last executing test programs: 3.184280093s ago: executing program 4 (id=5): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r0}, 0x10) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r1, &(0x7f0000000080)="b1", 0xfffd, 0x400c0d4, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) (fail_nth: 6) 2.817193629s ago: executing program 4 (id=11): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xdf, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0, 0x1}, 0x400, 0x2, 0xfffffffd, 0x1, 0x0, 0xfffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000a0db000000000000000000850000000e000000c50000002a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x1000000000000004, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_bp={0x0}, 0x0, 0x10000, 0xfffffffc, 0x5, 0x8, 0x20005, 0x0, 0x0, 0x0, 0x0, 0x2000000020000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r1, 0x400, 0x0) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000040), 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000440)='ext4_lazy_itable_init\x00', r0}, 0x18) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000b80)="d8000000150081044e81f782db44b9040a87080211000000040000a118000200e000000800000e1208000f0100810401a80016ea1f000940032e5f54c92011148ed08734843cb12b00000803600cfab44dcf5c0461c1d67f6f94007134cf6ee08000a0e408e8d8ef075c0100000000000000cb090000001fb791643a5ee4001b146218a07445d6d930dfe1d9d322fe7c9fd68775730d1688683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e0060000000000000080bbfe5a09d5e1cace81ed0bffece0b42a9ecbee5de6ccd40dd68adbef", 0xd8}], 0x1, 0x0, 0x0, 0x7400}, 0x4000884) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000700)=ANY=[@ANYRES64=r3], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x7}}, [@NFT_MSG_NEWRULE={0x5c, 0x6, 0xa, 0x409, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @payload={{0xc}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_PAYLOAD_BASE={0x8, 0x2, 0x1, 0x0, 0x2}, @NFTA_PAYLOAD_LEN={0x8}, @NFTA_PAYLOAD_OFFSET={0x8, 0x3, 0x1, 0x0, 0x100}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x84}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000440)=ANY=[@ANYBLOB="240000000104010200000180000000000000000008000540000000000500010001"], 0x24}}, 0x0) sendmsg$NFULNL_MSG_CONFIG(r5, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000280)={0x24, 0x1, 0x4, 0x301, 0x0, 0x0, {}, [@NFULA_CFG_FLAGS={0x6}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x24}, 0x1, 0x0, 0x0, 0x40010}, 0x20000808) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000240)={0xffffffffffffffff, 0x20, &(0x7f0000000180)={&(0x7f0000000840)=""/153, 0x93, 0x0, &(0x7f00000003c0)=""/41, 0x1d}}, 0x5f) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0xf, 0x7, &(0x7f0000000100)=ANY=[@ANYRES16=r4, @ANYBLOB="c42d611f44347c044d30d37b2a7d6cfa6119961079794552fb532943283b63cda304eb1e53e7059dff348bd2393d5198ad86f5309f0df6f5c4b9f282bca4c859a2629aaf4fe9844c35b1ffb35779895dbc8e751c5900f30b5ae3c79c79c7562e1af2ebf5", @ANYBLOB="0000000000000000b7020000000000008500000095"], &(0x7f00000006c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x60880, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r9 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000380)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd29, 0xffffffff, {0x0, 0x0, 0x0, r10, {0x0, 0x8}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x7f}}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20000040}, 0x0) sendmsg$nl_route_sched(r9, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000004c0)=@newtfilter={0x3c, 0x2c, 0xd27, 0x70bd25, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0xfff6, 0x1}, {}, {0x8, 0x4}}, [@filter_kind_options=@f_flower={{0xb}, {0xc, 0x2, [@TCA_FLOWER_KEY_ETH_TYPE={0x6, 0x8, 0x86dd}]}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20000}, 0x44010) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000380)='kmem_cache_free\x00', r7}, 0x18) setsockopt$SO_BINDTODEVICE(0xffffffffffffffff, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000001f00)=[{{&(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a90500040000746400009e150451160200000064c6", 0x15}, {&(0x7f00000002c0)="174640b6d80fb2eedc81ba60ccbb9d", 0xf}], 0x2}}, {{&(0x7f00000004c0)={0x2, 0x4e24, @local}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000780)="5825be57aff9352b356be67ca2746357d1787b35", 0x14}], 0x1}}], 0x2, 0x4004044) 2.55820103s ago: executing program 4 (id=14): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0xe, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000000100000100000028"], 0x50) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="12000000020000000400000002"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000600)={{r3}, &(0x7f0000000580)=0x2, &(0x7f00000005c0)=r2}, 0x20) r4 = syz_io_uring_setup(0xd1, &(0x7f0000000280)={0x0, 0x8a73, 0x8, 0x22, 0x1b7}, &(0x7f0000000300)=0x0, &(0x7f00000001c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000000)=0x8000103, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000040)=""/15, 0xf}], 0x1}) io_uring_enter(r4, 0x47ba, 0x3000000, 0x0, 0x0, 0x0) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x21, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x3ff, 0x1441e, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={0x0, 0x7}, 0x0, 0x10000, 0x8, 0x1, 0x5, 0x2020005, 0x8, 0x0, 0x0, 0x0, 0x20000007}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20008000}, 0x0) sendmsg$NFT_BATCH(r8, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000005c0)=ANY=[@ANYBLOB="140000001000010000000000000000000a00000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc3c0000000c0a010100000000000000000a0000070900020073797a31000000000900010073797a3100000000100003800c000080080003400000000214000000110001"], 0xa0}, 0x1, 0x0, 0x0, 0x24000850}, 0x40) r9 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_MSG_GETSETELEM(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000002f40)=ANY=[@ANYBLOB="40000000210a010900000000000000000a0000010900020073797a31000000000900010073797a31"], 0x40}, 0x1, 0x0, 0x0, 0x24000801}, 0x4c0c0) r10 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r7, 0x0, 0x5}, 0x18) ioctl$FICLONERANGE(r10, 0x4020940d, &(0x7f0000000040)={{r1}, 0x7, 0x12b, 0x3}) r11 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCETHTOOL(r11, 0x8946, &(0x7f0000000000)={'veth0_to_hsr\x00', &(0x7f0000002fc0)=@ethtool_stats}) r12 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r12, 0x5423, &(0x7f00000002c0)=0x1) capset(&(0x7f0000000c00)={0x20080522}, &(0x7f0000000280)={0x0, 0x3, 0x7, 0x0, 0x10040, 0x8f}) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x3, 0x5, &(0x7f0000000140)=ANY=[@ANYBLOB="180200000200000000000000000000008500000087000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0xb, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f00000002c0)={r13, 0x0, 0xe, 0x0, &(0x7f0000000100)="e0b9547ed387dbe9abc89b6f5bec", 0x0, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TIOCSETD(r12, 0x5423, &(0x7f0000000100)=0x2) 2.295175282s ago: executing program 4 (id=22): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000880)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r4}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r5}, 0x10) ioctl$TIOCSETD(r3, 0x5423, &(0x7f0000000080)=0xf) ioctl$TCFLSH(r3, 0x400455c8, 0x0) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000b80)=[{0x6}]}, 0x10) bind$bt_hci(r2, &(0x7f0000000140)={0x1f, 0xffff, 0x2}, 0x6) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) writev(r6, &(0x7f0000000940)=[{&(0x7f0000000200)='\f7', 0x2}, {&(0x7f0000000100)='0', 0x1}], 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socket$qrtr(0x2a, 0x2, 0x0) r7 = socket$nl_route(0x10, 0x3, 0x0) name_to_handle_at(0xffffffffffffff9c, 0x0, 0x0, 0x0, 0x1800) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000005c0)=@newlink={0x4c, 0x10, 0x403, 0x70b528, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, 0xa1}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @vlan={{0x9}, {0xc, 0x2, 0x0, 0x1, [@IFLA_VLAN_ID={0x6}]}}}, @IFLA_LINK={0x8, 0x5, r8}, @IFLA_MASTER={0x8, 0xa, r8}]}, 0x4c}, 0x1, 0xba01, 0x0, 0x4004}, 0x810) 1.887158289s ago: executing program 0 (id=31): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) socket$kcm(0x21, 0x2, 0x2) syz_mount_image$ext4(&(0x7f0000000040)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000140)={[{@noload}]}, 0xea, 0x472, &(0x7f0000000f40)="$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") r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000000)='kfree\x00', r3}, 0x18) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) r4 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x2000) ioctl$SG_GET_VERSION_NUM(r4, 0x2284, &(0x7f0000000080)) io_uring_enter(0xffffffffffffffff, 0x521d, 0x5092, 0x20, &(0x7f00000000c0)={[0x2]}, 0x8) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r5, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r6, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r5, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r7 