last executing test programs: 4m7.485807846s ago: executing program 2 (id=1757): getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000000)={{{@in6=@remote, @in6=@private2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000000280)=0xe8) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) set_mempolicy(0x4005, &(0x7f0000000040)=0x10000000005, 0x4) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) getsockopt$bt_l2cap_L2CAP_CONNINFO(r1, 0x6, 0x2, 0x0, &(0x7f0000000100)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffff7ffffe9}, 0x18) socket$nl_route(0x10, 0x3, 0x0) syz_usb_connect$cdc_ecm(0x5, 0x1d3, &(0x7f00000011c0)=ANY=[@ANYBLOB], 0x0) r2 = socket$kcm(0x10, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) getsockopt$SO_TIMESTAMP(0xffffffffffffffff, 0x1, 0x3f, &(0x7f0000000400), &(0x7f0000000440)=0x4) sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x7) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x45, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) sendmsg$kcm(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000000)="2e00000011008188e6b62aa73f72cc9f0ba1f8483d0000005e140602000000000e000a0010000000028000001294", 0x2e}], 0x1}, 0x0) setsockopt$MRT_DEL_MFC_PROXY(0xffffffffffffffff, 0x0, 0xd3, &(0x7f00000003c0)={@broadcast, @remote, 0x1, "dc479bd32888906baceb25dd9d973695718a791466075f9725c48167ca68d305", 0x9, 0x6, 0x2, 0x7f}, 0x3c) write$RDMA_USER_CM_CMD_SET_OPTION(0xffffffffffffffff, 0x0, 0x0) openat$nci(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) msync(&(0x7f0000952000/0x2000)=nil, 0x87abbe8d1cc6ad9, 0x6) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x1, @perf_bp={0x0, 0xe}, 0x0, 0x10000, 0x3, 0x1, 0x8, 0x0, 0xb, 0x0, 0xffffffff, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000044c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="4c00000002060101000000000000000000000036c6c2cd5354f455eb0600050005000a000000050001000700000005000400030000000900020073797a310000000011000300686173683a6e"], 0x4c}, 0x1, 0x0, 0x0, 0x4040000}, 0x0) sendmsg$IPSET_CMD_TEST(r5, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x4800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) syz_clone3(&(0x7f00000006c0)={0x102102180, 0x0, 0x0, 0x0, {0x40}, 0x0, 0x0, 0x0, &(0x7f0000000680)=[0x0], 0x1}, 0x58) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6b752202d209e9e1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_usb_connect$uac1(0x0, 0x71, &(0x7f0000000240)=ANY=[], 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYRES8=r4, @ANYRES32, @ANYBLOB="ff000000000000000000867e0000000000000000", @ANYRES32=r0, @ANYRES32, @ANYBLOB="0400"/28], 0x50) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0}, 0x0) 4m6.667001242s ago: executing program 2 (id=1763): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) keyctl$KEYCTL_PKEY_VERIFY(0x1c, 0x0, 0x0, 0x0, 0x0) fsopen(&(0x7f0000000180)='proc\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r2 = getpid() sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x400000000000041, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x482, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f0000000040)={0x0, 0x40000000, 0x0, 0x2, 0x83}) ioctl$TIOCSTI(0xffffffffffffffff, 0x5412, &(0x7f0000000140)=0xf8) ppoll(&(0x7f00000002c0)=[{0xffffffffffffffff, 0x208e}], 0x1, 0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) 4m5.756310505s ago: executing program 2 (id=1770): r0 = socket$inet6_sctp(0xa, 0x5, 0x84) r1 = socket$inet6_sctp(0xa, 0x1, 0x84) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0xc0802, 0x0) ioctl$PPPIOCNEWUNIT(r4, 0xc004743e, &(0x7f00000000c0)) ioctl$PPPIOCSMAXCID(r4, 0x40047451, &(0x7f0000000080)=0x4) ioctl$PPPIOCSFLAGS1(r4, 0x40047459, &(0x7f0000000100)=0x2000004) pwritev(r4, &(0x7f0000000280)=[{&(0x7f00000002c0)='\x00!', 0x2}], 0x1, 0x8, 0x49d) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x0, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x9}]}, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r1, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000280)={r5, 0x400}, 0x8) 4m5.564873371s ago: executing program 2 (id=1771): r0 = socket(0x10, 0x3, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) r3 = dup(0xffffffffffffffff) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000006, 0x13, r3, 0x0) syz_mount_image$iso9660(&(0x7f0000000940), &(0x7f0000000680)='./file0\x00', 0x14c0e, &(0x7f0000000b40)=ANY=[@ANYRES8=0x0], 0xfd, 0x6b1, &(0x7f0000001f80)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file2\x00', 0x0, 0x0) mmap(&(0x7f00009fa000/0x1000)=nil, 0x1000, 0x0, 0x10012, r4, 0x0) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x3) r5 = syz_open_dev$usbfs(&(0x7f0000003f00), 0x1ff, 0xa401) ioctl$USBDEVFS_CONTROL(r5, 0x8008551c, &(0x7f0000000180)={0x2, 0xbb170d7ba7e0ba9, 0x0, 0x1, 0x0, 0x40, 0x0}) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0xc, &(0x7f0000000180)={0xeffffb, 0x0, 0xfffffffd, 0x1}, 0x10) write(r0, &(0x7f0000000000)="1c0000001a005f0214f9f407000904001f000000ff00000000000000", 0x1c) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000ec0)={0x3, 0x80, 0x6, 0x2, 0x6, 0x2d, 0x0, 0xa0ddf59, 0x20020, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_config_ext={0x5, 0x3}, 0x400, 0x428644e6, 0x80, 0x8, 0xfffffffffffffff8, 0x2, 0x8001, 0x0, 0xffff8000, 0x0, 0x6}) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) syz_emit_ethernet(0x2a, &(0x7f0000000040)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa08004500000101000000002f9078e0000001e0000002a001880b00507f78"], 0x0) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @lirc_mode2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f00000002c0)='kfree\x00', r8, 0x0, 0x2}, 0x18) r9 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r10 = syz_pidfd_open(r9, 0x0) fsetxattr$trusted_overlay_redirect(r10, &(0x7f00000001c0), 0x0, 0x0, 0x1) sendmsg$nl_xfrm(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=@updpolicy={0x17c, 0x19, 0x1, 0x70bd27, 0x0, {{@in6=@private2, @in=@remote, 0x0, 0x3, 0x400, 0x0, 0xa, 0x0, 0x0, 0x5e}, {0x0, 0x800, 0x0, 0x7, 0x0, 0x0, 0x3, 0x7}, {0x0, 0x0, 0x3}}, [@tmpl={0xc4, 0x5, [{{@in=@remote, 0x4, 0x6c}, 0x0, @in=@dev={0xac, 0x14, 0x14, 0x8}, 0x0, 0x0, 0x0, 0x56, 0x0, 0xfffffffd, 0x1}, {{@in6=@private2, 0x0, 0x32}, 0x0, @in6=@remote, 0x3503}, {{@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d3, 0x32}, 0x2, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}]}]}, 0x17c}}, 0x0) r11 = socket$inet6_mptcp(0xa, 0x1, 0x106) getsockopt$inet6_int(r11, 0x29, 0x4e, 0x0, &(0x7f0000000000)) ioctl$ifreq_SIOCGIFINDEX_wireguard(r6, 0x8933, &(0x7f0000000e80)={'wg2\x00', 0x0}) r13 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r12, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000240)='kfree\x00', r13}, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 4m5.405975184s ago: executing program 2 (id=1774): r0 = epoll_create(0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x20, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x0, 0x1, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x18) bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000080)={r1, 0xffffffffffffffff, 0x2d, 0x0, @val=@netfilter={0x2, 0x0, 0x6, 0x1}}, 0x20) unshare(0x2040600) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000004c0)=ANY=[@ANYRESHEX=r0], &(0x7f0000000100)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, &(0x7f0000000300)=ANY=[], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100cb3a}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = gettid() syz_clone(0xb44040, 0x0, 0x0, 0x0, 0x0, 0x0) rt_sigaction(0x1b, &(0x7f0000000040)={0xfffffffffffffffc, 0x4c000000, 0x0, {[0x8000000000005a]}}, 0x0, 0x8, &(0x7f00000001c0)) tkill(r5, 0x1b) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0300000000000000009307690a", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r6 = syz_io_uring_setup(0x1458, &(0x7f00000003c0)={0x0, 0x5d44, 0x10180, 0x2000, 0x168}, &(0x7f0000000100)=0x0, &(0x7f00000000c0)=0x0) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000180)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, 0xffffffffffffffff, 0x0) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x6a, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x2040, 0x1}) io_uring_enter(r6, 0x2d3e, 0xfffffffd, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000500)='ext4_free_blocks\x00', r4, 0x0, 0x2}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x2, 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB="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"], &(0x7f0000000040)='syzkaller\x00', 0x4, 0x24, 0xffffffffffffffff, 0x0, 0x0, '\x00', 0x0, 0x38}, 0x80) socket(0x23, 0x801, 0xfffffffe) r9 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r9, 0x29, 0x2e, &(0x7f0000000200)={0xfffffffb, {{0xa, 0x4e24, 0x0, @private2, 0x20000}}, {{0xa, 0x0, 0x1000, @remote}}}, 0x108) r10 = socket(0x80000000000000a, 0x2, 0x0) setsockopt$inet6_group_source_req(r10, 0x29, 0x2e, &(0x7f0000000080)={0x0, {{0xa, 0x4, 0x0, @mcast1={0xff, 0x7}, 0x8a4}}, {{0xa, 0x4e20, 0xfe, @remote}}}, 0x108) 4m4.630611826s ago: executing program 2 (id=1784): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2c}}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000000)={0x200000, 0x200000, 0xa, 0x0, 0x8}) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002600)="89000000120081ae08060cdc030000007f1be3f74001000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c000140060404000004000031007a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad433ec50000000f00008095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) sendto$inet(r4, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) recvfrom$inet(r4, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) 4m4.630179766s ago: executing program 32 (id=1784): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000000)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2c}}, 0x10) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000000)={0x200000, 0x200000, 0xa, 0x0, 0x8}) r3 = socket$kcm(0x10, 0x2, 0x4) sendmsg$kcm(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f0000002600)="89000000120081ae08060cdc030000007f1be3f74001000000e2ffca1b1f0000000004c00e72f750375ed08a56331dbf9ed7815e381ad6e747033a0093b837dc6cc01e32efaec8c7a6ec00120c000140060404000004000031007a46e3988285dcdf12f21308f868fece01955fed0009d78f0a947ee2b49e33538afa8af92347514f0b56a20ff27fff", 0x89}], 0x1}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000440)=@req={0x3fc, 0x0, 0x2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad433ec50000000f00008095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) sendto$inet(r4, &(0x7f0000000000), 0xffffffffffffff94, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, 0x0) recvfrom$inet(r4, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'bridge0\x00'}) 2m23.499238416s ago: executing program 1 (id=2925): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x48) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x500}}, './file0\x00'}) r2 = bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = creat(&(0x7f00000000c0)='./file0\x00', 0x9c) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x10) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000001c80)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020073797a30000000000800410073697700140033006c6f"], 0xffaf}, 0x1, 0x0, 0x0, 0x854}, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r3, 0x4c09, 0x3) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r3, 0x40089413, 0x0) fsetxattr$system_posix_acl(0xffffffffffffffff, 0x0, &(0x7f0000000f80)=ANY=[@ANYRESDEC, @ANYBLOB="302b6eff52a55a9c3ff89c5391ed0178b7d6df01911c727d8c7a8d340a26ff2cb8921987aab69a1fb47fa5edf3bee3d2ca09657d8f2cc07be31fc642150b9ef2713becedbcc15cb8f783369416847ab9e77cd53f9026e0c77fe6f2fbff2b1a332c4344eb249088cd52895b0e1a309825e5cf51c5cbe8a460cbe94538496111b394f5dc09b64e9dbd25085e14659cd3203fd7c10cb02800b7360fd3d69ca5eabca7c397a554c715df475d5dd4820a47", @ANYRES16=r3, @ANYRES64=r3, @ANYRESOCT, @ANYRES16=r2, @ANYBLOB="0ffe05", @ANYRES8, @ANYBLOB="e8fa88e70da1b9c76cfaf3d80659ae68eb29563234049e665da79cebc620be16778776225013943b37faa22e2cf1c8182f9f145839b2c310bbb276b81cf5e8f79bbcdaca26dc11e2aac8f915fd6f248216e714865dc635d6f0f3b375b0dbba056bdf18a7f200de6a9e995dca5fa8beda1ef93e1a9b241640634e6a6687d44c4cb189bcdfa08b86714d70495d799a713d0b284c17e515c6f31fb7427d327feaf324", @ANYBLOB="8e992400028447ab6903d457b10100c104a0b14ac8f07d96cff44ef48944010165fbcfdd", @ANYBLOB="02000200", @ANYRES32=0xee00, @ANYRES8=r6, @ANYBLOB="7de0de6148d7d44c4d01eeff92df69b773e9c6727f8fbda7576c2a151378b664926695450adc68e745", @ANYRESDEC=r4, @ANYRESOCT, @ANYBLOB='\b', @ANYRES32=r5, @ANYBLOB="08000300", @ANYRES32=0xee00, @ANYBLOB="080004", @ANYRES16=r5], 0x94, 0x1) getegid() r8 = socket$nl_netfilter(0x10, 0x3, 0xc) r9 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r9}, &(0x7f0000000200), &(0x7f0000000240)=r10}, 