy_cookie={0x18, 0x114, 0xc, 0xf37}, @rdma_dest={0x73, 0x114, 0x2, {0x393, 0x6}}, @rdma_dest={0x18, 0x114, 0x2, {0x400, 0x400}}, @mask_fadd={0x58, 0x114, 0x8, {{0xfffffffb, 0x9}, &(0x7f0000000280)=0xa9, &(0x7f00000002c0)=0x7fffffff, 0x34cf, 0x7, 0xe122, 0x5, 0x10, 0x1}}, @mask_fadd={0x58, 0x114, 0x8, {{0x8, 0xd}, &(0x7f0000000400), &(0x7f00000004c0)=0x63, 0x7, 0x28b806a3, 0x7fffffff, 0x6, 0x31}}], 0xf8, 0xc8}, 0x20000000) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000009c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="1800"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000800), 0x8000, 0x0) r6 = dup(r5) ioctl$GIO_UNISCRNMAP(r6, 0x43403d0e, &(0x7f0000000080)=""/96) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x21, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r7}, 0x10) r8 = socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r8, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000040)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r9, @ANYBLOB="010000000000000000000100000024000180060005004e230000060001000200000008000300ac1414aa0800060001"], 0x38}, 0x1, 0x0, 0x0, 0x4000011}, 0x0) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r8, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000c00)=ANY=[@ANYBLOB="14000000", @ANYRES16=r9, @ANYBLOB="010028bd7000fcdbdf2504"], 0x14}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, 0x0}) setreuid(0xee01, 0x0) ioprio_get$uid(0x3, 0xee01) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file2\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0x1, 0x120d, &(0x7f0000001280)="$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") 627.510409ms ago: executing program 3 (id=1721): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) flistxattr(0xffffffffffffffff, 0x0, 0x2) 611.02552ms ago: executing program 3 (id=1722): ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee00}}, './file0\x00'}) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='mnt\x00', 0x4, &(0x7f00000000c0)={[], [{@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@obj_role={'obj_role', 0x3d, '+'}}, {@appraise}, {@mask={'mask', 0x3d, '^MAY_APPEND'}}, {@subj_user={'subj_user', 0x3d, 'ext4\x00'}}, {@uid_eq={'uid', 0x3d, r0}}, {@subj_type={'subj_type', 0x3d, '\x02./&'}}]}, 0x0, 0x236, &(0x7f0000000300)="$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") r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = syz_open_dev$usbfs(&(0x7f00000000c0), 0x204, 0x2) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1000002, 0x11012, r2, 0x108000) ioctl$USBDEVFS_SUBMITURB(r2, 0x8038550a, &(0x7f0000000140)=@urb_type_control={0x2, {}, 0x2000000b, 0x80, &(0x7f0000000240)={0x3, 0x0, 0xfffa, 0x4360}, 0x8, 0x6, 0x7d, 0x0, 0x1, 0x101, 0x0}) 569.529733ms ago: executing program 3 (id=1723): prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) mount_setattr(0xffffffffffffffff, &(0x7f0000001d80)='.\x00', 0x9900, &(0x7f0000001dc0)={0x100030, 0x0, 0x0, {r0}}, 0x20) r1 = syz_clone3(&(0x7f0000001880)={0x100000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) tgkill(r1, r1, 0x21) write$cgroup_pid(r0, &(0x7f0000000000)=r1, 0x12) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) r3 = syz_open_dev$sg(&(0x7f00000003c0), 0x0, 0x101005) socketpair(0x18, 0x1, 0x3, &(0x7f00000005c0)) ioctl$SG_IO(r3, 0x2285, 0x0) writev(r3, &(0x7f0000000400)=[{&(0x7f0000000000)="aefdda9d240300005a90f57f07703aeff0f64ebbee07962c22772e11b44e65d76641cb010052f436dd2a", 0x2a}, {&(0x7f0000000040)="aa1d484e240003000000f7c08b0e278ad10ab08ba900b92d276d720984d211fbdf23ea32db0e8f21d5bc27d85e44751170", 0x31}], 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x2, @perf_config_ext={0x1, 0x6}, 0x2, 0x0, 0x400, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="0f00000004000000040000001200000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="b6daab0000000000000000000000000000000000d7f3b6fb00000000"], 0x48) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00}, 0x80) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r4, r5, 0x5}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) r6 = open(&(0x7f0000000280)='.\x00', 0x0, 0x0) fcntl$notify(r6, 0x402, 0x5) fcntl$notify(r6, 0x402, 0x848234f1c7d17d2c) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000180)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x4, 0x5}, 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r7}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r8}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) recvmsg(r0, &(0x7f0000000b00)={&(0x7f0000000340)=@caif, 0x80, &(0x7f00000008c0)=[{&(0x7f0000000240)=""/25, 0x19}, {&(0x7f00000002c0)=""/41, 0x29}, {&(0x7f0000000680)=""/209, 0xd1}, {&(0x7f00000004c0)=""/191, 0xbf}, {&(0x7f0000000600)=""/38, 0x26}, {&(0x7f0000000780)=""/168, 0xa8}], 0x6, &(0x7f0000000940)=""/223, 0xdf}, 0x2000) io_setup(0x401, &(0x7f0000000300)) 492.34862ms ago: executing program 0 (id=1724): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={&(0x7f0000000180)="417f7949f6a309209ffac4a16809bc3256a4a8484094203e88a0e7a8684f8aec7cb5545cf86cca42df80da89a3274ced2735d98f1750a53a8d555e81142ec329be868a8982e79201a40733e1018571df748dc472e689f77843d6a53fd8d85483ab4d4870ee8c2ab837cc7c8fd3930b347f3af8d98e4586ededa4d82a6f145db1c2469b9b1af897527fd99a24f6521d22fad42037fc603f4aa6375496eeaf0d212bcb4e523d0134a5e0e0b8493dba808df51f1da27a4a7e853d65", &(0x7f0000000340)=""/161, &(0x7f0000000000)="08a35e609e2ec56d318b67b09a14083240e76c5ae969749366fbd7b6724851815b2f419dc05a", &(0x7f0000000240)="4ee1fe76b347ecb96138464be3fa82907e491584eebbc12a04f526795b51326c5528416c2b0a73132cd18c997d6164f89b7cc1108a82b468fed1209f86e9ddc9aeb10bb0b274c81111ef2c3026e490b8ad81e31596148d9ea64d9dc1415b82bea864ee21f18cf5c6534b8ed5a192", 0xa1, r0, 0xa94ebad5e8b19b4a}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x80, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0xffffffffffffffc7) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0xfffffffffffffffd}, 0x18) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r4, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r4, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) recvmsg(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 469.533701ms ago: executing program 0 (id=1725): creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b000000"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) creat(&(0x7f00000003c0)='./file0\x00', 0x36) newfstatat(0xffffffffffffff9c, &(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40), 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000002100)) 450.197383ms ago: executing program 7 (id=1727): fchdir(0xffffffffffffffff) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc2, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$msdos(&(0x7f0000000100), &(0x7f0000000180)='./file1\x00', 0xa1c406, &(0x7f00000008c0)=ANY=[@ANYBLOB="646f74730000f5ff522c246d6173a594e5e0ee30303030010000000000400017c3d234e02f30303030302c6e6f646f742c6e66733d6e0973", @ANYRES32=r3, @ANYRESDEC], 0x1, 0x2a2, &(0x7f0000001140)="$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") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000002240)=ANY=[], 0x20}}, 0xeb64d656241b6f26) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r4}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r5 = creat(&(0x7f00000000c0)='./file0\x00', 0x48) setsockopt$IP_VS_SO_SET_EDIT(r5, 0x0, 0x483, &(0x7f0000000940)={0xa5, @rand_addr=0x64010102, 0x4e24, 0x4, 'lblcr\x00', 0x2c, 0xffffff39, 0x6}, 0x2c) newfstatat(0xffffffffffffff9c, &(0x7f0000000400)='./file0\x00', &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x900) ioctl$sock_FIOGETOWN(r5, 0x8903, &(0x7f0000000200)=0x0) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f00000003c0)={r8, r6, r7}, 0xc) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r9 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7020000140000e5b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='mm_page_alloc\x00', r10, 0x0, 0x4}, 0x18) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r5, 0x8933, &(0x7f0000000740)={'batadv0\x00', 0x0}) sendmsg$BATADV_CMD_GET_DAT_CACHE(r5, &(0x7f0000000800)={&(0x7f0000000600), 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x3c, 0x0, 0x400, 0x70bd29, 0x25dfdbfb, {}, [@BATADV_ATTR_TPMETER_TEST_TIME={0x8, 0xb, 0x9}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8}, @BATADV_ATTR_THROUGHPUT_OVERRIDE={0x8, 0x3b, 0x8}, @BATADV_ATTR_ELP_INTERVAL={0x8, 0x3a, 0x7ff}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r12}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4}, 0xc040) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='contention_end\x00', r11}, 0x10) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0x9, 0x1, 0x56d, 0x2}, 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000600), &(0x7f0000001f80), 0xfffffffb, r13}, 0x38) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200), &(0x7f0000000840)="97403eb598f54dea5f15fcd873b6f4df4266e508409f9a1dd11a84251aba32a38f0d029626ef811c626b812c0d50eefab8552e51a708999148e70950e729dff0f7c35f2f18e4516036a96832537566049160e2627abc50b863b04d54174b2a582410c82c565b78", 0x1000, r13, 0x0, 0x11000000}, 0x38) dup3(r2, r0, 0x80000) syz_mount_image$iso9660(&(0x7f0000000680), &(0x7f00000006c0)='./file0\x00', 0x80000, &(0x7f0000000980)=ANY=[@ANYBLOB="686964652c7362736563746f723d3078303030303030303030303030316663652c7362736563746f723d3078303030303030303030303030303030312c6d61703d6e6f726d616c2c696f636861727365743d69736f383835392d31342c757466382c756e686964652c0060362ae6cef3ee42832a64ba2bd0979137e6de9ed9"], 0x3, 0x693, &(0x7f0000001080)="$eJzs3d9uE+nZAPDHAb4vSiVUtRVFiGVnoZVAYoPtLEHRHrnOOJld22PNOCs4qFZoSVaIsFvBtipIlcoJbaX2rDewp72I9h561otY9Q5K5bHDBvLH6QJJSn8/C97XM49nnhnMPHptz0wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAFFrL9frjVp0s/7azWRv7eUi7+059+Tz5f3thWaf9UbURn9idjbOjied/dG3s8+M/roY58fPzsfsqJmNx9878/0Pf3hyZuv1+yT8BsRvX57y8NHje7c3N9cfHG4ix8ZK2s/KPOu1VtIkK/NkaXGxfm21UyadrJuWt8ph2kvaRdoa5kVyuX0laSwtLSTp/K18rb+y3OqmWxNvvN+s1xeTj+YHaaso8/61j+bL9mrW7Wb9lSpmNHsUc2P0Rvw4GybDtNVLko27m+sL05IcBTUOEtScFtSsN5uNRrPZWLy+dP1GvX5yx4T6S2JHxGG/aTluXu8BHF7BzKT+Rzey6D97Fjcj2fXRjuUoIo/eHvMntur/T6+lu6/wz+Nme/3fqvJnv406F1X9vzBTPbuwV/3fI5c385iZ5LZ92sN4FI/jXtyOzdiM9XhwqBkd/WMl0uhHFmXkkUUvWtWUZDIliaVYjMWox6exGp0oI4lOZNGNNMq4FWUMI63eUe0oqt07jDyKSOJytONKJNGIpViKhUgijfm4FXmsRT9WYjla1VI24m613xf2yfF5UOMgQc19gtR/DuTCjyeHih0jBvWf4+TZVv0HAAAA3lq16tP30fj/VLxT9TpZN60fdVoAAADAa1R9839+1Jwa9d6JmvE/AAAAvG1qk9PwIubi3fHnAVtnQvkQAAAAAN4S1ff/F0bN3Kj3btSM/wEAAOBt8/up19gvB/9f++s/oyhO1Z4Mbv6kdr81imvdPzF+3YmXlzjsnKudniykahZPTp610/O1ydUvn18E85tJszEtj9prSCD+GO+NY967M27vbM0Zr2Wuk3XT+Xbe/bARrdbpmWF6c/jLL+7+OqrN/0O/d7oWG3c31+c/+3LzTpXLk9FSntyfXEBxx3UU98nlq+p6C9U5F7tu8anqRIzJeufG661v3/7J9Yhn/oN1Po2L45iLc+N27sXtnx2tszG/19ZPsmi84pY/jUvjmEuXL42bXbJoTsuiuT2L77QvDpDFwrQsFl4xC4CjsjGlCtV2Fv7vcJQ7nOr+NC6PYy6fqw6sJ8/tckSvTzui1/esbv/410Gy+EtcGcdc2Qreq8aO1vunl6rq16MXfL1nVS27zdpoF5746v4v4szDR4/fv3v/9ufrn69/0Wz+arH+Qb1+vRmnqs2YNGoPALu4GBfGnT3vsTM1ovbBlFH1D2IjovpJwXx8Fl/GZtyJq9XZBtUvDnZd6ty2nyFcnTJqndt2h5erU0Z1c9tu9HLw2IVD+JcAgMNzcUodPkj9vzpl3P1iLd9/dDyO/c3P/54d8o4AgP8hafFNbW74u1pRZINPG0tLjdZwNU2KvP1xUmTLK2mS9Ydp0V5t9VfSZFDkw7ydd0edT7LltEzKtcEgL4ZJJy+SQV5mN6s7vyeTW7+Xaa/VH2btctBNW2WazER/2GoPk+WsbCeDtZ91s3I1LaoXl4O0nXWydmuY5f2kzNeKdjqfJGWabgvMltP+MOtko24/GRRZr1XcSj7Ju2u9NFlOy3aRDYb5eIHtfLyurN/Ji1612Pmj3tkAcEw8fPT43u3NzfUHb7Bz1NsIALxIlQYAAAAAAAAAAAAAgOPvMM7/+6/uzMaxSOO1dLYuJ3xc8tnq/F9EHIM0jqJTO7b/B4/4wAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAu/h3AAAA///qQVMZ") 431.208524ms ago: executing program 6 (id=1728): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) r1 = syz_open_dev$loop(&(0x7f0000000200), 0x7fffffffffffffff, 0x2000) ioctl$BLKPG(r1, 0x1269, &(0x7f00000003c0)={0x3, 0x0, 0x98, &(0x7f00000002c0)={0xfffffffffffffffd, 0x10, 0x4}}) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r2, 0x0, 0x7}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) setxattr$security_evm(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x2) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000100)=@sha1={0x1, "ba4067f752c94d0674406b9298f910368cbd6c2f"}, 0x15, 0x1) r3 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)={0x38, 0x1403, 0x100, 0x70bd29, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bridge\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0x8081}, 0x20000010) socket(0x29, 0x2, 0x4410) 415.354816ms ago: executing program 0 (id=1729): bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff"], 0x50) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8510, 0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xa5f, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2c}}, 0x10) sendmmsg$inet(r0, &(0x7f0000003cc0)=[{{&(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000d40)=ANY=[@ANYBLOB="14000000000000000000000007"], 0x18}}], 0x1, 0x44008004) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x98002, 0x0) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000140)="de", 0x1}], 0x1, 0x0, 0x0) 398.701267ms ago: executing program 7 (id=1730): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000200), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000040)={0x40, r1, 0x1, 0x70bd2c, 0x25dfdbff, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0x14, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x10, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '+'}]}]}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x818}, 0x20000004) (fail_nth: 7) 397.485227ms ago: executing program 3 (id=1731): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x5, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x15, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x3, 0x8}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=@newtfilter={0x90, 0x2c, 0xd27, 0x70bd28, 0x6000000, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {}, {0x7, 0xe}}, [@filter_kind_options=@f_fw={{0x7}, {0x5c, 0x2, [@TCA_FW_ACT={0x58, 0x4, [@m_nat={0x54, 0x1, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0xfffffc00, 0x8, 0x10000000, 0x200000b, 0xff}, @broadcast, @local, 0xff, 0x1}}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}]}]}}, @TCA_RATE={0x6, 0x5, {0x11, 0x8}}]}, 0x90}, 0x1, 0x0, 0x0, 0x4}, 0x4000800) 373.925109ms ago: executing program 6 (id=1732): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x2e, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x22, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) flistxattr(0xffffffffffffffff, 0x0, 0x2) 330.471502ms ago: executing program 6 (id=1733): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x1000000000000}, 0x18) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{r2}, 0x0, 0x0}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000580)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000380), &(0x7f0000000280)=r3}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/kernel/notes', 0x900, 0x1a4) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x18) syz_io_uring_submit(0x0, 0x0, 0x0) r7 = socket$inet6(0xa, 0x802, 0x0) setsockopt$inet6_buf(r7, 0x29, 0x39, &(0x7f0000000040)="ff02040000ffffffffffffffff1f2be82db1af0000000000", 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x400000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000540)=ANY=[@ANYRES32=r4, @ANYBLOB, @ANYRESHEX=r3], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kmem_cache_free\x00', r8}, 0x18) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) preadv(r4, 0x0, 0x0, 0x0, 0x45) 330.313123ms ago: executing program 6 (id=1734): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000040)=0x100000001, 0x76dc) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='kfree\x00', r2, 0x0, 0x1}, 0x18) connect$inet6(r1, &(0x7f0000000080), 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000002c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000001300)=@gcm_256={{0x304}, "67c3f71b0f188109", "2c9e910757c2725dd5795f705ac44b9d43498e33fe93a0c9001c5c65f7107d0d", "ddfb00", "5a3e2c1b40238e79"}, 0x38) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x2, &(0x7f0000000280)=@gcm_256={{0x304}, "54164ace03f0fff5", "faad50724acb18aba4e3bc654d684ad9c694f3e96ca4b72643dd3689727968e9", "5cb6d03a", "29a78ab9b0a4e8ae"}, 0x38) r3 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000002c0)="d80000001c0081064e81f782db44b9040a1d08040e00000000000aa1180002000600142603600e1208000f0000810401a8001605200001400200000803600cfab94dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef52a985162756aa5e8d7ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f215ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd6e4edef3d93452a92954b43", 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x48090) 272.710277ms ago: executing program 7 (id=1735): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={&(0x7f0000000180)="417f7949f6a309209ffac4a16809bc3256a4a8484094203e88a0e7a8684f8aec7cb5545cf86cca42df80da89a3274ced2735d98f1750a53a8d555e81142ec329be868a8982e79201a40733e1018571df748dc472e689f77843d6a53fd8d85483ab4d4870ee8c2ab837cc7c8fd3930b347f3af8d98e4586ededa4d82a6f145db1c2469b9b1af897527fd99a24f6521d22fad42037fc603f4aa6375496eeaf0d212bcb4e523d0134a5e0e0b8493dba808df51f1da27a4a7e853d65", &(0x7f0000000340)=""/161, &(0x7f0000000000)="08a35e609e2ec56d318b67b09a14083240e76c5ae969749366fbd7b6724851815b2f419dc05a", &(0x7f0000000240)="4ee1fe76b347ecb96138464be3fa82907e491584eebbc12a04f526795b51326c5528416c2b0a73132cd18c997d6164f89b7cc1108a82b468fed1209f86e9ddc9aeb10bb0b274c81111ef2c3026e490b8ad81e31596148d9ea64d9dc1415b82bea864ee21f18cf5c6534b8ed5a192", 0xa1, r0, 0xa94ebad5e8b19b4a}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x80, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0xffffffffffffffc7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) sendmsg$tipc(r3, &(0x7f0000002700)={0x0, 0x0, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 272.239097ms ago: executing program 7 (id=1736): r0 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001540)=@newtaction={0x48, 0x32, 0x829, 0x70bd2d, 0x0, {0x0, 0x0, 0x2}, [{0x34, 0x1, [@m_simple={0x30, 0x0, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc, 0x7, {0x1}}, {0xc, 0x8, {0x1, 0x2}}}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8080}, 0x20000840) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x18, 