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x20, &(0x7f0000000000)='/proc/net/\x00\x00t4/c+\x0fG\xf9aK\fX\a0\x04\x00\x00\x82q\xee'}, 0x30) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000100)='svcrdma_send_pullup\x00', r7, 0x0, 0x4}, 0x18) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1b, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1008}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r8}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x4f, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r9, 0x0, 0x4}, 0x18) 1.572794152s ago: executing program 2 (id=34): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000f80)=ANY=[@ANYBLOB="1b0000000000000000000000002000e969695b67a34818bb2ab51a0000000000", @ANYRES32, @ANYBLOB='\x00'/18, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x19, 0x4, 0x8, 0x808, 0x0, 0xffffffffffffffff, 0x6}, 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x4, 0xc8}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, 0x0, 0x43}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) socket$vsock_stream(0x28, 0x1, 0x0) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00'}, 0x10) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x3}, 0x2000000, 0x0, 'id0\x00', 'timer0\x00'}) 1.460647697s ago: executing program 2 (id=35): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f00000002c0)=0x1) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000100)=0x2) 1.414858529s ago: executing program 2 (id=37): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="08000000040000000400000004"], 0x48) (async) r3 = shmget(0x3, 0x4000, 0x8, &(0x7f0000ffb000/0x4000)=nil) shmat(r3, &(0x7f0000ffd000/0x3000)=nil, 0x1000) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) (async) openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) (async) close(0xffffffffffffffff) (async) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) 1.311793934s ago: executing program 2 (id=38): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x95, 0x3}, 0x100002, 0x0, 0xffffffff, 0x3, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x3f, 0x0, 0x0, 0x0, 0xb}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000005f40)=[{{&(0x7f0000000d00)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f0000003400)=ANY=[@ANYBLOB="20000000000000000000000007000000440cd1700000000700000e0f940401001400000000000000000600000200000002000000000000001100000000000000000000000100000009000000000000001400000000000000eaffffff0100000006000000000000001400000000000000000000000200000006"], 0x80}}, {{&(0x7f00000010c0)={0x2, 0x4e22, @local}, 0x10, 0x0, 0x0, &(0x7f00000012c0)=ANY=[], 0x28}}], 0x2, 0x4000004) 1.310760754s ago: executing program 2 (id=40): r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xa1b96aadc3618c72}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r3}, &(0x7f0000000180), &(0x7f00000001c0)=r2}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000a80)={{}, &(0x7f0000000a00), &(0x7f0000000a40)}, 0x20) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 1.124374402s ago: executing program 2 (id=43): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00"/20, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014800000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000040400000900000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000000000000000000006d9a9c12012f334d0b3cc299f09bd45b8fa4125ee4e73df817b97d8018384ebeb98463b250fe32bef8d1a6"], 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=@bloom_filter={0x1e, 0x1, 0x6, 0x4eae, 0x2, 0x1, 0x4, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x1, 0x4, 0x5}, 0x50) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x16, 0x3, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000007e3a3b5649d05242fc2576cd00000000009500000000000000"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="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", @ANYRESOCT=r2, @ANYRES32=r4], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r8}, 0x10) bpf$PROG_BIND_MAP(0x23, &(0x7f0000000280)={r6, r5}, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000008c0)={{r4}, &(0x7f0000000840), &(0x7f0000000880)=r3}, 0x20) close(r3) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000000380)={r4, &(0x7f0000000900)}, 0x20) r9 = socket$netlink(0x10, 0x3, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000002c0)='mm_compaction_try_to_compact_pages\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffa}, 0x18) r10 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r10, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r10, 0x1, 0x8, &(0x7f0000000000)=0x80, 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r10, 0x10e, 0x4, &(0x7f0000000180)=0x800, 0x4) r11 = syz_genetlink_get_family_id$devlink(&(0x7f0000000240), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r9, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)={0x34, r11, 0x1, 0x0, 0x25dfdbfb, {0x25}, [@handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x34}, 0x1, 0x0, 0x0, 0x41}, 0x0) r12 = socket$kcm(0x2, 0x200000000000001, 0x106) sendmsg$inet(r12, &(0x7f0000000000)={&(0x7f0000000140)={0x2, 0x4001, @empty}, 0x10, 0x0}, 0x30006041) close(r12) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x4005, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) r13 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r13, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000000040)="2e000000120081a2040f46ecdb4cb9d8a7480ef410000000e3bd6e00000000000b0029002d000000ba8000001201", 0x2e}], 0x1, 0x0, 0x0, 0xc9e}, 0x0) 714.20996ms ago: executing program 0 (id=50): getpid() (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) perf_event_open(&(0x7f0000000280)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x42718, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd06, 0x2000044}, 0x101929, 0x5, 0x0, 0x1, 0xa, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) (async) r0 = open(&(0x7f0000000180)='./bus\x00', 0x14957e, 0x0) readahead(r0, 0x3, 0x2) (async, rerun: 32) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000840)={&(0x7f0000000400)=@pppol2tpv3in6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x30, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x80, 0x0}, 0x0) (async, rerun: 32) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, 0x0, 0x0) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) (async) bpf$BPF_PROG_GET_FD_BY_ID(0xd, 0x0, 0x0) (async) socket$kcm(0x11, 0x200000000000002, 0x300) (async, rerun: 32) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, 0x0) (async, rerun: 32) r1 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000003f000000000000000000f195"], &(0x7f0000000140)='GPL\x00'}, 0x80) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f0000000240)={r1, 0xf, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x40) (async) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0xfffffffe, &(0x7f0000000080)=[{&(0x7f0000000000)="2e00000010008188040f80ec59acbc0413a1f8481f0000005e140604000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) 677.304381ms ago: executing program 3 (id=52): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="09000000070000000000010003"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1c, 0xc, &(0x7f0000000680)=ANY=[@ANYRESDEC=r0, @ANYRESHEX=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x31, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r0}, &(0x7f00000004c0), &(0x7f0000000500)=r1}, 0x20) r2 = socket(0xa, 0x5, 0x0) sendmsg$inet_sctp(r2, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000008400006b0c000000ac1414aa0000000020000000000000008400000001"], 0x38, 0x4855}, 0x24000052) bpf$MAP_CREATE(0x0, 0x0, 0x50) ioctl$SG_IO(0xffffffffffffffff, 0x2285, 0x0) ioctl$SCSI_IOCTL_BENCHMARK_COMMAND(0xffffffffffffffff, 0x3) bpf$PROG_LOAD(0x5, &(0x7f0000000e40)={0x1a, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000000000200"], 0x0, 0x81, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={0x0, r3, 0x0, 0xfffffffffffffffc}, 0x18) r4 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet6(r4, &(0x7f00000003c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffd8d}}], 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) r5 = socket$inet6(0xa, 0x2, 0x0) r6 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000000c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000380)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="640000001000370403000000ffffffff00000000", @ANYRES32=r7, @ANYBLOB="0b1b050000000000440012800b00010069703667726500003400028008000100", @ANYRES32], 0x64}, 0x1, 0x0, 0x0, 0x48810}, 0x4000010) sendmmsg$inet(r5, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4e25, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r7, @empty, @multicast1}}}], 0x20, 0x3f}}], 0x1, 0xc0) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000400)='virtio_transport_alloc_pkt\x00', r8}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r9 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r9, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000000c0)='kfree\x00', r10, 0x0, 0xfffffffffffffffd}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0026}]}) socket$inet6_tcp(0xa, 