0x20) sendmsg$NFT_BATCH(r8, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000003280)=ANY=[@ANYBLOB="140000001000010000000000000000030000000a20000000000a05000000000000000000010000000900010073797a30000000002c000000030a01020000000000000000010000020900010073797a30000000000900030073797a3200000000240b0000060a010400000000000000000100000008000b4000000000fc0a048028000180080001006c6f67001c0002800e00024073797a6b616c6c65720000000800054000000008d00a01800e000100696d6d656469617465000000bc0a0280640002804c0002800900020073797a32000000000900020073797a310000000008000180fffffffc0900020073797a31000000000800034000009c920900020073797a300000000008000180ffffffff14000280080003400000000808000180fffffffb0800014000000002080001400000000b500002804b000100fa62d7ba9ceeacf9aa4f832b78f35731f355d63e192a72aef5e68a05d1b806151b6bd1e2d74abafd383790ad363fdc1b7766748630b48f9beefdb33c86d5835a470b5ffd20d7e9006c0102805c00028008000180fffffffe0900020073797a30000000000900020073797a320000000008000180ffffffff0900020073797a320000000008000180fffffffd0900020073797a310000000008000180fffffffc0800034000000e5628000280080003400000000608000340000000070900020073797a320000000008000180fffffffe540002800900020073797a320000000008000180fffffffe0800034000000000080003400000000008000340000000090900020073797a310000000008000180fffffffe080003400000800108000180fffffffd8e000100818ce881ff18470752e86442e8b77ddcfc7a4c87f05cd36147be26c85cc854cc117db1906007a5a8c298f4724c8c743d46ec7f3ba478d9dfb10bbe9e4fdfc2188d62db9bb1364fed383fe0b0c3fbbab83959470cb0ffb14765c32f10b54d99531d04caaf264214997543a1c63637d9a3a20b7ce9312e545626eb375c88462c198f35cf8a11616de4fa0c000098020280eb00010099c8e680eb4d0e7f78e1fb62226ae541d997c8cb51c5ebd0bb7e2730b61310dcd7525807288a7ad8c00f6aa230a1d1b876ddb0e188384e7c79cd8af94a02451a04d8f116bde38077da45650d82bdd1767b03e3f35bc4a5769e659d8cdb6d9d9d717c78b50f6b3ac899b07a9eaf2c989654de7d6609299bad01ca1f3fa8b6229a6c69627a07f627880e902231b20368f3ae64fd12fc37afeb95f14a4dc3d0bc5f6e2afd0fc8ef6982054cffa703ee1376654019ad6d2add9052c5d2f2e0ba3318f931b2c5f2dcce5cbca6093c64d23b64e2f2061da3dd5983644280de22d592b63b5d7f6b571beb005400010041bbc64da6bacaad1bebec23352accccbca40d6ba87943f82df945bf4ccc5250a0c2b2cb13793380f424b280bfb960885af6df4afa26efa8fcd7a1243389ef3fcf1d709f775a9cd1dfb2b84fd03e5d70f800010001950b7c0ec30534e476b721ba6e82d03078fe63b683918ecbbb9c339c8cdd63689339ac43acd5973f4aac8720a98d18e13b98e11e291f3f3621ed29c717639f84bdd28810da6ae30538775f15e00133741e9de3f96f69ab363752fa962b3c71041ba1e463a91d782a968d9febb648b66e71a6827c53b3be014b785f61c4fd46fef00658f64cdd465edb61ba4c5f00849b2935c485da99a38489ecc29837433ac5446c3922d73153fd8fb2368a5ce4201760ca6778f570b7fcb38be633a02d57c5884b6bcbaf3bc28ca7686edb5d59e1b823a8f0f5ff788625995d51c16413783c6290a9714bd4dcbd2a388139f3e46f69916f335c0002800900020073797a3000000000080003400000000908000180000000000900020073797a3000000000080003400000000808000180fffffffd080003400000000408000340fffffff908000180fffffffb0800034000000003a80002801c000280080003400000020008000340fffffff508000340000000001400028008000340000000050800034000000007720001001c2cce526d2ee30fb33f426450278cb35ac06b1cef15fefc26b5c17a8c9251bed316fccb5588f2e071fc355537fcf458cf14217f16ce4c12a4b559f3e807c94c6cc4f418baebc6024b74b9dbc5ef66dbbe91812ea247db80670c101ed494f105ad9c09b4eaf8d5c133b46a311c1a00001c0302802000028008000180fffffffc0900020073797a320000000008000340000000035c00028008000180fffffffc08000180fffffffc08000180fffffffb0900020073797a300000000008000340000000060900020073797a30000000000900020073797a31000000000900020073797a310000000008000180fffffffbf6000100330e5af714359ac9da33381a13071148dbe4293800e6be0290efbb549850cda132ca27a55553fd77c3067504c4596086f4001f53d49e8111395ebccb983c6b04735a58ab2617dfc62123b09c8dc5a47154667414dc28e8369829764b2e3cc23303a882890bad6d3a70d9e15701ec8c4c15a46d38c9ed6bc8658f8a45a02083f563324a27c649bab7cbcb485c289bd8df0a040128df6891ab48095977e0463f8e3ed7ba6df976ee30768954dfeb3f08c942b2c9384aa0b78baf92ecf5e4d73788afb1bc5a8f7c4b454897cd8bcac7f19cdd949fac66756da3b9311e13362eee317df853f6bc7e4638eb145a1484d3780e09b50000c8000100d5c1e4159bf770e02e6e1ebe911d7513709588175328d2e11f2ebf3f6967c49bedcb2a5459a45272bb8084e3bb55ea7a80166d97ec16457ed7d2a834d9aafdb2a54110ddc7975eaeda4f897ec7d533c27df0ce5ff92cfedadc67fff850ee5d07822d72b27af229d17ad2f8d802ae40d98f373e348a04b4f0270c71f82319de3a0331f165204896e0e448cf7ea0f8eb32a312fda6716f72f0234742fe6708ad0adf587ea21d94b8c8f5080028dda1e21d3d9ac82d8edd12941631b72b692ecc262d6ae12393000100c56deda494a09379df59bad8f0f17376b307ce49571034af728b1c4bf694e3b91406b976944238ab36ccaf40e3d92952ba87aa27af6353a82868c9508577a1b6a349fce75b3e4952b04b9527f496b5555e6db110dec07430b01446635eff12f136dbcb54fd4dc90b02e1bc6488ed74efd9eeb1b6de6e2a234f6c323df5c28a0352d03b34ee4f64ab614078125aa3cc0048000280080003400000000c08000340000000010900020073797a310000000008000180fffffffd0800034000008000080003400000dc5b08000180fffffffc08000180fffffffb2c0202804b000100cece2d8ff50c68c1060c2e691ddc50c6d87b46b4e5f6695010163d98bac2d9d7693cff0ec1e2107f58d3c305c78e5a596df92f1dbe80793dce5424be9e7951890023db7d0b9b2700e5000100f46e4b21dd4b92221713eece21b0e3bfb3fe995725eca78713a8d11ac82a6aefeeeab4720bd136479523ccafa34771afedeafc55275842bb7adb37ff3c93b19d9d5139f8b67ee81e380faa9506e6c8e5956cf7efc9828438d340aa4bfe771769c6ddb2f8c31049c1fc37e8f28812ea0aadd0caa7e32f6bb4b2b7a4473e5fa876c87bf285a503660ea12a0cfff6863a87c64ea83c31e737e278edcad77cb964828c7049d335e25156fd4d1c2faada6a8363794fe487155fbfd7c2e1b8504d4a744357734f51fca0426ffe929280df27411f8a90a067b285e970fa1e403722ae91dd000000f400010073e22ba6603d1c92836887468b100c2dc430efeb2ef19c66bd0582fe94df7b5a20292fdfbd2009980dbf9651685f7713bfb0f42583e452670f29e2cabf848fcdcb7a2067f0b257efd7dc927e540584b08f026e14be231afa797e36410d8ad6cbced8c5d2cce2f5a8b75713e57b3161b5b4ce78f283bf59a04f90bc1c5a4371abed0124c621ecb51b6166ad39f14216c09456232b7ea8dd7058bbbeae8b1c13df7ffa1515a359309683421d783f4fb00547cb06b3f974e65f28397c2c16675436a414b6e28d61800c35bdc05f9837e14491ce0fa7c0fbf6f61dd8f7eceac62373ed913de212a188ad5fa12d0eab8a0b440900010073797a30"], 0xb98}, 0x1, 0x0, 0x0, 0x20000000}, 0x40800) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000340)) mount$bpf(0x0, &(0x7f0000000000)='.\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="85615cb8f4281611716a89c29fc5adb252a0569f400137588c85c8e3ca763bee842ee7662d4e4ada", @ANYRESHEX=0x0, @ANYBLOB=',\x00']) r11 = epoll_create(0x3ff) epoll_create1(0x80000) unshare(0x22020600) r12 = openat$rtc(0xffffffffffffff9c, &(0x7f0000010500), 0x400, 0x0) poll(&(0x7f0000010700)=[{r12, 0x8022}], 0x1, 0x1a6) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x2, 0x8, &(0x7f00000002c0)=ANY=[@ANYRES64=r7, @ANYRESOCT=r4, @ANYRESOCT=0x0, @ANYRES8=r0], &(0x7f0000000780)='GPL\x00', 0x4, 0x0, 0x0, 0x41000, 0x48, '\x00', 0x0, @fallback=0xd, r11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r13}, 0x18) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='.\x00', &(0x7f0000000100), 0x0) 2m23.06706602s ago: executing program 1 (id=2931): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x0, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) linkat(0xffffffffffffff9c, 0x0, 0xffffffffffffffff, 0x0, 0xc00) 2m23.006420965s ago: executing program 1 (id=2932): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x1) link(&(0x7f00000009c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000bc0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') 2m22.95307639s ago: executing program 1 (id=2934): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3014850, &(0x7f0000000140)={[{@acl}, {@barrier_val={'barrier', 0x3d, 0x1003}}, {@errors_remount}, {@noauto_da_alloc}, {@dioread_lock}]}, 0x1, 0x4e4, &(0x7f0000002d40)="$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") name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0) mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2000000, 0x300) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000010000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=ANY=[], &(0x7f0000000200), 0x0) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) close(r3) syz_clone(0x80001000, 0x0, 0x0, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNGETDEVNETNS(r3, 0xff08, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r4, 0x0, 0x20040040) 2m22.494525747s ago: executing program 1 (id=2940): r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xf) futex(0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x800000000000002, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x0, 0x0) r2 = socket(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r2, 0x0, 0x40000) setsockopt$inet6_group_source_req(r2, 0x29, 0x2f, 0x0, 0x0) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) socket$nl_route(0x10, 0x3, 0x0) syz_emit_ethernet(0x46, &(0x7f0000000300)=ANY=[@ANYBLOB="0180729e0937c9a78b457be93af2fef95f8fc2000000bbbbbbbbbbbb86dd60b3388300103a"], 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) socket$netlink(0x10, 0x3, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={0x0}, 0x18) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mkdir(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000000)={0x2, {0xc, 0xa00, 0x6, 0x101, 0x100}}) 2m22.192718931s ago: executing program 1 (id=2948): io_uring_setup(0xf07, &(0x7f0000000580)={0x0, 0x400826e, 0x1, 0x3, 0xf0}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01fffcffffff000000007e0000000c0100000000000000000000b58a241335788607984e60a2a90fa1bbf2ba7300000000000000b4b50cd7a5bfd0780cceafcae5002933714476c811b9d4ac3e072492fc4dd0c97852591593fecf22a06f"], 0x20}}, 0x4000054) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000000506010200000000000000000a000001"], 0x20}, 0x1, 0x0, 0x0, 0x20004000}, 0x800) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r2 = socket$igmp6(0xa, 0x3, 0x2) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000300)={0x0, 'syzkaller1\x00'}) write$tun(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="06000000bbbbbbbbbbbbaaaaaaaaaabb88f5"], 0x72) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x140, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000001040)={{0x1, 0x1, 0x1018}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00'}) 2m22.179301072s ago: executing program 33 (id=2948): io_uring_setup(0xf07, &(0x7f0000000580)={0x0, 0x400826e, 0x1, 0x3, 0xf0}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="01fffcffffff000000007e0000000c0100000000000000000000b58a241335788607984e60a2a90fa1bbf2ba7300000000000000b4b50cd7a5bfd0780cceafcae5002933714476c811b9d4ac3e072492fc4dd0c97852591593fecf22a06f"], 0x20}}, 0x4000054) sendmsg$IPSET_CMD_RENAME(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="200000000506010200000000000000000a000001"], 0x20}, 0x1, 0x0, 0x0, 0x20004000}, 0x800) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x48241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r2 = socket$igmp6(0xa, 0x3, 0x2) r3 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r3, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) ioctl$sock_SIOCSIFVLAN_ADD_VLAN_CMD(r2, 0x8983, &(0x7f0000000300)={0x0, 'syzkaller1\x00'}) write$tun(r1, &(0x7f0000000100)=ANY=[@ANYBLOB="06000000bbbbbbbbbbbbaaaaaaaaaabb88f5"], 0x72) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x2000007d, &(0x7f00000006c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0xf}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000080), 0x140, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r4, 0xc018937e, &(0x7f0000001040)={{0x1, 0x1, 0x1018}, './file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00'}) 3.441562543s ago: executing program 5 (id=4912): bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[], 0x50) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) connect$unix(r0, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00"/13], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000000c0)={'dummy0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x40, 0x24, 0xd0f, 0x50bd2f, 0xfffffffc, {0x60, 0x0, 0x0, r4, {0x0, 0x8}, {0xffff, 0xffff}, {0x0, 0xc}}, [@qdisc_kind_options=@q_etf={{0x8}, {0xfffffffffffffea5, 0x2, @TCA_ETF_PARMS={0x10, 0x1, {0xb, 0xb}}}}]}, 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x3004408c) 3.403155446s ago: executing program 5 (id=4914): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000019200)={0x18, 0x4, &(0x7f00000192c0)=ANY=[@ANYBLOB], &(0x7f0000000000)='syzkaller\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000280)='kfree\x00', r0, 0x0, 0x1000000000000}, 0x18) r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet_sctp(r1, &(0x7f0000000880)=[{&(0x7f0000000440)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000040)=[{&(0x7f0000000100)="03", 0x1}], 0x1}], 0x1, 0x0) sendmmsg$inet_sctp(r1, &(0x7f00000032c0)=[{&(0x7f00000000c0)=@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000240)=[{0x0}], 0x1, &(0x7f0000000000)=ANY=[@ANYBLOB="30000000000000008400000001000000000000000c000400"/44], 0x30}], 0x1, 0x0) 3.385791917s ago: executing program 5 (id=4915): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) socket(0x10, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r1}, 0x18) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCMIWAIT(r2, 0x545c, 0x200000000000000) ioctl$TIOCVHANGUP(r2, 0x5437, 0x300) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002180)='blkio.bfq.io_merged\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = inotify_init() creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) inotify_add_watch(r7, &(0x7f0000000240)='./file0\x00', 0x4000cdd) close_range(r6, 0xffffffffffffffff, 0x0) 2.517665377s ago: executing program 5 (id=4927): sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = getpid() prlimit64(0x0, 0xe, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b7030000000000008500000072000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000010400000000000e470000000000", @ANYRES32=0x0, @ANYBLOB="421c0000000000001c001280090001007866726d000000000c0002800800020003000000140003007866726d3000"/56], 0x50}}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x200000000000000}, 0x7) r6 = syz_pidfd_open(r0, 0x0) r7 = pidfd_getfd(r6, r6, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f00000000c0), 0x10) setns(r7, 0x66020000) syz_clone(0x50820080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0}, 0x94) 2.282228696s ago: executing program 0 (id=4934): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x200000f3, &(0x7f0000000700)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x40, &(0x7f00000008c0)={[], [{@uid_gt}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x39, 0x38, 0x65, 0x32, 0x38, 0x39, 0x32], 0x2d, [0x31, 0x36, 0x66, 0x61], 0x2d, [0x7, 0x35, 0x0, 0x64], 0x2d, [0x35, 0x63, 0x39, 0x62], 0x2d, [0x37, 0x30, 0x62, 0x39, 0x56, 0x63, 0x39, 0x37]}}}]}, 0x1, 0x512, &(0x7f0000000380)="$eJzs3d9rY1kdAPDvvW1mOzNdk1WRdcF1cVc6i07Sbt3dIqLriz4tqOv7WNu0lCZNadJ1Whbt4H8ggoJPPvki+AcIwzz4B8jAgL6ID6KiiM7og6DOlSQ3TidN2rrTNp3m84HTnHPvzf2ec0NO7o/TewMYWy9FxFsRMRERr0ZEMZ+e5in2uqm93IP77y21UxJZ9s5fk0jyab11tcuTEXE1f9tURHztyxHfTA7Gbe7sri/WatWtvFxp1TcrzZ3d62v1xdXqanVjfn7ujYU3F15fmM1yT9TOUi/zky99/vanv/W7G3++9u12tT73kShEXztOUrfphc626Glvo63TCDYCE3l7CqOuCAAAx9Lex/9gRHyis/9fjInO3lyfiVHUDAAAADgp2Rem499JRAYAAABcWGlETEeSlvOxANORppfycwMfjitprdFsfWqlsb2x3J4XUYpCurJWq87mY4VLUUja5bl8jG2v/FpfeT4inouI7xcvd8rlpUZtecTnPgAAAGBcXO07/v9HMe3kjzbg/wQAAACA86s0tAAAAABcFA75AQAA4OLrP/6/PaJ6AAAAAKfiK2+/3U5Z7/nXy+/ubK833r2+XG2ul+vbS+WlxtZmebXRWO3cs69+1PpqjcbmZ2Jj+2alVW22Ks2d3Rv1xvZG68baY4/ABgAAAM7Qcx+/8+skIvY+e7mTIr8PIMBj/jDqCgAnaWLUFQBGxl28YXwVRl0BYOSSI+YbvAMAAE+/mY8evP7fe/6/cwNwsRnrAwDjx/V/GF8FIwBhrKUR8YFu9plhywy9/v/L40bJsoi7xf1TnF8EAICzNd1JSVrOjwOmI03L5YhnI9JSFJKVtVp1Nj8++FWx8Ey7PNd5Z3LkmGEAAAAAAAAAAAAAAAAAAAAAAAAAoCvLksgAAACACy0i/VPSuZt/xEzxlen+8wOXkn8W44954Ufv/ODmYqu1Ndee/rfOs7wuRUTrh/n014Y+PgwAAAA4acne0Fnd4/T8de5MawUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAGHhw/72lXjrLuH/5YkSUBsWfjKnO61QUIuLK35OY3Pe+JCImTiD+3q2IeH5Q/CQeZllWymvRHz+NiMunHL/U2TTD4189gfgwzu60+5+3Bn3/0nip8zr4+zeZpyc1vP9L88jPd/q5Qf3fswfWVh8Y44V7P6sMjX8r4oXJwf1Pr/9NhsR/+cDa/pVl2cEY3/j67u6w+NmPI2YG/v4kj8WqtOqblebO7vW1+uJqdbW6MT8/98bCmwuvL8xWVtZq1fzvwBjf+9jPHx7W/isD4v/2N93+97D2vzJspX3+c+/m/Q91s4VB8a+9PPD3dyqGxE/z375P5vn2/Jlefq+b3+/Fn9598bD2Lw/Z/kd9/teO2f5Xv/rd3x9zUQDgDDR3dtcXa7Xq1iGZqWMs8zRmfjF1Lqrxf2ay73Q/ufNSn/ebae+tPprSa9U5qNi+THZmsSbinDT5f5mRdksAAMApeLTTP+qaAAAAAAAAAAAAAAAAAAAAwPg6i9uJ9cfcG01TAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAO9d8AAAD//ysA4A0=") r1 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100cb3a}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0x2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r3 = memfd_secret(0x80000) ftruncate(r3, 0x3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x71f6, 0x0}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x18) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x68, 0x10, 0x1, 0x70bd29, 0x0, {0x0, 0x0, 0x0, 0x0, {0xfff3}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28}]}, 0x54}, 0x1, 0x0, 0x0, 0x40080}, 0x4000c00) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r7, 0x29, 0x35, &(0x7f0000000000)=0x8000, 0x4) bind$inet6(r7, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r7, 0x29, 0xb, &(0x7f0000000040)=0x8, 