0xb, &(0x7f0000000300)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000240)=ANY=[@ANYBLOB="380000006c0015000000d9fece23b82000000000", @ANYRES32=r3, @ANYBLOB="000080000000000018003480050035"], 0x38}, 0x1, 0x300}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x165) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) socket(0x10, 0x803, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000006c0)={0xffffffffffffffff}) ioctl$FIDEDUPERANGE(r4, 0xc0189436, &(0x7f00000005c0)=ANY=[@ANYBLOB="fdffffffffcf3b316b9cffffffffffff7f"]) r5 = socket$unix(0x1, 0x5, 0x0) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000280), r3) sendmsg$DEVLINK_CMD_GET(r2, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000002c0)={&(0x7f0000000380)={0x70, r6, 0x800, 0x70bd26, 0x25dfdbfe, {}, [@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8}, {0x11}}]}, 0x70}, 0x1, 0x0, 0x0, 0x4}, 0x80) r7 = memfd_secret(0x80000) ioctl$HIDIOCAPPLICATION(r7, 0x4802, 0x5) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r9}, 0x18) r10 = open_tree(0xffffffffffffff9c, 0x0, 0x0) r11 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r10) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_CMD_SHOW_NAME_TABLE(r10, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x307573189e5835e0}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x30, r11, 0x8, 0x70bd2c, 0x25dfdbfb, {{}, {}, {0x14, 0x19, {0x4ed, 0x80000000, 0x2, 0x7}}}, ["", "", "", "", "", ""]}, 0x30}, 0x1, 0x0, 0x0, 0x4004080}, 0x48004) bind$unix(r5, &(0x7f0000003000)=@file={0x1, './file0\x00'}, 0x6e) 118.48121ms ago: executing program 6 (id=1737): r0 = socket$packet(0x11, 0x2, 0x300) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpu.stat\x00', 0x275a, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r2, 0x29, 0x6, &(0x7f00000000c0)={0x15, {{0x29, 0x0, 0x58a09cf1, @empty, 0x3}}}, 0x88) write$UHID_CREATE2(r1, &(0x7f0000000040)=ANY=[], 0x118) fcntl$setstatus(r0, 0x4, 0x42400) syz_emit_ethernet(0x3e, &(0x7f0000000080)=ANY=[], 0x0) 73.103393ms ago: executing program 7 (id=1738): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020782500000000002020207b1af8fe00000000bfa100000000000007010000f8ffffffb702000008000000b7030000070000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x18) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) r2 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x14}, 0x14}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/20, @ANYRES32=r3, @ANYBLOB="01000000020000001c0012000c000100626f6e64"], 0x3c}}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=@newsa={0x15c, 0x10, 0x713, 0x0, 0x25dfdbfc, {{@in6=@rand_addr=' \x01\x00', @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x4e21, 0x2, 0x0, 0x0, 0x0, 0x6c, 0x0, 0xee00}, {@in6=@private1, 0xfe, 0x32}, @in=@multicast2, {0x0, 0x0, 0x0, 0x9, 0xffffffff00000001, 0x0, 0x80000001, 0x543}, {0x4, 0x7fffffffffffffff, 0x0, 0x1}, {}, 0x70bd2c, 0x3500, 0xa, 0x0, 0x0, 0x50}, [@algo_aead={0x60, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xa0, 0x60, "210466d38547aa140db9a200000000c538c7cb7a"}}, @offload={0xc, 0x1c, {r3, 0x3}}]}, 0x15c}, 0x1, 0x0, 0x0, 0x880}, 0x2000) 72.799844ms ago: executing program 0 (id=1739): creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x800) write$P9_RVERSION(r1, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r2 = dup(r1) write$P9_RLERRORu(r2, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r2, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @id_afonly={0x0}}, 0x20) write$binfmt_elf64(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b000000"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r2]) creat(&(0x7f00000003c0)='./file0\x00', 0x36) newfstatat(0xffffffffffffff9c, &(0x7f0000000d00)='./file0\x00', &(0x7f0000000d40), 0x0) stat(&(0x7f0000000480)='./file0\x00', &(0x7f0000002100)) 66.910684ms ago: executing program 6 (id=1740): r0 = syz_genetlink_get_family_id$batadv(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r0, 0x800, 0x70bd2c, 0x25dfdbfc, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0xeb}]}, 0x1c}, 0x1, 0x0, 0x0, 0x20044083}, 0x4000080) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_WIPHY(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x1c, r2, 0x300, 0x70bd2d, 0x25dfdbfc, {}, [@NL80211_ATTR_TXQ_QUANTUM={0x8, 0x10c, 0x1ff}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4004000}, 0x44) socket$inet_sctp(0x2, 0x1, 0x84) (async) r3 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_AUTOCLOSE(r3, 0x84, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x4) ioctl$VFAT_IOCTL_READDIR_BOTH(r1, 0x82307201, &(0x7f0000000300)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) creat(&(0x7f0000000540)='./file0\x00', 0x14) (async) r4 = creat(&(0x7f0000000540)='./file0\x00', 0x14) open(&(0x7f0000000580)='./file0\x00', 0x100, 0x8) (async) r5 = open(&(0x7f0000000580)='./file0\x00', 0x100, 0x8) setsockopt$IP_VS_SO_SET_ZERO(r3, 0x0, 0x48f, &(0x7f00000005c0)={0x2b, @broadcast, 0x4e23, 0x2, 'none\x00', 0x0, 0x2, 0xc}, 0x2c) syz_genetlink_get_family_id$devlink(&(0x7f0000000600), r4) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r5, 0x114, 0xa, &(0x7f0000000640), 0x1) (async) setsockopt$SO_RDS_MSG_RXPATH_LATENCY(r5, 0x114, 0xa, &(0x7f0000000640), 0x1) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x1c, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008080}, 0x10) (async) sendmsg$TIPC_CMD_GET_MAX_PORTS(r5, &(0x7f0000000740)={&(0x7f0000000680)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000700)={&(0x7f00000006c0)={0x1c, 0x0, 0x400, 0x70bd2c, 0x25dfdbfd, {}, ["", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x20008080}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000780)={0x2, 0x4e20, @empty}, 0x10) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r4, 0xc08c5332, &(0x7f00000007c0)={0xc20, 0x1, 0x1, 'queue1\x00', 0xfffffffc}) syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), r4) (async) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f00000008c0), r4) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000900)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000a00)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, r6, 0x800, 0x70bd2d, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa}]}, 0x58}}, 0x4004) (async) sendmsg$NL80211_CMD_GET_MPP(r1, &(0x7f0000000a00)={&(0x7f0000000880)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f00000009c0)={&(0x7f0000000940)={0x58, r6, 0x800, 0x70bd2d, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa, 0x1a, @device_b}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MPATH_NEXT_HOP={0xa}, @NL80211_ATTR_MAC={0xa}]}, 0x58}}, 0x4004) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r3, 0x8040942d, &(0x7f0000000a40)) getsockname$inet6(r4, &(0x7f0000000a80), &(0x7f0000000ac0)=0x1c) timer_create(0x3, &(0x7f0000000b00)={0x0, 0x10, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000b40)) (async) timer_create(0x3, &(0x7f0000000b00)={0x0, 0x10, 0x4, @tid=0xffffffffffffffff}, &(0x7f0000000b40)=0x0) timer_settime(r8, 0x0, &(0x7f0000000b80)={{0x0, 0x3938700}, {0x77359400}}, &(0x7f0000000bc0)) r9 = socket$inet_sctp(0x2, 0x0, 0x84) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r9, 0x84, 0x21, &(0x7f0000000c00), &(0x7f0000000c40)=0x4) (async) getsockopt$inet_sctp_SCTP_RECVNXTINFO(r9, 0x84, 0x21, &(0x7f0000000c00), &(0x7f0000000c40)=0x4) socket$igmp(0x2, 0x3, 0x2) sendmsg$NL80211_CMD_DISASSOCIATE(0xffffffffffffffff, &(0x7f0000000d40)={&(0x7f0000000c80)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000d00)={&(0x7f0000000cc0)={0x30, r6, 0x10, 0x70bd2a, 0x25dfdbfc, {{}, {@void, @void}}, [@NL80211_ATTR_LOCAL_STATE_CHANGE={0x4}, @NL80211_ATTR_IE={0x16, 0x2a, [@ext_channel_switch={0x3c, 0x4, {0x0, 0xc, 0xae, 0x7}}, @ibss={0x6, 0x2, 0xff}, @mesh_id={0x72, 0x6}]}]}, 0x30}, 0x1, 0x0, 0x0, 0x20000080}, 0x8880) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000dc0)={0x5, &(0x7f0000000d80)=[{0x7, 0x9, 0x7, 0x8315}, {0x5, 0xa, 0x7, 0x5f4}, {0x0, 0x8, 0x3, 0x5}, {0x101, 0x0, 0x6, 0x4}, {0xfffe, 0x72, 0xa2, 0x1}]}) (async) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000dc0)={0x5, &(0x7f0000000d80)=[{0x7, 0x9, 0x7, 0x8315}, {0x5, 0xa, 0x7, 0x5f4}, {0x0, 0x8, 0x3, 0x5}, {0x101, 0x0, 0x6, 0x4}, {0xfffe, 0x72, 0xa2, 0x1}]}) r10 = add_key$keyring(&(0x7f0000000ec0), &(0x7f0000000f00)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) add_key$fscrypt_provisioning(&(0x7f0000000e00), &(0x7f0000000e40)={'syz', 0x1}, &(0x7f0000000e80)={0x1, 0x0, @d}, 0x18, r10) 64.321414ms ago: executing program 3 (id=1741): socket$inet6(0xa, 0x80002, 0x0) unshare(0x24040400) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000140)={[{@noload}, {@resuid={'resuid', 0x3d, 0xee01}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@lazytime}, {@quota}, {@quota}]}, 0x3, 0x443, &(0x7f0000000940)="$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") bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000300), 0x4001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) fremovexattr(r1, &(0x7f00000000c0)=@known='trusted.overlay.metacopy\x00') ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000180)='cpu>=0|&!') r2 = syz_open_procfs(0x0, &(0x7f0000000240)='mountinfo\x00') ppoll(&(0x7f0000000000)=[{r2, 0x1002}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000180)='.\x00', 0x0, &(0x7f00000005c0)={0x8, 0x70, 0x80000, {r2}}, 0x20) 24.708668ms ago: executing program 0 (id=1742): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000100)={&(0x7f0000000180)="417f7949f6a309209ffac4a16809bc3256a4a8484094203e88a0e7a8684f8aec7cb5545cf86cca42df80da89a3274ced2735d98f1750a53a8d555e81142ec329be868a8982e79201a40733e1018571df748dc472e689f77843d6a53fd8d85483ab4d4870ee8c2ab837cc7c8fd3930b347f3af8d98e4586ededa4d82a6f145db1c2469b9b1af897527fd99a24f6521d22fad42037fc603f4aa6375496eeaf0d212bcb4e523d0134a5e0e0b8493dba808df51f1da27a4a7e853d65", &(0x7f0000000340)=""/161, &(0x7f0000000000)="08a35e609e2ec56d318b67b09a14083240e76c5ae969749366fbd7b6724851815b2f419dc05a", &(0x7f0000000240)="4ee1fe76b347ecb96138464be3fa82907e491584eebbc12a04f526795b51326c5528416c2b0a73132cd18c997d6164f89b7cc1108a82b468fed1209f86e9ddc9aeb10bb0b274c81111ef2c3026e490b8ad81e31596148d9ea64d9dc1415b82bea864ee21f18cf5c6534b8ed5a192", 0xa1, r0, 0xa94ebad5e8b19b4a}, 0x38) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x80, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xcb3a}, 0xffffffffffffffc7) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001}, 0x94) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r3, &(0x7f0000000f80)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f00000042c0)="86", 0x1}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000880)=[{&(0x7f0000000600)=""/203, 0xcb}], 0x1}, 0x0) 14.776358ms ago: executing program 7 (id=1743): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000000080008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000004c0)='mm_page_free\x00', r1}, 0x18) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f00000021c0)={0x2, 0x0, @local}, 0x10) sendmsg$rds(r2, &(0x7f0000002180)={&(0x7f0000000100)={0x2, 0x0, @loopback}, 0x10, 0x0, 0x0, &(0x7f00000016c0)=[@fadd={0x58, 0x114, 0x6, {{0x80000000, 0xfff}, &(0x7f00000003c0)=0xff, 0x0, 0x9, 0x0, 0x0, 0x6308, 0x10, 0x5}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f0000001ec0)=[{&(0x7f0000000680)=""/176, 0xb0}], 0x1}}], 0xa0, 0x8000}, 0x0) 0s ago: executing program 0 (id=1744): r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000940)={{0x14, 0x3f5}, [], {0x14, 0x3f6}}, 0x28}}, 0x4010) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0xf, "080000000000000000008000"}}}]}, 0x48}, 0x1, 0x0, 0x0, 0x801}, 0x0) syz_emit_ethernet(0x4a, &(0x7f0000000500)={@local, @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4f9309", 0x14, 0x6, 0x0, @private1={0xfc, 0x1, '\x00', 0x2}, @local, {[], {{0x0, 0x4001, 0x41424344, 0x41424344, 0x0, 0x0, 0x5, 0x1}}}}}}}, 0x0) kernel console output (not intermixed with test programs): 7.568777][ T6390] CPU: 1 UID: 0 PID: 6390 Comm: syz.6.1021 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 97.568814][ T6390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 97.568905][ T6390] Call Trace: [ 97.568912][ T6390] [ 97.568921][ T6390] __dump_stack+0x1d/0x30 [ 97.568943][ T6390] dump_stack_lvl+0xe8/0x140 [ 97.569016][ T6390] dump_stack+0x15/0x1b [ 97.569046][ T6390] should_fail_ex+0x265/0x280 [ 97.569089][ T6390] should_failslab+0x8c/0xb0 [ 97.569184][ T6390] kmem_cache_alloc_noprof+0x50/0x310 [ 97.569277][ T6390] ? p9_client_prepare_req+0xef/0x820 [ 97.569300][ T6390] ? obj_cgroup_charge_account+0xba/0x1a0 [ 97.569350][ T6390] p9_client_prepare_req+0xef/0x820 [ 97.569382][ T6390] ? __rcu_read_unlock+0x4f/0x70 [ 97.569429][ T6390] ? delete_node+0x218/0x5e0 [ 97.569462][ T6390] ? __account_obj_stock+0x211/0x350 [ 97.569486][ T6390] p9_client_rpc+0xdf/0x6c0 [ 97.569582][ T6390] ? radix_tree_iter_tag_clear+0x105/0x180 [ 97.569672][ T6390] ? _raw_spin_unlock_irq+0x26/0x50 [ 97.569708][ T6390] p9_client_walk+0x102/0x4c0 [ 97.569754][ T6390] v9fs_file_open+0x159/0x560 [ 97.569840][ T6390] do_dentry_open+0x646/0xa20 [ 97.569878][ T6390] ? __pfx_v9fs_file_open+0x10/0x10 [ 97.569990][ T6390] vfs_open+0x37/0x1e0 [ 97.570028][ T6390] path_openat+0x1c5e/0x2170 [ 97.570082][ T6390] ? _parse_integer_limit+0x170/0x190 [ 97.570116][ T6390] ? _parse_integer+0x27/0x40 [ 97.570162][ T6390] do_filp_open+0x109/0x230 [ 97.570251][ T6390] do_sys_openat2+0xa6/0x110 [ 97.570350][ T6390] __x64_sys_creat+0x65/0x90 [ 97.570391][ T6390] x64_sys_call+0x2d94/0x2ff0 [ 97.570483][ T6390] do_syscall_64+0xd2/0x200 [ 97.570511][ T6390] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 97.570612][ T6390] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 97.570638][ T6390] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 97.570726][ T6390] RIP: 0033:0x7f0dc33febe9 [ 97.570745][ T6390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 97.570768][ T6390] RSP: 002b:00007f0dc1a5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 97.570792][ T6390] RAX: ffffffffffffffda RBX: 00007f0dc3625fa0 RCX: 00007f0dc33febe9 [ 97.570808][ T6390] RDX: 0000000000000000 RSI: 0000000000000036 RDI: 00002000000003c0 [ 97.570823][ T6390] RBP: 00007f0dc1a5f090 R08: 0000000000000000 R09: 0000000000000000 [ 97.570841][ T6390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 97.570862][ T6390] R13: 00007f0dc3626038 R14: 00007f0dc3625fa0 R15: 00007ffddbc719f8 [ 97.570885][ T6390] [ 97.862984][ T5608] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 97.980408][ T6410] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1030'. [ 98.001141][ T6413] netlink: 132 bytes leftover after parsing attributes in process `syz.6.1033'. [ 98.026196][ T6416] loop7: detected capacity change from 0 to 1024 [ 98.051262][ T6416] EXT4-fs: Ignoring removed nomblk_io_submit option [ 98.065224][ T6424] netlink: 5 bytes leftover after parsing attributes in process `syz.0.1036'. [ 98.076326][ T6424] 0ªî{X¹¦: renamed from gretap0 (while UP) [ 98.077862][ T6421] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1035'. [ 98.092682][ T6416] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=e855c01c, mo2=0003] [ 98.117378][ T6424] 0ªî{X¹¦: entered allmulticast mode [ 98.122676][ T6431] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 98.123239][ T6424] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 98.141032][ T6416] System zones: 0-1, 3-36 [ 98.156678][ T6416] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 98.199511][ T5608] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 98.230830][ T6421] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6421 comm=syz.4.1035 [ 98.369041][ T6457] loop7: detected capacity change from 0 to 1024 [ 98.418532][ T6462] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 98.442739][ T6464] can0: slcan on ttyS3. [ 98.481356][ T6464] can0 (unregistered): slcan off ttyS3. [ 98.515127][ T6475] loop7: detected capacity change from 0 to 512 [ 98.518147][ T6478] netlink: 'syz.6.1054': attribute type 1 has an invalid length. [ 98.533457][ T6467] lo speed is unknown, defaulting to 1000 [ 98.648323][ T6488] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 98.648323][ T6488] program +}[@ not setting count and/or reply_len properly [ 98.669816][ T6486] netlink: 'syz.7.1057': attribute type 6 has an invalid length. [ 99.057680][ T6510] loop7: detected capacity change from 0 to 8192 [ 99.101916][ T6519] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 99.101916][ T6519] program +}[@ not setting count and/or reply_len properly [ 99.121275][ T6514] 9pnet: Could not find request transport: tc€ [ 99.121275][ T6514] [ 99.414493][ T6541] vhci_hcd: invalid port number 255 [ 99.420064][ T6541] vhci_hcd: USB_PORT_FEAT_LINK_STATE req not supported for USB 2.0 roothub [ 99.746363][ T6550] 9pnet_fd: Insufficient options for proto=fd [ 99.760272][ T29] kauditd_printk_skb: 583 callbacks suppressed [ 99.760288][ T29] audit: type=1326 audit(2000000051.550:6820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6551 comm="syz.4.1085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 99.793678][ T6551] delete_channel: no stack [ 99.802002][ T29] audit: type=1326 audit(2000000051.550:6821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6551 comm="syz.4.1085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 99.826305][ T29] audit: type=1326 audit(2000000051.550:6822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6551 comm="syz.4.1085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 99.850027][ T29] audit: type=1326 audit(2000000051.550:6823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6551 comm="syz.4.1085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 99.873995][ T29] audit: type=1326 audit(2000000051.550:6824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6551 comm="syz.4.1085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 99.897964][ T29] audit: type=1326 audit(2000000051.560:6825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6551 comm="syz.4.1085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 99.921359][ T29] audit: type=1326 audit(2000000051.560:6826): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6551 comm="syz.4.1085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 99.945342][ T29] audit: type=1326 audit(2000000051.560:6827): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6551 comm="syz.4.1085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 99.970084][ T29] audit: type=1326 audit(2000000051.560:6828): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6551 comm="syz.4.1085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 99.994711][ T29] audit: type=1326 audit(2000000051.560:6829): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6551 comm="syz.4.1085" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 100.152032][ T6576] 9pnet_fd: Insufficient options for proto=fd [ 100.160188][ T6581] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 100.160188][ T6581] program +}[@ not setting count and/or reply_len properly [ 100.206032][ T6588] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 100.252142][ T6594] FAULT_INJECTION: forcing a failure. [ 100.252142][ T6594] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 100.265830][ T6594] CPU: 1 UID: 0 PID: 6594 Comm: syz.0.1098 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 100.265863][ T6594] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 100.265891][ T6594] Call Trace: [ 100.265900][ T6594] [ 100.265910][ T6594] __dump_stack+0x1d/0x30 [ 100.265936][ T6594] dump_stack_lvl+0xe8/0x140 [ 100.265962][ T6594] dump_stack+0x15/0x1b [ 100.265985][ T6594] should_fail_ex+0x265/0x280 [ 100.266062][ T6594] should_fail+0xb/0x20 [ 100.266099][ T6594] should_fail_usercopy+0x1a/0x20 [ 100.266124][ T6594] _copy_from_user+0x1c/0xb0 [ 100.266187][ T6594] kstrtouint_from_user+0x69/0xf0 [ 100.266215][ T6594] ? 