0x1, 0x0) 628.653173ms ago: executing program 0 (id=53): r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_l2cap_L2CAP_OPTIONS(r0, 0x6, 0x1, &(0x7f0000000800)={0x3, 0x5, 0xf87, 0x1, 0x54, 0x9, 0x9}, 0xc) (fail_nth: 1) 628.279893ms ago: executing program 3 (id=54): r0 = socket$inet(0x2, 0x7, 0xff) recvmsg(r0, &(0x7f0000000d80)={&(0x7f0000000a00)=@sco, 0x80, &(0x7f0000000d00)=[{&(0x7f0000000e00)=""/190, 0xbe}, {&(0x7f0000000ac0)=""/175, 0xaf}, {&(0x7f0000000b80)=""/207, 0xcf}, {&(0x7f0000000c80)=""/74, 0x4a}], 0x4, &(0x7f0000000d40)=""/21, 0x15}, 0x1) bpf$TOKEN_CREATE(0x24, &(0x7f0000000940), 0x8) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000440)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r2}, 0x10) (async, rerun: 32) accept$inet6(0xffffffffffffffff, 0x0, 0x0) (rerun: 32) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x258, &(0x7f0000000140)=[{&(0x7f0000000280)="89000000120081ae08060cdc030ec0007f03e3f70000000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec08120800030006010000bdad446b9bbc7a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) (async) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x20000000000001ab, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0xfffffeb2}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r4}, 0x10) (async) kexec_load(0x5, 0x5, &(0x7f00000006c0)=[{&(0x7f0000000340)="962ec38590b75446655de793c379d3ef65848fd451beec788d57438df42e70b0435c824186208a8c3841b55302457c74eddebec1ec865870ecbaa7c6ed97c2b2fb864ea9d913ce18c7c3b9ce360c347746b5d1903721b1a1", 0x58, 0x583d, 0x3}, {&(0x7f0000000400)="b35650c6ae240d34179884ba4c82bb58371a4e52cf0c5abecf57fe9cfbc67011bd72c0131e99925d0f43d98e6b0eee421fc5a292ab43692de56974ff097ca593c6cb6c687e5fbfd6db8524ef615e9b568123979d42b549b309e147585dd1e411401381227318956202d3490d91ae2866187f81486ba7df7840c8f7e5a813efa6f1ec0dc93a2aa8e98a6998", 0x8b, 0x3, 0x8b1d}, {&(0x7f00000004c0)="3bad444465adcf2e5dd46994b2f6a02fc9280dee5af9909af29b98a9cd9aae13e325a603679955b3d34850c406e3b8fc8b54a68ff13e3cef424d9cca9b96cfcd0f99bbb220a82aee4d0761f23276783d86718b3751208a2e3309207ad3fa922f9e86214c9872ff32", 0x68, 0x80000000, 0x6c0}, {&(0x7f00000005c0)="9706cbca11bf0c24f8b7493c1b9c3f8872145d2351ee6b91e126d07310813661c9507cf2f2dc3a4e42c4466da648670584dde8db7e679c363073e201481dc951bb4ec7f2c668222bd6b5c42d755a3fb99d4b7b2257750bb2b399ce9817c21ac4ff1d7642dcd823caedc3ba447e388145e8dc", 0x72, 0xfff, 0xffffffff}, {&(0x7f0000000640)="cc0daa4636e10a330d7a415ec4f3909cffd4dcaabcedbe70d04e6a14bd9bf30ca21b6a482340b03a7eab16163525bd831a2de4bfe43904a92421d617094b5f5ed36b75134ba41eedd75f563b00f4a7daca83daac0b6110f56c32a40b1817399b7ee8", 0x62, 0xfffffffffffffff8, 0xeb3e}], 0x1) (async) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r6, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000880)=ANY=[@ANYBLOB="0c0100001000030400"/20, @ANYRESHEX=r5, @ANYBLOB="0000230000000000dca8128009000100766c616e00000000cc00028006000100000000001c0003800a00010000000000000000000c00010000000000000000000d000200000000f5ff0000000c00020000000000000000001c0004800c00010000000000000000000c0001000000000000000000700004800c00010000000000000000000c000100000000000000f3ff0b0001"], 0x10c}, 0x1, 0xba01, 0x0, 0x8004}, 0x0) (async) sendmsg$AUDIT_USER_TTY(r4, &(0x7f0000000f40)={&(0x7f0000000dc0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000f00)={&(0x7f0000000f80)=ANY=[@ANYBLOB="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"], 0xec}, 0x1, 0x0, 0x0, 0x840}, 0x24000890) (async) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r4}, './file0\x00'}) r8 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000200)={r8}, 0x4) (async) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000005c0)='kfree\x00', r9}, 0x18) syz_usbip_server_init(0x0) (async) syz_usbip_server_init(0x3) setsockopt$inet6_int(r7, 0x29, 0x9, &(0x7f0000000300), 0x4) (async) sendmsg$AUDIT_USER(0xffffffffffffffff, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="bc000000ed0300022cbd7000fcdbdf259dee5eb858d050bb60514e90385cec8e9b8035e0d051734128ff61bf41b5051becb1d80c60338ff099e1e75158c50b544594acc18a2734784a1025a4579069d35949dc3effeab801985a24e6be3a56303bfe6e51c7fee2f7cc77368befe15e7466a84b005090d4cc17bee83779b3dddfa22c57a8d252753b46de0984ec9c53cec442c1c81a7aadb2cf0f1a2d685bc28970bd109ec0fcf977664b216f76bf436f1b8df87fca752080df337b8d"], 0xbc}, 0x1, 0x0, 0x0, 0xc5}, 0x0) (async) socket$inet6_sctp(0xa, 0x1, 0x84) (async) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r10}, 0x10) (async, rerun: 32) r11 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='blkio.bfq.io_wait_time_recursive\x00', 0x275a, 0x0) (rerun: 32) write$binfmt_script(r11, &(0x7f0000000340), 0x4) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r11, 0x0) 628.024663ms ago: executing program 0 (id=55): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="050000b10600009de3a8362997b588", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="19000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r2}, 0x10) r3 = socket$inet(0xa, 0x801, 0x84) connect$inet(r3, &(0x7f0000004cc0)={0x2, 0x0, @remote={0xac, 0x14, 0xffffffffffffffff}}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000640)={{r0}, &(0x7f00000005c0), &(0x7f0000000600)}, 0x20) r5 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x8, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r6}, 0x10) acct(0x0) close(r5) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x570}, 0x94) clock_adjtime(0x0, &(0x7f0000000040)={0xd51, 0x0, 0x8, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x80, 0x0, 0x100, 0x0, 0x0, 0x8001, 0x21}) r7 = socket$nl_route(0x10, 0x3, 0x0) syz_io_uring_setup(0x4172, &(0x7f0000000780)={0x0, 0x4f5c, 0x10100}, &(0x7f00000000c0), &(0x7f0000000140)) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="07000000040000000001000001"], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', r9, 0x0, 0x7}, 0x18) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000046c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x8000000, 0x0, {0x0, 0x0, 0x0, r10, {0x0, 0xb}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x2, 0x0, 0x0, 0x0, 0x10000000, 0xfffffffd, 0x40000000, 0x1000, 0x6, 0x0, 0x0, 0x8000002, 0x0, 0x7e150a0b, 0x0, 0x80005, 0x0, 0x0, 0x4, 0x4, 0x0, 0x100000, 0x0, 0x43, 0x0, 0x974, 0x0, 0x0, 0x0, 0x0, 0x2202, 0x0, 0x200000, 0x0, 0x0, 0x0, 0x10000, 0x5d2, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf7fffffe, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x1007, 0x751, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x40000000, 0x3, 0x3, 0x6, 0x1, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0xd, 0x0, 0x7, 0x2, 0x9, 0x0, 0x3, 0x7, 0xfbfffffd, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x3, 0x0, 0x3, 0x4fd, 0x2000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0xe863, 0x9, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x10000000, 0x0, 0x0, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2d3, 0x0, 0x0, 0xb2e, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xff, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x6, 0x6, 0xc3f3, 0x1, 0x0, 0x800, 0x9, 0x800, 0x0, 0x8, 0xe, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0xfffffffe, 0xc, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffe, 0x8000, 0x0, 0xfffffffd, 0x0, 0x0, 0xd819ac9, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffff, 0x1, 0x0, 0x80000001, 0x0, 0x10, 0x20, 0x4, 0x400000b2, 0x0, 0x0, 0x6, 0x1, 0x0, 0x8, 0x0, 0x0, 0x1000, 0x100, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xfffffffd, 0x1, 0x1, 0xfffffffe, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x4, 0x0, 0x0, 0x20000041, 0xffffffff, 0x400, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x9, 0x80, 0x0, 0x0, 0x8000, 0x1ff, 0x20, 0xaaf0, 0xfffffffe]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x0, 0x0, 0x0, 0x0, 0xc0000001}, {0x3, 0x0, 0xf, 0x0, 0x1, 0xffffffff}, 0xb, 0x10, 0x2000000}}]}}]}, 0x45c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) 573.528765ms ago: executing program 3 (id=57): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x3, &(0x7f0000000440)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{r0}, &(0x7f0000000640), &(0x7f0000000680)=r1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x7fff}, 0x18) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000003c0)={'syztnl1\x00', &(0x7f0000000300)={'ip_vti0\x00', 0x0, 0x1, 0x20, 0x1000, 0xc, {{0x14, 0x4, 0x1, 0x21, 0x50, 0x68, 0x0, 0x0, 0x2f, 0x0, @broadcast, @dev={0xac, 0x14, 0x14, 0x28}, {[@timestamp={0x44, 0x20, 0x97, 0x0, 0x7, [0x4, 0xefb, 0x88d, 0x401, 0x7ff, 0x8, 0xffff6508]}, @cipso={0x86, 0x14, 0x1, [{0x5, 0x6, "ef78fe85"}, {0x6, 0x8, "75d1660123e4"}]}, @noop, @ra={0x94, 0x4}]}}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000400)={'syztnl1\x00', &(0x7f0000000580)={'sit0\x00', 0x0, 0x40, 0x8000, 0x2, 0x111, {{0x12, 0x4, 0x0, 0x7, 0x48, 0x66, 0x0, 0x9, 0x4, 0x0, @multicast2, @empty, {[@noop, @timestamp={0x44, 0x18, 0x30, 0x0, 0x2, [0x3, 0x1ff, 0x5, 0x8, 0x8]}, @ra={0x94, 0x4, 0x1}, @timestamp={0x44, 0x14, 0xf5, 0x0, 0x3, [0x4, 0x3, 0x8, 