0x4) r8 = socket(0x1e, 0x805, 0x0) connect$tipc(r8, &(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{}, 0x2}}, 0x10) close(r8) recvmmsg(r7, &(0x7f0000000140), 0x0, 0x20, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) setsockopt$MRT_DEL_MFC(0xffffffffffffffff, 0x0, 0xcd, &(0x7f00000000c0)={@remote, @local, 0xffffffffffffffff, "a49aa73da9d161ec0c873de5212fab24edbf727a1909e325ec9f3a87941a68ab", 0x50f, 0x143eaf52, 0x1100e, 0x4}, 0x3c) 2.188600923s ago: executing program 3 (id=4936): socket$packet(0x11, 0xa, 0x300) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r2, &(0x7f0000000280)='2', 0x1, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0xffff, @loopback, 0x3}, 0x1c) 2.067953903s ago: executing program 3 (id=4938): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) socket(0x10, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r1}, 0x18) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCMIWAIT(r2, 0x545c, 0x200000000000000) ioctl$TIOCVHANGUP(r2, 0x5437, 0x300) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002180)='blkio.bfq.io_merged\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = inotify_init() creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) inotify_add_watch(r7, &(0x7f0000000240)='./file0\x00', 0x4000cdd) close_range(r6, 0xffffffffffffffff, 0x0) 1.691429294s ago: executing program 0 (id=4941): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x1, {{0x41}, 0x3}}, 0x10) listen(r2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r3 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x41}}}, 0x10, 0x0}, 0x0) accept4(r2, 0x0, 0x0, 0x80800) 1.409729266s ago: executing program 0 (id=4942): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3000000"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000280)="fe112162c63e6da8bc8432294ef18af53cc330a62a2c7035246635093ba4d30fcf19a90804f04a10939db8f4e13069cda6d167bf1b68c94d8d694d6ad1a4d51a715975560ad48770706eb1b88d021e1119f2eb75275cfe77f862368649be0f7aff5e7826729816e3d3e7986d9434f891c71ca6e4210c6757083cfd8e732048c504f28b6d309fc129ed8eb5a82e224eb648f90134d1d315977c6ea360a7fece4baa3dd7dcc970759f29df0e86469e954e2b050e87b203ca27a2a519b7555c3b73f2681d49442d9647ff5ea64110cc5020fdeafe53a7d8be70f3260816bc376bcdc5352771fa55d9733e27730ec7103520e8359c78edd21ee6c68feb3685a55722", 0x100}], 0x1}, 0x0) lgetxattr(0x0, &(0x7f0000000280)=ANY=[], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) io_uring_register$IORING_REGISTER_BUFFERS2(0xffffffffffffffff, 0xf, &(0x7f0000001780)={0x0, 0x1, 0x0, 0x0, 0x0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r2, 0x0, 0x200000000000006}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000200), 0x3, 0x42f, &(0x7f0000000940)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f0000000300), &(0x7f0000000000)=ANY=[], 0xfe37, 0x0) unlink(&(0x7f0000000180)='./file1\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000480)='gtp\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3, 0x0, 0x3}, 0x18) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pwrite64(r5, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) lseek(r5, 0x5, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) 1.215866552s ago: executing program 3 (id=4946): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000100)=ANY=[@ANYBLOB="38000000030101010000000000000000020000001400198008000100080400000800020014080000100001"], 0x38}}, 0x0) 1.161011986s ago: executing program 3 (id=4948): socket$packet(0x11, 0xa, 0x300) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r2, &(0x7f0000000280)='2', 0x1, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0xffff, @loopback, 0x3}, 0x1c) 1.128552859s ago: executing program 0 (id=4949): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0xffffffffffffff58, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20}, 0x10) shutdown(r0, 0x1) close(r0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000002, 0x200000005c832, 0xffffffffffffffff, 0x0) r1 = io_uring_setup(0x3eae, &(0x7f0000000080)={0x0, 0x6d33, 0x1000, 0x0, 0x4000000}) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) (fail_nth: 1) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240), 0x80802, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x0, 0x2, 0xfffffe81, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000400000008"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='rxrpc_congest\x00', r4, 0x0, 0x400000000f7}, 0x18) socket$packet(0x11, 0x2, 0x300) write$cgroup_int(r2, 0x0, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x1a, r9, 0x1, 0xf, 0x6, @multicast}, 0x14) setresgid(0xee00, 0xee01, 0x0) setuid(0xee00) r10 = msgget$private(0x0, 0xfffffffffffffffd) msgrcv(r10, 0x0, 0x0, 0x1, 0x3000) msgrcv(r10, 0x0, 0x0, 0x1, 0x0) sendto$packet(r8, &(0x7f0000000180)="0b0312002e0064000200475400f6a13bb1000000086086dd4803", 0x100a6, 0x88a8ffff, &(0x7f0000000140)={0x11, 0x8100, r9}, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) 1.089868992s ago: executing program 3 (id=4951): r0 = signalfd(0xffffffffffffffff, &(0x7f0000000140)={[0x157]}, 0x8) r1 = syz_io_uring_setup(0x6934, &(0x7f0000000300)={0x0, 0x125a, 0x10100, 0xffffffff, 0x100000, 0x0, r0}, &(0x7f0000000040)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x20, 0x3, r0, 0x0, 0x0, 0x0, 0x0, 0x0, {0xfffe}}) io_uring_enter(r1, 0x44fd, 0x3, 0x1, 0x0, 0x0) r4 = syz_io_uring_setup(0x88f, &(0x7f00000000c0)={0x0, 0xaee2, 0x80, 0x4, 0x8b6}, &(0x7f0000000000)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r4, 0x0, &(0x7f0000000040)='./file0\x00', 0x64, 0x183000, 0x23456}) perf_event_open(0x0, 0x0, 0xfffffffffff80000, r0, 0x1) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x42002) io_uring_enter(r4, 0x47f9, 0x1, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r7 = signalfd4(0xffffffffffffffff, &(0x7f0000000040), 0x8, 0x0) epoll_create1(0x0) signalfd4(r7, &(0x7f0000000180), 0x8, 0x0) 1.070459103s ago: executing program 4 (id=4953): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) mknodat$null(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0xb0a54e68b1cd2fdb, 0x103) r2 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r2, &(0x7f0000000000)=@name={0x1e, 0x2, 0x1, {{0x41}, 0x3}}, 0x10) listen(r2, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x3) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) r3 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r3, &(0x7f00000003c0)={&(0x7f0000000080)=@name={0x1e, 0x2, 0x0, {{0x41}}}, 0x10, 0x0}, 0x0) accept4(r2, 0x0, 0x0, 0x80800) 1.027869847s ago: executing program 4 (id=4955): socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x100000000007, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x7, 0x8, 0x4020005, 0xb, 0x0, 0x0, 0x0, 0x20800006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = socket$inet_sctp(0x2, 0x5, 0x84) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000240)=0x8) sendmsg$inet_sctp(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=[@sndinfo={0x20, 0x84, 0x2, {0xa, 0x4, 0x28, 0x200000b, r3}}], 0x20, 0x2400e044}, 0x0) 978.777871ms ago: executing program 5 (id=4956): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) socket(0x10, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r1}, 0x18) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCMIWAIT(r2, 0x545c, 0x200000000000000) ioctl$TIOCVHANGUP(r2, 0x5437, 0x300) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002180)='blkio.bfq.io_merged\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = inotify_init() creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) inotify_add_watch(r7, &(0x7f0000000240)='./file0\x00', 0x4000cdd) close_range(r6, 0xffffffffffffffff, 0x0) 780.874237ms ago: executing program 3 (id=4957): r0 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, &(0x7f0000000140), 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4e20, @rand_addr=0xa15}, 0x10) shutdown(r0, 0x1) close(r0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2000002, 0x200000005c832, 0xffffffffffffffff, 0x0) r1 = io_uring_setup(0x3eae, &(0x7f0000000080)={0x0, 0x6d33, 0x1000, 0x0, 0x4000000}) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) r2 = openat$selinux_checkreqprot(0xffffffffffffff9c, &(0x7f0000000240), 0x80802, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x0, 0x2, 0xfffffe81, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="070000000400000008"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='rxrpc_congest\x00', r4, 0x0, 0x400000000f7}, 0x18) socket$packet(0x11, 0x2, 0x300) write$cgroup_int(r2, 0x0, 0x2) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000004c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000001740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001800)={0x11, 0xc, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) r8 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r8, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) bind$packet(0xffffffffffffffff, &(0x7f00000001c0)={0x11, 0x1a, r9, 0x1, 0xf, 0x6, @multicast}, 0x14) setresgid(0xee00, 0xee01, 0x0) setuid(0xee00) r10 = msgget$private(0x0, 0xfffffffffffffffd) msgrcv(r10, 0x0, 0x0, 0x1, 0x3000) msgrcv(r10, 0x0, 0x0, 0x1, 0x0) sendto$packet(r8, &(0x7f0000000180)="0b0312002e0064000200475400f6a13bb1000000086086dd4803", 0x100a6, 0x88a8ffff, &(0x7f0000000140)={0x11, 0x8100, r9}, 0x14) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) 723.944071ms ago: executing program 4 (id=4960): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3000000"], 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) sendmsg$kcm(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000280)="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", 0x100}], 0x1}, 0x0) lgetxattr(0x0, &(0x7f0000000280)=ANY=[], 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r0}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) io_uring_register$IORING_REGISTER_BUFFERS2(0xffffffffffffffff, 0xf, &(0x7f0000001780)={0x0, 0x1, 0x0, 0x0, 0x0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r2, 0x0, 0x200000000000006}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000200), 0x3, 0x42f, &(0x7f0000000940)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f0000000300), &(0x7f0000000000)=ANY=[], 0xfe37, 0x0) unlink(&(0x7f0000000180)='./file1\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000480)='gtp\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020732600000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3, 0x0, 0x3}, 0x18) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, 0x0) socketpair(0x1, 0x5, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x89a2, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18020000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) sendmsg$nl_route(0xffffffffffffffff, 0x0, 0x0) pwrite64(r5, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) lseek(r5, 0x5, 0x4) socket$inet6_tcp(0xa, 0x1, 0x0) 707.672783ms ago: executing program 6 (id=4961): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x3014850, &(0x7f0000000140)={[{@acl}, {@barrier_val={'barrier', 0x3d, 0x1003}}, {@errors_remount}, {@noauto_da_alloc}, {@dioread_lock}]}, 0x1, 0x4e4, &(0x7f0000002d40)="$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") name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x0, 0x0) mount$bind(0x0, &(0x7f0000000100)='.\x00', 0x0, 0x21, 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000000000)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) futex(0x0, 0xd, 0x0, 0x0, 0x0, 0x2) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2000000, 0x300) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) symlink(&(0x7f0000001780)='./file0/../file0\x00', &(0x7f00000017c0)='./file0\x00') r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000010000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) futex(&(0x7f000000cffc), 0xc, 0x1, 0x0, &(0x7f0000048000)=0x1, 0x0) 543.556296ms ago: executing program 4 (id=4962): socket$packet(0x11, 0xa, 0x300) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_sysctl, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r2, &(0x7f0000000280)='2', 0x1, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0xffff, @loopback, 0x3}, 0x1c) 529.770217ms ago: executing program 6 (id=4963): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x200000f3, &(0x7f0000000700)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x40, &(0x7f00000008c0)={[], [{@uid_gt}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x39, 0x38, 0x65, 0x32, 0x38, 0x39, 0x32], 0x2d, [0x31, 0x36, 0x66, 0x61], 0x2d, [0x7, 0x35, 0x0, 0x64], 0x2d, [0x35, 0x63, 0x39, 0x62], 0x2d, [0x37, 0x30, 0x62, 0x39, 0x56, 0x63, 0x39, 0x37]}}}]}, 0x1, 0x512, &(0x7f0000000380)="$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") r1 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100cb3a}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0x2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r3 = memfd_secret(0x80000) ftruncate(r3, 0x3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x71f6, 0x0}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x18) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x68, 0x10, 0x1, 0x70bd29, 0x0, {0x0, 0x0, 0x0, 0x0, {0xfff3}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28}]}, 0x54}, 0x1, 0x0, 0x0, 0x40080}, 0x4000c00) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r7, 0x29, 0x35, &(0x7f0000000000)=0x8000, 0x4) recvmmsg(r7, &(0x7f0000000140), 0x0, 0x20, 0x0) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 483.744281ms ago: executing program 4 (id=4964): r0 = socket(0x10, 0x803, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000100)={'team_slave_1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000002080)=@newtfilter={0x3820, 0x2c, 0xd2b, 0x70bd2b, 0x25dfdbf3, {0x0, 0x0, 0x0, r2, {0xf}, {}, {0x7, 0xfff3}}, [@filter_kind_options=@f_route={{0xa}, {0x37f0, 0x2, [@TCA_ROUTE4_POLICE={0xc2c, 0x5, [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0xd}, @TCA_POLICE_RATE={0x404, 0x2, [0x8, 0x4, 0x1000, 0x5, 0x200, 0xfffffffd, 0x0, 0x1, 0x9, 0x80000001, 0xc0e6, 0x32f, 0x81, 0xfffff77f, 0xa, 0xfffffffc, 0x10, 0xffff, 0x3, 0x3, 0x3, 0x6, 0x8, 0x8, 0x5, 0x0, 0x3, 0x6, 0x40, 0x8, 0x2, 0x8de1, 0x3, 0x80000001, 0x0, 0xff, 0x400, 0x2, 0x2, 0x7, 0x0, 0x8, 0x1, 0x40, 0x101, 0x5, 0x5, 0x5, 0x8, 0x40, 0x0, 0x2, 0xe, 0x1ff, 0x4, 0x5, 0x1, 0x10000, 0x26f, 0x4, 0x0, 0x7f, 0x6, 0x800, 0x1, 0x800000, 0x8, 0x6, 0x0, 0x0, 0x5, 0x1, 0x10000, 0x5, 0x101, 0x3, 0xd0e, 0x0, 0x40, 0x5, 0x377, 0x1ff, 0xffff, 0x8, 0x20000000, 0x5, 0x8, 0x3f, 0x4, 0xffff0c61, 0x4, 0xe6be, 0x6, 0x2, 0x8, 0x6, 0x7, 0x3, 0x8, 0x0, 0x6, 0xffffff81, 0xa, 0x2, 0x4, 0x5, 0x8, 0x10000, 0x2, 0x7, 0xffffff7f, 0x9, 0x0, 0x2a, 0x1, 0xc, 0x40, 0x9, 0xbc, 0xe, 0xf, 0x2c, 0x6c6d, 0x4, 0x2, 0x5, 0x2, 0x6, 0xf, 0x3, 0x53a, 0xff, 0xfffffffe, 0x9, 0x80, 0xdc8f, 0x8, 0xbb8, 0x4, 0x2e5f, 0x8, 0x227b, 0x6afafecb, 0x6, 0x0, 0x6, 0x6, 0xffff, 0x4, 0x0, 0xfffffffe, 0x1, 0x3, 0x20000, 0x9, 0x2, 0x3, 0xfffffbff, 0x7, 0x95, 0x18a07254, 0x3a07, 0x8001, 0x3, 0x8, 0x6, 0x8, 0x4, 0xf, 0x3, 