0xffffffff81000000 [ 100.266233][ T6594] ? selinux_file_permission+0x1e4/0x320 [ 100.266284][ T6594] proc_fail_nth_write+0x50/0x160 [ 100.266320][ T6594] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 100.266409][ T6594] vfs_write+0x269/0x8e0 [ 100.266437][ T6594] ? vfs_read+0x47f/0x6f0 [ 100.266464][ T6594] ? __rcu_read_unlock+0x4f/0x70 [ 100.266493][ T6594] ? __fget_files+0x184/0x1c0 [ 100.266549][ T6594] ksys_write+0xda/0x1a0 [ 100.266580][ T6594] __x64_sys_write+0x40/0x50 [ 100.266609][ T6594] x64_sys_call+0x27fe/0x2ff0 [ 100.266671][ T6594] do_syscall_64+0xd2/0x200 [ 100.266773][ T6594] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 100.266836][ T6594] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 100.266865][ T6594] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 100.266894][ T6594] RIP: 0033:0x7fb59758d69f [ 100.266914][ T6594] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 100.266940][ T6594] RSP: 002b:00007fb595bef030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 100.266985][ T6594] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fb59758d69f [ 100.267002][ T6594] RDX: 0000000000000001 RSI: 00007fb595bef0a0 RDI: 0000000000000003 [ 100.267020][ T6594] RBP: 00007fb595bef090 R08: 0000000000000000 R09: 0000000000000000 [ 100.267037][ T6594] R10: 00002000000002c0 R11: 0000000000000293 R12: 0000000000000001 [ 100.267054][ T6594] R13: 00007fb5977b6038 R14: 00007fb5977b5fa0 R15: 00007fff71945c58 [ 100.267091][ T6594] [ 100.500699][ T6601] __nla_validate_parse: 10 callbacks suppressed [ 100.500721][ T6601] netlink: 132 bytes leftover after parsing attributes in process `syz.6.1099'. [ 100.600682][ T6616] netlink: 40 bytes leftover after parsing attributes in process `syz.6.1106'. [ 100.659105][ T6622] vhci_hcd: USB_PORT_FEAT_U1/2_TIMEOUT req not supported for USB 2.0 roothub [ 100.729313][ T3410] hid_parser_main: 6 callbacks suppressed [ 100.729336][ T3410] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 100.743092][ T3410] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 100.751125][ T3410] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 100.758591][ T3410] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 100.766133][ T3410] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 100.774162][ T3410] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 100.781946][ T3410] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 100.789572][ T3410] hid-generic 0000:0000:0000.0002: unknown main item tag 0x4 [ 100.797171][ T3410] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 100.805172][ T3410] hid-generic 0000:0000:0000.0002: unknown main item tag 0x0 [ 100.821249][ T3410] hid-generic 0000:0000:0000.0002: hidraw0: HID v0.00 Device [syz0] on syz1 [ 100.834595][ T6627] lo speed is unknown, defaulting to 1000 [ 100.920750][ T6636] netlink: 132 bytes leftover after parsing attributes in process `syz.7.1114'. [ 100.986396][ T6643] loop7: detected capacity change from 0 to 1024 [ 100.993488][ T6643] EXT4-fs: Ignoring removed nobh option [ 100.999196][ T6643] EXT4-fs: Ignoring removed bh option [ 101.014812][ T6643] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 101.113974][ T5608] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 101.191094][ T6661] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 101.191094][ T6661] program +}[@ not setting count and/or reply_len properly [ 101.216302][ T6663] FAULT_INJECTION: forcing a failure. [ 101.216302][ T6663] name failslab, interval 1, probability 0, space 0, times 0 [ 101.229593][ T6663] CPU: 0 UID: 0 PID: 6663 Comm: syz.7.1126 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 101.229649][ T6663] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 101.229745][ T6663] Call Trace: [ 101.229752][ T6663] [ 101.229781][ T6663] __dump_stack+0x1d/0x30 [ 101.229805][ T6663] dump_stack_lvl+0xe8/0x140 [ 101.229831][ T6663] dump_stack+0x15/0x1b [ 101.229879][ T6663] should_fail_ex+0x265/0x280 [ 101.229975][ T6663] should_failslab+0x8c/0xb0 [ 101.230006][ T6663] kmem_cache_alloc_node_noprof+0x57/0x320 [ 101.230044][ T6663] ? __alloc_skb+0x101/0x320 [ 101.230083][ T6663] __alloc_skb+0x101/0x320 [ 101.230148][ T6663] netlink_alloc_large_skb+0xba/0xf0 [ 101.230185][ T6663] netlink_sendmsg+0x3cf/0x6b0 [ 101.230222][ T6663] ? __pfx_netlink_sendmsg+0x10/0x10 [ 101.230260][ T6663] __sock_sendmsg+0x145/0x180 [ 101.230348][ T6663] ____sys_sendmsg+0x31e/0x4e0 [ 101.230437][ T6663] ___sys_sendmsg+0x17b/0x1d0 [ 101.230483][ T6663] __x64_sys_sendmsg+0xd4/0x160 [ 101.230549][ T6663] x64_sys_call+0x191e/0x2ff0 [ 101.230589][ T6663] do_syscall_64+0xd2/0x200 [ 101.230615][ T6663] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 101.230642][ T6663] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 101.230713][ T6663] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 101.230742][ T6663] RIP: 0033:0x7f8256ccebe9 [ 101.230763][ T6663] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.230788][ T6663] RSP: 002b:00007f8255337038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 101.230813][ T6663] RAX: ffffffffffffffda RBX: 00007f8256ef5fa0 RCX: 00007f8256ccebe9 [ 101.230867][ T6663] RDX: 00000000000400d0 RSI: 0000200000000200 RDI: 0000000000000003 [ 101.230879][ T6663] RBP: 00007f8255337090 R08: 0000000000000000 R09: 0000000000000000 [ 101.230891][ T6663] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.230903][ T6663] R13: 00007f8256ef6038 R14: 00007f8256ef5fa0 R15: 00007ffcb7312478 [ 101.230987][ T6663] [ 101.449577][ T6656] syz.6.1123 calls setitimer() with new_value NULL pointer. Misfeature support will be removed [ 101.468437][ T6666] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1127'. [ 101.693286][ T6691] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 101.693286][ T6691] program +}[@ not setting count and/or reply_len properly [ 101.748714][ T6698] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1141'. [ 101.835125][ T6705] netlink: 'syz.4.1143': attribute type 3 has an invalid length. [ 101.858832][ T6711] FAULT_INJECTION: forcing a failure. [ 101.858832][ T6711] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 101.872496][ T6711] CPU: 0 UID: 0 PID: 6711 Comm: syz.0.1146 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 101.872529][ T6711] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 101.872541][ T6711] Call Trace: [ 101.872550][ T6711] [ 101.872590][ T6711] __dump_stack+0x1d/0x30 [ 101.872619][ T6711] dump_stack_lvl+0xe8/0x140 [ 101.872645][ T6711] dump_stack+0x15/0x1b [ 101.872666][ T6711] should_fail_ex+0x265/0x280 [ 101.872710][ T6711] should_fail+0xb/0x20 [ 101.872772][ T6711] should_fail_usercopy+0x1a/0x20 [ 101.872792][ T6711] _copy_from_user+0x1c/0xb0 [ 101.872823][ T6711] bpf_test_init+0xdf/0x160 [ 101.872871][ T6711] bpf_prog_test_run_xdp+0x274/0x910 [ 101.872968][ T6711] ? kstrtouint+0x76/0xc0 [ 101.873005][ T6711] ? __rcu_read_unlock+0x4f/0x70 [ 101.873034][ T6711] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 101.873133][ T6711] bpf_prog_test_run+0x227/0x390 [ 101.873166][ T6711] __sys_bpf+0x4b9/0x7b0 [ 101.873206][ T6711] __x64_sys_bpf+0x41/0x50 [ 101.873230][ T6711] x64_sys_call+0x2aea/0x2ff0 [ 101.873252][ T6711] do_syscall_64+0xd2/0x200 [ 101.873349][ T6711] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 101.873373][ T6711] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 101.873419][ T6711] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 101.873448][ T6711] RIP: 0033:0x7fb59758ebe9 [ 101.873468][ T6711] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 101.873541][ T6711] RSP: 002b:00007fb595bef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 101.873564][ T6711] RAX: ffffffffffffffda RBX: 00007fb5977b5fa0 RCX: 00007fb59758ebe9 [ 101.873586][ T6711] RDX: 0000000000000050 RSI: 0000200000000340 RDI: 000000000000000a [ 101.873675][ T6711] RBP: 00007fb595bef090 R08: 0000000000000000 R09: 0000000000000000 [ 101.873688][ T6711] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 101.873701][ T6711] R13: 00007fb5977b6038 R14: 00007fb5977b5fa0 R15: 00007fff71945c58 [ 101.873728][ T6711] [ 102.130307][ T6700] FAULT_INJECTION: forcing a failure. [ 102.130307][ T6700] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 102.144119][ T6700] CPU: 1 UID: 0 PID: 6700 Comm: syz.7.1142 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 102.144155][ T6700] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 102.144172][ T6700] Call Trace: [ 102.144179][ T6700] [ 102.144188][ T6700] __dump_stack+0x1d/0x30 [ 102.144254][ T6700] dump_stack_lvl+0xe8/0x140 [ 102.144364][ T6700] dump_stack+0x15/0x1b [ 102.144385][ T6700] should_fail_ex+0x265/0x280 [ 102.144426][ T6700] should_fail_alloc_page+0xf2/0x100 [ 102.144486][ T6700] __alloc_frozen_pages_noprof+0xff/0x360 [ 102.144539][ T6700] alloc_pages_mpol+0xb3/0x250 [ 102.144584][ T6700] folio_alloc_mpol_noprof+0x39/0x80 [ 102.144703][ T6700] __read_swap_cache_async+0x10e/0x350 [ 102.144823][ T6700] swap_cluster_readahead+0x277/0x3e0 [ 102.144883][ T6700] swapin_readahead+0xde/0x6f0 [ 102.144926][ T6700] ? __filemap_get_folio+0x4f7/0x6b0 [ 102.144998][ T6700] ? __rcu_read_unlock+0x4f/0x70 [ 102.145022][ T6700] ? swap_cache_get_folio+0x77/0x200 [ 102.145097][ T6700] do_swap_page+0x301/0x2430 [ 102.145124][ T6700] ? mod_memcg_lruvec_state+0x1fc/0x2c0 [ 102.145222][ T6700] ? __rcu_read_unlock+0x34/0x70 [ 102.145247][ T6700] ? __lruvec_stat_mod_folio+0xd6/0x120 [ 102.145286][ T6700] ? __pfx_default_wake_function+0x10/0x10 [ 102.145314][ T6700] handle_mm_fault+0x9a5/0x2c20 [ 102.145340][ T6700] ? __rcu_read_lock+0x37/0x50 [ 102.145365][ T6700] ? __pte_offset_map_lock+0x1d4/0x230 [ 102.145483][ T6700] __get_user_pages+0x102e/0x1fa0 [ 102.145610][ T6700] __gup_longterm_locked+0x8f4/0xe60 [ 102.145640][ T6700] ? exc_page_fault+0x62/0xa0 [ 102.145708][ T6700] ? should_fail_ex+0xdb/0x280 [ 102.145745][ T6700] pin_user_pages_remote+0x7e/0xb0 [ 102.145806][ T6700] process_vm_rw+0x484/0x960 [ 102.145882][ T6700] __x64_sys_process_vm_writev+0x78/0x90 [ 102.145921][ T6700] x64_sys_call+0x2a7c/0x2ff0 [ 102.145949][ T6700] do_syscall_64+0xd2/0x200 [ 102.145986][ T6700] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 102.146018][ T6700] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 102.146046][ T6700] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.146073][ T6700] RIP: 0033:0x7f8256ccebe9 [ 102.146093][ T6700] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.146117][ T6700] RSP: 002b:00007f8255337038 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 102.146164][ T6700] RAX: ffffffffffffffda RBX: 00007f8256ef5fa0 RCX: 00007f8256ccebe9 [ 102.146181][ T6700] RDX: 0000000000000001 RSI: 0000200000000000 RDI: 0000000000000089 [ 102.146197][ T6700] RBP: 00007f8255337090 R08: 000000000000023a R09: 0000000000000000 [ 102.146281][ T6700] R10: 0000200000121000 R11: 0000000000000246 R12: 0000000000000001 [ 102.146296][ T6700] R13: 00007f8256ef6038 R14: 00007f8256ef5fa0 R15: 00007ffcb7312478 [ 102.146318][ T6700] [ 102.442633][ T6719] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 102.442633][ T6719] program +}[@ not setting count and/or reply_len properly [ 102.554186][ T6722] FAULT_INJECTION: forcing a failure. [ 102.554186][ T6722] name failslab, interval 1, probability 0, space 0, times 0 [ 102.566958][ T6722] CPU: 0 UID: 0 PID: 6722 Comm: syz.0.1152 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 102.566992][ T6722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 102.567009][ T6722] Call Trace: [ 102.567018][ T6722] [ 102.567028][ T6722] __dump_stack+0x1d/0x30 [ 102.567114][ T6722] dump_stack_lvl+0xe8/0x140 [ 102.567140][ T6722] dump_stack+0x15/0x1b [ 102.567249][ T6722] should_fail_ex+0x265/0x280 [ 102.567282][ T6722] should_failslab+0x8c/0xb0 [ 102.567310][ T6722] kmem_cache_alloc_noprof+0x50/0x310 [ 102.567340][ T6722] ? dst_alloc+0xbd/0x100 [ 102.567461][ T6722] dst_alloc+0xbd/0x100 [ 102.567503][ T6722] ip_route_output_key_hash_rcu+0xef5/0x1380 [ 102.567615][ T6722] ip_route_output_flow+0x7b/0x130 [ 102.567652][ T6722] inet_csk_route_req+0x328/0x400 [ 102.567744][ T6722] tcp_v4_send_synack+0x60/0x350 [ 102.567772][ T6722] ? selinux_socket_sock_rcv_skb+0x298/0x620 [ 102.567805][ T6722] ? get_random_u32+0x169/0x220 [ 102.567852][ T6722] tcp_rtx_synack+0xbd/0x2a0 [ 102.567878][ T6722] tcp_check_req+0x34c/0xd90 [ 102.567924][ T6722] ? tcp_inbound_hash+0x1d4/0x470 [ 102.567970][ T6722] tcp_v4_rcv+0xe9f/0x1f70 [ 102.568021][ T6722] ? raw_local_deliver+0x670/0x6a0 [ 102.568057][ T6722] ? __pfx_tcp_v4_rcv+0x10/0x10 [ 102.568159][ T6722] ip_protocol_deliver_rcu+0x397/0x780 [ 102.568259][ T6722] ip_local_deliver_finish+0x1fc/0x2f0 [ 102.568297][ T6722] ip_local_deliver+0xe8/0x1c0 [ 102.568337][ T6722] ? __pfx_ip_local_deliver_finish+0x10/0x10 [ 102.568412][ T6722] ip_rcv_finish+0x194/0x1c0 [ 102.568521][ T6722] ip_rcv+0x62/0x140 [ 102.568556][ T6722] ? __pfx_ip_rcv_finish+0x10/0x10 [ 102.568640][ T6722] ? __pfx_ip_rcv+0x10/0x10 [ 102.568671][ T6722] __netif_receive_skb+0xff/0x270 [ 102.568745][ T6722] ? tun_rx_batched+0xc7/0x430 [ 102.568781][ T6722] netif_receive_skb+0x4b/0x2e0 [ 102.568808][ T6722] ? tun_rx_batched+0xc7/0x430 [ 102.568840][ T6722] tun_rx_batched+0xfc/0x430 [ 102.568949][ T6722] tun_get_user+0x1eb6/0x2680 [ 102.569071][ T6722] ? ref_tracker_alloc+0x1f2/0x2f0 [ 102.569173][ T6722] tun_chr_write_iter+0x15e/0x210 [ 102.569210][ T6722] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 102.569245][ T6722] vfs_write+0x49d/0x8e0 [ 102.569325][ T6722] ksys_write+0xda/0x1a0 [ 102.569355][ T6722] __x64_sys_write+0x40/0x50 [ 102.569386][ T6722] x64_sys_call+0x27fe/0x2ff0 [ 102.569480][ T6722] do_syscall_64+0xd2/0x200 [ 102.569509][ T6722] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 102.569614][ T6722] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 102.569641][ T6722] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.569664][ T6722] RIP: 0033:0x7fb59758d69f [ 102.569684][ T6722] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 102.569707][ T6722] RSP: 002b:00007fb595bef000 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 102.569731][ T6722] RAX: ffffffffffffffda RBX: 00007fb5977b5fa0 RCX: 00007fb59758d69f [ 102.569796][ T6722] RDX: 0000000000000042 RSI: 0000200000000500 RDI: 00000000000000c8 [ 102.569833][ T6722] RBP: 00007fb595bef090 R08: 0000000000000000 R09: 0000000000000000 [ 102.569845][ T6722] R10: 0000000000000042 R11: 0000000000000293 R12: 0000000000000001 [ 102.569857][ T6722] R13: 00007fb5977b6038 R14: 00007fb5977b5fa0 R15: 00007fff71945c58 [ 102.569925][ T6722] [ 102.979319][ T6734] FAULT_INJECTION: forcing a failure. [ 102.979319][ T6734] name failslab, interval 1, probability 0, space 0, times 0 [ 102.992179][ T6734] CPU: 1 UID: 0 PID: 6734 Comm: syz.6.1155 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 102.992214][ T6734] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 102.992230][ T6734] Call Trace: [ 102.992238][ T6734] [ 102.992286][ T6734] __dump_stack+0x1d/0x30 [ 102.992312][ T6734] dump_stack_lvl+0xe8/0x140 [ 102.992336][ T6734] dump_stack+0x15/0x1b [ 102.992358][ T6734] should_fail_ex+0x265/0x280 [ 102.992398][ T6734] should_failslab+0x8c/0xb0 [ 102.992434][ T6734] kmem_cache_alloc_node_noprof+0x57/0x320 [ 102.992463][ T6734] ? __alloc_skb+0x101/0x320 [ 102.992499][ T6734] __alloc_skb+0x101/0x320 [ 102.992537][ T6734] pfkey_sendmsg+0xd7/0x900 [ 102.992595][ T6734] ? avc_has_perm+0xf7/0x180 [ 102.992623][ T6734] ? selinux_socket_sendmsg+0x175/0x1b0 [ 102.992663][ T6734] ? __pfx_pfkey_sendmsg+0x10/0x10 [ 102.992762][ T6734] __sock_sendmsg+0x145/0x180 [ 102.992787][ T6734] ____sys_sendmsg+0x31e/0x4e0 [ 102.992838][ T6734] ___sys_sendmsg+0x17b/0x1d0 [ 102.992945][ T6734] __x64_sys_sendmsg+0xd4/0x160 [ 102.992997][ T6734] x64_sys_call+0x191e/0x2ff0 [ 102.993018][ T6734] do_syscall_64+0xd2/0x200 [ 102.993062][ T6734] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 102.993087][ T6734] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 102.993108][ T6734] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 102.993133][ T6734] RIP: 0033:0x7f0dc33febe9 [ 102.993151][ T6734] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 102.993232][ T6734] RSP: 002b:00007f0dc1a5f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 102.993257][ T6734] RAX: ffffffffffffffda RBX: 00007f0dc3625fa0 RCX: 00007f0dc33febe9 [ 102.993289][ T6734] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000007 [ 102.993306][ T6734] RBP: 00007f0dc1a5f090 R08: 0000000000000000 R09: 0000000000000000 [ 102.993390][ T6734] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 102.993402][ T6734] R13: 00007f0dc3626038 R14: 00007f0dc3625fa0 R15: 00007ffddbc719f8 [ 102.993424][ T6734] [ 102.996277][ T6730] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1154'. [ 103.288116][ T6745] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 103.288116][ T6745] program +}[@ not setting count and/or reply_len properly [ 103.353451][ T6755] FAULT_INJECTION: forcing a failure. [ 103.353451][ T6755] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 103.366993][ T6755] CPU: 1 UID: 0 PID: 6755 Comm: syz.6.1164 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 103.367028][ T6755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 103.367047][ T6755] Call Trace: [ 103.367057][ T6755] [ 103.367068][ T6755] __dump_stack+0x1d/0x30 [ 103.367098][ T6755] dump_stack_lvl+0xe8/0x140 [ 103.367122][ T6755] dump_stack+0x15/0x1b [ 103.367140][ T6755] should_fail_ex+0x265/0x280 [ 103.367298][ T6755] should_fail+0xb/0x20 [ 103.367342][ T6755] should_fail_usercopy+0x1a/0x20 [ 103.367364][ T6755] _copy_to_user+0x20/0xa0 [ 103.367393][ T6755] simple_read_from_buffer+0xb5/0x130 [ 103.367419][ T6755] proc_fail_nth_read+0x10e/0x150 [ 103.367498][ T6755] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 103.367573][ T6755] vfs_read+0x19d/0x6f0 [ 103.367654][ T6755] ? __rcu_read_unlock+0x4f/0x70 [ 103.367679][ T6755] ? __fget_files+0x184/0x1c0 [ 103.367732][ T6755] ksys_read+0xda/0x1a0 [ 103.367759][ T6755] __x64_sys_read+0x40/0x50 [ 103.367783][ T6755] x64_sys_call+0x27bc/0x2ff0 [ 103.367842][ T6755] do_syscall_64+0xd2/0x200 [ 103.367870][ T6755] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 103.367906][ T6755] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 103.367969][ T6755] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 103.368000][ T6755] RIP: 0033:0x7f0dc33fd5fc [ 103.368023][ T6755] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 103.368047][ T6755] RSP: 002b:00007f0dc1a5f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 103.368076][ T6755] RAX: ffffffffffffffda RBX: 00007f0dc3625fa0 RCX: 00007f0dc33fd5fc [ 103.368095][ T6755] RDX: 000000000000000f RSI: 00007f0dc1a5f0a0 RDI: 0000000000000008 [ 103.368108][ T6755] RBP: 00007f0dc1a5f090 R08: 0000000000000000 R09: 0000000000000000 [ 103.368185][ T6755] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 103.368203][ T6755] R13: 00007f0dc3626038 R14: 00007f0dc3625fa0 R15: 00007ffddbc719f8 [ 103.368232][ T6755] [ 103.582825][ T6756] vhci_hcd: invalid port number 96 [ 103.588049][ T6756] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 103.781633][ T6774] netlink: 'syz.6.1167': attribute type 2 has an invalid length. [ 103.821042][ T6773] netlink: 24 bytes leftover after parsing attributes in process `syz.4.1171'. [ 104.019972][ T6789] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1178'. [ 104.794501][ T29] kauditd_printk_skb: 6775 callbacks suppressed [ 104.794524][ T29] audit: type=1326 audit(2000000056.550:13605): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.7.1183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f8256cc5ba7 code=0x7ffc0000 [ 104.825697][ T29] audit: type=1326 audit(2000000056.550:13606): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.7.1183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f8256c6adb9 code=0x7ffc0000 [ 104.850067][ T29] audit: type=1326 audit(2000000056.560:13607): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.7.1183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f8256cc5ba7 code=0x7ffc0000 [ 104.874491][ T29] audit: type=1326 audit(2000000056.560:13608): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.7.1183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f8256c6adb9 code=0x7ffc0000 [ 104.899362][ T29] audit: type=1326 audit(2000000056.560:13609): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.7.1183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f8256cc5ba7 code=0x7ffc0000 [ 104.923732][ T29] audit: type=1326 audit(2000000056.560:13610): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.7.1183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f8256c6adb9 code=0x7ffc0000 [ 104.947620][ T29] audit: type=1326 audit(2000000056.560:13611): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.7.1183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f8256cc5ba7 code=0x7ffc0000 [ 104.971885][ T29] audit: type=1326 audit(2000000056.560:13612): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.7.1183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f8256c6adb9 code=0x7ffc0000 [ 104.996907][ T29] audit: type=1326 audit(2000000056.560:13613): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.7.1183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f8256cc5ba7 code=0x7ffc0000 [ 105.021293][ T29] audit: type=1326 audit(2000000056.560:13614): auid=4294967295 uid=60929 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6799 comm="syz.7.1183" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f8256c6adb9 code=0x7ffc0000 [ 105.198958][ T6800] loop7: detected capacity change from 0 to 8192 [ 105.313328][ T6838] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 105.426514][ T6853] loop7: detected capacity change from 0 to 1024 [ 105.436912][ T6853] EXT4-fs (loop7): ext4_check_descriptors: Inode bitmap for group 0 overlaps block group descriptors [ 105.448303][ T6853] EXT4-fs (loop7): ext4_check_descriptors: Checksum for group 0 failed (51554!=20869) [ 105.461025][ T6853] JBD2: no valid journal superblock found [ 105.466819][ T6853] EXT4-fs (loop7): Could not load journal inode [ 105.517171][ T6850] ref_ctr_offset mismatch. inode: 0x5c2 offset: 0x0 ref_ctr_offset(old): 0x0 ref_ctr_offset(new): 0x300000018 [ 105.664700][ T6867] loop7: detected capacity change from 0 to 8192 [ 105.759673][ T6876] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 105.842488][ T6884] program syz.0.1218 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 105.853460][ T6884] sd 0:0:1:0: ioctl_internal_command: ILLEGAL REQUEST asc=0x20 ascq=0x0 [ 105.853645][ T6886] random: crng reseeded on system resumption [ 105.933434][ T6889] netlink: 9 bytes leftover after parsing attributes in process `syz.3.1219'. [ 105.951072][ T6889] 0·: renamed from hsr0 [ 105.962398][ T6889] 0·: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 105.972808][ T6889] 0·: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 105.983236][ T6889] 0·: entered allmulticast mode [ 105.988402][ T6889] hsr_slave_0: entered allmulticast mode [ 105.994535][ T6889] hsr_slave_1: entered allmulticast mode [ 106.002797][ T6889] A link change request failed with some changes committed already. Interface 70· may have been left with an inconsistent configuration, please check. [ 106.179799][ T6902] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 106.484331][ T6912] Can not set IPV6_FL_F_REFLECT if flowlabel_consistency sysctl is enable [ 106.512086][ T6916] loop7: detected capacity change from 0 to 128 [ 106.592255][ T6922] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 106.618840][ T6922] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 106.656086][ T6922] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(16) [ 106.663100][ T6922] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 106.671141][ T6922] vhci_hcd vhci_hcd.0: Device attached [ 106.693619][ T6929] vhci_hcd: connection closed [ 106.694823][ T56] vhci_hcd: stop threads [ 106.704128][ T56] vhci_hcd: release socket [ 106.708930][ T56] vhci_hcd: disconnect device [ 106.910477][ T6957] netlink: 'syz.3.1250': attribute type 10 has an invalid length. [ 106.931551][ T6960] FAULT_INJECTION: forcing a failure. [ 106.931551][ T6960] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 106.943529][ T6957] team0: Port device dummy0 added [ 106.944858][ T6960] CPU: 0 UID: 0 PID: 6960 Comm: syz.7.1251 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 106.944978][ T6960] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 106.944998][ T6960] Call Trace: [ 106.945006][ T6960] [ 106.945017][ T6960] __dump_stack+0x1d/0x30 [ 106.945047][ T6960] dump_stack_lvl+0xe8/0x140 [ 106.945074][ T6960] dump_stack+0x15/0x1b [ 106.945099][ T6960] should_fail_ex+0x265/0x280 [ 106.945180][ T6960] should_fail+0xb/0x20 [ 106.945271][ T6960] should_fail_usercopy+0x1a/0x20 [ 106.945298][ T6960] _copy_from_user+0x1c/0xb0 [ 106.945402][ T6960] bpf_test_init+0xdf/0x160 [ 106.945456][ T6960] bpf_prog_test_run_skb+0x144/0xbd0 [ 106.945499][ T6960] ? __rcu_read_unlock+0x4f/0x70 [ 106.945531][ T6960] ? __fget_files+0x184/0x1c0 [ 106.945615][ T6960] ? __rcu_read_unlock+0x4f/0x70 [ 106.945647][ T6960] ? __pfx_bpf_prog_test_run_skb+0x10/0x10 [ 106.945752][ T6960] bpf_prog_test_run+0x227/0x390 [ 106.945798][ T6960] __sys_bpf+0x4b9/0x7b0 [ 106.945846][ T6960] __x64_sys_bpf+0x41/0x50 [ 106.945894][ T6960] x64_sys_call+0x2aea/0x2ff0 [ 106.945925][ T6960] do_syscall_64+0xd2/0x200 [ 106.945999][ T6960] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 106.946034][ T6960] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 106.946172][ T6960] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 106.946203][ T6960] RIP: 0033:0x7f8256ccebe9 [ 106.946224][ T6960] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 106.946270][ T6960] RSP: 002b:00007f8255337038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 106.946298][ T6960] RAX: ffffffffffffffda RBX: 00007f8256ef5fa0 RCX: 00007f8256ccebe9 [ 106.946318][ T6960] RDX: 0000000000000048 RSI: 00002000000002c0 RDI: 000000000000000a [ 106.946336][ T6960] RBP: 00007f8255337090 R08: 0000000000000000 R09: 0000000000000000 [ 106.946355][ T6960] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 106.946374][ T6960] R13: 00007f8256ef6038 R14: 00007f8256ef5fa0 R15: 00007ffcb7312478 [ 106.946476][ T6960] [ 106.976144][ T6961] netlink: 'syz.3.1250': attribute type 10 has an invalid length. [ 107.191652][ T6961] team0: Port device dummy0 removed [ 107.214087][ T6961] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 107.307856][ T6977] 9pnet_fd: Insufficient options for proto=fd [ 107.498234][ T6989] FAULT_INJECTION: forcing a failure. [ 107.498234][ T6989] name failslab, interval 1, probability 0, space 0, times 0 [ 107.511125][ T6989] CPU: 0 UID: 0 PID: 6989 Comm: syz.4.1263 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 107.511165][ T6989] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 107.511182][ T6989] Call Trace: [ 107.511215][ T6989] [ 107.511224][ T6989] __dump_stack+0x1d/0x30 [ 107.511245][ T6989] dump_stack_lvl+0xe8/0x140 [ 107.511265][ T6989] dump_stack+0x15/0x1b [ 107.511282][ T6989] should_fail_ex+0x265/0x280 [ 107.511325][ T6989] should_failslab+0x8c/0xb0 [ 107.511389][ T6989] kmem_cache_alloc_noprof+0x50/0x310 [ 107.511426][ T6989] ? audit_log_start+0x365/0x6c0 [ 107.511472][ T6989] audit_log_start+0x365/0x6c0 [ 107.511519][ T6989] audit_seccomp+0x48/0x100 [ 107.511544][ T6989] ? __seccomp_filter+0x68c/0x10d0 [ 107.511567][ T6989] __seccomp_filter+0x69d/0x10d0 [ 107.511673][ T6989] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 107.511701][ T6989] ? vfs_write+0x75e/0x8e0 [ 107.511722][ T6989] ? __rcu_read_unlock+0x4f/0x70 [ 107.511747][ T6989] ? __rcu_read_unlock+0x4f/0x70 [ 107.511901][ T6989] __secure_computing+0x82/0x150 [ 107.511929][ T6989] syscall_trace_enter+0xcf/0x1e0 [ 107.511956][ T6989] do_syscall_64+0xac/0x200 [ 107.512016][ T6989] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 107.512047][ T6989] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 107.512075][ T6989] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 107.512181][ T6989] RIP: 0033:0x7f68cddfd5fc [ 107.512202][ T6989] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 107.512226][ T6989] RSP: 002b:00007f68cc467030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 107.512250][ T6989] RAX: ffffffffffffffda RBX: 00007f68ce025fa0 RCX: 00007f68cddfd5fc [ 107.512262][ T6989] RDX: 000000000000000f RSI: 00007f68cc4670a0 RDI: 0000000000000006 [ 107.512274][ T6989] RBP: 00007f68cc467090 R08: 0000000000000000 R09: 0000000000000000 [ 107.512286][ T6989] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 107.512300][ T6989] R13: 00007f68ce026038 R14: 00007f68ce025fa0 R15: 00007ffe562de558 [ 107.512386][ T6989] [ 107.882828][ T6992] lo speed is unknown, defaulting to 1000 [ 108.945768][ T6994] lo speed is unknown, defaulting to 1000 [ 109.032367][ T7003] FAULT_INJECTION: forcing a failure. [ 109.032367][ T7003] name failslab, interval 1, probability 0, space 0, times 0 [ 109.045430][ T7003] CPU: 0 UID: 0 PID: 7003 Comm: syz.4.1268 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 109.045501][ T7003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 109.045518][ T7003] Call Trace: [ 109.045526][ T7003] [ 109.045535][ T7003] __dump_stack+0x1d/0x30 [ 109.045563][ T7003] dump_stack_lvl+0xe8/0x140 [ 109.045610][ T7003] dump_stack+0x15/0x1b [ 109.045738][ T7003] should_fail_ex+0x265/0x280 [ 109.045797][ T7003] should_failslab+0x8c/0xb0 [ 109.045829][ T7003] __kmalloc_noprof+0xa5/0x3e0 [ 109.045864][ T7003] ? io_cache_alloc_new+0x2a/0xb0 [ 109.045944][ T7003] io_cache_alloc_new+0x2a/0xb0 [ 109.045973][ T7003] __io_prep_rw+0xcf/0x660 [ 109.046088][ T7003] ? __io_alloc_req_refill+0x12e/0x1d0 [ 109.046124][ T7003] io_prep_read+0x20/0xa0 [ 109.046186][ T7003] io_submit_sqes+0x5de/0x1050 [ 109.046238][ T7003] __se_sys_io_uring_enter+0x1c1/0x1b70 [ 109.046293][ T7003] ? 0xffffffff81000000 [ 109.046310][ T7003] ? __rcu_read_unlock+0x4f/0x70 [ 109.046386][ T7003] ? get_pid_task+0x96/0xd0 [ 109.046414][ T7003] ? proc_fail_nth_write+0x13b/0x160 [ 109.046448][ T7003] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 109.046483][ T7003] ? vfs_write+0x75e/0x8e0 [ 109.046573][ T7003] ? __rcu_read_unlock+0x4f/0x70 [ 109.046601][ T7003] ? __fget_files+0x184/0x1c0 [ 109.046634][ T7003] ? fput+0x8f/0xc0 [ 109.046738][ T7003] __x64_sys_io_uring_enter+0x78/0x90 [ 109.046783][ T7003] x64_sys_call+0x2de1/0x2ff0 [ 109.046812][ T7003] do_syscall_64+0xd2/0x200 [ 109.046846][ T7003] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 109.046944][ T7003] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 109.046969][ T7003] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 109.046990][ T7003] RIP: 0033:0x7f68cddfebe9 [ 109.047007][ T7003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 109.047086][ T7003] RSP: 002b:00007f68cc467038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 109.047114][ T7003] RAX: ffffffffffffffda RBX: 00007f68ce025fa0 RCX: 00007f68cddfebe9 [ 109.047131][ T7003] RDX: 0000000000002448 RSI: 00000000000074d1 RDI: 0000000000000004 [ 109.047147][ T7003] RBP: 00007f68cc467090 R08: 0000000000000000 R09: 0000000000000000 [ 109.047163][ T7003] R10: 0000000000000043 R11: 0000000000000246 R12: 0000000000000001 [ 109.047178][ T7003] R13: 00007f68ce026038 R14: 00007f68ce025fa0 R15: 00007ffe562de558 [ 109.047198][ T7003] [ 109.806404][ T29] kauditd_printk_skb: 1775 callbacks suppressed [ 109.806423][ T29] audit: type=1326 audit(2000000061.600:15388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.3.1280" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 109.871600][ T29] audit: type=1326 audit(2000000061.630:15389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.3.1280" exe="/root/syz-executor" sig=0 arch=c000003e syscall=28 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 109.895758][ T29] audit: type=1326 audit(2000000061.630:15390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.3.1280" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 109.920420][ T29] audit: type=1326 audit(2000000061.630:15391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.3.1280" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 109.944824][ T29] audit: type=1326 audit(2000000061.630:15392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.3.1280" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 109.968760][ T29] audit: type=1326 audit(2000000061.630:15393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.3.1280" exe="/root/syz-executor" sig=0 arch=c000003e syscall=302 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 109.992821][ T29] audit: type=1326 audit(2000000061.630:15394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7032 comm="syz.3.1280" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 110.145841][ T29] audit: type=1400 audit(2000000061.820:15395): avc: denied { setcheckreqprot } for pid=7037 comm="syz.0.1282" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 110.207294][ T29] audit: type=1326 audit(2000000062.000:15396): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7045 comm="syz.3.1286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 110.231391][ T29] audit: type=1326 audit(2000000062.000:15397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7045 comm="syz.3.1286" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 110.391198][ T7062] FAULT_INJECTION: forcing a failure. [ 110.391198][ T7062] name failslab, interval 1, probability 0, space 0, times 0 [ 110.404014][ T7062] CPU: 1 UID: 0 PID: 7062 Comm: syz.3.1294 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 110.404050][ T7062] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 110.404071][ T7062] Call Trace: [ 110.404079][ T7062] [ 110.404088][ T7062] __dump_stack+0x1d/0x30 [ 110.404128][ T7062] dump_stack_lvl+0xe8/0x140 [ 110.404155][ T7062] dump_stack+0x15/0x1b [ 110.404177][ T7062] should_fail_ex+0x265/0x280 [ 110.404219][ T7062] should_failslab+0x8c/0xb0 [ 110.404295][ T7062] kmem_cache_alloc_node_noprof+0x57/0x320 [ 110.404333][ T7062] ? __alloc_skb+0x101/0x320 [ 110.404368][ T7062] __alloc_skb+0x101/0x320 [ 110.404399][ T7062] alloc_skb_with_frags+0x7d/0x470 [ 110.404442][ T7062] ? should_fail_ex+0xdb/0x280 [ 110.404523][ T7062] sock_alloc_send_pskb+0x43a/0x4f0 [ 110.404554][ T7062] ? __rcu_read_unlock+0x4f/0x70 [ 110.404656][ T7062] ? __rcu_read_unlock+0x4f/0x70 [ 110.404687][ T7062] packet_sendmsg+0x222b/0x31f0 [ 110.404769][ T7062] ? avc_has_perm+0xf7/0x180 [ 110.404876][ T7062] ? selinux_socket_sendmsg+0x175/0x1b0 [ 110.404965][ T7062] ? __pfx_packet_sendmsg+0x10/0x10 [ 110.404999][ T7062] __sock_sendmsg+0x145/0x180 [ 110.405025][ T7062] __sys_sendto+0x268/0x330 [ 110.405097][ T7062] __x64_sys_sendto+0x76/0x90 [ 110.405137][ T7062] x64_sys_call+0x2d05/0x2ff0 [ 110.405183][ T7062] do_syscall_64+0xd2/0x200 [ 110.405209][ T7062] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 