0x5]}]}}}}}) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r7, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r7, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000180)=0x14) sendmsg$nl_route(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600"/18, @ANYRES32=r8, @ANYBLOB="01000000000000001c0012000c000100626f6e64"], 0x3c}}, 0x0) r9 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@getlink={0x20, 0x12, 0x1, 0x70bd29, 0x25dfdbfb, {0x0, 0x0, 0x0, r8, 0x2000, 0x67000}}, 0x20}}, 0x8000) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r2, &(0x7f0000000700)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x9000100}, 0xc, &(0x7f0000000600)={&(0x7f0000000880)={0xec, r3, 0x200, 0x70bd2c, 0x25dfdbfb, {}, [@ETHTOOL_A_CHANNELS_HEADER={0x24, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r5}]}, @ETHTOOL_A_CHANNELS_HEADER={0x6c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wlan1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip_vti0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'team_slave_1\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}, @ETHTOOL_A_CHANNELS_HEADER={0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg2\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r8}]}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0x5}, @ETHTOOL_A_CHANNELS_COMBINED_COUNT={0x8, 0x9, 0xc}, @ETHTOOL_A_CHANNELS_OTHER_COUNT={0x8}, @ETHTOOL_A_CHANNELS_TX_COUNT={0x8, 0x7, 0x1}, @ETHTOOL_A_CHANNELS_RX_COUNT={0x8, 0x6, 0xff}]}, 0xec}, 0x1, 0x0, 0x0, 0x4000004}, 0x20000000) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r10 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r10, 0xffffffffffffffff}, 0x4) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000b80)={0x1f, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r11, @ANYBLOB="0000000000000000b70500000000000085000000a500000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_BIND_MAP(0xa, &(0x7f0000000000)={r12}, 0xc) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00'}, 0x10) syz_clone(0x4029500, 0x0, 0x0, 0x0, 0x0, 0x0) 546.047407ms ago: executing program 0 (id=58): r0 = syz_open_dev$usbfs(&(0x7f0000000000), 0x1ff, 0x402) r1 = dup(r0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) ioctl$USBDEVFS_CONTROL(r1, 0xc0185500, &(0x7f0000000040)={0x23, 0x3, 0x8005, 0x3, 0x0, 0x0, 0x0}) 526.323738ms ago: executing program 0 (id=59): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0xfd, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x5, 0x0, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000480)=@ccm_128={{0x304}, "794d63e80c0164a6", "35cf3e2c384b547c810772410a076670", "454f7b98", "fc562e29899b57cc"}, 0x28) write$binfmt_script(r1, &(0x7f0000000640)={'#! ', './file0'}, 0xb) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r1, 0x6, 0x14, &(0x7f0000000040)=0x1, 0x4) syz_read_part_table(0x1051, &(0x7f0000000000)="$eJzsz7utAjEUBNB5eou1KwIktD2QkBJTBCKnEkQLtEFEgwhkzKcDtME5gcfXGgc3TMK5xeqaTY7j8vP+/8rbdyrbrl773JPMM2uFLkONv/ecvh67MTk8f5Z1ktOQLLqU1ijZX36zHQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABM2yMAAP//2qsHZg==") r2 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x4}]}) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x20000000) close_range(r2, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @fallback=0x37, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x1487ee83a120476b, 0x9, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x18) r4 = socket$nl_generic(0x10, 0x3, 0x10) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r5, &(0x7f0000001740)={&(0x7f0000000080)=@abs={0x0, 0x0, 0x4e21}, 0x6e, 0x0, 0x0, &(0x7f0000001680)=[@rights={{0x14, 0x1, 0x1, [r4]}}], 0x18, 0x40}, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 522.752218ms ago: executing program 3 (id=60): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) r1 = socket(0x10, 0x803, 0x0) r2 = socket(0x1, 0x803, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000500)=@ipv6_newaddr={0x2c, 0x14, 0x9535393fea6295b5, 0x0, 0x20000, {0xa, 0x40, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @ipv4}]}, 0x2c}}, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000280)=@ipv6_newaddr={0x40, 0x14, 0x9535393fea6295b5, 0x0, 0x0, {0xa, 0x0, 0x0, 0x0, r3}, [@IFA_LOCAL={0x14, 0x2, @ipv4}, @IFA_ADDRESS={0x14, 0x1, @rand_addr=' \x01\x00'}]}, 0x40}, 0x1, 0x0, 0x0, 0x41}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x18, &(0x7f0000000380)=ANY=[@ANYRESDEC=r4, @ANYRES32=r0, @ANYBLOB="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"], &(0x7f0000000600)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r6, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x40, r7, 0x100, 0x70bd28, 0x25dfdbfc, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'dvmrp1\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6tnl0\x00'}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x20044085}, 0x4080) r8 = socket$unix(0x1, 0x1, 0x0) bind$unix(r8, &(0x7f0000000000)=@file={0x1, './file0\x00'}, 0x6e) r9 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000500), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r9, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x1018}, './file0\x00'}) 492.587349ms ago: executing program 1 (id=61): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) lgetxattr(0x0, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x6, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000180)={'veth1_to_bond\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000300)={r1, r4, 0x25, 0x4}, 0x14) 464.58233ms ago: executing program 3 (id=62): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000540), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00', 0x0}) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000c00)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r3}, &(0x7f0000000800), &(0x7f0000000840)=r4}, 0x20) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000a00)={0x0, 0x0, &(0x7f00000009c0)={&(0x7f0000000800)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r1, @ANYBLOB, @ANYRES32=r2], 0x30}}, 0x0) 464.05554ms ago: executing program 3 (id=63): perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x1, 0x441e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x0, 0x5, 0x2060005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000000)={0xfffffc64, 0x0}) signalfd(r0, &(0x7f0000000080), 0x8) openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0), 0x280002, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000180)='cgroup.controllers\x00', 0x275a, 0x0) fsetxattr(r1, &(0x7f0000000000)=@known='security.selinux\x00', &(0x7f0000000080)='@\x00', 0x7c8, 0x0) signalfd(r0, &(0x7f0000000100), 0x8) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{}, &(0x7f0000000140), &(0x7f0000000180)}, 0x20) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(0xffffffffffffffff, &(0x7f0000000340)={0x1d, r2, 0x0, {0x1, 0xf0, 0x4}, 0xfe}, 0x18) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCMIWAIT(r3, 0x545c, 0x0) ioctl$TIOCVHANGUP(r3, 0x5437, 0x8000000) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x3, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000010000000000049500"/24, @ANYRESOCT=r2, @ANYRESOCT=r3], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000440)={&(0x7f0000000340)=ANY=[@ANYBLOB="9feb010018000000000000002800000028000000040000000b00000000000002050000000500000002000006040000000d00000000ef00000c0000000e000000002e0000"], &(0x7f00000003c0)=""/65, 0x44, 0x41, 0x0, 0x1000}, 0x28) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={0x1}, 0x4) r4 = syz_io_uring_setup(0xbdc, &(0x7f0000000080)={0x0, 0xec21, 0x80, 0x1, 0x40000333}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) set_mempolicy(0x4005, &(0x7f0000000080)=0x7e, 0x9) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000380)=""/195, 0xc3}], 0x1, 0x0, 0x1}) io_uring_enter(r4, 0x847ba, 0x2000, 0xe, 0x0, 0x0) openat$incfs(0xffffffffffffffff, &(0x7f00000004c0)='.pending_reads\x00', 0x29a000, 0x82) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{}, &(0x7f00000004c0), &(0x7f0000000300)}, 0x20) open_tree(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x1) 429.778122ms ago: executing program 1 (id=64): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x10000, &(0x7f0000000180)={[{@nolazytime}, {@delalloc}, {@data_err_ignore}, {@debug}, {@usrjquota}, {@bsdgroups}]}, 0x1, 0x4e8, &(0x7f00000016c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_elf64(r1, 0x0, 0x11b0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 405.962923ms ago: executing program 1 (id=65): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x10000, &(0x7f0000000180)={[{@nolazytime}, {@delalloc}, {@data_err_ignore}, {@debug}, {@usrjquota}, {@bsdgroups}]}, 0x1, 0x4e8, &(0x7f00000016c0)="$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") r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_elf64(r1, 0x0, 0x11b0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) (fail_nth: 1) 152.390513ms ago: executing program 1 (id=66): syz_mount_image$ext4(&(0x7f00000004c0)='ext3\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f0000000240), 0x1, 