0x17, 0x8, 0x2, 0x10000, 0x7fff, 0x88b, 0xfffffff9, 0x19, 0x7, 0x6, 0x5, 0x1, 0x559b, 0x1, 0xfffffff9, 0x2, 0x8, 0x1, 0xcca, 0xa91, 0x8001, 0x0, 0xb9b1, 0x3, 0x0, 0x4de4, 0x1, 0x800, 0x833, 0xa1, 0x3, 0x48, 0xeb9b, 0x6, 0x7, 0x1, 0xff, 0x0, 0x2, 0x3, 0x5, 0x81, 0x3, 0x7ff, 0x20, 0xffff, 0x4, 0x3, 0x3a, 0x7, 0x8, 0xab11, 0x7, 0x2, 0x7, 0x0, 0x0, 0x7, 0x0, 0x9, 0x5, 0xf, 0x8, 0x6, 0xfffffff7, 0x80000000, 0x1, 0x0, 0x4, 0x10000, 0x7, 0xffffff80, 0xcaa6, 0x101, 0x7, 0xb, 0x1, 0x4, 0x4, 0x6, 0x703, 0x7fffffff, 0x83c, 0x0, 0xfff, 0x80000000]}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x8}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x80}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x401, 0x5, 0x5, 0x1, 0x2, 0x6, 0x4fd, 0x80000000, 0x1e, 0x2, 0x7, 0x9, 0xe, 0x31, 0x8, 0x1, 0x7, 0xd7b2, 0xa1, 0x0, 0x9, 0xd3, 0x40f, 0x7, 0x78da, 0x4, 0x9, 0x8c6, 0xffffff7f, 0x1, 0x61, 0x1ff, 0x6, 0x36, 0xcd, 0x200, 0x1, 0x3dd, 0x4, 0x9, 0x200, 0x5a15, 0x80000001, 0xc4d1, 0x3, 0x4, 0x5, 0x3, 0x3, 0xffffffbe, 0x3, 0x4, 0x1c, 0x79a4, 0x316b, 0x8, 0xc2, 0x2, 0x3, 0x9, 0x80000001, 0x0, 0xffffffff, 0x4, 0x6, 0xfffffff3, 0xcbfe161, 0xffffffff, 0x7, 0x5, 0xfffffffe, 0x401, 0x7, 0x3, 0x51, 0x4, 0x8c9b, 0xe, 0x80000000, 0x7, 0x1, 0x3, 0x4, 0x5, 0x7, 0x0, 0xb5a, 0x7, 0xfffffff7, 0x80000000, 0x2, 0x0, 0xeb0d, 0x6, 0x3, 0x5, 0xa, 0x2, 0x8000, 0x6, 0x1, 0x100, 0x1, 0x80, 0xe, 0x58, 0x5, 0x4, 0x3, 0x3ff, 0x80000001, 0xcb, 0x5, 0x7, 0x305, 0x7, 0x9, 0x800, 0x1, 0x0, 0x5, 0x100, 0x1ff, 0x56, 0x227, 0x80000001, 0x4, 0xa, 0x0, 0x1, 0x1ff, 0x5000, 0x1, 0x5, 0xffff4a73, 0x3, 0x7, 0x7fff, 0x4e5c, 0x9, 0x7, 0x7, 0xfffffe00, 0x7, 0x2, 0x401, 0x9, 0x81, 0x8, 0x80, 0xcc2b, 0x39, 0x2, 0xfffffffd, 0x4, 0xb, 0x6, 0x6, 0xffff, 0x8, 0x5, 0x0, 0x7ff, 0xf7, 0x200, 0xfffffff7, 0xd86, 0x7, 0x3, 0x10000, 0x812, 0x4, 0xff, 0xa, 0x2, 0x80000000, 0x9, 0x1, 0x2, 0x6, 0x4, 0x9, 0xfff, 0xfffffffc, 0x5, 0x49cc, 0x7, 0x8, 0x2, 0x468, 0x6, 0x4, 0x3a, 0x8, 0x1, 0x9, 0x8000, 0x3ff, 0xfffffffc, 0x4, 0x2, 0x3, 0x0, 0x3, 0x1be, 0x10, 0x2, 0x0, 0xa18, 0x7f07, 0xfffffe00, 0x7, 0x3, 0x4, 0x1, 0x0, 0x8, 0x480000, 0xb, 0x6, 0x0, 0x6, 0x29e0cb7a, 0x0, 0x1, 0xdeef, 0x7ff, 0x6, 0x7fff, 0x7f, 0xff, 0x1, 0x95, 0x400, 0x0, 0xdf, 0xc6c, 0xb81, 0x9, 0x8, 0x80000000, 0x8, 0x2, 0x5, 0x10, 0x0, 0xc, 0x4, 0x5, 0x6, 0x8000, 0x6, 0x4, 0x401, 0xe71, 0x47]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x3, 0xffffff00, 0x2, 0xf, 0x2, 0x7, 0x8, 0x0, 0xfffffffe, 0xfffffff7, 0x9, 0x1, 0x5, 0x8, 0x5, 0x7, 0x6, 0x8, 0x1, 0x2, 0x2, 0x3, 0x81, 0x5, 0x7, 0x1, 0x7, 0x1, 0xe, 0x5, 0xac, 0x2, 0x1, 0x10001, 0x80000000, 0xa60, 0x800, 0x1, 0x7, 0x3, 0x401, 0x4ace, 0x0, 0xa43, 0x9, 0x1, 0xb, 0x7, 0xfffffffe, 0x7, 0x7, 0x4, 0x3, 0x9, 0x1, 0x9, 0x3, 0x8, 0x9, 0x7, 0x2, 0x80, 0x7, 0x8, 0x1, 0x2, 0x79, 0x7, 0x8, 0xd, 0x2, 0x9, 0xf3e, 0x8, 0x5, 0x8, 0x5, 0x5, 0x9, 0x2, 0x3, 0x7fffffff, 0x1, 0x6, 0xe, 0xfffffffd, 0x1, 0x3ff, 0x5b, 0x7f00000, 0xfffeffff, 0x685, 0x218, 0x200, 0xffff, 0x5, 0x3, 0x1ff, 0x0, 0x2, 0x8, 0x9, 0xfffff76e, 0x1, 0x8001, 0x7, 0x9, 0x100, 0x8, 0x100, 0xcc3c, 0x10, 0x0, 0x6, 0xb0a6, 0x1, 0x400, 0x6, 0x5, 0x6, 0xc5f, 0x369a, 0xa4, 0xbe10, 0x80000001, 0x3, 0x80, 0x713, 0x5, 0x4, 0x2, 0x7ad8fa82, 0x23, 0x2, 0x9e, 0x800, 0xb6, 0x3400, 0x7, 0x3, 0x50d0787b, 0xffffff61, 0x2, 0x1, 0xb6, 0x22c, 0x4, 0xd6, 0x8, 0xfffff000, 0x4, 0x2, 0x5, 0x3, 0x17, 0x7, 0x0, 0x6f, 0x0, 0x101, 0xe, 0x3ff, 0x6, 0x3, 0x0, 0x4f53, 0x2, 0x771d, 0x6, 0x9, 0xabeb, 0xab4, 0x7, 0x1ff, 0x920, 0x2, 0x5, 0x6, 0x5, 0x7f, 0x0, 0xb5, 0xfffffbff, 0x2, 0x7ff, 0x1, 0x7, 0x401, 0x2, 0x4, 0x9, 0x7, 0xffffffff, 0x46, 0x36, 0x97, 0x8001, 0x86, 0xdef2, 0x5, 0xff, 0x7fffffff, 0x73, 0x35, 0x8001, 0x1, 0x6, 0xb, 0x0, 0x8, 0x6, 0xcb7, 0x0, 0x40, 0x9, 0x10000000, 0x0, 0x18000000, 0x8, 0x8, 0x24000000, 0x0, 0x1, 0x8000, 0x1, 0x7, 0x3, 0xfffffff4, 0xcf, 0x0, 0x2, 0x400, 0x7, 0x1, 0xf, 0xa0000000, 0x8, 0x52, 0xa, 0x5, 0x7, 0x800, 0x0, 0x0, 0x8001, 0xc68a, 0x9, 0x7f, 0x7, 0x2, 0x7, 0xa, 0x7, 0x2, 0x401, 0x7]}]}, @TCA_ROUTE4_ACT={0x160, 0x6, [@m_police={0x64, 0x9, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [[@TCA_POLICE_RESULT={0x8, 0x5, 0xa000}]]}, {0x30, 0x6, "80ac53174e1f243bcc8d3fe63b7b039931bbf873f67ad6e67ebf8a3f85449d97febbe072c8fac840623a2c62"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x2}}}}, @m_tunnel_key={0xf8, 0xd, 0x0, 0x0, {{0xf}, {0x84, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @initdev={0xac, 0x1e, 0x0, 0x0}}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_ENC_IPV4_DST={0x8, 0x4, @local}, @TCA_TUNNEL_KEY_ENC_IPV6_DST={0x14, 0x6, @loopback}, @TCA_TUNNEL_KEY_NO_CSUM={0x5}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x81, 0x2, 0x2, 0x40000000, 0x101}, 0x1}}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x14, 0x5, @loopback}, @TCA_TUNNEL_KEY_PARMS={0x1c, 0x2, {{0x7, 0x8, 0xffffffffffffffff, 0x8, 0x6}, 0x2}}]}, {0x48, 0x6, "6dcc4be9c7d9f9eb5e5118e6a36684c6af5fea2b5191306a4ad46376a48f2f65dc1ae3ea9a2e9b93979a07b432ec78e9a1d9b5fa2776d3e6752a66da9e8747f6e21e1348"}, {0xc, 0x7, {0x1, 0xd051d1df11d0f050}}, {0xc, 0x8, {0x2, 0x1}}}}]}, @TCA_ROUTE4_CLASSID={0x8, 0x1, {0x1e, 0xd}}, @TCA_ROUTE4_CLASSID={0x8, 0x1, {0x6, 0x1}}, @TCA_ROUTE4_ACT={0x2988, 0x6, [@m_connmark={0xcc, 0x3, 0x0, 0x0, {{0xd}, {0x3c, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x12c0947f, 0x101, 0x20000000, 0x1, 0x7}, 0x1}}, @TCA_CONNMARK_PARMS={0x1c, 0x1, {{0x2, 0xfefd, 0x1, 0x0, 0x5}, 0xbe}}]}, {0x61, 0x6, "c74dc58c5bfd3c509651e449ace1ec73a8033e44a36ea90cff2ae67c78d28016cca7c0502957949fbd849e7308c7352497121374dad349b263fdbb183e3bd19c674561d829cad788b5b9aa5002a4a1c71f5bc6c25024d8fbbf5ad26124"}, {0xc}, {0xc, 0x8, {0x2, 0x2}}}}, @m_gact={0x94, 0x1, 0x0, 0x0, {{0x9}, {0x58, 0x2, 0x0, 0x1, [@TCA_GACT_PARMS={0x18, 0x2, {0x7, 0xf, 0x5, 0x8c, 0xfd6}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x508, 0x5}}, @TCA_GACT_PROB={0xc, 0x3, {0x2, 0x19b9, 0x1}}, @TCA_GACT_PARMS={0x18, 0x2, {0x100, 0x578b27af, 0xffffffffffffffff, 0x1, 0x5}}, @TCA_GACT_PROB={0xc, 0x3, {0x1, 0x1feb, 0x8}}]}, {0x13, 0x6, "7e62b05385ae7d767869918249bfbc"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_ct={0x103c, 0x8, 0x0, 0x0, {{0x7}, {0x14, 0x2, 0x0, 0x1, [@TCA_CT_NAT_PORT_MAX={0x6, 0xe, 0x4e21}, @TCA_CT_NAT_IPV4_MAX={0x8, 0xa, @multicast2}]}, {0x1004, 0x6, "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"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x1}}}}, @m_csum={0x1ac, 0x1d, 0x0, 0x0, {{0x9}, {0xac, 0x2, 0x0, 0x1, [@TCA_CSUM_PARMS={0x1c, 0x1, {{0x7, 0xaa, 0x10000000, 0x9, 0x2}, 0x1c}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x735b, 0x4, 0x1, 0x80000001, 0x58}, 0x2e}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0xed11, 0x5, 0x7, 0x6, 0x3}, 0x50}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x2, 0x5, 0x5, 0x8, 0x10001}, 0x5}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x8, 0x5662, 0x0, 0x401, 0x9}, 0x5a}}, @TCA_CSUM_PARMS={0x1c, 0x1, {{0x3, 0xf, 0x4, 0x6, 0x1000}, 0x54}}]}, {0xd6, 0x6, "33849e2239a8410ed1346fad926bfe66be13e8d70399bc22ce5b7feb05bead73a963102dd756529a49c918e9df8bf473698790559869e1b26fa58f0dd4a3499cdc121f47026b27e9dd2a1b1b6ae8a5dfce8541c15054fd116d8c4814db49d800ce02eb68fdcca10ac9be46c1c184814d2d24ff83e1a7db29aae7d1b948fef9961d346fcd6ec7415a2d681eeb2bfa48e9e953251a5405f475c1aa4df42cf5bc57457382e4761a0a632850aebf93e5cfafe844967df9585aeaf3b14a79c4fddd1902c24123b1d8aa4fa80807ff6ea5fee2d0a1"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_police={0x163c, 0x12, 0x0, 0x0, {{0xb}, {0x1568, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE64={0xc, 0x8, 0x1}, @TCA_POLICE_RATE={0x404, 0x2, [0xb, 0x0, 0xde6, 0x1b5, 0x40, 0x8000, 0x6, 0xe81, 0x3, 0x8, 0x3, 0x800, 0x1, 0x4, 0x7fff, 0xd, 0x8001, 0x6, 0x7, 0x1, 0x8, 0x7, 0x100, 0x7, 0x69, 0xe1f, 0x3, 0x4c, 0x2, 0x3, 0x9, 0x107, 0xfff, 0x101, 0xfffffffd, 0x7, 0x10001, 0x6, 0x9, 0x5, 0x7, 0x8, 0xa, 0x5, 0xfff, 0xfa, 0x0, 0x9, 0x7fff, 0xffff, 0x1, 0xd, 0xfff, 0x8, 0xa2, 0x8, 0x0, 0x0, 0x4, 0x8001, 0x625, 0x6, 0x7, 0x7df, 0xf, 0x0, 0xffff, 0x1, 0x2, 0xfffffff9, 0xfffffff8, 0x4, 0x7, 0x4, 0x2, 0x10000, 0x0, 0x10000, 0x2, 0x5, 0x3, 0xfd1a, 0x4d, 0xfffffffa, 0x297234db, 0x8, 0x8, 0x0, 0xfffffff9, 0xffffffff, 0x3e, 0x9, 0xf, 0x2a, 0x80000000, 0x7, 0x4, 0x800, 0x4, 0x28000000, 0x8, 0x7, 0x5df, 0x3, 0x4, 0x800, 0x9, 0x8, 0x8, 0x1, 0x4, 0x7d, 0x3, 0x80000000, 0x0, 0x5, 0x1, 0x1, 0x7, 0x7, 0x1, 0x1, 0x80, 0x6, 0x0, 0xf, 0x2, 0x3, 0x1, 0x9, 0x1d0, 0x400, 0x7, 0x10001, 0x7, 0x4, 0x0, 0x8, 0x8, 0xd9d4, 0x1, 0xfff, 0x1ff, 0x6, 0x8, 0x8000, 0x3, 0x3, 0x5, 0x800, 0x8, 0x6, 0xfffffffe, 0xff, 0x2cd5, 0x1, 0x57b0, 0x1000, 0x2, 0x2, 0x2, 0x8, 0x400, 0x5, 0x10, 0x2, 0x10001, 0x5152, 0x5, 0xf93, 0xa7, 0xfffffff2, 0x3, 0x1, 0x5b2, 0x5, 0x2, 0x7, 0x400, 0x5, 0x991, 0x10000000, 0x8001, 0x9, 0x6, 0x0, 0xc5, 0x4, 0x6, 0x1, 0x7, 0x4, 0x1000, 0x0, 0x4, 0x9, 0x2, 0x2, 0x7, 0x7, 0xfffffff7, 0xc, 0x5fee, 0x3, 0xff, 0x9, 0x1ff, 0xfffffff7, 0x2, 0x8, 0xffffffff, 0x8, 0xd, 0x6, 0x7, 0x1, 0x1000, 0xbbd8, 0x40, 0x0, 0xc, 0x3, 0x6, 0x7fff, 0x7, 0x6, 0xfffffff9, 0x7, 0xfff, 0x0, 0x7, 0x1, 0x6, 0x9, 0x6, 0x8, 0x0, 0x7, 0x0, 0x1dc, 0x400, 0x192d9223, 0x8, 0x3, 0x4, 0x6, 0x7cf7, 0x6, 0x7fffffff, 0x3, 0x5, 0x6, 0x0, 0xab5, 0x7, 0xe0]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x8000, 0x10000000, 0x7, 0xa, 0xba7, {0x0, 0x1, 0xb, 0x85e, 0x5, 0x9}, {0x3, 0x1, 0x8, 0xff, 0x0, 0x6}, 0x2, 0x8}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xb9, 0x8, 0x8, 0xfffffffb, 0x1, 0x0, 0x3, 0x9, 0x5, 0x7, 0x8000, 0x53, 0x5, 0x7, 0xd1, 0x1000, 0x0, 0x16c0, 0x5, 0x1, 0x1cbc, 0x2, 0x80000001, 0x7, 0x29, 0x28e, 0xa2, 0x1, 0x7ff, 0x2, 0x2, 0x8001, 0x6, 0x9, 0x6, 0x6b01fed7, 0x3, 0x4, 0x6, 0x1, 0xffffff05, 0x101, 0x7f, 0xd25d, 0xbb, 0x6, 0x0, 0x2, 0x0, 0xfffffffa, 0x453, 0x6, 0xf91, 0xa, 0x6, 0x8, 0x308, 0xe, 0xfffffffc, 0x9346, 0x9, 0x40, 0x8, 0x6, 0xe, 0x1, 0x5, 0x1, 0x81, 0xeb, 0x4, 0xa, 0x5, 0x8, 0x4, 0x7, 0x4, 0x3a2, 0x2, 0x3ff, 0x2e9, 0x5, 0x8bf, 0x389, 0x800, 0x9, 0x1bc, 0x200, 0x2, 0x7, 0x7fffffff, 0x9, 0x2, 0xfffffffc, 0x3, 0x7, 0x2dd514f9, 0xffff4ee9, 0x5, 0x5ce, 0x0, 0x6, 0x3, 0x1, 0x10, 0xfc, 0x7, 0x63a5, 0x5, 0xb0b, 0x8, 0x2, 0x7, 0x0, 0x0, 0x9, 0x4, 0xfc9, 0x40, 0x6, 0x800, 0x10001, 0x1ff, 0xfffffffb, 0x7f, 0x5, 0xfffffff9, 0x800, 0x4, 0x9, 0xfffff79f, 0xb1, 0x2, 0xfffffffb, 0x6, 0x7ff, 0x5, 0x101, 0x19f4, 0x3, 0xfffffffb, 0x0, 0x3, 0x4, 0xfffffff8, 0x10001, 0x8000, 0x3, 0x4, 0xb, 0x40, 0x1ff, 0x3, 0x9, 0x5, 0x507, 0x2247, 0x1a98, 0x2, 0x8001, 0x3, 0x8, 0x8, 0x5, 0x200, 0x7, 0x1, 0xa, 0x3, 0x200, 0xfffffffd, 0x1, 0x5, 0x8, 0x7, 0x842, 0xdd, 0x0, 0x5, 0x1, 0x100, 0xfffffffc, 0xf, 0x0, 0x776, 0xc, 0x0, 0x1, 0x9, 0x8, 0x9, 0x0, 0x6, 0x5, 0x7, 0x5, 0x0, 0x3, 0x3, 0x80, 0x7ff, 0x800, 0x9, 0x3, 0x5, 0x0, 0x3ff, 0x40, 0x2, 0xd, 0x7ff, 0x7, 0x8, 0x3, 0x7, 0x2, 0x0, 0x0, 0x1, 0xbd, 0x7c, 0x0, 0xfffff70f, 0x79d8ecf4, 0x3, 0x2, 0x9, 0x4b34, 0xc, 0xffffff85, 0x6, 0x5, 0x3, 0x4, 0x9, 0x5, 0xffffffff, 0x4, 0x30000000, 0xfffffff8, 0x9, 0x80000000, 0x5c8a, 0x2, 0x6, 0x8000, 0x5, 0x401, 0x44, 0x753, 0xc610992, 0xd4ba, 0x4, 0x10001, 0x2b9f7beb, 0x1]}], [@TCA_POLICE_RATE64={0xc, 0x8, 0xa7c}, @TCA_POLICE_TBF={0x3c, 0x1, {0x6, 0x8, 0x1, 0x0, 0x8001, {0x9, 0x0, 0x8, 0x1, 0x2, 0x4}, {0x7, 0x0, 0x0, 0x96af, 0x996, 0x4}, 0x1, 0x9, 0x6}}, @TCA_POLICE_RESULT={0x8, 0x5, 0xff}], [@TCA_POLICE_AVRATE={0x8}, @TCA_POLICE_RATE64={0xc, 0x8, 0x10}, @TCA_POLICE_RATE64={0xc, 0x8, 0x6}], [@TCA_POLICE_PEAKRATE64={0xc, 0x9, 0xfffffffffffff160}, @TCA_POLICE_RATE64={0xc, 0x8, 0x8}, @TCA_POLICE_RATE={0x404, 0x2, [0x5, 0x8000, 0x152ab542, 0x7, 0x68, 0xa, 0x6, 0x7b, 0x45, 0x4468, 0xffffff31, 0x8, 0x9, 0x2, 0x8, 0x1, 0x5, 0x6c, 0x7, 0x10000, 0x61, 0x10000, 0x2, 0xf65, 0x8, 0x80000001, 0x2, 0x3, 0x5, 0xfffffffc, 0xb97e, 0x9, 0x1, 0x8, 0x19f6, 0x8, 0x6, 0x7f000000, 0x7, 0x4, 0x1ff, 0x1000, 0x2, 0x790d, 0x1, 0x6, 0x8000000, 0x48, 0x9, 0x10001, 0xc, 0x2, 0x5e7d, 0x6, 0x1, 0x2, 0x8, 0x8, 0x40, 0x8, 0xd91, 0x10001, 0x2, 0x2, 0x9, 0x0, 0x1, 0x80000000, 0x3, 0x0, 0x9, 0x0, 0xff, 0x7, 0x8, 0x2, 0x3, 0x16, 0xd, 0x7, 0x4, 0x4, 0x80, 0x10, 0x6, 0x7b, 0x5, 0x8, 0x200, 0x8, 0x200, 0x0, 0x7c8, 0x39, 0xff, 0x4, 0x9, 0x9, 0xff, 0x8, 0x6, 0x8, 0x2, 0x8, 0xffff5a6f, 0x5, 0x6, 0x6, 0x700000, 0x3, 0xe99f, 0x8, 0x1ff, 0x5b2bf4f7, 0xfff, 0x2, 0x10000, 0x3, 0x2, 0x6, 0x3, 0x7f, 0xa, 0x80000000, 0x45, 0x4, 0x85, 0x5, 0x0, 0xc7e, 0x3, 0xf8, 0xfffffffe, 0xbdc, 0x5, 0x3ff, 0x5, 0x6, 0x1, 0x5, 0x9, 0x10001, 0x6, 0xd, 0x7, 0x7, 0x80000001, 0x8, 0x5, 0x0, 0x7, 0xfffeffff, 0x1ff, 0x1, 0x40, 0x39d490c4, 0x10000, 0x5, 0x8, 0x4, 0x4, 0x2, 0xe68, 0xe3e, 0x7, 0x8000000, 0x0, 0x2, 0x10, 0x10001, 0x6, 0x0, 0xffff, 0x2, 0xe, 0x1, 0x8, 0x7fff, 0x4a83197e, 0x5, 0x4, 0xfffff001, 0x7, 0xfffffe01, 0x8, 0x2, 0x6a000000, 0x1, 0x3, 0x2, 0x8, 0xa1e2, 0xabd, 0x1, 0xfffff24b, 0x2, 0x10000, 0x2, 0x3, 0x4e, 0x2, 0xb1, 0x49cf, 0xffff5cc4, 0x9, 0x3, 0x80000001, 0x3c, 0x6, 0x80000000, 0xd, 0x1, 0x5, 0x5, 0xfffffffd, 0x2, 0x2, 0x5, 0x2, 0x8, 0x4, 0x7, 0xb, 0x1, 0x9, 0x7, 0x3ff000, 0x9, 0x0, 0x1, 0x80000000, 0x4, 0x5, 0x7, 0x80000000, 0xbde, 0x200, 0x0, 0x0, 0x6, 0x8, 0x8, 0x9, 0x8, 0x400, 0x70000, 0x0, 0xcb46, 0x3, 0x0, 0x9, 0xb, 0xffffffff, 0x1, 0x8, 0x8001]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x142f, 0x20000000, 0x9, 0x80000000, 0x7, {0xe, 0x1, 0x7, 0x4, 0x9, 0x3}, {0x6, 0x1, 0x4, 0x3, 0x8, 0x5}, 0x0, 0x6, 0x4}}, @TCA_POLICE_RATE={0x404, 0x2, [0x9, 0xa7d8, 0x2, 0x8, 0x2, 0xffff, 0xd1, 0xfffffffa, 0x926, 0x81, 0x81, 0x4, 0x10000, 0x0, 0xc, 0x6, 0x4, 0x101, 0x0, 0x6, 0x5, 0x150, 0xfff, 0x9, 0x9e, 0x81, 0x7, 0x0, 0x1ff, 0x6, 0x10, 0x3ff, 0xa, 0x9, 0xffff, 0x10001, 0x8, 0x8, 0x9, 0xfffff801, 0x5032, 0x1, 0x8, 0x7, 0x0, 0x6, 0x5, 0x1ff, 0x60a4, 0x4, 0x4, 0xf1, 0x5, 0xffffffff, 0x3b8, 0xffff, 0x8, 0x2, 0x1, 0x8, 0x0, 0x5, 0x9, 0x4, 0x2, 0x7, 0x7, 0x1, 0x4, 0x3, 0x8, 0x1, 0x6, 0x0, 0xd4e, 0x5, 0x4a0, 0xfffffffa, 0xe, 0x1, 0x5, 0x3, 0x1, 0x10001, 0x1, 0x0, 0x800, 0x80, 0x10000, 0xa16, 0x8000, 0xbfb, 0x2, 0xaac, 0x80000000, 0xe, 0x1, 0x4, 0x1, 0x1, 0x1, 0xc, 0x8, 0x6, 0x2, 0x0, 0x2, 0x7f, 0x0, 0x200, 0x9, 0x1, 0x9, 0x0, 0x0, 0x40, 0x10000, 0x3, 0x79fc, 0x7, 0xffff, 0x91, 0x6b, 0x9, 0xa5, 0x7, 0xaa, 0x0, 0x1051, 0x3df1, 0x3, 0x7, 0x5, 0x9100, 0x8, 0x1, 0x401, 0x1, 0x2, 0x5, 0x9, 0x6, 0x8000, 0x2, 0x2, 0x4, 0xe, 0x3, 0xe8, 0x4, 0x5a, 0x30a, 0x7ff, 0x1, 0x2, 0xfffffff8, 0x3, 0x4, 0x1, 0x8, 0xfffffffe, 0x3ff, 0x8bf, 0x8001, 0x1, 0x400, 0x1, 0x6, 0x4, 0x4, 0x4, 0x8001, 0x2, 0xd, 0x0, 0x1000, 0x4, 0x8, 0xada4, 0x64c, 0x9, 0x0, 0x8, 0x80000000, 0x6, 0xe5, 0x9, 0x3, 0x1000, 0x2, 0xdf, 0x3, 0x3, 0x7fffffff, 0xffff, 0x6, 0x5, 0xb, 0x0, 0x8, 0x800, 0x1a54, 0x0, 0x85, 0x9, 0x2, 0xfffffffd, 0xe773, 0x9, 0x3, 0x1, 0xfffffff4, 0x3, 0x9, 0x2, 0x1, 0xd447, 0x6, 0xfa20, 0x8000, 0x617fb762, 0x5, 0x1, 0x0, 0x9, 0x8, 0x207, 0x5, 0x8001, 0x1, 0x8, 0x5, 0x8001, 0x1, 0x401, 0x6fa8, 0x4, 0x8, 0x5, 0x7, 0xfffffffa, 0x40, 0x6, 0x3, 0xfffffff9, 0x5, 0xffffffab, 0x3, 0x1, 0x8, 0x1, 0x4, 0xf0, 0x0, 0xfffffff7, 0x9]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x30d5ff73, 0x6, 0x4, 0x0, 0x5, {0x22, 0x1, 0x5, 0x4, 0xff80, 0x1}, {0x8, 0x0, 0x9, 0x7, 0x1381, 0x714}, 0x10000, 0x7, 0x624e}}, @TCA_POLICE_RESULT={0x8, 0x5, 