110.405233][ T7062] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 110.405296][ T7062] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 110.405321][ T7062] RIP: 0033:0x7f9ce59bebe9 [ 110.405336][ T7062] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 110.405387][ T7062] RSP: 002b:00007f9ce401f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 110.405446][ T7062] RAX: ffffffffffffffda RBX: 00007f9ce5be5fa0 RCX: 00007f9ce59bebe9 [ 110.405459][ T7062] RDX: 000000000000fce0 RSI: 00002000000002c0 RDI: 0000000000000003 [ 110.405484][ T7062] RBP: 00007f9ce401f090 R08: 0000200000000140 R09: 0000000000000014 [ 110.405501][ T7062] R10: 0000000000000004 R11: 0000000000000246 R12: 0000000000000001 [ 110.405518][ T7062] R13: 00007f9ce5be6038 R14: 00007f9ce5be5fa0 R15: 00007ffff7e5d4d8 [ 110.405541][ T7062] [ 110.688504][ T7060] pim6reg1: entered promiscuous mode [ 110.694104][ T7060] pim6reg1: entered allmulticast mode [ 110.915181][ T7084] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1300'. [ 111.532851][ T7103] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1308'. [ 112.055915][ T7126] netlink: 'syz.4.1319': attribute type 10 has an invalid length. [ 112.277073][ T7136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7136 comm=syz.0.1323 [ 112.294595][ T7136] netlink: 12 bytes leftover after parsing attributes in process `syz.0.1323'. [ 112.421362][ T2956] hid_parser_main: 32 callbacks suppressed [ 112.421382][ T2956] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 112.435777][ T2956] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 112.443585][ T2956] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 112.451121][ T2956] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 112.458737][ T2956] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 112.466494][ T2956] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 112.474160][ T2956] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 112.481991][ T2956] hid-generic 0000:0000:0000.0003: unknown main item tag 0x4 [ 112.489566][ T2956] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 112.497461][ T2956] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 112.511325][ T2956] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz0] on syz1 [ 112.547607][ T7160] lo speed is unknown, defaulting to 1000 [ 112.597900][ T7168] sg_write: data in/out 196608/1 bytes for SCSI command 0xdb-- guessing data in; [ 112.597900][ T7168] program syz.0.1335 not setting count and/or reply_len properly [ 112.638603][ T7173] netlink: 'syz.3.1336': attribute type 1 has an invalid length. [ 112.646520][ T7173] netlink: 224 bytes leftover after parsing attributes in process `syz.3.1336'. [ 112.745839][ T7177] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7177 comm=syz.6.1338 [ 112.804263][ T7177] netlink: 12 bytes leftover after parsing attributes in process `syz.6.1338'. [ 113.113400][ T7203] FAULT_INJECTION: forcing a failure. [ 113.113400][ T7203] name failslab, interval 1, probability 0, space 0, times 0 [ 113.135996][ T7203] CPU: 1 UID: 0 PID: 7203 Comm: syz.7.1346 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 113.136087][ T7203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 113.136103][ T7203] Call Trace: [ 113.136111][ T7203] [ 113.136122][ T7203] __dump_stack+0x1d/0x30 [ 113.136147][ T7203] dump_stack_lvl+0xe8/0x140 [ 113.136171][ T7203] dump_stack+0x15/0x1b [ 113.136205][ T7203] should_fail_ex+0x265/0x280 [ 113.136241][ T7203] should_failslab+0x8c/0xb0 [ 113.136323][ T7203] __kmalloc_noprof+0xa5/0x3e0 [ 113.136356][ T7203] ? unix_bind+0x1a0/0x920 [ 113.136397][ T7203] unix_bind+0x1a0/0x920 [ 113.136435][ T7203] __sys_bind+0x1ce/0x2a0 [ 113.136515][ T7203] __x64_sys_bind+0x3f/0x50 [ 113.136596][ T7203] x64_sys_call+0x2b6e/0x2ff0 [ 113.136627][ T7203] do_syscall_64+0xd2/0x200 [ 113.136754][ T7203] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 113.136779][ T7203] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 113.136802][ T7203] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 113.136830][ T7203] RIP: 0033:0x7f8256ccebe9 [ 113.136851][ T7203] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.136946][ T7203] RSP: 002b:00007f8255337038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 113.136985][ T7203] RAX: ffffffffffffffda RBX: 00007f8256ef5fa0 RCX: 00007f8256ccebe9 [ 113.137003][ T7203] RDX: 000000000000006e RSI: 0000200000003000 RDI: 0000000000000003 [ 113.137019][ T7203] RBP: 00007f8255337090 R08: 0000000000000000 R09: 0000000000000000 [ 113.137031][ T7203] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.137044][ T7203] R13: 00007f8256ef6038 R14: 00007f8256ef5fa0 R15: 00007ffcb7312478 [ 113.137105][ T7203] [ 113.541714][ T7238] sit0: entered allmulticast mode [ 113.580176][ T7242] netlink: 'syz.0.1362': attribute type 6 has an invalid length. [ 113.588630][ T7242] netlink: 168 bytes leftover after parsing attributes in process `syz.0.1362'. [ 113.592256][ T7244] netlink: 4 bytes leftover after parsing attributes in process `syz.4.1363'. [ 113.608519][ T7244] FAULT_INJECTION: forcing a failure. [ 113.608519][ T7244] name failslab, interval 1, probability 0, space 0, times 0 [ 113.622204][ T7244] CPU: 0 UID: 0 PID: 7244 Comm: syz.4.1363 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 113.622315][ T7244] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 113.622332][ T7244] Call Trace: [ 113.622340][ T7244] [ 113.622350][ T7244] __dump_stack+0x1d/0x30 [ 113.622378][ T7244] dump_stack_lvl+0xe8/0x140 [ 113.622462][ T7244] dump_stack+0x15/0x1b [ 113.622484][ T7244] should_fail_ex+0x265/0x280 [ 113.622582][ T7244] should_failslab+0x8c/0xb0 [ 113.622618][ T7244] kmem_cache_alloc_node_noprof+0x57/0x320 [ 113.622656][ T7244] ? __alloc_skb+0x101/0x320 [ 113.622761][ T7244] __alloc_skb+0x101/0x320 [ 113.622868][ T7244] netlink_alloc_large_skb+0xba/0xf0 [ 113.622976][ T7244] netlink_sendmsg+0x3cf/0x6b0 [ 113.623014][ T7244] ? __pfx_netlink_sendmsg+0x10/0x10 [ 113.623052][ T7244] __sock_sendmsg+0x145/0x180 [ 113.623081][ T7244] ____sys_sendmsg+0x31e/0x4e0 [ 113.623178][ T7244] ___sys_sendmsg+0x17b/0x1d0 [ 113.623281][ T7244] __x64_sys_sendmsg+0xd4/0x160 [ 113.623319][ T7244] x64_sys_call+0x191e/0x2ff0 [ 113.623342][ T7244] do_syscall_64+0xd2/0x200 [ 113.623473][ T7244] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 113.623501][ T7244] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 113.623566][ T7244] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 113.623632][ T7244] RIP: 0033:0x7f68cddfebe9 [ 113.623649][ T7244] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 113.623668][ T7244] RSP: 002b:00007f68cc467038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 113.623743][ T7244] RAX: ffffffffffffffda RBX: 00007f68ce025fa0 RCX: 00007f68cddfebe9 [ 113.623776][ T7244] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000003 [ 113.623789][ T7244] RBP: 00007f68cc467090 R08: 0000000000000000 R09: 0000000000000000 [ 113.623802][ T7244] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 113.623814][ T7244] R13: 00007f68ce026038 R14: 00007f68ce025fa0 R15: 00007ffe562de558 [ 113.623835][ T7244] [ 113.878548][ T7250] bridge0: port 3(gretap0) entered blocking state [ 113.886103][ T7250] bridge0: port 3(gretap0) entered disabled state [ 113.894915][ T7250] gretap0: entered allmulticast mode [ 113.901305][ T7250] gretap0: entered promiscuous mode [ 113.970581][ T7257] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1369'. [ 113.981993][ T7257] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1369'. [ 114.230707][ T7270] FAULT_INJECTION: forcing a failure. [ 114.230707][ T7270] name failslab, interval 1, probability 0, space 0, times 0 [ 114.243999][ T7270] CPU: 1 UID: 0 PID: 7270 Comm: syz.4.1372 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 114.244037][ T7270] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 114.244054][ T7270] Call Trace: [ 114.244063][ T7270] [ 114.244073][ T7270] __dump_stack+0x1d/0x30 [ 114.244101][ T7270] dump_stack_lvl+0xe8/0x140 [ 114.244123][ T7270] dump_stack+0x15/0x1b [ 114.244140][ T7270] should_fail_ex+0x265/0x280 [ 114.244181][ T7270] should_failslab+0x8c/0xb0 [ 114.244211][ T7270] kmem_cache_alloc_noprof+0x50/0x310 [ 114.244247][ T7270] ? mas_alloc_nodes+0x265/0x520 [ 114.244281][ T7270] mas_alloc_nodes+0x265/0x520 [ 114.244314][ T7270] mas_preallocate+0x33e/0x520 [ 114.244349][ T7270] mmap_region+0xbdd/0x1630 [ 114.244404][ T7270] do_mmap+0x9b3/0xbe0 [ 114.244443][ T7270] vm_mmap_pgoff+0x17a/0x2e0 [ 114.244476][ T7270] ksys_mmap_pgoff+0xc2/0x310 [ 114.244511][ T7270] ? __x64_sys_mmap+0x49/0x70 [ 114.244534][ T7270] x64_sys_call+0x14a3/0x2ff0 [ 114.244556][ T7270] do_syscall_64+0xd2/0x200 [ 114.244584][ T7270] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 114.244614][ T7270] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 114.244641][ T7270] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 114.244669][ T7270] RIP: 0033:0x7f68cddfebe9 [ 114.244689][ T7270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 114.244709][ T7270] RSP: 002b:00007f68cc446038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 114.244732][ T7270] RAX: ffffffffffffffda RBX: 00007f68ce026090 RCX: 00007f68cddfebe9 [ 114.244758][ T7270] RDX: 0000000001000001 RSI: 0000000000fbe000 RDI: 0000200000000000 [ 114.244774][ T7270] RBP: 00007f68cc446090 R08: ffffffffffffffff R09: 0000000000000000 [ 114.244791][ T7270] R10: 0000000000000031 R11: 0000000000000246 R12: 0000000000000002 [ 114.244807][ T7270] R13: 00007f68ce026128 R14: 00007f68ce026090 R15: 00007ffe562de558 [ 114.244830][ T7270] [ 114.492161][ T7274] bridge0: port 3(gretap0) entered blocking state [ 114.498835][ T7274] bridge0: port 3(gretap0) entered disabled state [ 114.505682][ T7274] ref_tracker: memory allocation failure, unreliable refcount tracker. [ 114.542691][ T7274] gretap0: entered allmulticast mode [ 114.553193][ T7274] gretap0: entered promiscuous mode [ 114.558952][ T7274] bridge0: port 3(gretap0) entered blocking state [ 114.565573][ T7274] bridge0: port 3(gretap0) entered forwarding state [ 114.674379][ T2956] IPVS: starting estimator thread 0... [ 114.675965][ T7287] bridge0: port 5(batadv1) entered blocking state [ 114.686885][ T7287] bridge0: port 5(batadv1) entered disabled state [ 114.696420][ T7287] batadv1: entered allmulticast mode [ 114.702753][ T7287] batadv1: entered promiscuous mode [ 114.770797][ T7287] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=39 sclass=netlink_route_socket pid=7287 comm=syz.0.1380 [ 114.791011][ T7289] IPVS: using max 1776 ests per chain, 88800 per kthread [ 114.813350][ T7304] netlink: 4 bytes leftover after parsing attributes in process `syz.3.1387'. [ 114.843327][ T29] kauditd_printk_skb: 466 callbacks suppressed [ 114.843387][ T29] audit: type=1326 audit(2000000066.640:15864): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7295 comm="syz.4.1384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 114.875746][ T29] audit: type=1326 audit(2000000066.640:15865): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7295 comm="syz.4.1384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 114.899715][ T29] audit: type=1326 audit(2000000066.640:15866): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7295 comm="syz.4.1384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 114.924122][ T29] audit: type=1326 audit(2000000066.640:15867): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7295 comm="syz.4.1384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 114.948504][ T29] audit: type=1326 audit(2000000066.640:15868): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7295 comm="syz.4.1384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 114.972349][ T29] audit: type=1326 audit(2000000066.640:15869): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7295 comm="syz.4.1384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 114.996998][ T29] audit: type=1326 audit(2000000066.640:15870): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7295 comm="syz.4.1384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 115.021195][ T29] audit: type=1326 audit(2000000066.640:15871): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7295 comm="syz.4.1384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 115.045398][ T29] audit: type=1326 audit(2000000066.640:15872): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7295 comm="syz.4.1384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 115.069493][ T29] audit: type=1326 audit(2000000066.640:15873): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7295 comm="syz.4.1384" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 115.094433][ T7310] FAULT_INJECTION: forcing a failure. [ 115.094433][ T7310] name failslab, interval 1, probability 0, space 0, times 0 [ 115.107466][ T7310] CPU: 0 UID: 0 PID: 7310 Comm: syz.6.1389 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 115.107503][ T7310] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 115.107517][ T7310] Call Trace: [ 115.107525][ T7310] [ 115.107533][ T7310] __dump_stack+0x1d/0x30 [ 115.107606][ T7310] dump_stack_lvl+0xe8/0x140 [ 115.107628][ T7310] dump_stack+0x15/0x1b [ 115.107647][ T7310] should_fail_ex+0x265/0x280 [ 115.107684][ T7310] should_failslab+0x8c/0xb0 [ 115.107775][ T7310] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 115.107808][ T7310] ? __d_alloc+0x3d/0x340 [ 115.107840][ T7310] __d_alloc+0x3d/0x340 [ 115.107872][ T7310] d_alloc_pseudo+0x1e/0x80 [ 115.107983][ T7310] alloc_file_pseudo+0x71/0x160 [ 115.108058][ T7310] anon_inode_getfile+0xa0/0x120 [ 115.108094][ T7310] bpf_link_prime+0xfc/0x1d0 [ 115.108176][ T7310] bpf_uprobe_multi_link_attach+0x8b9/0x910 [ 115.108225][ T7310] link_create+0x680/0x6e0 [ 115.108292][ T7310] __sys_bpf+0x61d/0x7b0 [ 115.108337][ T7310] __x64_sys_bpf+0x41/0x50 [ 115.108395][ T7310] x64_sys_call+0x2aea/0x2ff0 [ 115.108419][ T7310] do_syscall_64+0xd2/0x200 [ 115.108474][ T7310] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 115.108503][ T7310] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 115.108585][ T7310] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.108622][ T7310] RIP: 0033:0x7f0dc33febe9 [ 115.108640][ T7310] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.108661][ T7310] RSP: 002b:00007f0dc1a5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 115.108684][ T7310] RAX: ffffffffffffffda RBX: 00007f0dc3625fa0 RCX: 00007f0dc33febe9 [ 115.108759][ T7310] RDX: 0000000000000040 RSI: 00002000000005c0 RDI: 000000000000001c [ 115.108772][ T7310] RBP: 00007f0dc1a5f090 R08: 0000000000000000 R09: 0000000000000000 [ 115.108786][ T7310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 115.108800][ T7310] R13: 00007f0dc3626038 R14: 00007f0dc3625fa0 R15: 00007ffddbc719f8 [ 115.108893][ T7310] [ 115.184699][ T7311] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1388'. [ 115.191391][ T124] batman_adv: batadv1: No IGMP Querier present - multicast optimizations disabled [ 115.346490][ T124] batman_adv: batadv1: No MLD Querier present - multicast optimizations disabled [ 115.628616][ T7326] smc: net device bond0 applied user defined pnetid SYZ2 [ 115.682325][ T7329] smc: net device bond0 erased user defined pnetid SYZ2 [ 115.793971][ T7332] loop7: detected capacity change from 0 to 128 [ 115.813537][ T7333] FAULT_INJECTION: forcing a failure. [ 115.813537][ T7333] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 115.826968][ T7333] CPU: 0 UID: 0 PID: 7333 Comm: syz.6.1397 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 115.827001][ T7333] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 115.827018][ T7333] Call Trace: [ 115.827027][ T7333] [ 115.827042][ T7333] __dump_stack+0x1d/0x30 [ 115.827069][ T7333] dump_stack_lvl+0xe8/0x140 [ 115.827090][ T7333] dump_stack+0x15/0x1b [ 115.827106][ T7333] should_fail_ex+0x265/0x280 [ 115.827182][ T7333] should_fail+0xb/0x20 [ 115.827212][ T7333] should_fail_usercopy+0x1a/0x20 [ 115.827296][ T7333] _copy_from_user+0x1c/0xb0 [ 115.827321][ T7333] ___sys_sendmsg+0xc1/0x1d0 [ 115.827406][ T7333] __x64_sys_sendmsg+0xd4/0x160 [ 115.827455][ T7333] x64_sys_call+0x191e/0x2ff0 [ 115.827555][ T7333] do_syscall_64+0xd2/0x200 [ 115.827578][ T7333] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 115.827644][ T7333] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 115.827667][ T7333] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 115.827688][ T7333] RIP: 0033:0x7f0dc33febe9 [ 115.827704][ T7333] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 115.827846][ T7333] RSP: 002b:00007f0dc1a5f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 115.827914][ T7333] RAX: ffffffffffffffda RBX: 00007f0dc3625fa0 RCX: 00007f0dc33febe9 [ 115.827931][ T7333] RDX: 0000000024000880 RSI: 00002000000000c0 RDI: 0000000000000005 [ 115.827948][ T7333] RBP: 00007f0dc1a5f090 R08: 0000000000000000 R09: 0000000000000000 [ 115.827965][ T7333] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 115.827981][ T7333] R13: 00007f0dc3626038 R14: 00007f0dc3625fa0 R15: 00007ffddbc719f8 [ 115.828007][ T7333] [ 115.830284][ T7332] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 116.024427][ T7332] vhci_hcd: invalid port number 96 [ 116.029714][ T7332] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 116.075031][ T7338] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7338 comm=syz.7.1399 [ 116.163729][ T7343] sch_tbf: burst 0 is lower than device ip6gre0 mtu (1448) ! [ 116.165858][ T7342] loop7: detected capacity change from 0 to 1024 [ 116.181084][ T7342] EXT4-fs: Ignoring removed nobh option [ 116.186840][ T7342] EXT4-fs: Ignoring removed bh option [ 116.202517][ T7342] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 116.429494][ T5608] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 116.553602][ T7390] FAULT_INJECTION: forcing a failure. [ 116.553602][ T7390] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 116.566997][ T7390] CPU: 1 UID: 0 PID: 7390 Comm: syz.3.1419 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 116.567037][ T7390] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 116.567053][ T7390] Call Trace: [ 116.567061][ T7390] [ 116.567068][ T7390] __dump_stack+0x1d/0x30 [ 116.567095][ T7390] dump_stack_lvl+0xe8/0x140 [ 116.567197][ T7390] dump_stack+0x15/0x1b [ 116.567214][ T7390] should_fail_ex+0x265/0x280 [ 116.567251][ T7390] should_fail+0xb/0x20 [ 116.567290][ T7390] should_fail_usercopy+0x1a/0x20 [ 116.567358][ T7390] strncpy_from_user+0x25/0x230 [ 116.567392][ T7390] ? kmem_cache_alloc_noprof+0x186/0x310 [ 116.567469][ T7390] ? getname_flags+0x80/0x3b0 [ 116.567503][ T7390] getname_flags+0xae/0x3b0 [ 116.567548][ T7390] getname_uflags+0x21/0x30 [ 116.567583][ T7390] __x64_sys_execveat+0x5d/0x90 [ 116.567708][ T7390] x64_sys_call+0x1fec/0x2ff0 [ 116.567735][ T7390] do_syscall_64+0xd2/0x200 [ 116.567759][ T7390] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 116.567784][ T7390] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 116.567807][ T7390] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 116.567872][ T7390] RIP: 0033:0x7f9ce59bebe9 [ 116.567887][ T7390] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 116.567910][ T7390] RSP: 002b:00007f9ce401f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 116.567935][ T7390] RAX: ffffffffffffffda RBX: 00007f9ce5be5fa0 RCX: 00007f9ce59bebe9 [ 116.567950][ T7390] RDX: 0000000000000000 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 116.567962][ T7390] RBP: 00007f9ce401f090 R08: 0000000000000000 R09: 0000000000000000 [ 116.567974][ T7390] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 116.568048][ T7390] R13: 00007f9ce5be6038 R14: 00007f9ce5be5fa0 R15: 00007ffff7e5d4d8 [ 116.568075][ T7390] [ 116.857665][ T7397] __nla_validate_parse: 4 callbacks suppressed [ 116.857764][ T7397] netlink: 156 bytes leftover after parsing attributes in process `syz.0.1422'. [ 116.876905][ T7397] netlink: 24 bytes leftover after parsing attributes in process `syz.0.1422'. [ 116.887006][ T7399] loop7: detected capacity change from 0 to 164 [ 116.898463][ T7399] rock: directory entry would overflow storage [ 116.904970][ T7399] rock: sig=0x66, size=4, remaining=3 [ 116.911397][ T7400] rock: directory entry would overflow storage [ 116.917872][ T7400] rock: sig=0x66, size=4, remaining=3 [ 117.092637][ T7420] batadv_slave_1: entered promiscuous mode [ 117.106811][ T7420] batadv_slave_1: left promiscuous mode [ 117.140445][ T7424] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7424 comm=syz.7.1434 [ 117.156535][ T7424] netlink: 12 bytes leftover after parsing attributes in process `syz.7.1434'. [ 117.172935][ T7429] batadv_slave_1: entered promiscuous mode [ 117.193217][ T7426] netlink: 16 bytes leftover after parsing attributes in process `syz.6.1435'. [ 117.212378][ T7427] batadv_slave_1: left promiscuous mode [ 117.241938][ T7426] netlink: 52 bytes leftover after parsing attributes in process `syz.6.1435'. [ 117.300613][ T7444] usb usb7: usbfs: process 7444 (syz.4.1440) did not claim interface 0 before use [ 117.332259][ T7440] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1442'. [ 117.342073][ T7440] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1442'. [ 117.351134][ T7440] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1442'. [ 117.360136][ T7440] netlink: 4 bytes leftover after parsing attributes in process `syz.7.1442'. [ 117.369417][ T7440] netlink: 8 bytes leftover after parsing attributes in process `syz.7.1442'. [ 117.461451][ T7456] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7456 comm=syz.6.1447 [ 117.574115][ T7461] lo speed is unknown, defaulting to 1000 [ 117.930830][ T7488] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7488 comm=syz.3.1460 [ 118.205050][ T7512] FAULT_INJECTION: forcing a failure. [ 118.205050][ T7512] name failslab, interval 1, probability 0, space 0, times 0 [ 118.218599][ T7512] CPU: 1 UID: 0 PID: 7512 Comm: syz.3.1469 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 118.218683][ T7512] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 118.218707][ T7512] Call Trace: [ 118.218723][ T7512] [ 118.218732][ T7512] __dump_stack+0x1d/0x30 [ 118.218759][ T7512] dump_stack_lvl+0xe8/0x140 [ 118.218850][ T7512] dump_stack+0x15/0x1b [ 118.218867][ T7512] should_fail_ex+0x265/0x280 [ 118.218902][ T7512] should_failslab+0x8c/0xb0 [ 118.218937][ T7512] kmem_cache_alloc_noprof+0x50/0x310 [ 118.218972][ T7512] ? skb_clone+0x151/0x1f0 [ 118.219018][ T7512] skb_clone+0x151/0x1f0 [ 118.219053][ T7512] __netlink_deliver_tap+0x2c9/0x500 [ 118.219155][ T7512] netlink_unicast+0x66b/0x690 [ 118.219203][ T7512] netlink_sendmsg+0x58b/0x6b0 [ 118.219244][ T7512] ? __pfx_netlink_sendmsg+0x10/0x10 [ 118.219313][ T7512] __sock_sendmsg+0x145/0x180 [ 118.219410][ T7512] ____sys_sendmsg+0x31e/0x4e0 [ 118.219551][ T7512] ___sys_sendmsg+0x17b/0x1d0 [ 118.219613][ T7512] __x64_sys_sendmsg+0xd4/0x160 [ 118.219663][ T7512] x64_sys_call+0x191e/0x2ff0 [ 118.219686][ T7512] do_syscall_64+0xd2/0x200 [ 118.219791][ T7512] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 118.219819][ T7512] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 118.219847][ T7512] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 118.219876][ T7512] RIP: 0033:0x7f9ce59bebe9 [ 118.219894][ T7512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 118.219976][ T7512] RSP: 002b:00007f9ce401f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 118.219999][ T7512] RAX: ffffffffffffffda RBX: 00007f9ce5be5fa0 RCX: 00007f9ce59bebe9 [ 118.220037][ T7512] RDX: 0000000000000000 RSI: 00002000000012c0 RDI: 0000000000000005 [ 118.220049][ T7512] RBP: 00007f9ce401f090 R08: 0000000000000000 R09: 0000000000000000 [ 118.220061][ T7512] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 118.220072][ T7512] R13: 00007f9ce5be6038 R14: 00007f9ce5be5fa0 R15: 00007ffff7e5d4d8 [ 118.220167][ T7512] [ 118.434490][ T7512] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 118.524437][ T7522] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 118.564948][ T7530] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7530 comm=syz.6.1477 [ 118.587861][ T7522] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 118.611066][ T7533] sg_write: data in/out 196608/1 bytes for SCSI command 0xdb-- guessing data in; [ 118.611066][ T7533] program syz.3.1479 not setting count and/or reply_len properly [ 118.657036][ T7522] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 118.754996][ T7522] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 118.865750][ T7548] sg_write: data in/out 196608/1 bytes for SCSI command 0xdb-- guessing data in; [ 118.865750][ T7548] program syz.0.1482 not setting count and/or reply_len properly [ 118.938613][ T12] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.951244][ T1602] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.963370][ T1602] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 118.976021][ T1602] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 119.063158][ T7567] FAULT_INJECTION: forcing a failure. [ 119.063158][ T7567] name failslab, interval 1, probability 0, space 0, times 0 [ 119.076534][ T7567] CPU: 0 UID: 0 PID: 7567 Comm: syz.3.1490 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 119.076570][ T7567] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 119.076583][ T7567] Call Trace: [ 119.076590][ T7567] [ 119.076636][ T7567] __dump_stack+0x1d/0x30 [ 119.076661][ T7567] dump_stack_lvl+0xe8/0x140 [ 119.076680][ T7567] dump_stack+0x15/0x1b [ 119.076702][ T7567] should_fail_ex+0x265/0x280 [ 119.076797][ T7567] should_failslab+0x8c/0xb0 [ 119.076827][ T7567] __kvmalloc_node_noprof+0x123/0x4e0 [ 119.076908][ T7567] ? alloc_netdev_mqs+0x6e2/0xa20 [ 119.076955][ T7567] alloc_netdev_mqs+0x6e2/0xa20 [ 119.077026][ T7567] ip6_tnl_locate+0x37e/0x4a0 [ 119.077053][ T7567] ip6_tnl_siocdevprivate+0x550/0x920 [ 119.077172][ T7567] dev_ifsioc+0x8f8/0xaa0 [ 119.077246][ T7567] dev_ioctl+0x78d/0x960 [ 119.077347][ T7567] sock_ioctl+0x593/0x610 [ 119.077385][ T7567] ? __pfx_sock_ioctl+0x10/0x10 [ 119.077412][ T7567] __se_sys_ioctl+0xce/0x140 [ 119.077472][ T7567] __x64_sys_ioctl+0x43/0x50 [ 119.077598][ T7567] x64_sys_call+0x1816/0x2ff0 [ 119.077623][ T7567] do_syscall_64+0xd2/0x200 [ 119.077691][ T7567] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 119.077733][ T7567] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 119.077755][ T7567] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 119.077800][ T7567] RIP: 0033:0x7f9ce59bebe9 [ 119.077826][ T7567] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 119.077850][ T7567] RSP: 002b:00007f9ce401f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 119.077925][ T7567] RAX: ffffffffffffffda RBX: 00007f9ce5be5fa0 RCX: 00007f9ce59bebe9 [ 119.077942][ T7567] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000007 [ 119.077959][ T7567] RBP: 00007f9ce401f090 R08: 0000000000000000 R09: 0000000000000000 [ 119.077975][ T7567] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 119.077991][ T7567] R13: 00007f9ce5be6038 R14: 00007f9ce5be5fa0 R15: 00007ffff7e5d4d8 [ 119.078031][ T7567] [ 119.315884][ T7572] vhci_hcd: invalid port number 96 [ 119.321125][ T7572] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 119.380539][ T7579] loop0: detected capacity change from 0 to 1024 [ 119.387714][ T7579] EXT4-fs: Ignoring removed bh option [ 119.404628][ T7579] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 119.603513][ T7579] tipc: New replicast peer: 10.1.1.2 [ 119.608974][ T7579] tipc: Enabled bearer , priority 10 [ 119.609623][ T7596] sg_write: data in/out 196608/1 bytes for SCSI command 0xdb-- guessing data in; [ 119.609623][ T7596] program syz.3.1499 not setting count and/or reply_len properly [ 119.638240][ T7601] netlink: 'syz.4.1500': attribute type 2 has an invalid length. [ 119.825567][ T7608] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7608 comm=syz.4.1501 [ 120.085668][ T7620] vhci_hcd: invalid port number 96 [ 120.090981][ T7620] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 120.125999][ T29] kauditd_printk_skb: 608 callbacks suppressed [ 120.126018][ T29] audit: type=1326 audit(2000000071.920:16482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7625 comm="syz.4.1506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 120.157087][ T29] audit: type=1326 audit(2000000071.950:16483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7625 comm="syz.4.1506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=196 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 120.181415][ T29] audit: type=1326 audit(2000000071.950:16484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7625 comm="syz.4.1506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 120.205859][ T29] audit: type=1326 audit(2000000071.950:16485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7625 comm="syz.4.1506" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68cddfebe9 code=0x7ffc0000 [ 120.262592][ T3303] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 120.289999][ T29] audit: type=1326 audit(2000000072.080:16486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7635 comm="syz.0.1511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb59758ebe9 code=0x7ffc0000 [ 120.314754][ T29] audit: type=1326 audit(2000000072.080:16487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7635 comm="syz.0.1511" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb59758ebe9 code=0x7ffc0000 [ 120.398688][ T29] audit: type=1326 audit(2000000072.170:16488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7629 comm="syz.6.1508" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0dc33febe9 code=0x7ffc0000 [ 120.423731][ T29] audit: type=1326 audit(2000000072.170:16489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7629 comm="syz.6.1508" exe="/root/syz-executor" sig=0 arch=c000003e syscall=250 compat=0 ip=0x7f0dc33febe9 code=0x7ffc0000 [ 120.448250][ T29] audit: type=1326 audit(2000000072.170:16490): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7629 comm="syz.6.1508" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0dc33febe9 code=0x7ffc0000 [ 120.472283][ T29] audit: type=1326 audit(2000000072.170:16491): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7629 comm="syz.6.1508" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f0dc33febe9 code=0x7ffc0000 [ 120.616641][ T10] tipc: Node number set to 4091123064 [ 120.625643][ T7651] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7651 comm=syz.7.1516 [ 120.960331][ T7664] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.025339][ T7664] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.086150][ T7664] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.178022][ T7664] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 121.229347][ T12] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 121.249479][ T12] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 121.264549][ T12] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 121.390686][ T7699] FAULT_INJECTION: forcing a failure. [ 121.390686][ T7699] name failslab, interval 1, probability 0, space 0, times 0 [ 121.403541][ T7699] CPU: 1 UID: 0 PID: 7699 Comm: syz.3.1535 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 121.403575][ T7699] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 121.403587][ T7699] Call Trace: [ 121.403594][ T7699] [ 121.403603][ T7699] __dump_stack+0x1d/0x30 [ 121.403630][ T7699] dump_stack_lvl+0xe8/0x140 [ 121.403656][ T7699] dump_stack+0x15/0x1b [ 121.403695][ T7699] should_fail_ex+0x265/0x280 [ 121.403732][ T7699] should_failslab+0x8c/0xb0 [ 121.403756][ T7699] kmem_cache_alloc_noprof+0x50/0x310 [ 121.403879][ T7699] ? security_file_alloc+0x32/0x100 [ 121.403994][ T7699] security_file_alloc+0x32/0x100 [ 121.404032][ T7699] init_file+0x5c/0x1d0 [ 121.404065][ T7699] alloc_empty_file+0x8b/0x200 [ 121.404113][ T7699] path_openat+0x68/0x2170 [ 121.404137][ T7699] ? _parse_integer_limit+0x170/0x190 [ 121.404216][ T7699] ? _parse_integer+0x27/0x40 [ 121.404253][ T7699] ? kstrtoull+0x111/0x140 [ 121.404346][ T7699] ? kstrtouint+0x76/0xc0 [ 121.404381][ T7699] do_filp_open+0x109/0x230 [ 121.404488][ T7699] do_sys_openat2+0xa6/0x110 [ 121.404531][ T7699] __x64_sys_creat+0x65/0x90 [ 121.404572][ T7699] x64_sys_call+0x2d94/0x2ff0 [ 121.404600][ T7699] do_syscall_64+0xd2/0x200 [ 121.404632][ T7699] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 121.404663][ T7699] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 121.404687][ T7699] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 121.404746][ T7699] RIP: 0033:0x7f9ce59bebe9 [ 121.404762][ T7699] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 121.404794][ T7699] RSP: 002b:00007f9ce401f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 121.404812][ T7699] RAX: ffffffffffffffda RBX: 00007f9ce5be5fa0 RCX: 00007f9ce59bebe9 [ 121.404829][ T7699] RDX: 0000000000000000 RSI: 0000000000000036 RDI: 00002000000003c0 [ 121.404852][ T7699] RBP: 00007f9ce401f090 R08: 0000000000000000 R09: 0000000000000000 [ 121.404869][ T7699] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 121.404885][ T7699] R13: 00007f9ce5be6038 R14: 00007f9ce5be5fa0 R15: 00007ffff7e5d4d8 [ 121.404913][ T7699] [ 121.676531][ T7703] FAULT_INJECTION: forcing a failure. [ 121.676531][ T7703] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 121.690125][ T7703] CPU: 1 UID: 0 PID: 7703 Comm: syz.6.1537 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 121.690189][ T7703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 121.690205][ T7703] Call Trace: [ 121.690215][ T7703] [ 121.690224][ T7703] __dump_stack+0x1d/0x30 [ 121.690251][ T7703] dump_stack_lvl+0xe8/0x140 [ 121.690276][ T7703] dump_stack+0x15/0x1b [ 121.690356][ T7703] should_fail_ex+0x265/0x280 [ 121.690396][ T7703] should_fail+0xb/0x20 [ 121.690468][ T7703] should_fail_usercopy+0x1a/0x20 [ 121.690513][ T7703] _copy_to_user+0x20/0xa0 [ 121.690580][ T7703] copy_siginfo_to_user+0x22/0xb0 [ 121.690607][ T7703] x64_setup_rt_frame+0x2b5/0x580 [ 121.690635][ T7703] arch_do_signal_or_restart+0x27c/0x480 [ 121.690716][ T7703] exit_to_user_mode_loop+0x7a/0x100 [ 121.690742][ T7703] do_syscall_64+0x1d6/0x200 [ 121.690771][ T7703] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 121.690800][ T7703] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 121.690834][ T7703] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 121.690945][ T7703] RIP: 0033:0x7f0dc33febe7 [ 121.690964][ T7703] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 121.691001][ T7703] RSP: 002b:00007f0dc1a5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 121.691051][ T7703] RAX: 0000000000000001 RBX: 00007f0dc3625fa0 RCX: 00007f0dc33febe9 [ 121.691067][ T7703] RDX: 0000000000000010 RSI: 00002000000001c0 RDI: 0000000000000003 [ 121.691084][ T7703] RBP: 00007f0dc1a5f090 R08: 0000000000000000 R09: 0000000000000000 [ 121.691101][ T7703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 121.691158][ T7703] R13: 00007f0dc3626038 R14: 00007f0dc3625fa0 R15: 00007ffddbc719f8 [ 121.691186][ T7703] [ 122.079615][ T7725] vhci_hcd: invalid port number 96 [ 122.085018][ T7725] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 122.106774][ T7727] FAULT_INJECTION: forcing a failure. [ 122.106774][ T7727] name failslab, interval 1, probability 0, space 0, times 0 [ 122.119608][ T7727] CPU: 0 UID: 0 PID: 7727 Comm: syz.3.1546 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 122.119670][ T7727] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 122.119687][ T7727] Call Trace: [ 122.119695][ T7727] [ 122.119709][ T7727] __dump_stack+0x1d/0x30 [ 122.119735][ T7727] dump_stack_lvl+0xe8/0x140 [ 122.119752][ T7727] dump_stack+0x15/0x1b [ 122.119835][ T7727] should_fail_ex+0x265/0x280 [ 122.119903][ T7727] should_failslab+0x8c/0xb0 [ 122.120004][ T7727] kmem_cache_alloc_noprof+0x50/0x310 [ 122.120041][ T7727] ? fcntl_getlk+0x3d/0x6e0 [ 122.120062][ T7727] fcntl_getlk+0x3d/0x6e0 [ 122.120081][ T7727] ? should_fail_ex+0xdb/0x280 [ 122.120111][ T7727] do_fcntl+0x6d5/0xdf0 [ 122.120192][ T7727] ? selinux_file_fcntl+0x1cb/0x1e0 [ 122.120225][ T7727] __se_sys_fcntl+0xb1/0x120 [ 122.120291][ T7727] __x64_sys_fcntl+0x43/0x50 [ 122.120318][ T7727] x64_sys_call+0x29a0/0x2ff0 [ 122.120337][ T7727] do_syscall_64+0xd2/0x200 [ 122.120358][ T7727] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 122.120384][ T7727] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 122.120403][ T7727] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 122.120422][ T7727] RIP: 0033:0x7f9ce59bebe9 [ 122.120470][ T7727] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 122.120614][ T7727] RSP: 002b:00007f9ce401f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 122.120638][ T7727] RAX: ffffffffffffffda RBX: 00007f9ce5be5fa0 RCX: 00007f9ce59bebe9 [ 122.120654][ T7727] RDX: 00002000000000c0 RSI: 0000000000000024 RDI: 0000000000000003 [ 122.120747][ T7727] RBP: 00007f9ce401f090 R08: 0000000000000000 R09: 0000000000000000 [ 122.120759][ T7727] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 122.120770][ T7727] R13: 00007f9ce5be6038 R14: 00007f9ce5be5fa0 R15: 00007ffff7e5d4d8 [ 122.120789][ T7727] [ 122.415499][ T7733] FAULT_INJECTION: forcing a failure. [ 122.415499][ T7733] name failslab, interval 1, probability 0, space 0, times 0 [ 122.428558][ T7733] CPU: 1 UID: 0 PID: 7733 Comm: syz.4.1549 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 122.428592][ T7733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 122.428651][ T7733] Call Trace: [ 122.428684][ T7733] [ 122.428693][ T7733] __dump_stack+0x1d/0x30 [ 122.428842][ T7733] dump_stack_lvl+0xe8/0x140 [ 122.428914][ T7733] dump_stack+0x15/0x1b [ 122.428936][ T7733] should_fail_ex+0x265/0x280 [ 122.428972][ T7733] should_failslab+0x8c/0xb0 [ 122.429049][ T7733] kmem_cache_alloc_noprof+0x50/0x310 [ 122.429089][ T7733] ? security_file_alloc+0x32/0x100 [ 122.429141][ T7733] security_file_alloc+0x32/0x100 [ 122.429171][ T7733] init_file+0x5c/0x1d0 [ 122.429264][ T7733] alloc_empty_file+0x8b/0x200 [ 122.429373][ T7733] path_openat+0x68/0x2170 [ 122.429397][ T7733] ? _parse_integer_limit+0x170/0x190 [ 122.429474][ T7733] ? _parse_integer+0x27/0x40 [ 122.429504][ T7733] ? kstrtoull+0x111/0x140 [ 122.429542][ T7733] ? kstrtouint+0x76/0xc0 [ 122.429575][ T7733] do_filp_open+0x109/0x230 [ 122.429686][ T7733] do_sys_openat2+0xa6/0x110 [ 122.429734][ T7733] __x64_sys_open+0xe6/0x110 [ 122.429791][ T7733] x64_sys_call+0x1457/0x2ff0 [ 122.429819][ T7733] do_syscall_64+0xd2/0x200 [ 122.429850][ T7733] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 122.429881][ T7733] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 122.429976][ T7733] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 122.429997][ T7733] RIP: 0033:0x7f68cddfebe9 [ 122.430016][ T7733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 122.430040][ T7733] RSP: 002b:00007f68cc467038 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 122.430064][ T7733] RAX: ffffffffffffffda RBX: 00007f68ce025fa0 RCX: 00007f68cddfebe9 [ 122.430142][ T7733] RDX: 0000000000000111 RSI: 000000000014937e RDI: 0000200000000180 [ 122.430155][ T7733] RBP: 00007f68cc467090 R08: 0000000000000000 R09: 0000000000000000 [ 122.430167][ T7733] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 122.430179][ T7733] R13: 00007f68ce026038 R14: 00007f68ce025fa0 R15: 00007ffe562de558 [ 122.430221][ T7733] [ 122.689668][ T7743] FAULT_INJECTION: forcing a failure. [ 122.689668][ T7743] name failslab, interval 1, probability 0, space 0, times 0 [ 122.702796][ T7743] CPU: 1 UID: 0 PID: 7743 Comm: syz.4.1554 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 122.702827][ T7743] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 122.702840][ T7743] Call Trace: [ 122.702847][ T7743] [ 122.702907][ T7743] __dump_stack+0x1d/0x30 [ 122.702946][ T7743] dump_stack_lvl+0xe8/0x140 [ 122.702980][ T7743] dump_stack+0x15/0x1b [ 122.703030][ T7743] should_fail_ex+0x265/0x280 [ 122.703071][ T7743] should_failslab+0x8c/0xb0 [ 122.703099][ T7743] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 122.703218][ T7743] ? sidtab_sid2str_get+0xa0/0x130 [ 122.703256][ T7743] kmemdup_noprof+0x2b/0x70 [ 122.703281][ T7743] sidtab_sid2str_get+0xa0/0x130 [ 122.703386][ T7743] security_sid_to_context_core+0x1eb/0x2e0 [ 122.703428][ T7743] security_sid_to_context+0x27/0x40 [ 122.703457][ T7743] selinux_lsmprop_to_secctx+0x67/0xf0 [ 122.703496][ T7743] security_lsmprop_to_secctx+0x43/0x80 [ 122.703593][ T7743] audit_log_task_context+0x77/0x190 [ 122.703626][ T7743] audit_log_task+0xf4/0x250 [ 122.703690][ T7743] audit_seccomp+0x61/0x100 [ 122.703720][ T7743] ? __seccomp_filter+0x68c/0x10d0 [ 122.703740][ T7743] __seccomp_filter+0x69d/0x10d0 [ 122.703763][ T7743] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 122.703787][ T7743] ? vfs_write+0x75e/0x8e0 [ 122.703806][ T7743] ? __rcu_read_unlock+0x4f/0x70 [ 122.703855][ T7743] ? __fget_files+0x184/0x1c0 [ 122.703880][ T7743] __secure_computing+0x82/0x150 [ 122.703899][ T7743] syscall_trace_enter+0xcf/0x1e0 [ 122.703921][ T7743] do_syscall_64+0xac/0x200 [ 122.704003][ T7743] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 122.704024][ T7743] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 122.704043][ T7743] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 122.704089][ T7743] RIP: 0033:0x7f68cddfebe9 [ 122.704102][ T7743] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 122.704190][ T7743] RSP: 002b:00007f68cc467038 EFLAGS: 00000246 ORIG_RAX: 00000000000000cc [ 122.704207][ T7743] RAX: ffffffffffffffda RBX: 00007f68ce025fa0 RCX: 00007f68cddfebe9 [ 122.704218][ T7743] RDX: 0000200000000380 RSI: 0000000000000008 RDI: 00000000000002d7 [ 122.704230][ T7743] RBP: 00007f68cc467090 R08: 0000000000000000 R09: 0000000000000000 [ 122.704247][ T7743] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 122.704263][ T7743] R13: 00007f68ce026038 R14: 00007f68ce025fa0 R15: 00007ffe562de558 [ 122.704294][ T7743] [ 122.966666][ T7665] netdevsim netdevsim7 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.001985][ T7746] usb usb7: usbfs: process 7746 (syz.0.1555) did not claim interface 0 before use [ 123.013966][ T7665] netdevsim netdevsim7 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.073910][ T7665] netdevsim netdevsim7 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 123.254170][ T7768] __nla_validate_parse: 20 callbacks suppressed [ 123.254233][ T7768] netlink: 40 bytes leftover after parsing attributes in process `syz.4.1563'. [ 123.517099][ T7780] tipc: Started in network mode [ 123.522178][ T7780] tipc: Node identity 26f701a0146f, cluster identity 4711 [ 123.529497][ T7780] tipc: Enabled bearer , priority 0 [ 123.541967][ T7780] D: renamed from syzkaller0 [ 123.563197][ T7780] tipc: Disabling bearer [ 123.884477][ T7782] tipc: Enabling of bearer rejected, failed to enable media [ 124.328229][ T7798] FAULT_INJECTION: forcing a failure. [ 124.328229][ T7798] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 124.341978][ T7798] CPU: 0 UID: 0 PID: 7798 Comm: syz.6.1574 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 124.342055][ T7798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 124.342069][ T7798] Call Trace: [ 124.342125][ T7798] [ 124.342135][ T7798] __dump_stack+0x1d/0x30 [ 124.342162][ T7798] dump_stack_lvl+0xe8/0x140 [ 124.342187][ T7798] dump_stack+0x15/0x1b [ 124.342208][ T7798] should_fail_ex+0x265/0x280 [ 124.342257][ T7798] should_fail+0xb/0x20 [ 124.342287][ T7798] should_fail_usercopy+0x1a/0x20 [ 124.342309][ T7798] _copy_from_iter+0xcf/0xe40 [ 124.342337][ T7798] ? __build_skb_around+0x1a0/0x200 [ 124.342486][ T7798] ? __alloc_skb+0x223/0x320 [ 124.342595][ T7798] netlink_sendmsg+0x471/0x6b0 [ 124.342671][ T7798] ? __pfx_netlink_sendmsg+0x10/0x10 [ 124.342703][ T7798] __sock_sendmsg+0x145/0x180 [ 124.342730][ T7798] ____sys_sendmsg+0x31e/0x4e0 [ 124.342825][ T7798] ___sys_sendmsg+0x17b/0x1d0 [ 124.342960][ T7798] __x64_sys_sendmsg+0xd4/0x160 [ 124.343008][ T7798] x64_sys_call+0x191e/0x2ff0 [ 124.343029][ T7798] do_syscall_64+0xd2/0x200 [ 124.343054][ T7798] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 124.343079][ T7798] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 124.343139][ T7798] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 124.343166][ T7798] RIP: 0033:0x7f0dc33febe9 [ 124.343185][ T7798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 124.343285][ T7798] RSP: 002b:00007f0dc1a5f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 124.343303][ T7798] RAX: ffffffffffffffda RBX: 00007f0dc3625fa0 RCX: 00007f0dc33febe9 [ 124.343314][ T7798] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000006 [ 124.343325][ T7798] RBP: 00007f0dc1a5f090 R08: 0000000000000000 R09: 0000000000000000 [ 124.343336][ T7798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 124.343347][ T7798] R13: 00007f0dc3626038 R14: 00007f0dc3625fa0 R15: 00007ffddbc719f8 [ 124.343432][ T7798] [ 124.615096][ T7806] usb usb7: usbfs: process 7806 (syz.3.1578) did not claim interface 0 before use [ 124.651399][ T7811] netlink: 132 bytes leftover after parsing attributes in process `syz.4.1580'. [ 124.680244][ T7813] vhci_hcd: invalid port number 96 [ 124.686047][ T7813] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 125.252677][ T7819] siw: device registration error -23 [ 125.261940][ T7819] loop0: detected capacity change from 0 to 512 [ 125.269397][ T7819] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 125.284804][ T7819] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 125.298223][ T7819] ext4 filesystem being mounted at /349/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 125.310265][ T7819] EXT4-fs error (device loop0): ext4_xattr_block_get:593: inode #15: comm syz.0.1583: corrupted xattr block 19: overlapping e_value [ 125.324645][ T7819] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop0 ino=15 [ 125.334442][ T7819] EXT4-fs error (device loop0): ext4_xattr_block_get:593: inode #15: comm syz.0.1583: corrupted xattr block 19: overlapping e_value [ 125.348666][ T7819] SELinux: inode_doinit_use_xattr: getxattr returned 117 for dev=loop0 ino=15 [ 125.357978][ T29] kauditd_printk_skb: 329 callbacks suppressed [ 125.357994][ T29] audit: type=1400 audit(2000000077.160:16818): avc: denied { setattr } for pid=7818 comm="syz.0.1583" name="file1" dev="loop0" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 125.358071][ T7819] EXT4-fs error (device loop0): ext4_xattr_block_get:593: inode #15: comm syz.0.1583: corrupted xattr block 19: overlapping e_value [ 125.365526][ T29] audit: type=1400 audit(2000000077.160:16819): avc: denied { setattr } for pid=7818 comm="syz.0.1583" name="file0" dev="loop0" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 125.390256][ T7823] EXT4-fs error (device loop0): ext4_mb_generate_buddy:1289: group 0, [ 125.424328][ T29] audit: type=1400 audit(2000000077.220:16820): avc: denied { mounton } for pid=7818 comm="syz.0.1583" path="/349/file1/file0" dev="loop0" ino=12 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 125.424902][ T7823] block bitmap and bg descriptor inconsistent: 41 vs 39667 free clusters [ 125.461387][ T29] audit: type=1326 audit(2000000077.230:16821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7805 comm="syz.3.1578" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 125.467007][ T7823] Quota error (device loop0): write_blk: dquota write failed [ 125.498174][ T7823] Quota error (device loop0): qtree_write_dquot: Error -28 occurred while creating quota [ 125.508118][ T7823] EXT4-fs error (device loop0): ext4_acquire_dquot:6933: comm syz.0.1583: Failed to acquire dquot type 0 [ 125.519610][ T29] audit: type=1326 audit(2000000077.290:16822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7805 comm="syz.3.1578" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 125.571891][ T3303] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 125.593146][ T29] audit: type=1326 audit(2000000077.380:16823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.3.1584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 125.617168][ T29] audit: type=1326 audit(2000000077.380:16824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7824 comm="syz.3.1584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=206 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 125.659826][ T29] audit: type=1326 audit(2000000077.450:16825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7830 comm="syz.6.1587" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f0dc33febe9 code=0x7ffc0000 [ 125.699044][ T7832] sg_write: data in/out 196608/1 bytes for SCSI command 0xdb-- guessing data in; [ 125.699044][ T7832] program syz.6.1587 not setting count and/or reply_len properly [ 125.788469][ T7850] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=7850 comm=syz.3.1594 [ 125.802240][ T7850] netlink: 12 bytes leftover after parsing attributes in process `syz.3.1594'. [ 125.856214][ T7855] usb usb7: usbfs: process 7855 (syz.3.1596) did not claim interface 0 before use [ 125.936703][ T7861] netlink: 48 bytes leftover after parsing attributes in process `syz.3.1599'. [ 126.005394][ T7870] sg_write: data in/out 196608/1 bytes for SCSI command 0xdb-- guessing data in; [ 126.005394][ T7870] program syz.3.1602 not setting count and/or reply_len properly [ 126.032782][ T7876] netlink: 'syz.0.1601': attribute type 10 has an invalid length. [ 126.041233][ T7876] netlink: 40 bytes leftover after parsing attributes in process `syz.0.1601'. [ 126.054110][ T7876] geneve1: entered promiscuous mode [ 126.060012][ T7876] team0: Port device geneve1 added [ 126.066931][ T51] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.078583][ T51] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.087125][ T51] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.095802][ T51] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.108394][ T7865] netlink: 14 bytes leftover after parsing attributes in process `wg1'. [ 126.119545][ T7865]  (unregistering): (slave bond_slave_0): Releasing backup interface [ 126.130394][ T7865]  (unregistering): (slave bond_slave_1): Releasing backup interface [ 126.139512][ T7865]  (unregistering): Released all slaves [ 126.251546][ T7886] loop0: detected capacity change from 0 to 128 [ 126.258322][ T7886] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 126.272741][ T7886] vhci_hcd: invalid port number 96 [ 126.278035][ T7886] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 126.401930][ T7884] lo speed is unknown, defaulting to 1000 [ 126.424035][ T7895] usb usb7: usbfs: process 7895 (syz.0.1612) did not claim interface 0 before use [ 126.535540][ T7901] sg_write: data in/out 196608/1 bytes for SCSI command 0xdb-- guessing data in; [ 126.535540][ T7901] program syz.0.1615 not setting count and/or reply_len properly [ 126.575602][ T7905] FAULT_INJECTION: forcing a failure. [ 126.575602][ T7905] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 126.589085][ T7905] CPU: 0 UID: 0 PID: 7905 Comm: syz.3.1616 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 126.589123][ T7905] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 126.589139][ T7905] Call Trace: [ 126.589146][ T7905] [ 126.589153][ T7905] __dump_stack+0x1d/0x30 [ 126.589227][ T7905] dump_stack_lvl+0xe8/0x140 [ 126.589252][ T7905] dump_stack+0x15/0x1b [ 126.589273][ T7905] should_fail_ex+0x265/0x280 [ 126.589308][ T7905] should_fail+0xb/0x20 [ 126.589338][ T7905] should_fail_usercopy+0x1a/0x20 [ 126.589437][ T7905] _copy_from_iter+0xcf/0xe40 [ 126.589459][ T7905] ? __build_skb_around+0x1a0/0x200 [ 126.589492][ T7905] ? __alloc_skb+0x223/0x320 [ 126.589532][ T7905] netlink_sendmsg+0x471/0x6b0 [ 126.589653][ T7905] ? __pfx_netlink_sendmsg+0x10/0x10 [ 126.589695][ T7905] __sock_sendmsg+0x145/0x180 [ 126.589725][ T7905] ____sys_sendmsg+0x31e/0x4e0 [ 126.589792][ T7905] ___sys_sendmsg+0x17b/0x1d0 [ 126.589938][ T7905] __x64_sys_sendmsg+0xd4/0x160 [ 126.589986][ T7905] x64_sys_call+0x191e/0x2ff0 [ 126.590036][ T7905] do_syscall_64+0xd2/0x200 [ 126.590068][ T7905] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 126.590100][ T7905] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 126.590202][ T7905] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 126.590224][ T7905] RIP: 0033:0x7f9ce59bebe9 [ 126.590242][ T7905] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 126.590264][ T7905] RSP: 002b:00007f9ce401f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 126.590354][ T7905] RAX: ffffffffffffffda RBX: 00007f9ce5be5fa0 RCX: 00007f9ce59bebe9 [ 126.590366][ T7905] RDX: 0000000000000000 RSI: 00002000000003c0 RDI: 0000000000000007 [ 126.590378][ T7905] RBP: 00007f9ce401f090 R08: 0000000000000000 R09: 0000000000000000 [ 126.590389][ T7905] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 126.590402][ T7905] R13: 00007f9ce5be6038 R14: 00007f9ce5be5fa0 R15: 00007ffff7e5d4d8 [ 126.590443][ T7905] [ 126.947718][ T51] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.980909][ T51] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 126.989157][ T51] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 127.018615][ T51] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 127.048884][ T7920] usb usb7: usbfs: process 7920 (syz.6.1623) did not claim interface 0 before use [ 127.128163][ T7921] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1618'. [ 127.137329][ T7921] netlink: 8 bytes leftover after parsing attributes in process `syz.4.1618'. [ 127.203736][ T7934] netlink: 132 bytes leftover after parsing attributes in process `syz.0.1627'. [ 127.264042][ T7936] loop0: detected capacity change from 0 to 128 [ 127.281247][ T7936] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 127.304241][ T7936] vhci_hcd: invalid port number 96 [ 127.309425][ T7936] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 127.346495][ T7941] netlink: 28 bytes leftover after parsing attributes in process `syz.6.1629'. [ 127.433142][ T7949] FAULT_INJECTION: forcing a failure. [ 127.433142][ T7949] name failslab, interval 1, probability 0, space 0, times 0 [ 127.446314][ T7949] CPU: 0 UID: 0 PID: 7949 Comm: syz.6.1633 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 127.446367][ T7949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 127.446387][ T7949] Call Trace: [ 127.446395][ T7949] [ 127.446406][ T7949] __dump_stack+0x1d/0x30 [ 127.446432][ T7949] dump_stack_lvl+0xe8/0x140 [ 127.446474][ T7949] dump_stack+0x15/0x1b [ 127.446498][ T7949] should_fail_ex+0x265/0x280 [ 127.446545][ T7949] should_failslab+0x8c/0xb0 [ 127.446592][ T7949] kmem_cache_alloc_noprof+0x50/0x310 [ 127.446653][ T7949] ? posix_lock_inode+0x162/0x2380 [ 127.446687][ T7949] posix_lock_inode+0x162/0x2380 [ 127.446715][ T7949] ? file_has_perm+0x324/0x370 [ 127.446790][ T7949] fcntl_setlk+0x61f/0x950 [ 127.446908][ T7949] do_fcntl+0x5dd/0xdf0 [ 127.446952][ T7949] ? selinux_file_fcntl+0x1cb/0x1e0 [ 127.447018][ T7949] __se_sys_fcntl+0xb1/0x120 [ 127.447057][ T7949] __x64_sys_fcntl+0x43/0x50 [ 127.447234][ T7949] x64_sys_call+0x29a0/0x2ff0 [ 127.447262][ T7949] do_syscall_64+0xd2/0x200 [ 127.447294][ T7949] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 127.447329][ T7949] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 127.447392][ T7949] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 127.447423][ T7949] RIP: 0033:0x7f0dc33febe9 [ 127.447446][ T7949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 127.447503][ T7949] RSP: 002b:00007f0dc1a5f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000048 [ 127.447531][ T7949] RAX: ffffffffffffffda RBX: 00007f0dc3625fa0 RCX: 00007f0dc33febe9 [ 127.447550][ T7949] RDX: 0000200000000040 RSI: 0000000000000007 RDI: 0000000000000003 [ 127.447569][ T7949] RBP: 00007f0dc1a5f090 R08: 0000000000000000 R09: 0000000000000000 [ 127.447646][ T7949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 127.447660][ T7949] R13: 00007f0dc3626038 R14: 00007f0dc3625fa0 R15: 00007ffddbc719f8 [ 127.447683][ T7949] [ 127.652187][ T7918] lo speed is unknown, defaulting to 1000 [ 128.296723][ T8007] sg_write: data in/out 196608/1 bytes for SCSI command 0xdb-- guessing data in; [ 128.296723][ T8007] program syz.7.1654 not setting count and/or reply_len properly [ 128.441025][ T8012] tipc: Enabled bearer , priority 0 [ 128.457589][ T8012] D: renamed from syzkaller0 [ 128.512945][ T8012] tipc: Disabling bearer [ 128.763991][ T8023] lo: entered promiscuous mode [ 128.798598][ T8023] tunl0: entered promiscuous mode [ 128.844340][ T8023] gre0: entered promiscuous mode [ 129.208380][ T8023] erspan0: entered promiscuous mode [ 129.219301][ T8023] ip_vti0: entered promiscuous mode [ 129.226555][ T8023] ip6_vti0: entered promiscuous mode [ 129.235368][ T8023] sit0: entered promiscuous mode [ 129.242333][ T8023] ip6tnl0: entered promiscuous mode [ 129.249803][ T8023] ip6gre0: entered promiscuous mode [ 129.256580][ T8023] syz_tun: entered promiscuous mode [ 129.263273][ T8023] ip6gretap0: entered promiscuous mode [ 129.269973][ T8023] bridge0: entered promiscuous mode [ 129.276801][ T8023] vcan0: entered promiscuous mode [ 129.283916][ T8023] bond0: entered promiscuous mode [ 129.289084][ T8023] bond_slave_0: entered promiscuous mode [ 129.294963][ T8023] bond_slave_1: entered promiscuous mode [ 129.306043][ T8023] dummy0: entered promiscuous mode [ 129.313517][ T8023] nlmon0: entered promiscuous mode [ 129.329729][ T8035] __nla_validate_parse: 5 callbacks suppressed [ 129.329746][ T8035] netlink: 8 bytes leftover after parsing attributes in process `syz.6.1660'. [ 129.411176][ T8023] caif0: entered promiscuous mode [ 129.416332][ T8023] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 129.583540][ T8032] netlink: 'syz.3.1662': attribute type 49 has an invalid length. [ 129.868788][ T8039] kthread_run failed with err -4 [ 129.986245][ T8041] lo speed is unknown, defaulting to 1000 [ 130.412543][ T29] kauditd_printk_skb: 517 callbacks suppressed [ 130.412557][ T29] audit: type=1400 audit(2000000082.200:17343): avc: denied { create } for pid=8048 comm="syz.7.1665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 130.439540][ T29] audit: type=1326 audit(2000000082.200:17344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8048 comm="syz.7.1665" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8256ccebe9 code=0x7ffc0000 [ 130.463565][ T29] audit: type=1326 audit(2000000082.200:17345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8048 comm="syz.7.1665" exe="/root/syz-executor" sig=0 arch=c000003e syscall=7 compat=0 ip=0x7f8256ccebe9 code=0x7ffc0000 [ 130.487235][ T29] audit: type=1326 audit(2000000082.200:17346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8048 comm="syz.7.1665" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8256ccebe9 code=0x7ffc0000 [ 130.511103][ T29] audit: type=1326 audit(2000000082.200:17347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8048 comm="syz.7.1665" exe="/root/syz-executor" sig=0 arch=c000003e syscall=334 compat=0 ip=0x7f8256ccebe9 code=0x7ffc0000 [ 130.535705][ T29] audit: type=1326 audit(2000000082.200:17348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8048 comm="syz.7.1665" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8256ccebe9 code=0x7ffc0000 [ 130.559573][ T29] audit: type=1326 audit(2000000082.200:17349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8048 comm="syz.7.1665" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8256ccebe9 code=0x7ffc0000 [ 130.624752][ T29] audit: type=1400 audit(2000000082.420:17350): avc: denied { write } for pid=8048 comm="syz.7.1665" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=caif_socket permissive=1 [ 130.718823][ T8055] sg_write: data in/out 196608/1 bytes for SCSI command 0xdb-- guessing data in; [ 130.718823][ T8055] program syz.3.1667 not setting count and/or reply_len properly [ 130.763801][ T29] audit: type=1326 audit(2000000082.560:17351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8054 comm="syz.3.1667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 130.794121][ T29] audit: type=1326 audit(2000000082.590:17352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8054 comm="syz.3.1667" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f9ce59bebe9 code=0x7ffc0000 [ 130.845762][ T8076] netlink: 4 bytes leftover after parsing attributes in process `syz.6.1675'. [ 130.859616][ T8076] FAULT_INJECTION: forcing a failure. [ 130.859616][ T8076] name failslab, interval 1, probability 0, space 0, times 0 [ 130.872821][ T8076] CPU: 0 UID: 0 PID: 8076 Comm: syz.6.1675 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 130.872861][ T8076] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 130.872907][ T8076] Call Trace: [ 130.872915][ T8076] [ 130.872924][ T8076] __dump_stack+0x1d/0x30 [ 130.872951][ T8076] dump_stack_lvl+0xe8/0x140 [ 130.872992][ T8076] dump_stack+0x15/0x1b [ 130.873008][ T8076] should_fail_ex+0x265/0x280 [ 130.873048][ T8076] should_failslab+0x8c/0xb0 [ 130.873073][ T8076] kmem_cache_alloc_node_noprof+0x57/0x320 [ 130.873180][ T8076] ? __alloc_skb+0x101/0x320 [ 130.873211][ T8076] __alloc_skb+0x101/0x320 [ 130.873320][ T8076] netlink_alloc_large_skb+0xba/0xf0 [ 130.873358][ T8076] netlink_sendmsg+0x3cf/0x6b0 [ 130.873398][ T8076] ? __pfx_netlink_sendmsg+0x10/0x10 [ 130.873431][ T8076] __sock_sendmsg+0x145/0x180 [ 130.873525][ T8076] ____sys_sendmsg+0x31e/0x4e0 [ 130.873564][ T8076] ___sys_sendmsg+0x17b/0x1d0 [ 130.873628][ T8076] __x64_sys_sendmsg+0xd4/0x160 [ 130.873751][ T8076] x64_sys_call+0x191e/0x2ff0 [ 130.873825][ T8076] do_syscall_64+0xd2/0x200 [ 130.873856][ T8076] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 130.873888][ T8076] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 130.873935][ T8076] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 130.873957][ T8076] RIP: 0033:0x7f0dc33febe9 [ 130.873986][ T8076] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 130.874005][ T8076] RSP: 002b:00007f0dc1a5f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 130.874024][ T8076] RAX: ffffffffffffffda RBX: 00007f0dc3625fa0 RCX: 00007f0dc33febe9 [ 130.874037][ T8076] RDX: 0000000000000000 RSI: 0000200000000180 RDI: 0000000000000006 [ 130.874049][ T8076] RBP: 00007f0dc1a5f090 R08: 0000000000000000 R09: 0000000000000000 [ 130.874063][ T8076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 130.874083][ T8076] R13: 00007f0dc3626038 R14: 00007f0dc3625fa0 R15: 00007ffddbc719f8 [ 130.874110][ T8076] [ 131.093615][ T8083] netlink: 'syz.4.1676': attribute type 10 has an invalid length. [ 131.101696][ T8083] netlink: 40 bytes leftover after parsing attributes in process `syz.4.1676'. [ 131.114763][ T8085] netlink: 496 bytes leftover after parsing attributes in process `syz.0.1677'. [ 131.126776][ T8083] A link change request failed with some changes committed already. Interface geneve1 may have been left with an inconsistent configuration, please check. [ 131.262327][ T8100] lo speed is unknown, defaulting to 1000 [ 131.543452][ T8119] netlink: 8 bytes leftover after parsing attributes in process `syz.0.1688'. [ 131.879968][ T8126] sg_write: data in/out 196608/1 bytes for SCSI command 0xdb-- guessing data in; [ 131.879968][ T8126] program syz.7.1691 not setting count and/or reply_len properly [ 131.971332][ T8114] lo speed is unknown, defaulting to 1000 [ 132.207250][ T8134] netlink: 'syz.3.1693': attribute type 10 has an invalid length. [ 132.215364][ T8134] netlink: 40 bytes leftover after parsing attributes in process `syz.3.1693'. [ 132.227718][ T8136] FAULT_INJECTION: forcing a failure. [ 132.227718][ T8136] name failslab, interval 1, probability 0, space 0, times 0 [ 132.240498][ T8136] CPU: 1 UID: 0 PID: 8136 Comm: syz.4.1694 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 132.240532][ T8136] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 132.240582][ T8136] Call Trace: [ 132.240591][ T8136] [ 132.240601][ T8136] __dump_stack+0x1d/0x30 [ 132.240628][ T8136] dump_stack_lvl+0xe8/0x140 [ 132.240653][ T8136] dump_stack+0x15/0x1b [ 132.240674][ T8136] should_fail_ex+0x265/0x280 [ 132.240837][ T8136] should_failslab+0x8c/0xb0 [ 132.240871][ T8136] kmem_cache_alloc_node_noprof+0x57/0x320 [ 132.240979][ T8136] ? __alloc_skb+0x101/0x320 [ 132.241020][ T8136] __alloc_skb+0x101/0x320 [ 132.241057][ T8136] ? audit_log_start+0x365/0x6c0 [ 132.241089][ T8136] audit_log_start+0x380/0x6c0 [ 132.241127][ T8136] audit_seccomp+0x48/0x100 [ 132.241160][ T8136] ? __seccomp_filter+0x68c/0x10d0 [ 132.241193][ T8136] __seccomp_filter+0x69d/0x10d0 [ 132.241223][ T8136] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 132.241389][ T8136] ? vfs_write+0x75e/0x8e0 [ 132.241475][ T8136] ? __rcu_read_unlock+0x4f/0x70 [ 132.241498][ T8136] ? __fget_files+0x184/0x1c0 [ 132.241526][ T8136] __secure_computing+0x82/0x150 [ 132.241549][ T8136] syscall_trace_enter+0xcf/0x1e0 [ 132.241609][ T8136] do_syscall_64+0xac/0x200 [ 132.241639][ T8136] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 132.241662][ T8136] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 132.241683][ T8136] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 132.241705][ T8136] RIP: 0033:0x7f68cddfebe9 [ 132.241802][ T8136] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 132.241826][ T8136] RSP: 002b:00007f68cc467038 EFLAGS: 00000246 ORIG_RAX: 0000000000000068 [ 132.241901][ T8136] RAX: ffffffffffffffda RBX: 00007f68ce025fa0 RCX: 00007f68cddfebe9 [ 132.241918][ T8136] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 132.241935][ T8136] RBP: 00007f68cc467090 R08: 0000000000000000 R09: 0000000000000000 [ 132.241957][ T8136] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 132.241970][ T8136] R13: 00007f68ce026038 R14: 00007f68ce025fa0 R15: 00007ffe562de558 [ 132.242059][ T8136] [ 132.525138][ T8134] team0: Port device geneve1 added [ 132.532772][ T12] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 132.546152][ T12] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 132.580558][ T12] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 132.616505][ T12] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 132.631978][ T8151] block device autoloading is deprecated and will be removed. [ 132.860780][ T8175] sg_write: data in/out 196608/1 bytes for SCSI command 0xdb-- guessing data in; [ 132.860780][ T8175] program syz.4.1709 not setting count and/or reply_len properly [ 133.097203][ T8197] FAULT_INJECTION: forcing a failure. [ 133.097203][ T8197] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 133.110981][ T8197] CPU: 0 UID: 0 PID: 8197 Comm: syz.3.1717 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 133.111012][ T8197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 133.111025][ T8197] Call Trace: [ 133.111032][ T8197] [ 133.111052][ T8197] __dump_stack+0x1d/0x30 [ 133.111078][ T8197] dump_stack_lvl+0xe8/0x140 [ 133.111102][ T8197] dump_stack+0x15/0x1b [ 133.111124][ T8197] should_fail_ex+0x265/0x280 [ 133.111177][ T8197] should_fail+0xb/0x20 [ 133.111215][ T8197] should_fail_usercopy+0x1a/0x20 [ 133.111238][ T8197] _copy_from_user+0x1c/0xb0 [ 133.111271][ T8197] ___sys_sendmsg+0xc1/0x1d0 [ 133.111343][ T8197] __x64_sys_sendmsg+0xd4/0x160 [ 133.111387][ T8197] x64_sys_call+0x191e/0x2ff0 [ 133.111415][ T8197] do_syscall_64+0xd2/0x200 [ 133.111439][ T8197] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 133.111467][ T8197] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 133.111489][ T8197] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 133.111568][ T8197] RIP: 0033:0x7f9ce59bebe9 [ 133.111587][ T8197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.111642][ T8197] RSP: 002b:00007f9ce401f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 133.111665][ T8197] RAX: ffffffffffffffda RBX: 00007f9ce5be5fa0 RCX: 00007f9ce59bebe9 [ 133.111682][ T8197] RDX: 0000000030040004 RSI: 0000200000000940 RDI: 0000000000000006 [ 133.111699][ T8197] RBP: 00007f9ce401f090 R08: 0000000000000000 R09: 0000000000000000 [ 133.111713][ T8197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.111726][ T8197] R13: 00007f9ce5be6038 R14: 00007f9ce5be5fa0 R15: 00007ffff7e5d4d8 [ 133.111748][ T8197] [ 133.409840][ T8208] vhci_hcd: invalid port number 96 [ 133.415275][ T8208] vhci_hcd: default hub control req: 0300 vfffa i0060 l0 [ 133.468657][ T8212] sg_write: data in/out 196608/1 bytes for SCSI command 0xdb-- guessing data in; [ 133.468657][ T8212] program syz.3.1723 not setting count and/or reply_len properly [ 133.614244][ T8228] FAULT_INJECTION: forcing a failure. [ 133.614244][ T8228] name failslab, interval 1, probability 0, space 0, times 0 [ 133.627169][ T8228] CPU: 1 UID: 0 PID: 8228 Comm: syz.7.1730 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 133.627199][ T8228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 133.627287][ T8228] Call Trace: [ 133.627296][ T8228] [ 133.627305][ T8228] __dump_stack+0x1d/0x30 [ 133.627335][ T8228] dump_stack_lvl+0xe8/0x140 [ 133.627354][ T8228] dump_stack+0x15/0x1b [ 133.627370][ T8228] should_fail_ex+0x265/0x280 [ 133.627451][ T8228] should_failslab+0x8c/0xb0 [ 133.627481][ T8228] kmem_cache_alloc_node_noprof+0x57/0x320 [ 133.627569][ T8228] ? __alloc_skb+0x101/0x320 [ 133.627600][ T8228] __alloc_skb+0x101/0x320 [ 133.627628][ T8228] netlink_ack+0xfd/0x500 [ 133.627755][ T8228] ? __pfx_ethnl_set_features+0x10/0x10 [ 133.627786][ T8228] netlink_rcv_skb+0x192/0x220 [ 133.627833][ T8228] ? __pfx_genl_rcv_msg+0x10/0x10 [ 133.627873][ T8228] genl_rcv+0x28/0x40 [ 133.627961][ T8228] netlink_unicast+0x5c0/0x690 [ 133.628000][ T8228] netlink_sendmsg+0x58b/0x6b0 [ 133.628105][ T8228] ? __pfx_netlink_sendmsg+0x10/0x10 [ 133.628148][ T8228] __sock_sendmsg+0x145/0x180 [ 133.628177][ T8228] ____sys_sendmsg+0x31e/0x4e0 [ 133.628263][ T8228] ___sys_sendmsg+0x17b/0x1d0 [ 133.628438][ T8228] __x64_sys_sendmsg+0xd4/0x160 [ 133.628488][ T8228] x64_sys_call+0x191e/0x2ff0 [ 133.628565][ T8228] do_syscall_64+0xd2/0x200 [ 133.628592][ T8228] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 133.628624][ T8228] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 133.628663][ T8228] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 133.628691][ T8228] RIP: 0033:0x7f8256ccebe9 [ 133.628711][ T8228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 133.628766][ T8228] RSP: 002b:00007f8255337038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 133.628792][ T8228] RAX: ffffffffffffffda RBX: 00007f8256ef5fa0 RCX: 00007f8256ccebe9 [ 133.628815][ T8228] RDX: 0000000020000004 RSI: 0000200000000440 RDI: 0000000000000003 [ 133.628832][ T8228] RBP: 00007f8255337090 R08: 0000000000000000 R09: 0000000000000000 [ 133.628844][ T8228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 133.628856][ T8228] R13: 00007f8256ef6038 R14: 00007f8256ef5fa0 R15: 00007ffcb7312478 [ 133.628880][ T8228] [ 133.675419][ T8234] netlink: 132 bytes leftover after parsing attributes in process `syz.6.1734'. [ 133.905145][ T8249] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=8249 comm=syz.7.1738 [ 133.923812][ T8249] netlink: 12 bytes leftover after parsing attributes in process `syz.7.1738'. [ 133.952773][ T8253] IPVS: set_ctl: invalid protocol: 43 255.255.255.255:20003 [ 133.968569][ T8257] random: crng reseeded on system resumption [ 134.017264][ T8264] ================================================================== [ 134.025498][ T8264] BUG: KCSAN: data-race in memcpy_and_pad / release_task [ 134.032648][ T8264] [ 134.035085][ T8264] write to 0xffff8881099a46c8 of 8 bytes by task 5608 on cpu 0: [ 134.042726][ T8264] release_task+0x6f9/0xb60 [ 134.047713][ T8264] wait_consider_task+0x114a/0x1660 [ 134.052939][ T8264] __do_wait+0xfa/0x510 [ 134.057229][ T8264] do_wait+0xb7/0x260 [ 134.061252][ T8264] kernel_wait4+0x16b/0x1e0 [ 134.066046][ T8264] __x64_sys_wait4+0x91/0x120 [ 134.070857][ T8264] x64_sys_call+0x2a66/0x2ff0 [ 134.075648][ T8264] do_syscall_64+0xd2/0x200 [ 134.080646][ T8264] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 134.086727][ T8264] [ 134.089071][ T8264] read to 0xffff8881099a4200 of 3264 bytes by task 8264 on cpu 1: [ 134.097050][ T8264] memcpy_and_pad+0x48/0x80 [ 134.101581][ T8264] arch_dup_task_struct+0x2c/0x40 [ 134.106616][ T8264] dup_task_struct+0x83/0x6a0 [ 134.111310][ T8264] copy_process+0x399/0x2000 [ 134.116267][ T8264] kernel_clone+0x16c/0x5c0 [ 134.120793][ T8264] __se_sys_clone3+0x1c2/0x200 [ 134.125575][ T8264] __x64_sys_clone3+0x31/0x40 [ 134.130355][ T8264] x64_sys_call+0x1fc9/0x2ff0 [ 134.135060][ T8264] do_syscall_64+0xd2/0x200 [ 134.139668][ T8264] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 134.145573][ T8264] [ 134.147997][ T8264] Reported by Kernel Concurrency Sanitizer on: [ 134.154234][ T8264] CPU: 1 UID: 0 PID: 8264 Comm: syz.0.1744 Not tainted 6.16.0-syzkaller-11743-g6bcdbd62bd56 #0 PREEMPT(voluntary) [ 134.166311][ T8264] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 134.176642][ T8264] ================================================================== [ 134.191329][ T8267] vhci_hcd: invalid port number 96 [ 134.196498][ T8267] vhci_hcd: default hub control req: 0300 vfffa i0060 l0