0x4bf, &(0x7f0000000540)="$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") syz_open_procfs(0x0, &(0x7f0000000580)='net/sctp\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x42, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x1c1341, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller0\x00', 0x84aebfbd6349b7f2}) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) syz_emit_ethernet(0x4e, &(0x7f0000000000)={@local, @remote, @void, {@ipv4={0x800, @tcp={{0xb, 0x4, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x5, 0x0, @dev, @rand_addr=0x64010102, {[@timestamp_addr={0x44, 0x14, 0x9, 0x3, 0x0, [{@multicast2}, {@multicast1, 0x9}]}, @generic={0x7, 0x2}]}}, {{0x4, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x5}}}}}}, 0x0) close(r2) socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000140)) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @link_local}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000400)={&(0x7f0000000200)=ANY=[@ANYBLOB="9feb010018000000000000000c0000000c00000002000000000000000000000f0000000000003490f82bf77b2a82a671c1209e6e873b9a19135d607149c68d0daa96906e4da3c227a9acb2c3375c46c0ba56dc4f8d9d38b589d9186011473191ed5f2a8ed07eeacc55e3f2ab18e97b0ec7bf5ba59d120dc6aa8139383d1a56ae44e6f30032482a4f1160b92532ba84de32848e8944e29e7ff15ad8901a8d04"], 0x0, 0x26}, 0x20) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYBLOB="8f0cb97907081175f37538e486dd"], 0xfdef) write$cgroup_subtree(r1, &(0x7f0000000180)=ANY=[], 0xfdef) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27ffff7, 0x4012011, r0, 0x0) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000001c0), 0x3) getdents64(r0, &(0x7f0000000140)=""/56, 0x38) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000080)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=@framed={{0xb6, 0xa, 0x0, 0x0, 0x0, 0x61, 0x11, 0x48}, [@initr0]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) 92.992426ms ago: executing program 1 (id=67): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000080)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000003000000018000180140002007665746830"], 0x2c}}, 0x0) 92.515127ms ago: executing program 4 (id=68): bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r0 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f0000000300), 0x4) socket$kcm(0x10, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='wchan\x00') r1 = socket$inet_udp(0x2, 0x2, 0x0) sendmmsg$inet(r1, &(0x7f0000001480)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2000c044) bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={0x0, r2, 0x0, 0x8000000000000000}, 0x18) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) r3 = syz_io_uring_setup(0x14d9, &(0x7f0000000480)={0x0, 0x5121, 0x0, 0x3, 0x257}, &(0x7f00000001c0)=0x0, &(0x7f00000000c0)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f0000000080)=@IORING_OP_SYMLINKAT={0x26, 0x4, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r3, 0x47ba, 0x0, 0x0, 0x0, 0x0) 75.656457ms ago: executing program 1 (id=69): socket$inet_udp(0x2, 0x2, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @multicast1}, 0x10) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001080)=ANY=[], 0x48) modify_ldt$write(0x1, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_usb_ep_read(0xffffffffffffffff, 0x1, 0xff, &(0x7f0000000300)=""/255) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000cc0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0x29e, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x70) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000980)=ANY=[@ANYBLOB="d00000000002010400000000000000000a000000440001802c00018014000300fe80000000000000000000000000002014000400fe80000000000000000000000000002f0c000280e0fe01009800feff05000340000200003c0003800c00028005000100890000002c00018014000300fe80000000000000000000000000002a14000400fe8800000000000000000000000001013c0002802c00018014000300ff0200000000000000000000000000011400040000000000000000000000ffffe00000020c00028005"], 0xd0}, 0x1, 0x0, 0x0, 0x20008004}, 0x4) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$inet6_IPV6_RTHDR(r2, 0x29, 0x39, &(0x7f00000002c0)=ANY=[@ANYBLOB="0006020300000000fc02000000000000000000000000000100000000000000000000000000000001fe8000000010000000000000000000bb"], 0x38) 0s ago: executing program 4 (id=70): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000f80)=ANY=[@ANYBLOB="1b0000000000000000000000002000e969695b67a34818bb2ab51a0000000000", @ANYRES32, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0x19, 0x4, 0x8, 0x808, 0x0, 0xffffffffffffffff, 0x6}, 0x50) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b83, 0x2, @perf_config_ext={0x4, 0xc8}, 0x8000, 0x5, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x2009}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000480)={0x0, 0x0, 0x43}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x3, &(0x7f0000000800)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f00000001c0)='GPL\x00'}, 0x90) socket$vsock_stream(0x28, 0x1, 0x0) set_mempolicy(0x6005, &(0x7f0000000080)=0xfffffffffffffffd, 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00'}, 0x10) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x2) ioctl$SNDRV_TIMER_IOCTL_GINFO(r0, 0xc0f85403, &(0x7f0000000040)={{0x1, 0x0, 0x0, 0x3}, 0x2000000, 0x0, 'id0\x00', 'timer0\x00'}) kernel console output (not intermixed with test programs): Warning: Permanently added '10.128.1.193' (ED25519) to the list of known hosts. [ 33.207245][ T29] audit: type=1400 audit(1764161604.836:62): avc: denied { mounton } for pid=3304 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=2022 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 33.230281][ T29] audit: type=1400 audit(1764161604.856:63): avc: denied { mount } for pid=3304 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.231305][ T3304] cgroup: Unknown subsys name 'net' [ 33.258157][ T29] audit: type=1400 audit(1764161604.886:64): avc: denied { unmount } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 33.397236][ T3304] cgroup: Unknown subsys name 'cpuset' [ 33.403616][ T3304] cgroup: Unknown subsys name 'rlimit' [ 33.574548][ T29] audit: type=1400 audit(1764161605.196:65): avc: denied { setattr } for pid=3304 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 33.599718][ T29] audit: type=1400 audit(1764161605.196:66): avc: denied { create } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.620319][ T29] audit: type=1400 audit(1764161605.196:67): avc: denied { write } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.640910][ T29] audit: type=1400 audit(1764161605.196:68): avc: denied { read } for pid=3304 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 33.661272][ T29] audit: type=1400 audit(1764161605.196:69): avc: denied { mounton } for pid=3304 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 33.670770][ T3307] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 33.686102][ T29] audit: type=1400 audit(1764161605.196:70): avc: denied { mount } for pid=3304 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 33.718319][ T29] audit: type=1400 audit(1764161605.316:71): avc: denied { relabelto } for pid=3307 comm="mkswap" name="swap-file" dev="sda1" ino=2025 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 33.758003][ T3304] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 34.939873][ T3314] chnl_net:caif_netlink_parms(): no params data found [ 34.956549][ T3313] chnl_net:caif_netlink_parms(): no params data found [ 35.041369][ T3314] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.048543][ T3314] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.073147][ T3314] bridge_slave_0: entered allmulticast mode [ 35.079968][ T3314] bridge_slave_0: entered promiscuous mode [ 35.095394][ T3314] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.107391][ T3314] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.114586][ T3314] bridge_slave_1: entered allmulticast mode [ 35.121151][ T3314] bridge_slave_1: entered promiscuous mode [ 35.144109][ T3321] chnl_net:caif_netlink_parms(): no params data found [ 35.173993][ T3325] chnl_net:caif_netlink_parms(): no params data found [ 35.182626][ T3315] chnl_net:caif_netlink_parms(): no params data found [ 35.201811][ T3314] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.211031][ T3313] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.218265][ T3313] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.225397][ T3313] bridge_slave_0: entered allmulticast mode [ 35.232012][ T3313] bridge_slave_0: entered promiscuous mode [ 35.248048][ T3314] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.263174][ T3313] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.270430][ T3313] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.277680][ T3313] bridge_slave_1: entered allmulticast mode [ 35.284185][ T3313] bridge_slave_1: entered promiscuous mode [ 35.329154][ T3314] team0: Port device team_slave_0 added [ 35.340559][ T3313] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.357617][ T3314] team0: Port device team_slave_1 added [ 35.371554][ T3313] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.388627][ T3321] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.395706][ T3321] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.403010][ T3321] bridge_slave_0: entered allmulticast mode [ 35.409553][ T3321] bridge_slave_0: entered promiscuous mode [ 35.437719][ T3321] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.445160][ T3321] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.452545][ T3321] bridge_slave_1: entered allmulticast mode [ 35.459087][ T3321] bridge_slave_1: entered promiscuous mode [ 35.480289][ T3315] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.487601][ T3315] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.494813][ T3315] bridge_slave_0: entered allmulticast mode [ 35.501341][ T3315] bridge_slave_0: entered promiscuous mode [ 35.508096][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.515136][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.541218][ T3314] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.561833][ T3325] bridge0: port 1(bridge_slave_0) entered blocking state [ 35.569504][ T3325] bridge0: port 1(bridge_slave_0) entered disabled state [ 35.576667][ T3325] bridge_slave_0: entered allmulticast mode [ 35.583298][ T3325] bridge_slave_0: entered promiscuous mode [ 35.590367][ T3313] team0: Port device team_slave_0 added [ 35.596169][ T3325] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.603439][ T3325] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.610782][ T3325] bridge_slave_1: entered allmulticast mode [ 35.617297][ T3325] bridge_slave_1: entered promiscuous mode [ 35.623713][ T3315] bridge0: port 2(bridge_slave_1) entered blocking state [ 35.630794][ T3315] bridge0: port 2(bridge_slave_1) entered disabled state [ 35.637945][ T3315] bridge_slave_1: entered allmulticast mode [ 35.644440][ T3315] bridge_slave_1: entered promiscuous mode [ 35.650884][ T3314] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.657889][ T3314] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.683909][ T3314] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.700790][ T3313] team0: Port device team_slave_1 added [ 35.707940][ T3321] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.745947][ T3321] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.762701][ T3315] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.772304][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 35.779304][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.805236][ T3313] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 35.822782][ T3325] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 35.833597][ T3325] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.844602][ T3315] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 35.854039][ T3313] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 35.861282][ T3313] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 35.887344][ T3313] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 35.926236][ T3321] team0: Port device team_slave_0 added [ 35.944013][ T3314] hsr_slave_0: entered promiscuous mode [ 35.950251][ T3314] hsr_slave_1: entered promiscuous mode [ 35.963507][ T3315] team0: Port device team_slave_0 added [ 35.975245][ T3321] team0: Port device team_slave_1 added [ 35.986637][ T3325] team0: Port device team_slave_0 added [ 35.998299][ T3315] team0: Port device team_slave_1 added [ 36.014977][ T3325] team0: Port device team_slave_1 added [ 36.028428][ T3313] hsr_slave_0: entered promiscuous mode [ 36.034456][ T3313] hsr_slave_1: entered promiscuous mode [ 36.040599][ T3313] debugfs: 'hsr0' already exists in 'hsr' [ 36.046382][ T3313] Cannot create hsr debugfs directory [ 36.057823][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.064794][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.090735][ T3321] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.112766][ T3325] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.119799][ T3325] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.145821][ T3325] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.161859][ T3321] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.168862][ T3321] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.194838][ T3321] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.211941][ T3325] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.219151][ T3325] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.245171][ T3325] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.256478][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 36.263441][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.289465][ T3315] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 36.302910][ T3315] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 36.309920][ T3315] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 36.335889][ T3315] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 36.379555][ T3321] hsr_slave_0: entered promiscuous mode [ 36.385632][ T3321] hsr_slave_1: entered promiscuous mode [ 36.391718][ T3321] debugfs: 'hsr0' already exists in 'hsr' [ 36.397552][ T3321] Cannot create hsr debugfs directory [ 36.448619][ T3325] hsr_slave_0: entered promiscuous mode [ 36.454723][ T3325] hsr_slave_1: entered promiscuous mode [ 36.460607][ T3325] debugfs: 'hsr0' already exists in 'hsr' [ 36.466334][ T3325] Cannot create hsr debugfs directory [ 36.486954][ T3315] hsr_slave_0: entered promiscuous mode [ 36.493128][ T3315] hsr_slave_1: entered promiscuous mode [ 36.499105][ T3315] debugfs: 'hsr0' already exists in 'hsr' [ 36.504843][ T3315] Cannot create hsr debugfs directory [ 36.615440][ T3314] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 36.626769][ T3314] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 36.644442][ T3314] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 36.670767][ T3314] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 36.714607][ T3313] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 36.724622][ T3313] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 36.734486][ T3313] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 36.746117][ T3313] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 36.787660][ T3321] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 36.797035][ T3321] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 36.806062][ T3321] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 36.819382][ T3314] 8021q: adding VLAN 0 to HW filter on device bond0 [ 36.828052][ T3321] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 36.856263][ T3314] 8021q: adding VLAN 0 to HW filter on device team0 [ 36.872836][ T3325] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 36.883264][ T3325] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 36.892197][ T3325] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 36.900988][ T3325] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 36.912804][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 36.919890][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 36.928924][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 36.936034][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 36.982099][ T3315] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 36.993786][ T3315] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 37.003681][ T3315] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 37.016986][ T3315] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 37.038142][ T3313] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.051930][ T3321] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.085343][ T3321] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.100182][ T3313] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.115162][ T1645] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.122449][ T1645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.135416][ T1645] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.142608][ T1645] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.160253][ T1645] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.167343][ T1645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.176217][ T1645] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.183360][ T1645] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.233808][ T3314] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.242702][ T3325] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.252016][ T3313] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.300272][ T3325] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.312353][ T3315] 8021q: adding VLAN 0 to HW filter on device bond0 [ 37.332720][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.339992][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.350557][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.357727][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.370303][ T3315] 8021q: adding VLAN 0 to HW filter on device team0 [ 37.386076][ T3325] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 37.396517][ T3325] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.428561][ T37] bridge0: port 1(bridge_slave_0) entered blocking state [ 37.435792][ T37] bridge0: port 1(bridge_slave_0) entered forwarding state [ 37.445595][ T37] bridge0: port 2(bridge_slave_1) entered blocking state [ 37.452733][ T37] bridge0: port 2(bridge_slave_1) entered forwarding state [ 37.470362][ T3313] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.491706][ T3321] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.512068][ T3314] veth0_vlan: entered promiscuous mode [ 37.533038][ T3315] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 37.549890][ T3325] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.567767][ T3314] veth1_vlan: entered promiscuous mode [ 37.616276][ T3313] veth0_vlan: entered promiscuous mode [ 37.645863][ T3315] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 37.660414][ T3313] veth1_vlan: entered promiscuous mode [ 37.667825][ T3314] veth0_macvtap: entered promiscuous mode [ 37.684344][ T3314] veth1_macvtap: entered promiscuous mode [ 37.707981][ T3313] veth0_macvtap: entered promiscuous mode [ 37.727440][ T3313] veth1_macvtap: entered promiscuous mode [ 37.751425][ T3321] veth0_vlan: entered promiscuous mode [ 37.760941][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.775787][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.790978][ T3314] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.800365][ T3313] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 37.813038][ T3321] veth1_vlan: entered promiscuous mode [ 37.833855][ T31] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.854053][ T3321] veth0_macvtap: entered promiscuous mode [ 37.861634][ T3321] veth1_macvtap: entered promiscuous mode [ 37.868358][ T31] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.877598][ T31] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.892743][ T31] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.903110][ T3315] veth0_vlan: entered promiscuous mode [ 37.910670][ T31] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.926377][ T3315] veth1_vlan: entered promiscuous mode [ 37.934204][ T31] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.954079][ T3325] veth0_vlan: entered promiscuous mode [ 37.962566][ T31] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 37.972577][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 37.988761][ T3313] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 37.989671][ T3321] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.010851][ T31] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.028379][ T3325] veth1_vlan: entered promiscuous mode [ 38.056272][ T52] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.082801][ T3315] veth0_macvtap: entered promiscuous mode [ 38.091716][ C1] hrtimer: interrupt took 27129 ns [ 38.093747][ T52] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.105898][ T52] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.118485][ T3325] veth0_macvtap: entered promiscuous mode [ 38.132469][ T3325] veth1_macvtap: entered promiscuous mode [ 38.144108][ T52] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.155988][ T3315] veth1_macvtap: entered promiscuous mode [ 38.184400][ T3325] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.197692][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 38.212936][ T3325] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.233567][ T3490] netlink: 'syz.3.6': attribute type 3 has an invalid length. [ 38.233859][ T3315] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 38.241218][ T3490] netlink: 199836 bytes leftover after parsing attributes in process `syz.3.6'. [ 38.258887][ T37] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.280804][ T37] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.303520][ T114] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.338310][ T114] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.361881][ T114] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.371790][ T3494] netlink: 830 bytes leftover after parsing attributes in process `syz.3.7'. [ 38.378541][ T29] kauditd_printk_skb: 34 callbacks suppressed [ 38.378560][ T29] audit: type=1400 audit(1764161609.996:106): avc: denied { create } for pid=3491 comm="syz.1.2" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 38.380721][ T3494] bond_slave_0: entered promiscuous mode [ 38.411633][ T3494] bond_slave_1: entered promiscuous mode [ 38.417574][ T114] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.434964][ T29] audit: type=1400 audit(1764161610.056:107): avc: denied { allowed } for pid=3496 comm="syz.0.8" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 38.455070][ T29] audit: type=1400 audit(1764161610.056:108): avc: denied { create } for pid=3496 comm="syz.0.8" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 38.471614][ T114] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.476253][ T29] audit: type=1400 audit(1764161610.056:109): avc: denied { map } for pid=3496 comm="syz.0.8" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3833 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 38.508429][ T29] audit: type=1400 audit(1764161610.056:110): avc: denied { read write } for pid=3496 comm="syz.0.8" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=3833 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 38.550085][ T3503] loop3: detected capacity change from 0 to 512 [ 38.567284][ T3503] ext4: Unknown parameter 'nouser_xattr' [ 38.568948][ T3504] FAULT_INJECTION: forcing a failure. [ 38.568948][ T3504] name failslab, interval 1, probability 0, space 0, times 1 [ 38.585740][ T3504] CPU: 0 UID: 0 PID: 3504 Comm: syz.4.5 Not tainted syzkaller #0 PREEMPT(voluntary) [ 38.585768][ T3504] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 38.585783][ T3504] Call Trace: [ 38.585791][ T3504] [ 38.585873][ T3504] __dump_stack+0x1d/0x30 [ 38.585896][ T3504] dump_stack_lvl+0xe8/0x140 [ 38.585916][ T3504] dump_stack+0x15/0x1b [ 38.585934][ T3504] should_fail_ex+0x265/0x280 [ 38.585978][ T3504] should_failslab+0x8c/0xb0 [ 38.586070][ T3504] __kmalloc_node_track_caller_noprof+0xa5/0x580 [ 38.586105][ T3504] ? sidtab_sid2str_get+0xa0/0x130 [ 38.586145][ T3504] ? skb_put+0xa9/0xf0 [ 38.586182][ T3504] kmemdup_noprof+0x2b/0x70 [ 38.586217][ T3504] sidtab_sid2str_get+0xa0/0x130 [ 38.586277][ T3504] security_sid_to_context_core+0x1eb/0x2e0 [ 38.586314][ T3504] security_sid_to_context+0x27/0x40 [ 38.586412][ T3504] avc_audit_post_callback+0x9d/0x520 [ 38.586455][ T3504] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 38.586515][ T3504] common_lsm_audit+0x1bb/0x230 [ 38.586545][ T3504] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 38.586665][ T3504] ? avc_denied+0xe4/0x100 [ 38.586762][ T3504] slow_avc_audit+0x104/0x140 [ 38.586808][ T3504] avc_has_perm+0x13a/0x180 [ 38.586834][ T3504] selinux_socket_sendmsg+0x175/0x1b0 [ 38.586938][ T3504] security_socket_sendmsg+0x48/0x80 [ 38.586962][ T3504] __sock_sendmsg+0x30/0x180 [ 38.587027][ T3504] __sys_sendto+0x268/0x330 [ 38.587072][ T3504] __x64_sys_sendto+0x76/0x90 [ 38.587151][ T3504] x64_sys_call+0x2d14/0x3000 [ 38.587206][ T3504] do_syscall_64+0xd2/0x200 [ 38.587233][ T3504] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 38.587269][ T3504] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 38.587342][ T3504] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 38.587362][ T3504] RIP: 0033:0x7f00e58bf749 [ 38.587377][ T3504] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 38.587395][ T3504] RSP: 002b:00007f00e4327038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 38.587420][ T3504] RAX: ffffffffffffffda RBX: 00007f00e5b15fa0 RCX: 00007f00e58bf749 [ 38.587498][ T3504] RDX: 000000000000fffd RSI: 0000200000000080 RDI: 0000000000000005 [ 38.587512][ T3504] RBP: 00007f00e4327090 R08: 0000200000000140 R09: 000000000000001c [ 38.587526][ T3504] R10: 000000000400c0d4 R11: 0000000000000246 R12: 0000000000000001 [ 38.587541][ T3504] R13: 00007f00e5b16038 R14: 00007f00e5b15fa0 R15: 00007ffe536bab68 [ 38.587565][ T3504] [ 38.593739][ T29] audit: type=1400 audit(1764161610.166:111): avc: denied { append } for pid=3496 comm="syz.0.8" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 38.619701][ T114] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 38.622782][ T29] audit: type=1400 audit(1764161610.166:112): avc: denied { open } for pid=3496 comm="syz.0.8" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 38.774588][ T3511] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 38.785180][ T29] audit: type=1400 audit(1764161610.166:113): avc: denied { ioctl } for pid=3496 comm="syz.0.8" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x9374 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 38.924649][ T29] audit: type=1400 audit(1764161610.166:114): avc: denied { read } for pid=3496 comm="syz.0.8" name="mISDNtimer" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 38.947662][ T29] audit: type=1400 audit(1764161610.166:115): avc: denied { open } for pid=3496 comm="syz.0.8" path="/dev/mISDNtimer" dev="devtmpfs" ino=250 