0x6}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x401, 0x9, 0x5, 0x1, 0x100, 0x94, 0x7, 0x6, 0x10000, 0x3, 0x8, 0x3ff, 0x4, 0xa, 0xc, 0x8, 0x1, 0x2, 0x9, 0xe, 0x7, 0x7, 0x0, 0x9, 0x7fffffff, 0x7fff, 0x4, 0x5d9, 0x6ce, 0x9, 0x6, 0xfff, 0x3, 0x2, 0x4, 0x81, 0xfffffff9, 0xfffffffc, 0x5, 0x6, 0x5, 0x8, 0xcc21, 0xd7000000, 0x6, 0x711e, 0xefc, 0x9, 0x6, 0x4, 0x80000000, 0xbb56, 0x80000000, 0x2, 0x7, 0x7, 0x6, 0x7, 0x8, 0xfb, 0x10000, 0x6, 0x84, 0x9, 0x0, 0x1000, 0x7, 0x6, 0x5, 0x7fff, 0x2, 0x800, 0x4, 0x200, 0x2, 0x2, 0x7f, 0x895a, 0x0, 0x5, 0x54, 0x91, 0x9, 0xffff, 0xcbfd, 0x8, 0x4c0c, 0x28, 0x80000000, 0x4290a3f1, 0x7, 0x1, 0x3, 0x791, 0x9, 0x885, 0xfd6, 0xc78, 0x3, 0x7, 0x7, 0x4, 0xfffffffa, 0x7fffffff, 0x40, 0x9, 0x7, 0x3, 0xb7, 0x5, 0x7, 0x1, 0x10001, 0xe, 0x9, 0x7ff8, 0x8, 0x2, 0xfffffffc, 0x9, 0x6, 0x0, 0xc, 0x2, 0xb3, 0x7, 0x3, 0x2d, 0x5, 0x1000, 0x0, 0xd837, 0x8, 0x47, 0x4, 0x5, 0x0, 0x80, 0x7, 0x10001, 0x8, 0x3, 0xf15, 0x8, 0x9, 0x2, 0xb, 0x62, 0x6, 0x1, 0xe, 0x5, 0x7fff, 0x8000, 0x3, 0xffff0001, 0x353, 0x7, 0x3, 0xffff, 0x5, 0x86b, 0x0, 0x9, 0x3, 0x8, 0x9, 0x9, 0x101, 0x4, 0x7fff, 0x41, 0x1521, 0x4, 0x242d1917, 0x8, 0x4, 0x3, 0x10001, 0x7, 0x4, 0x8, 0x2, 0x9, 0x949, 0x1, 0xc78, 0x8, 0xfffffff8, 0x4, 0x4507, 0x8, 0x8000, 0x3, 0xc1, 0x0, 0x407, 0xffffffc6, 0x5, 0x1ff, 0x2, 0x4, 0x101, 0x21, 0x3, 0x8, 0x2, 0x2, 0x1, 0x7b6, 0x7, 0xfffffffe, 0x2cc, 0xcf, 0x1f1, 0x7f, 0x9, 0x80000000, 0x9, 0x1, 0x1, 0x401, 0xa, 0x8, 0x0, 0x7fff, 0x800, 0x8, 0x1, 0x0, 0xfffffffc, 0x8001, 0x0, 0xbed, 0x6c, 0x1, 0x4, 0x8a8b, 0xc2f7, 0xfffff8f0, 0xb, 0x7f, 0x29d1, 0x2, 0xbec6, 0x3, 0xffff483a, 0x99b2df25, 0x4a67d869, 0x4, 0x7, 0x6, 0xfffffff7, 0x5, 0x9, 0x1]}], []]}, {0xa9, 0x6, "b8d8fe2a662bc23edd6126ac81973da820df31125354b02724224efcfcc7b468ea3075d0cbcac9117a4ae0da66cc3581e4a4666fce3d5a1158d577e43e4ce39f34d1cadd30c72b6343803d4f641c0b3c0e20f489872b3410ec08c130f3b27dfaf4255a3b62f2ada4fa926a639d0fe215ea534597ce4f7488c6614e17322baac0cfe9b0f5ab69c4972a3879c82707338ac1a0e21d004f2670aecdd94d0182d9fe5ed4315a9b"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x1, 0x3}}}}]}, @TCA_ROUTE4_FROM={0x8, 0x3, 0x6f}, @TCA_ROUTE4_POLICE={0x84, 0x5, [@TCA_POLICE_TBF={0x3c, 0x1, {0x6, 0x0, 0x9, 0x5, 0x5ec, {0xf8, 0x2, 0x5, 0x0, 0x0, 0x4}, {0x6, 0x0, 0x4, 0x6, 0xd, 0xe}, 0x3, 0x2, 0x6ef39b7c}}, @TCA_POLICE_RESULT={0x8, 0x5, 0x7ff}, @TCA_POLICE_TBF={0x3c, 0x1, {0x4, 0x5, 0xd, 0x8cf1, 0x7b6, {0x5, 0x1, 0x5, 0x7fff, 0x2}, {0x7f, 0x0, 0x0, 0x9, 0x8, 0x7fff}, 0x3, 0x3}}]}, @TCA_ROUTE4_ACT={0x34, 0x6, [@m_csum={0x30, 0x1d, 0x0, 0x0, {{0x9}, {0x4}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}, @TCA_ROUTE4_TO={0x8, 0x2, 0xf0}]}}]}, 0x3820}}, 0x24040084) 481.810561ms ago: executing program 6 (id=4965): r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f0000000040)={0x0, 0x6}, 0x4) setsockopt$packet_fanout_data(r0, 0x107, 0x16, &(0x7f0000000000)={0x0, &(0x7f0000000080)}, 0x10) r1 = syz_open_dev$hidraw(0x0, 0x1, 0x2800) ioctl$HIDIOCSFEATURE(r1, 0xc0404806, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0xd9}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="180000000000000000000000000008001812", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r3, 0x0, 0xfffffffffffffffc}, 0x18) r4 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r4, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) r5 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x0, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) write(0xffffffffffffffff, &(0x7f0000000000)="240000001a005f0214f9f407000904000a000000fe0000000000000008000f00fd000000", 0x85) setsockopt$MRT_INIT(0xffffffffffffffff, 0x0, 0xc8, &(0x7f0000003d40), 0x4) setsockopt$MRT_ADD_VIF(0xffffffffffffffff, 0x0, 0xca, &(0x7f0000003d80)={0x0, 0x0, 0x0, 0x0, @vifc_lcl_addr=@local, @dev}, 0x10) socket$inet_icmp_raw(0x2, 0x3, 0x1) close(0x3) 466.653942ms ago: executing program 4 (id=4966): sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r0 = getpid() prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000010400000000000e470000000000", @ANYRES32=0x0, @ANYBLOB="421c0000000000001c001280090001007866726d000000000c0002800800020003000000140003007866726d3000"/56], 0x50}}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0x200000000000000}, 0x7) r6 = syz_pidfd_open(r0, 0x0) r7 = pidfd_getfd(r6, r6, 0x0) bind$can_raw(0xffffffffffffffff, &(0x7f00000000c0), 0x10) setns(r7, 0x66020000) syz_clone(0x50820080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, 0x0}, 0x94) 461.382713ms ago: executing program 6 (id=4967): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000940)={0x11, 0x200000f3, &(0x7f0000000700)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x40, &(0x7f00000008c0)={[], [{@uid_gt}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x39, 0x38, 0x65, 0x32, 0x38, 0x39, 0x32], 0x2d, [0x31, 0x36, 0x66, 0x61], 0x2d, [0x7, 0x35, 0x0, 0x64], 0x2d, [0x35, 0x63, 0x39, 0x62], 0x2d, [0x37, 0x30, 0x62, 0x39, 0x56, 0x63, 0x39, 0x37]}}}]}, 0x1, 0x512, &(0x7f0000000380)="$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") r1 = socket$nl_route(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x11, 0x70, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x7, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x100cb3a}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000040)='kmem_cache_free\x00', r2, 0x0, 0x2}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r3 = memfd_secret(0x80000) ftruncate(r3, 0x3) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x80, 0x1, 0x28}, 0x50) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000140)={0x71f6, 0x0}, 0x8) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r4}, {}, {0x85, 0x0, 0x0, 0x1b}}]}, &(0x7f0000000780)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x6, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x18) sendmsg$nl_route_sched(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x68, 0x10, 0x1, 0x70bd29, 0x0, {0x0, 0x0, 0x0, 0x0, {0xfff3}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28}]}, 0x54}, 0x1, 0x0, 0x0, 0x40080}, 0x4000c00) r7 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_int(r7, 0x29, 0x35, &(0x7f0000000000)=0x8000, 0x4) bind$inet6(r7, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(r7, 0x29, 0xb, &(0x7f0000000040)=0x8, 0x4) r8 = socket(0x1e, 0x805, 0x0) connect$tipc(r8, &(0x7f0000000040)=@name={0x1e, 0x2, 0x0, {{}, 0x2}}, 0x10) close(r8) recvmmsg(r7, &(0x7f0000000140), 0x0, 0x20, 0x0) sendto$inet6(r7, 0x0, 0x0, 0x0, &(0x7f0000000300)={0xa, 0x4e20, 0x0, @mcast1}, 0x1c) r9 = socket$inet(0x2, 0x2, 0x0) setsockopt$MRT_DEL_MFC(r9, 0x0, 0xcd, &(0x7f00000000c0)={@remote, @local, 0xffffffffffffffff, "a49aa73da9d161ec0c873de5212fab24edbf727a1909e325ec9f3a87941a68ab", 0x50f, 0x143eaf52, 0x1100e, 0x4}, 0x3c) 165.655396ms ago: executing program 5 (id=4968): mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xf, 0x4008032, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) openat$binfmt(0xffffffffffffff9c, 0x0, 0x41, 0x1ff) socket(0x10, 0x2, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x4, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000040), &(0x7f0000000280)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000380)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000000c0)='sched_switch\x00', r1}, 0x18) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCMIWAIT(r2, 0x545c, 0x200000000000000) ioctl$TIOCVHANGUP(r2, 0x5437, 0x300) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000600)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000002180)='blkio.bfq.io_merged\x00', 0x275a, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x12, r3, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x18) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = inotify_init() creat(&(0x7f0000000100)='./file0\x00', 0xd931d3864d39dcca) inotify_add_watch(r7, &(0x7f0000000240)='./file0\x00', 0x4000cdd) close_range(r6, 0xffffffffffffffff, 0x0) 163.968496ms ago: executing program 6 (id=4978): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x7, 0x4, 0x8, 0xd9}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000080018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='kfree\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) sendmsg$tipc(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000008c0)=@nameseq={0x1e, 0x1, 0x0, {0x42}}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x2400c09d}, 0x20) r2 = socket(0x10, 0x80003, 0x0) write(r2, &(0x7f0000000000)="240000001a005f0214f9f407000904000a000000fe0000000000000008000f00fd000000", 0x85) close_range(r2, 0xffffffffffffffff, 0x0) 86.605393ms ago: executing program 0 (id=4969): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) flock(r0, 0x5) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bind$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x4e21, @broadcast}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x181601, 0x0) dup3(r3, r0, 0x0) 22.625198ms ago: executing program 6 (id=4970): socket$nl_route(0x10, 0x3, 0x0) r0 = signalfd(0xffffffffffffffff, &(0x7f0000000140)={[0x3]}, 0x8) read$msr(r0, &(0x7f0000000bc0)=""/4096, 0x1000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='percpu_alloc_percpu\x00'}, 0xc) socket$packet(0x11, 0xa, 0x300) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x2000000000000022, &(0x7f0000000200)=0x1, 0x4) sendto$inet6(r1, &(0x7f0000000280)='2', 0x1, 0x20000045, &(0x7f00000001c0)={0xa, 0x2, 0xffff, @loopback, 0x3}, 0x1c) 0s ago: executing program 0 (id=4971): socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x100000000007, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x8, 0x7, 0x8, 0x4020005, 0xb, 0x0, 0x0, 0x0, 0x20800006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00'}, 0x90) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000002c0)={r0, 0x4, 0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) r1 = socket$inet_sctp(0x2, 0x5, 0x84) close(r1) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r2, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000240)=0x8) sendmsg$inet_sctp(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f00000000c0)=[@sndinfo={0x20, 0x84, 0x2, {0xa, 0x4, 0x28, 0x200000b, r3}}], 0x20, 0x2400e044}, 0x0) 0s ago: executing program 3 (id=4972): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x15, 0xc, &(0x7f0000000000)=ANY=[@ANYRES8=r1, @ANYRESDEC=r1], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x477}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) rt_sigpending(0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f00000012c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x15, 0xc, &(0x7f0000000000)=ANY=[@ANYRES8=r1, @ANYRESDEC=r1], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x477}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r2}, 0x10) (async) rt_sigpending(0x0, 0x0) (async) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') (async) syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') (async) kernel console output (not intermixed with test programs): 00003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 335.803085][ T29] audit: type=1326 audit(1756074493.997:8085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14771 comm="syz.3.3796" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 336.072602][T14790] netlink: 'syz.3.3802': attribute type 1 has an invalid length. [ 336.080445][T14790] netlink: 224 bytes leftover after parsing attributes in process `syz.3.3802'. [ 336.080698][T14798] can0: slcan on ttyS3. [ 336.116559][T14797] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 336.125119][T14797] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 336.134226][T14797] netlink: 'syz.6.3805': attribute type 10 has an invalid length. [ 336.184548][T14762] can0 (unregistered): slcan off ttyS3. [ 336.192422][T14799] netlink: 56 bytes leftover after parsing attributes in process `syz.6.3805'. [ 336.236322][T14797] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 336.250116][T14797] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 336.501129][T14826] netlink: 16 bytes leftover after parsing attributes in process `syz.0.3813'. [ 336.513616][T14826] netlink: 20 bytes leftover after parsing attributes in process `syz.0.3813'. [ 337.389221][T14873] FAULT_INJECTION: forcing a failure. [ 337.389221][T14873] name failslab, interval 1, probability 0, space 0, times 0 [ 337.401950][T14873] CPU: 0 UID: 0 PID: 14873 Comm: syz.5.3832 Not tainted syzkaller #0 PREEMPT(voluntary) [ 337.402049][T14873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 337.402062][T14873] Call Trace: [ 337.402070][T14873] [ 337.402077][T14873] __dump_stack+0x1d/0x30 [ 337.402094][T14873] dump_stack_lvl+0xe8/0x140 [ 337.402158][T14873] dump_stack+0x15/0x1b [ 337.402195][T14873] should_fail_ex+0x265/0x280 [ 337.402212][T14873] should_failslab+0x8c/0xb0 [ 337.402231][T14873] kmem_cache_alloc_node_noprof+0x57/0x320 [ 337.402259][T14873] ? __alloc_skb+0x101/0x320 [ 337.402288][T14873] __alloc_skb+0x101/0x320 [ 337.402307][T14873] netlink_alloc_large_skb+0xba/0xf0 [ 337.402338][T14873] netlink_sendmsg+0x3cf/0x6b0 [ 337.402358][T14873] ? __pfx_netlink_sendmsg+0x10/0x10 [ 337.402392][T14873] __sock_sendmsg+0x145/0x180 [ 337.402420][T14873] sock_write_iter+0x165/0x1b0 [ 337.402501][T14873] do_iter_readv_writev+0x499/0x540 [ 337.402536][T14873] vfs_writev+0x2df/0x8b0 [ 337.402634][T14873] do_writev+0xe7/0x210 [ 337.402659][T14873] __x64_sys_writev+0x45/0x50 [ 337.402683][T14873] x64_sys_call+0x1e9a/0x2ff0 [ 337.402746][T14873] do_syscall_64+0xd2/0x200 [ 337.402846][T14873] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 337.402921][T14873] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 337.402941][T14873] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 337.402958][T14873] RIP: 0033:0x7f1d29b7ebe9 [ 337.402971][T14873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.403061][T14873] RSP: 002b:00007f1d285df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 337.403081][T14873] RAX: ffffffffffffffda RBX: 00007f1d29da5fa0 RCX: 00007f1d29b7ebe9 [ 337.403094][T14873] RDX: 0000000000000001 RSI: 00002000000003c0 RDI: 0000000000000006 [ 337.403108][T14873] RBP: 00007f1d285df090 R08: 0000000000000000 R09: 0000000000000000 [ 337.403199][T14873] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.403231][T14873] R13: 00007f1d29da6038 R14: 00007f1d29da5fa0 R15: 00007ffd20e31688 [ 337.403247][T14873] [ 337.679022][T14877] netlink: 'syz.6.3836': attribute type 4 has an invalid length. [ 337.949665][T14895] lo speed is unknown, defaulting to 1000 [ 338.036182][T14895] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3839'. [ 338.344349][T14911] syz_tun: entered allmulticast mode [ 338.353418][T14910] syz_tun: left allmulticast mode [ 339.019497][T14944] lo speed is unknown, defaulting to 1000 [ 339.092596][T14944] netlink: 24 bytes leftover after parsing attributes in process `syz.6.3856'. [ 339.832871][T14961] netlink: 20 bytes leftover after parsing attributes in process `syz.6.3862'. [ 339.860829][T14961] ip6tnl1: entered allmulticast mode [ 339.880664][T14961] SELinux: policydb version 209717011 does not match my version range 15-35 [ 339.890855][T14961] SELinux: failed to load policy [ 340.410804][ T29] kauditd_printk_skb: 162 callbacks suppressed [ 340.410820][ T29] audit: type=1326 audit(1756074499.047:8246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14974 comm="syz.4.3867" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 340.465699][T14982] lo speed is unknown, defaulting to 1000 [ 340.993964][ T29] audit: type=1326 audit(1756074499.068:8247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14972 comm="syz.4.3867" exe="/root/syz-executor" sig=0 arch=c000003e syscall=96 compat=0 ip=0xffffffffff600000 code=0x7ffc0000 [ 341.017722][ T29] audit: type=1326 audit(1756074499.068:8248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14972 comm="syz.4.3867" exe="/root/syz-executor" sig=0 arch=c000003e syscall=60 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 341.180156][T14992] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 341.197890][T15004] siw: device registration error -23 [ 341.234408][ T29] audit: type=1326 audit(1756074499.929:8249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15005 comm="syz.0.3875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 341.257928][ T29] audit: type=1326 audit(1756074499.929:8250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15005 comm="syz.0.3875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 341.281453][ T29] audit: type=1326 audit(1756074499.929:8251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15005 comm="syz.0.3875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 341.310183][ T29] audit: type=1326 audit(1756074499.992:8252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15005 comm="syz.0.3875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 341.333693][ T29] audit: type=1326 audit(1756074499.992:8253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15005 comm="syz.0.3875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 341.357150][ T29] audit: type=1326 audit(1756074499.992:8254): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15005 comm="syz.0.3875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 341.380659][ T29] audit: type=1326 audit(1756074499.992:8255): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15005 comm="syz.0.3875" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 341.674567][T15024] lo speed is unknown, defaulting to 1000 [ 341.764443][T15024] netlink: 24 bytes leftover after parsing attributes in process `syz.4.3880'. [ 342.640793][T15068] FAULT_INJECTION: forcing a failure. [ 342.640793][T15068] name failslab, interval 1, probability 0, space 0, times 0 [ 342.653577][T15068] CPU: 0 UID: 0 PID: 15068 Comm: syz.6.3898 Not tainted syzkaller #0 PREEMPT(voluntary) [ 342.653602][T15068] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 342.653613][T15068] Call Trace: [ 342.653620][T15068] [ 342.653626][T15068] __dump_stack+0x1d/0x30 [ 342.653726][T15068] dump_stack_lvl+0xe8/0x140 [ 342.653751][T15068] dump_stack+0x15/0x1b [ 342.653764][T15068] should_fail_ex+0x265/0x280 [ 342.653783][T15068] should_failslab+0x8c/0xb0 [ 342.653864][T15068] __kmalloc_noprof+0xa5/0x3e0 [ 342.653989][T15068] ? copy_splice_read+0xc2/0x660 [ 342.654009][T15068] copy_splice_read+0xc2/0x660 [ 342.654032][T15068] ? __pfx_shmem_file_splice_read+0x10/0x10 [ 342.654101][T15068] splice_direct_to_actor+0x290/0x680 [ 342.654122][T15068] ? __pfx_direct_splice_actor+0x10/0x10 [ 342.654146][T15068] do_splice_direct+0xda/0x150 [ 342.654166][T15068] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 342.654232][T15068] do_sendfile+0x380/0x650 [ 342.654259][T15068] __x64_sys_sendfile64+0x105/0x150 [ 342.654284][T15068] x64_sys_call+0x2bb0/0x2ff0 [ 342.654327][T15068] do_syscall_64+0xd2/0x200 [ 342.654342][T15068] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 342.654363][T15068] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 342.654375][T15068] RIP: 0033:0x7f38b34debe9 [ 342.654408][T15068] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 342.654472][T15068] RSP: 002b:00007f38b1f47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 342.654483][T15068] RAX: ffffffffffffffda RBX: 00007f38b3705fa0 RCX: 00007f38b34debe9 [ 342.654490][T15068] RDX: 0000000000000000 RSI: 0000000000000004 RDI: 0000000000000004 [ 342.654497][T15068] RBP: 00007f38b1f47090 R08: 0000000000000000 R09: 0000000000000000 [ 342.654504][T15068] R10: 0000000800000009 R11: 0000000000000246 R12: 0000000000000001 [ 342.654563][T15068] R13: 00007f38b3706038 R14: 00007f38b3705fa0 R15: 00007ffec0c8c1a8 [ 342.654573][T15068] [ 343.026066][T15086] netlink: 'syz.0.3906': attribute type 12 has an invalid length. [ 343.041540][T15086] netlink: 4 bytes leftover after parsing attributes in process `syz.0.3906'. [ 343.206886][T15107] netlink: 'syz.0.3910': attribute type 4 has an invalid length. [ 343.535718][T15126] lo speed is unknown, defaulting to 1000 [ 344.100112][T15128] lo speed is unknown, defaulting to 1000 [ 344.674083][T15171] lo speed is unknown, defaulting to 1000 [ 344.774794][T15171] netlink: 24 bytes leftover after parsing attributes in process `syz.6.3933'. [ 344.833914][T15173] netlink: 'syz.5.3940': attribute type 4 has an invalid length. [ 345.370660][T15186] syz_tun: entered allmulticast mode [ 345.387152][T15186] dvmrp8: entered allmulticast mode [ 345.402954][T15185] syz_tun: left allmulticast mode [ 345.416904][T15185] dvmrp8: left allmulticast mode [ 345.478291][ T29] kauditd_printk_skb: 158 callbacks suppressed [ 345.478303][ T29] audit: type=1326 audit(1756074504.370:8414): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15193 comm="syz.4.3950" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 345.508346][ T29] audit: type=1326 audit(1756074504.370:8415): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15193 comm="syz.4.3950" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 345.536872][ T29] audit: type=1326 audit(1756074504.433:8416): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15193 comm="syz.4.3950" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 345.560491][ T29] audit: type=1326 audit(1756074504.433:8417): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15193 comm="syz.4.3950" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 345.583953][ T29] audit: type=1326 audit(1756074504.433:8418): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15193 comm="syz.4.3950" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 345.607507][ T29] audit: type=1326 audit(1756074504.433:8419): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15193 comm="syz.4.3950" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 345.630986][ T29] audit: type=1326 audit(1756074504.433:8420): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15193 comm="syz.4.3950" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 345.654467][ T29] audit: type=1326 audit(1756074504.433:8421): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15193 comm="syz.4.3950" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 345.677935][ T29] audit: type=1326 audit(1756074504.433:8422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15193 comm="syz.4.3950" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 345.701462][ T29] audit: type=1326 audit(1756074504.433:8423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15193 comm="syz.4.3950" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 345.752318][T15211] netlink: 'syz.0.3955': attribute type 21 has an invalid length. [ 345.760184][T15211] netlink: 128 bytes leftover after parsing attributes in process `syz.0.3955'. [ 345.769390][T15211] netlink: 'syz.0.3955': attribute type 4 has an invalid length. [ 345.777149][T15211] netlink: 'syz.0.3955': attribute type 5 has an invalid length. [ 345.785013][T15211] netlink: 3 bytes leftover after parsing attributes in process `syz.0.3955'. [ 346.186188][T15229] FAULT_INJECTION: forcing a failure. [ 346.186188][T15229] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 346.199399][T15229] CPU: 1 UID: 0 PID: 15229 Comm: syz.0.3961 Not tainted syzkaller #0 PREEMPT(voluntary) [ 346.199428][T15229] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 346.199439][T15229] Call Trace: [ 346.199461][T15229] [ 346.199468][T15229] __dump_stack+0x1d/0x30 [ 346.199489][T15229] dump_stack_lvl+0xe8/0x140 [ 346.199509][T15229] dump_stack+0x15/0x1b [ 346.199526][T15229] should_fail_ex+0x265/0x280 [ 346.199592][T15229] should_fail+0xb/0x20 [ 346.199607][T15229] should_fail_usercopy+0x1a/0x20 [ 346.199630][T15229] _copy_from_iter+0xd2/0xe80 [ 346.199650][T15229] ? trace_reschedule_exit+0xd/0xc0 [ 346.199670][T15229] ? netlink_sendmsg+0x463/0x6b0 [ 346.199771][T15229] netlink_sendmsg+0x471/0x6b0 [ 346.199806][T15229] ? __pfx_netlink_sendmsg+0x10/0x10 [ 346.199900][T15229] __sock_sendmsg+0x145/0x180 [ 346.199924][T15229] ____sys_sendmsg+0x31e/0x4e0 [ 346.199944][T15229] ___sys_sendmsg+0x17b/0x1d0 [ 346.200011][T15229] __x64_sys_sendmsg+0xd4/0x160 [ 346.200036][T15229] x64_sys_call+0x191e/0x2ff0 [ 346.200054][T15229] do_syscall_64+0xd2/0x200 [ 346.200129][T15229] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 346.200150][T15229] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 346.200170][T15229] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 346.200191][T15229] RIP: 0033:0x7f1d3c46ebe9 [ 346.200206][T15229] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 346.200224][T15229] RSP: 002b:00007f1d3aed7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 346.200323][T15229] RAX: ffffffffffffffda RBX: 00007f1d3c695fa0 RCX: 00007f1d3c46ebe9 [ 346.200335][T15229] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000005 [ 346.200346][T15229] RBP: 00007f1d3aed7090 R08: 0000000000000000 R09: 0000000000000000 [ 346.200356][T15229] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.200366][T15229] R13: 00007f1d3c696038 R14: 00007f1d3c695fa0 R15: 00007fff91b17c48 [ 346.200382][T15229] [ 346.503935][T15238] FAULT_INJECTION: forcing a failure. [ 346.503935][T15238] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 346.517181][T15238] CPU: 0 UID: 0 PID: 15238 Comm: syz.4.3965 Not tainted syzkaller #0 PREEMPT(voluntary) [ 346.517205][T15238] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 346.517215][T15238] Call Trace: [ 346.517222][T15238] [ 346.517229][T15238] __dump_stack+0x1d/0x30 [ 346.517247][T15238] dump_stack_lvl+0xe8/0x140 [ 346.517297][T15238] dump_stack+0x15/0x1b [ 346.517388][T15238] should_fail_ex+0x265/0x280 [ 346.517406][T15238] should_fail+0xb/0x20 [ 346.517423][T15238] should_fail_usercopy+0x1a/0x20 [ 346.517445][T15238] _copy_from_iter+0xd2/0xe80 [ 346.517468][T15238] ? __build_skb_around+0x1a0/0x200 [ 346.517526][T15238] ? __alloc_skb+0x223/0x320 [ 346.517546][T15238] netlink_sendmsg+0x471/0x6b0 [ 346.517568][T15238] ? __pfx_netlink_sendmsg+0x10/0x10 [ 346.517587][T15238] __sock_sendmsg+0x145/0x180 [ 346.517618][T15238] ____sys_sendmsg+0x31e/0x4e0 [ 346.517642][T15238] ___sys_sendmsg+0x17b/0x1d0 [ 346.517727][T15238] __x64_sys_sendmsg+0xd4/0x160 [ 346.517750][T15238] x64_sys_call+0x191e/0x2ff0 [ 346.517770][T15238] do_syscall_64+0xd2/0x200 [ 346.517797][T15238] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 346.517886][T15238] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 346.517905][T15238] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 346.517916][T15238] RIP: 0033:0x7f93f346ebe9 [ 346.517926][T15238] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 346.517970][T15238] RSP: 002b:00007f93f1ed7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 346.517981][T15238] RAX: ffffffffffffffda RBX: 00007f93f3695fa0 RCX: 00007f93f346ebe9 [ 346.518020][T15238] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 346.518028][T15238] RBP: 00007f93f1ed7090 R08: 0000000000000000 R09: 0000000000000000 [ 346.518034][T15238] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 346.518041][T15238] R13: 00007f93f3696038 R14: 00007f93f3695fa0 R15: 00007ffd13f93348 [ 346.518051][T15238] [ 346.864296][T15250] lo speed is unknown, defaulting to 1000 [ 347.435876][T15263] netlink: 32 bytes leftover after parsing attributes in process `syz.6.3973'. [ 347.815816][T15285] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=15285 comm=syz.4.3980 [ 348.852756][T15321] lo speed is unknown, defaulting to 1000 [ 348.894119][T15324] lo speed is unknown, defaulting to 1000 [ 349.123945][T15317] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 349.132602][T15317] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 349.141495][T15317] netlink: 'syz.6.3993': attribute type 10 has an invalid length. [ 349.213801][T15337] lo speed is unknown, defaulting to 1000 [ 349.257667][T15337] netlink: 24 bytes leftover after parsing attributes in process `syz.5.3998'. [ 349.565810][T15332] netlink: 56 bytes leftover after parsing attributes in process `syz.6.3993'. [ 349.608812][T15317] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 349.617383][T15317] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 349.649856][T15361] netlink: 144 bytes leftover after parsing attributes in process `syz.3.4007'. [ 349.659549][T15361] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4007'. [ 349.718708][T15363] netlink: 156 bytes leftover after parsing attributes in process `syz.3.4007'. [ 349.958598][T15371] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4010'. [ 349.976661][T15371] IPVS: Error joining to the multicast group [ 350.558093][T15384] siw: device registration error -23 [ 350.713911][T15387] lo speed is unknown, defaulting to 1000 [ 350.886133][T15404] binfmt_misc: register: failed to install interpreter file ./file2 [ 351.679006][ T29] kauditd_printk_skb: 116 callbacks suppressed [ 351.679019][ T29] audit: type=1326 audit(1756074510.890:8540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15443 comm="syz.3.4035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 351.679743][T15444] FAULT_INJECTION: forcing a failure. [ 351.679743][T15444] name failslab, interval 1, probability 0, space 0, times 0 [ 351.685220][ T29] audit: type=1326 audit(1756074510.890:8541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15443 comm="syz.3.4035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=237 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 351.708773][T15444] CPU: 1 UID: 0 PID: 15444 Comm: syz.3.4035 Not tainted syzkaller #0 PREEMPT(voluntary) [ 351.708809][T15444] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 351.708820][T15444] Call Trace: [ 351.708827][T15444] [ 351.708835][T15444] __dump_stack+0x1d/0x30 [ 351.708855][T15444] dump_stack_lvl+0xe8/0x140 [ 351.708898][T15444] dump_stack+0x15/0x1b [ 351.708914][T15444] should_fail_ex+0x265/0x280 [ 351.708934][T15444] ? audit_log_d_path+0x8d/0x150 [ 351.708961][T15444] should_failslab+0x8c/0xb0 [ 351.708983][T15444] __kmalloc_cache_noprof+0x4c/0x320 [ 351.709082][T15444] audit_log_d_path+0x8d/0x150 [ 