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 38.991162][ T3513] netlink: 132 bytes leftover after parsing attributes in process `syz.4.11'. [ 39.090937][ T3519] infiniband syz!: set active [ 39.095697][ T3519] infiniband syz!: added team_slave_0 [ 39.111731][ T3519] RDS/IB: syz!: added [ 39.115821][ T3519] smc: adding ib device syz! with port count 1 [ 39.125324][ T3519] smc: ib device syz! port 1 has no pnetid [ 39.206810][ T3517] syz.3.12 (3517) used greatest stack depth: 10160 bytes left [ 39.217682][ T3525] netlink: 20 bytes leftover after parsing attributes in process `syz.4.14'. [ 39.346880][ T3534] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 39.347033][ T3525] Falling back ldisc for ttyS3. [ 39.382125][ T3536] batadv0: entered promiscuous mode [ 39.401704][ T3536] batadv0: left promiscuous mode [ 39.422593][ T3538] syz.1.20 uses obsolete (PF_INET,SOCK_PACKET) [ 39.452788][ T3544] loop3: detected capacity change from 0 to 512 [ 39.511875][ T3541] bridge0: port 3(vlan2) entered blocking state [ 39.518595][ T3541] bridge0: port 3(vlan2) entered disabled state [ 39.526760][ T3541] vlan2: entered allmulticast mode [ 39.531939][ T3541] bridge0: entered allmulticast mode [ 39.538370][ T3541] vlan2: left allmulticast mode [ 39.543331][ T3541] bridge0: left allmulticast mode [ 39.549827][ T12] Bluetooth: hci0: Frame reassembly failed (-84) [ 39.557972][ T3544] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 39.585404][ T3544] ext4 filesystem being mounted at /9/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 39.671364][ T3556] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 39.700135][ T3562] netlink: 4 bytes leftover after parsing attributes in process `syz.1.26'. [ 39.850967][ T3576] sd 0:0:1:0: device reset [ 39.876012][ T3578] loop2: detected capacity change from 0 to 128 [ 39.942360][ T3578] syz.2.32: attempt to access beyond end of device [ 39.942360][ T3578] loop2: rw=2049, sector=185, nr_sectors = 16 limit=128 [ 39.957127][ T3578] syz.2.32: attempt to access beyond end of device [ 39.957127][ T3578] loop2: rw=2049, sector=209, nr_sectors = 8 limit=128 [ 39.970910][ T3578] syz.2.32: attempt to access beyond end of device [ 39.970910][ T3578] loop2: rw=2049, sector=225, nr_sectors = 8 limit=128 [ 39.984432][ T3578] syz.2.32: attempt to access beyond end of device [ 39.984432][ T3578] loop2: rw=2049, sector=241, nr_sectors = 8 limit=128 [ 39.999459][ T3578] syz.2.32: attempt to access beyond end of device [ 39.999459][ T3578] loop2: rw=2049, sector=257, nr_sectors = 8 limit=128 [ 40.013367][ T3578] syz.2.32: attempt to access beyond end of device [ 40.013367][ T3578] loop2: rw=2049, sector=273, nr_sectors = 8 limit=128 [ 40.026858][ T3578] syz.2.32: attempt to access beyond end of device [ 40.026858][ T3578] loop2: rw=2049, sector=289, nr_sectors = 8 limit=128 [ 40.040695][ T3578] syz.2.32: attempt to access beyond end of device [ 40.040695][ T3578] loop2: rw=2049, sector=305, nr_sectors = 8 limit=128 [ 40.054645][ T3578] syz.2.32: attempt to access beyond end of device [ 40.054645][ T3578] loop2: rw=2049, sector=321, nr_sectors = 8 limit=128 [ 40.068793][ T3578] syz.2.32: attempt to access beyond end of device [ 40.068793][ T3578] loop2: rw=2049, sector=337, nr_sectors = 8 limit=128 [ 40.292578][ T3313] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 40.674636][ T3609] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 40.745149][ T3613] netlink: 'syz.2.43': attribute type 41 has an invalid length. [ 40.782638][ T3615] netlink: 132 bytes leftover after parsing attributes in process `syz.1.45'. [ 40.799530][ T3617] netlink: 76 bytes leftover after parsing attributes in process `syz.3.46'. [ 40.819344][ T3617] netlink: 83 bytes leftover after parsing attributes in process `syz.3.46'. [ 40.884619][ T3623] loop3: detected capacity change from 0 to 164 [ 40.926769][ T3630] IPv6: NLM_F_CREATE should be specified when creating new route [ 41.048620][ T3643] netlink: 40 bytes leftover after parsing attributes in process `syz.3.52'. [ 41.118237][ T3652] netlink: 236 bytes leftover after parsing attributes in process `syz.3.54'. [ 41.150199][ T3648] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 41.275022][ T3677] SELinux: Context @ is not valid (left unmapped). [ 41.320325][ T3685] FAULT_INJECTION: forcing a failure. [ 41.320325][ T3685] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 41.333665][ T3685] CPU: 0 UID: 0 PID: 3685 Comm: syz.1.65 Not tainted syzkaller #0 PREEMPT(voluntary) [ 41.333717][ T3685] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 41.333750][ T3685] Call Trace: [ 41.333759][ T3685] [ 41.333769][ T3685] __dump_stack+0x1d/0x30 [ 41.333798][ T3685] dump_stack_lvl+0xe8/0x140 [ 41.333824][ T3685] dump_stack+0x15/0x1b [ 41.333865][ T3685] should_fail_ex+0x265/0x280 [ 41.333908][ T3685] should_fail_alloc_page+0xf2/0x100 [ 41.333977][ T3685] __alloc_frozen_pages_noprof+0xff/0x360 [ 41.334025][ T3685] alloc_pages_mpol+0xb3/0x260 [ 41.334053][ T3685] vma_alloc_folio_noprof+0x1aa/0x300 [ 41.334099][ T3685] handle_mm_fault+0xec2/0x2be0 [ 41.334129][ T3685] ? vma_start_read+0x141/0x1f0 [ 41.334174][ T3685] do_user_addr_fault+0x630/0x1080 [ 41.334205][ T3685] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 41.334280][ T3685] exc_page_fault+0x62/0xa0 [ 41.334321][ T3685] asm_exc_page_fault+0x26/0x30 [ 41.334400][ T3685] RIP: 0033:0x7fc62355cc5b [ 41.334419][ T3685] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 41.334441][ T3685] RSP: 002b:00007fc622014e10 EFLAGS: 00010246 [ 41.334460][ T3685] RAX: 00007fc622016f30 RBX: 00007fc6237da640 RCX: 0000000000000000 [ 41.334476][ T3685] RDX: 00007fc622016f78 RSI: 00007fc623610df8 RDI: 00007fc622014e30 [ 41.334491][ T3685] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 41.334562][ T3685] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.334577][ T3685] R13: 00007fc623806038 R14: 00007fc623805fa0 R15: 00007fff88b40328 [ 41.334601][ T3685] [ 41.334614][ T3685] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 41.596675][ T44] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 41.597036][ T3552] Bluetooth: hci0: command 0x1003 tx timeout [ 41.743784][ T3698] loop7: detected capacity change from 0 to 16384 [ 41.751054][ T3306] ================================================================== [ 41.759198][ T3306] BUG: KCSAN: data-race in __filemap_add_folio / filemap_write_and_wait_range [ 41.768199][ T3306] [ 41.770637][ T3306] read-write to 0xffff8881005f1e78 of 8 bytes by task 3698 on cpu 0: [ 41.778734][ T3306] __filemap_add_folio+0x5b9/0x7d0 [ 41.783885][ T3306] filemap_add_folio+0x1d9/0x360 [ 41.788862][ T3306] page_cache_ra_unbounded+0x203/0x450 [ 41.794650][ T3306] page_cache_ra_order+0x145/0x220 [ 41.799806][ T3306] page_cache_sync_ra+0x52d/0x6a0 [ 41.804885][ T3306] filemap_get_pages+0x2d0/0x11b0 [ 41.809962][ T3306] filemap_splice_read+0x3a9/0x740 [ 41.815113][ T3306] splice_direct_to_actor+0x26f/0x680 [ 41.820530][ T3306] do_splice_direct+0xda/0x150 [ 41.825327][ T3306] do_sendfile+0x380/0x650 [ 41.829780][ T3306] __x64_sys_sendfile64+0x105/0x150 [ 41.835012][ T3306] x64_sys_call+0x2bb4/0x3000 [ 41.839897][ T3306] do_syscall_64+0xd2/0x200 [ 41.844432][ T3306] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.850364][ T3306] [ 41.852707][ T3306] read to 0xffff8881005f1e78 of 8 bytes by task 3306 on cpu 1: [ 41.860274][ T3306] filemap_write_and_wait_range+0x59/0x340 [ 41.866124][ T3306] sync_blockdev+0x35/0x50 [ 41.870569][ T3306] bdev_disk_changed+0xdb/0xcb0 [ 41.875461][ T3306] blkdev_get_whole+0x1f5/0x2d0 [ 41.880517][ T3306] bdev_open+0x280/0x7e0 [ 41.884799][ T3306] blkdev_open+0x259/0x290 [ 41.889260][ T3306] do_dentry_open+0x649/0xa20 [ 41.893955][ T3306] vfs_open+0x37/0x1e0 [ 41.898047][ T3306] path_openat+0x1c5e/0x2170 [ 41.902663][ T3306] do_filp_open+0x109/0x230 [ 41.907191][ T3306] do_sys_openat2+0xa6/0x110 [ 41.911824][ T3306] __x64_sys_openat+0xf2/0x120 [ 41.916607][ T3306] x64_sys_call+0x2eab/0x3000 [ 41.921303][ T3306] do_syscall_64+0xd2/0x200 [ 41.925818][ T3306] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.931818][ T3306] [ 41.934150][ T3306] value changed: 0x000000000000000f -> 0x000000000000001e [ 41.941260][ T3306] [ 41.943595][ T3306] Reported by Kernel Concurrency Sanitizer on: [ 41.949752][ T3306] CPU: 1 UID: 0 PID: 3306 Comm: udevd Not tainted syzkaller #0 PREEMPT(voluntary) [ 41.959050][ T3306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 41.969121][ T3306] ================================================================== [ 41.994604][ T3609] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 42.046576][ T3699] loop7: detected capacity change from 16384 to 0 [ 42.055632][ T3609] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 42.099516][ T3609] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 42.142751][ T52] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.153979][ T52] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.165889][ T1936] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 42.177382][ T1936] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0