351.709108][T15444] audit_log_d_path_exe+0x42/0x70 [ 351.709204][T15444] audit_log_task+0x1e9/0x250 [ 351.709229][T15444] audit_seccomp+0x61/0x100 [ 351.709254][T15444] ? __seccomp_filter+0x68c/0x10d0 [ 351.709401][T15444] __seccomp_filter+0x69d/0x10d0 [ 351.709498][T15444] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 351.709581][T15444] ? vfs_write+0x7e8/0x960 [ 351.709601][T15444] ? __rcu_read_unlock+0x4f/0x70 [ 351.709661][T15444] ? __fget_files+0x184/0x1c0 [ 351.709687][T15444] __secure_computing+0x82/0x150 [ 351.709707][T15444] syscall_trace_enter+0xcf/0x1e0 [ 351.709729][T15444] do_syscall_64+0xac/0x200 [ 351.709776][T15444] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 351.709798][T15444] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 351.709893][T15444] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 351.709913][T15444] RIP: 0033:0x7ff8be5aebe9 [ 351.709928][T15444] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 351.709995][T15444] RSP: 002b:00007ff8bd00f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bf [ 351.710014][T15444] RAX: ffffffffffffffda RBX: 00007ff8be7d5fa0 RCX: 00007ff8be5aebe9 [ 351.710027][T15444] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000000 [ 351.710056][T15444] RBP: 00007ff8bd00f090 R08: 0000000000000000 R09: 0000000000000000 [ 351.710068][T15444] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 351.710080][T15444] R13: 00007ff8be7d6038 R14: 00007ff8be7d5fa0 R15: 00007ffce0e9dae8 [ 351.710127][T15444] [ 351.811547][T15442] lo speed is unknown, defaulting to 1000 [ 351.813183][ T29] audit: type=1326 audit(1756074510.890:8542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15443 comm="syz.3.4035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 351.926265][T15448] siw: device registration error -23 [ 351.932720][ T29] audit: type=1326 audit(1756074510.890:8543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15443 comm="syz.3.4035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 352.020623][ T29] audit: type=1326 audit(1756074510.890:8544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15443 comm="syz.3.4035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 352.044243][ T29] audit: type=1326 audit(1756074510.890:8545): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15443 comm="syz.3.4035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 352.067643][ T29] audit: type=1326 audit(1756074510.890:8546): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15443 comm="syz.3.4035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 352.091122][ T29] audit: type=1326 audit(1756074510.890:8547): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15443 comm="syz.3.4035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 352.115027][ T29] audit: type=1326 audit(1756074510.890:8548): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15443 comm="syz.3.4035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 352.138558][ T29] audit: type=1326 audit(1756074510.890:8549): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15443 comm="syz.3.4035" exe="/root/syz-executor" sig=0 arch=c000003e syscall=266 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 352.503183][T15471] lo speed is unknown, defaulting to 1000 [ 352.599821][T15471] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4045'. [ 353.482962][T15505] siw: device registration error -23 [ 353.530935][T15516] netlink: 'syz.5.4056': attribute type 4 has an invalid length. [ 354.168077][T15544] capability: warning: `syz.6.4073' uses 32-bit capabilities (legacy support in use) [ 354.178309][T15544] netlink: 'syz.6.4073': attribute type 10 has an invalid length. [ 354.189449][T15544] team0: Port device dummy0 added [ 354.196276][T15544] netlink: 'syz.6.4073': attribute type 10 has an invalid length. [ 354.207080][T15544] team0: Port device dummy0 removed [ 354.215359][T15544] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 354.258677][T15552] siw: device registration error -23 [ 355.073678][T15581] netlink: 'syz.0.4086': attribute type 4 has an invalid length. [ 355.111861][T15583] syz_tun: entered allmulticast mode [ 355.117825][T15582] syz_tun: left allmulticast mode [ 355.221852][T15590] FAULT_INJECTION: forcing a failure. [ 355.221852][T15590] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 355.221880][T15590] CPU: 0 UID: 0 PID: 15590 Comm: syz.5.4090 Not tainted syzkaller #0 PREEMPT(voluntary) [ 355.221905][T15590] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 355.221915][T15590] Call Trace: [ 355.221921][T15590] [ 355.221984][T15590] __dump_stack+0x1d/0x30 [ 355.222004][T15590] dump_stack_lvl+0xe8/0x140 [ 355.222022][T15590] dump_stack+0x15/0x1b [ 355.222042][T15590] should_fail_ex+0x265/0x280 [ 355.222062][T15590] should_fail+0xb/0x20 [ 355.222122][T15590] should_fail_usercopy+0x1a/0x20 [ 355.222143][T15590] _copy_from_iter+0xd2/0xe80 [ 355.222166][T15590] ? __build_skb_around+0x1a0/0x200 [ 355.222196][T15590] ? __alloc_skb+0x223/0x320 [ 355.222266][T15590] netlink_sendmsg+0x471/0x6b0 [ 355.222288][T15590] ? __pfx_netlink_sendmsg+0x10/0x10 [ 355.222358][T15590] __sock_sendmsg+0x145/0x180 [ 355.222383][T15590] ____sys_sendmsg+0x31e/0x4e0 [ 355.222405][T15590] ___sys_sendmsg+0x17b/0x1d0 [ 355.222517][T15590] __x64_sys_sendmsg+0xd4/0x160 [ 355.222541][T15590] x64_sys_call+0x191e/0x2ff0 [ 355.222559][T15590] do_syscall_64+0xd2/0x200 [ 355.222584][T15590] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 355.222666][T15590] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 355.222690][T15590] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 355.222711][T15590] RIP: 0033:0x7f1d29b7ebe9 [ 355.222800][T15590] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 355.222822][T15590] RSP: 002b:00007f1d285df038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 355.222841][T15590] RAX: ffffffffffffffda RBX: 00007f1d29da5fa0 RCX: 00007f1d29b7ebe9 [ 355.222853][T15590] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000004 [ 355.222866][T15590] RBP: 00007f1d285df090 R08: 0000000000000000 R09: 0000000000000000 [ 355.222878][T15590] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 355.222890][T15590] R13: 00007f1d29da6038 R14: 00007f1d29da5fa0 R15: 00007ffd20e31688 [ 355.222949][T15590] [ 355.494003][T15604] siw: device registration error -23 [ 356.424599][T15633] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 356.433796][T15633] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 356.442217][T15633] netlink: 'syz.5.4104': attribute type 10 has an invalid length. [ 356.499736][T15634] netlink: 56 bytes leftover after parsing attributes in process `syz.5.4104'. [ 356.518559][T15633] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 356.526968][T15633] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 356.657279][T15645] siw: device registration error -23 [ 356.728476][ T29] kauditd_printk_skb: 133 callbacks suppressed [ 356.728486][ T29] audit: type=1326 audit(1756074516.192:8683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15649 comm="syz.6.4109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 356.758272][ T29] audit: type=1326 audit(1756074516.192:8684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15649 comm="syz.6.4109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 356.781844][ T29] audit: type=1326 audit(1756074516.192:8685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15649 comm="syz.6.4109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 356.805413][ T29] audit: type=1326 audit(1756074516.192:8686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15649 comm="syz.6.4109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 356.829229][ T29] audit: type=1326 audit(1756074516.192:8687): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15649 comm="syz.6.4109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 356.852736][ T29] audit: type=1326 audit(1756074516.192:8688): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15649 comm="syz.6.4109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 356.876204][ T29] audit: type=1326 audit(1756074516.192:8689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15649 comm="syz.6.4109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 356.899745][ T29] audit: type=1326 audit(1756074516.192:8690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15649 comm="syz.6.4109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 356.923555][ T29] audit: type=1326 audit(1756074516.276:8691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15649 comm="syz.6.4109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 356.947034][ T29] audit: type=1326 audit(1756074516.276:8692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15649 comm="syz.6.4109" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 358.151991][T15707] netdevsim netdevsim3 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 358.234922][T15707] netdevsim netdevsim3 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 358.298984][T15707] netdevsim netdevsim3 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 358.373158][T15707] netdevsim netdevsim3 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 358.459657][T12303] netdevsim netdevsim3 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.492911][T12303] netdevsim netdevsim3 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.516463][T12303] netdevsim netdevsim3 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.534001][T12303] netdevsim netdevsim3 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 358.807487][T15742] lo speed is unknown, defaulting to 1000 [ 358.893126][T15742] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4133'. [ 359.363002][T15758] FAULT_INJECTION: forcing a failure. [ 359.363002][T15758] name failslab, interval 1, probability 0, space 0, times 0 [ 359.375715][T15758] CPU: 0 UID: 0 PID: 15758 Comm: syz.0.4143 Not tainted syzkaller #0 PREEMPT(voluntary) [ 359.375747][T15758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 359.375760][T15758] Call Trace: [ 359.375767][T15758] [ 359.375774][T15758] __dump_stack+0x1d/0x30 [ 359.375795][T15758] dump_stack_lvl+0xe8/0x140 [ 359.375814][T15758] dump_stack+0x15/0x1b [ 359.375831][T15758] should_fail_ex+0x265/0x280 [ 359.375891][T15758] should_failslab+0x8c/0xb0 [ 359.375947][T15758] kmem_cache_alloc_noprof+0x50/0x310 [ 359.375971][T15758] ? audit_log_start+0x365/0x6c0 [ 359.376016][T15758] audit_log_start+0x365/0x6c0 [ 359.376089][T15758] audit_seccomp+0x48/0x100 [ 359.376115][T15758] ? __seccomp_filter+0x68c/0x10d0 [ 359.376134][T15758] __seccomp_filter+0x69d/0x10d0 [ 359.376260][T15758] ? vfs_write+0x7e8/0x960 [ 359.376344][T15758] __secure_computing+0x82/0x150 [ 359.376416][T15758] syscall_trace_enter+0xcf/0x1e0 [ 359.376438][T15758] do_syscall_64+0xac/0x200 [ 359.376518][T15758] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 359.376541][T15758] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 359.376665][T15758] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 359.376682][T15758] RIP: 0033:0x7f1d3c46ebe9 [ 359.376697][T15758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 359.376839][T15758] RSP: 002b:00007f1d3aed7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000041 [ 359.376856][T15758] RAX: ffffffffffffffda RBX: 00007f1d3c695fa0 RCX: 00007f1d3c46ebe9 [ 359.376867][T15758] RDX: 0000000000000001 RSI: 0000200000000040 RDI: 0000000000000000 [ 359.376881][T15758] RBP: 00007f1d3aed7090 R08: 0000000000000000 R09: 0000000000000000 [ 359.376895][T15758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.376908][T15758] R13: 00007f1d3c696038 R14: 00007f1d3c695fa0 R15: 00007fff91b17c48 [ 359.376926][T15758] [ 360.541499][T15807] FAULT_INJECTION: forcing a failure. [ 360.541499][T15807] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 360.554648][T15807] CPU: 0 UID: 0 PID: 15807 Comm: syz.4.4159 Not tainted syzkaller #0 PREEMPT(voluntary) [ 360.554675][T15807] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 360.554695][T15807] Call Trace: [ 360.554701][T15807] [ 360.554709][T15807] __dump_stack+0x1d/0x30 [ 360.554729][T15807] dump_stack_lvl+0xe8/0x140 [ 360.554748][T15807] dump_stack+0x15/0x1b [ 360.554765][T15807] should_fail_ex+0x265/0x280 [ 360.554848][T15807] should_fail+0xb/0x20 [ 360.554900][T15807] should_fail_usercopy+0x1a/0x20 [ 360.554977][T15807] _copy_to_user+0x20/0xa0 [ 360.555005][T15807] simple_read_from_buffer+0xb5/0x130 [ 360.555029][T15807] proc_fail_nth_read+0x10e/0x150 [ 360.555133][T15807] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 360.555233][T15807] vfs_read+0x1a8/0x770 [ 360.555250][T15807] ? __rcu_read_unlock+0x4f/0x70 [ 360.555269][T15807] ? __fget_files+0x184/0x1c0 [ 360.555384][T15807] ksys_read+0xda/0x1a0 [ 360.555407][T15807] __x64_sys_read+0x40/0x50 [ 360.555428][T15807] x64_sys_call+0x27bc/0x2ff0 [ 360.555449][T15807] do_syscall_64+0xd2/0x200 [ 360.555470][T15807] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 360.555553][T15807] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 360.555570][T15807] RIP: 0033:0x7f93f346d5fc [ 360.555583][T15807] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 360.555667][T15807] RSP: 002b:00007f93f1ed7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 360.555750][T15807] RAX: ffffffffffffffda RBX: 00007f93f3695fa0 RCX: 00007f93f346d5fc [ 360.555816][T15807] RDX: 000000000000000f RSI: 00007f93f1ed70a0 RDI: 0000000000000006 [ 360.555827][T15807] RBP: 00007f93f1ed7090 R08: 0000000000000000 R09: 0000000000000000 [ 360.555837][T15807] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 360.555847][T15807] R13: 00007f93f3696038 R14: 00007f93f3695fa0 R15: 00007ffd13f93348 [ 360.555863][T15807] [ 360.893761][T15831] lo speed is unknown, defaulting to 1000 [ 360.936923][T15833] SELinux: policydb magic number 0xffffffff does not match expected magic number 0xf97cff8c [ 360.959632][T15833] SELinux: failed to load policy [ 361.147135][T15842] siw: device registration error -23 [ 361.513706][T15851] lo speed is unknown, defaulting to 1000 [ 361.785726][ T29] kauditd_printk_skb: 352 callbacks suppressed [ 361.785738][ T29] audit: type=1326 audit(1756074521.494:9041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15855 comm="syz.6.4176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 361.815458][ T29] audit: type=1326 audit(1756074521.494:9042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15855 comm="syz.6.4176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 361.839069][ T29] audit: type=1326 audit(1756074521.494:9043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15855 comm="syz.6.4176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 361.862605][ T29] audit: type=1326 audit(1756074521.494:9044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15855 comm="syz.6.4176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 361.886273][ T29] audit: type=1326 audit(1756074521.494:9045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15855 comm="syz.6.4176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 361.909802][ T29] audit: type=1326 audit(1756074521.494:9046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15855 comm="syz.6.4176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 361.933376][ T29] audit: type=1326 audit(1756074521.494:9047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15855 comm="syz.6.4176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 361.956895][ T29] audit: type=1326 audit(1756074521.494:9048): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15855 comm="syz.6.4176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 361.980630][ T29] audit: type=1326 audit(1756074521.494:9049): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15855 comm="syz.6.4176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 362.004224][ T29] audit: type=1326 audit(1756074521.494:9050): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15855 comm="syz.6.4176" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 362.245002][T15886] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4179'. [ 362.734941][T15892] lo speed is unknown, defaulting to 1000 [ 363.059725][T15905] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4190'. [ 363.275593][T15919] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1792 sclass=netlink_route_socket pid=15919 comm=syz.5.4195 [ 363.421429][T15927] lo speed is unknown, defaulting to 1000 [ 364.003599][T15971] netlink: 12 bytes leftover after parsing attributes in process `syz.0.4217'. [ 364.070885][T15971] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 364.202443][T15993] sctp: [Deprecated]: syz.0.4226 (pid 15993) Use of struct sctp_assoc_value in delayed_ack socket option. [ 364.202443][T15993] Use struct sctp_sack_info instead [ 364.353967][T15997] lo speed is unknown, defaulting to 1000 [ 364.457401][T15995] netlink: 20 bytes leftover after parsing attributes in process `syz.0.4227'. [ 364.467326][T15995] netlink: 168 bytes leftover after parsing attributes in process `syz.0.4227'. [ 364.477360][T15995] C: renamed from team_slave_0 (while UP) [ 364.496486][T15995] can0: slcan on ttyS3. [ 364.538464][T15994] can0 (unregistered): slcan off ttyS3. [ 364.726385][T12329] nci: nci_rx_work: unknown MT 0x6 [ 364.733645][T16011] netlink: 8 bytes leftover after parsing attributes in process `syz.6.4228'. [ 364.747128][T16013] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 364.756506][T16013] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 365.614199][T16043] FAULT_INJECTION: forcing a failure. [ 365.614199][T16043] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 365.627480][T16043] CPU: 0 UID: 0 PID: 16043 Comm: syz.4.4242 Not tainted syzkaller #0 PREEMPT(voluntary) [ 365.627506][T16043] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 365.627551][T16043] Call Trace: [ 365.627557][T16043] [ 365.627564][T16043] __dump_stack+0x1d/0x30 [ 365.627581][T16043] dump_stack_lvl+0xe8/0x140 [ 365.627596][T16043] dump_stack+0x15/0x1b [ 365.627608][T16043] should_fail_ex+0x265/0x280 [ 365.627625][T16043] should_fail+0xb/0x20 [ 365.627698][T16043] should_fail_usercopy+0x1a/0x20 [ 365.627715][T16043] _copy_from_iter+0xd2/0xe80 [ 365.627733][T16043] ? __build_skb_around+0x1a0/0x200 [ 365.627758][T16043] ? __alloc_skb+0x223/0x320 [ 365.627773][T16043] netlink_sendmsg+0x471/0x6b0 [ 365.627834][T16043] ? __pfx_netlink_sendmsg+0x10/0x10 [ 365.627907][T16043] __sock_sendmsg+0x145/0x180 [ 365.627949][T16043] ____sys_sendmsg+0x31e/0x4e0 [ 365.627967][T16043] ___sys_sendmsg+0x17b/0x1d0 [ 365.627993][T16043] __x64_sys_sendmsg+0xd4/0x160 [ 365.628012][T16043] x64_sys_call+0x191e/0x2ff0 [ 365.628096][T16043] do_syscall_64+0xd2/0x200 [ 365.628116][T16043] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 365.628134][T16043] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 365.628155][T16043] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 365.628203][T16043] RIP: 0033:0x7f93f346ebe9 [ 365.628216][T16043] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 365.628229][T16043] RSP: 002b:00007f93f1ed7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 365.628274][T16043] RAX: ffffffffffffffda RBX: 00007f93f3695fa0 RCX: 00007f93f346ebe9 [ 365.628284][T16043] RDX: 000000002000c800 RSI: 0000200000000380 RDI: 0000000000000005 [ 365.628294][T16043] RBP: 00007f93f1ed7090 R08: 0000000000000000 R09: 0000000000000000 [ 365.628304][T16043] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 365.628314][T16043] R13: 00007f93f3696038 R14: 00007f93f3695fa0 R15: 00007ffd13f93348 [ 365.628328][T16043] [ 366.094373][T16069] lo speed is unknown, defaulting to 1000 [ 366.355930][T16078] FAULT_INJECTION: forcing a failure. [ 366.355930][T16078] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 366.369076][T16078] CPU: 0 UID: 0 PID: 16078 Comm: syz.3.4255 Not tainted syzkaller #0 PREEMPT(voluntary) [ 366.369102][T16078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 366.369114][T16078] Call Trace: [ 366.369121][T16078] [ 366.369128][T16078] __dump_stack+0x1d/0x30 [ 366.369162][T16078] dump_stack_lvl+0xe8/0x140 [ 366.369177][T16078] dump_stack+0x15/0x1b [ 366.369190][T16078] should_fail_ex+0x265/0x280 [ 366.369206][T16078] should_fail+0xb/0x20 [ 366.369232][T16078] should_fail_usercopy+0x1a/0x20 [ 366.369249][T16078] strncpy_from_user+0x25/0x230 [ 366.369271][T16078] getname_flags+0x230/0x3b0 [ 366.369303][T16078] __se_sys_statx+0x5e/0x1b0 [ 366.369386][T16078] ? vfs_write+0x7e8/0x960 [ 366.369402][T16078] ? __rcu_read_unlock+0x4f/0x70 [ 366.369418][T16078] ? __fget_files+0x184/0x1c0 [ 366.369441][T16078] ? fput+0x8f/0xc0 [ 366.369479][T16078] ? ksys_write+0x192/0x1a0 [ 366.369529][T16078] __x64_sys_statx+0x67/0x80 [ 366.369551][T16078] x64_sys_call+0x2cb8/0x2ff0 [ 366.369630][T16078] do_syscall_64+0xd2/0x200 [ 366.369678][T16078] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 366.369696][T16078] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 366.369714][T16078] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 366.369797][T16078] RIP: 0033:0x7ff8be5aebe9 [ 366.369832][T16078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 366.369846][T16078] RSP: 002b:00007ff8bd00f038 EFLAGS: 00000246 ORIG_RAX: 000000000000014c [ 366.369861][T16078] RAX: ffffffffffffffda RBX: 00007ff8be7d5fa0 RCX: 00007ff8be5aebe9 [ 366.369872][T16078] RDX: 0000000000006000 RSI: 0000200000000000 RDI: ffffffffffffffff [ 366.369882][T16078] RBP: 00007ff8bd00f090 R08: 0000000000000000 R09: 0000000000000000 [ 366.369892][T16078] R10: 0000000000000400 R11: 0000000000000246 R12: 0000000000000001 [ 366.369939][T16078] R13: 00007ff8be7d6038 R14: 00007ff8be7d5fa0 R15: 00007ffce0e9dae8 [ 366.369953][T16078] [ 366.569254][ T29] kauditd_printk_skb: 119 callbacks suppressed [ 366.569267][ T29] audit: type=1326 audit(1756074526.293:9170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16077 comm="syz.5.4254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d29b7ebe9 code=0x7ffc0000 [ 366.598960][ T29] audit: type=1326 audit(1756074526.293:9171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16077 comm="syz.5.4254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d29b7ebe9 code=0x7ffc0000 [ 366.622526][ T29] audit: type=1326 audit(1756074526.293:9172): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16077 comm="syz.5.4254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1d29b7ebe9 code=0x7ffc0000 [ 366.645987][ T29] audit: type=1326 audit(1756074526.293:9173): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16077 comm="syz.5.4254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d29b7ebe9 code=0x7ffc0000 [ 366.669675][ T29] audit: type=1326 audit(1756074526.293:9174): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16077 comm="syz.5.4254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1d29b7ebe9 code=0x7ffc0000 [ 366.693176][ T29] audit: type=1326 audit(1756074526.293:9175): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16077 comm="syz.5.4254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d29b7ebe9 code=0x7ffc0000 [ 366.716734][ T29] audit: type=1326 audit(1756074526.293:9176): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16077 comm="syz.5.4254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1d29b7ebe9 code=0x7ffc0000 [ 366.740264][ T29] audit: type=1326 audit(1756074526.523:9177): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16077 comm="syz.5.4254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d29b7ebe9 code=0x7ffc0000 [ 366.877466][ T29] audit: type=1326 audit(1756074526.828:9178): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16077 comm="syz.5.4254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d29b7ebe9 code=0x7ffc0000 [ 366.901676][ T29] audit: type=1326 audit(1756074526.838:9179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16077 comm="syz.5.4254" exe="/root/syz-executor" sig=0 arch=c000003e syscall=259 compat=0 ip=0x7f1d29b7ebe9 code=0x7ffc0000 [ 367.792127][T16124] IPVS: sync thread started: state = MASTER, mcast_ifn = bridge_slave_0, syncid = 0, id = 0 [ 367.870208][T16135] lo speed is unknown, defaulting to 1000 [ 367.876919][T16137] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pid=16137 comm=syz.5.4274 [ 367.942605][T16155] wg2: entered promiscuous mode [ 367.947529][T16155] wg2: entered allmulticast mode [ 368.029642][T16166] syzkaller1: entered promiscuous mode [ 368.035216][T16166] syzkaller1: entered allmulticast mode [ 368.664073][T16191] netlink: 144 bytes leftover after parsing attributes in process `syz.0.4293'. [ 368.674894][T16191] netlink: 20 bytes leftover after parsing attributes in process `syz.0.4293'. [ 368.699397][T16195] geneve2: entered promiscuous mode [ 368.704726][T16195] geneve2: entered allmulticast mode [ 368.711901][ T4390] netdevsim netdevsim3 eth0: set [1, 1] type 2 family 0 port 20000 - 0 [ 368.723418][T16191] netlink: 156 bytes leftover after parsing attributes in process `syz.0.4293'. [ 368.732881][ T4390] netdevsim netdevsim3 eth1: set [1, 1] type 2 family 0 port 20000 - 0 [ 368.741255][ T4390] netdevsim netdevsim3 eth2: set [1, 1] type 2 family 0 port 20000 - 0 [ 368.749646][ T4390] netdevsim netdevsim3 eth3: set [1, 1] type 2 family 0 port 20000 - 0 [ 368.762060][T16197] netlink: 8 bytes leftover after parsing attributes in process `syz.3.4297'. [ 368.770967][T16197] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4297'. [ 369.691597][T16231] lo speed is unknown, defaulting to 1000 [ 370.062536][T16246] FAULT_INJECTION: forcing a failure. [ 370.062536][T16246] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 370.075671][T16246] CPU: 0 UID: 0 PID: 16246 Comm: syz.6.4315 Not tainted syzkaller #0 PREEMPT(voluntary) [ 370.075699][T16246] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 370.075782][T16246] Call Trace: [ 370.075789][T16246] [ 370.075796][T16246] __dump_stack+0x1d/0x30 [ 370.075817][T16246] dump_stack_lvl+0xe8/0x140 [ 370.075836][T16246] dump_stack+0x15/0x1b [ 370.075851][T16246] should_fail_ex+0x265/0x280 [ 370.075934][T16246] should_fail+0xb/0x20 [ 370.075950][T16246] should_fail_usercopy+0x1a/0x20 [ 370.075969][T16246] _copy_from_user+0x1c/0xb0 [ 370.075992][T16246] sctp_getsockopt_connectx3+0xda/0x300 [ 370.076083][T16246] sctp_getsockopt+0x910/0xaa0 [ 370.076132][T16246] sock_common_getsockopt+0x5d/0x70 [ 370.076156][T16246] ? __pfx_sock_common_getsockopt+0x10/0x10 [ 370.076195][T16246] do_sock_getsockopt+0x1fd/0x240 [ 370.076220][T16246] __x64_sys_getsockopt+0x11e/0x1a0 [ 370.076293][T16246] x64_sys_call+0x2bc6/0x2ff0 [ 370.076310][T16246] do_syscall_64+0xd2/0x200 [ 370.076332][T16246] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 370.076351][T16246] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 370.076415][T16246] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 370.076432][T16246] RIP: 0033:0x7f38b34debe9 [ 370.076445][T16246] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 370.076460][T16246] RSP: 002b:00007f38b1f47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000037 [ 370.076476][T16246] RAX: ffffffffffffffda RBX: 00007f38b3705fa0 RCX: 00007f38b34debe9 [ 370.076487][T16246] RDX: 000000000000006f RSI: 0000000000000084 RDI: 000000000000000a [ 370.076562][T16246] RBP: 00007f38b1f47090 R08: 0000200000000100 R09: 0000000000000000 [ 370.076573][T16246] R10: 00002000000000c0 R11: 0000000000000246 R12: 0000000000000001 [ 370.076654][T16246] R13: 00007f38b3706038 R14: 00007f38b3705fa0 R15: 00007ffec0c8c1a8 [ 370.076669][T16246] [ 370.331090][T16249] lo speed is unknown, defaulting to 1000 [ 370.359403][T16249] netlink: 24 bytes leftover after parsing attributes in process `syz.3.4313'. [ 370.640962][T16253] netlink: 144 bytes leftover after parsing attributes in process `syz.4.4317'. [ 370.667223][T16253] netlink: 20 bytes leftover after parsing attributes in process `syz.4.4317'. [ 371.595628][ T29] kauditd_printk_skb: 127 callbacks suppressed [ 371.595639][ T29] audit: type=1400 audit(1756074531.794:9307): avc: denied { mounton } for pid=16295 comm="syz.0.4331" path="/256/file0" dev="tmpfs" ino=1350 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 371.658468][T16303] FAULT_INJECTION: forcing a failure. [ 371.658468][T16303] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 371.672942][T16303] CPU: 1 UID: 0 PID: 16303 Comm: syz.5.4334 Not tainted syzkaller #0 PREEMPT(voluntary) [ 371.673074][T16303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 371.673084][T16303] Call Trace: [ 371.673090][T16303] [ 371.673097][T16303] __dump_stack+0x1d/0x30 [ 371.673119][T16303] dump_stack_lvl+0xe8/0x140 [ 371.673138][T16303] dump_stack+0x15/0x1b [ 371.673156][T16303] should_fail_ex+0x265/0x280 [ 371.673178][T16303] should_fail+0xb/0x20 [ 371.673193][T16303] should_fail_usercopy+0x1a/0x20 [ 371.673217][T16303] _copy_to_user+0x20/0xa0 [ 371.673245][T16303] simple_read_from_buffer+0xb5/0x130 [ 371.673268][T16303] proc_fail_nth_read+0x10e/0x150 [ 371.673312][T16303] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 371.673399][T16303] vfs_read+0x1a8/0x770 [ 371.673419][T16303] ? __rcu_read_unlock+0x4f/0x70 [ 371.673441][T16303] ? __fget_files+0x184/0x1c0 [ 371.673462][T16303] ksys_read+0xda/0x1a0 [ 371.673495][T16303] __x64_sys_read+0x40/0x50 [ 371.673516][T16303] x64_sys_call+0x27bc/0x2ff0 [ 371.673537][T16303] do_syscall_64+0xd2/0x200 [ 371.673574][T16303] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 371.673595][T16303] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 371.673619][T16303] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 371.673644][T16303] RIP: 0033:0x7f1d29b7d5fc [ 371.673657][T16303] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 371.673670][T16303] RSP: 002b:00007f1d285df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 371.673687][T16303] RAX: ffffffffffffffda RBX: 00007f1d29da5fa0 RCX: 00007f1d29b7d5fc [ 371.673700][T16303] RDX: 000000000000000f RSI: 00007f1d285df0a0 RDI: 0000000000000007 [ 371.673767][T16303] RBP: 00007f1d285df090 R08: 0000000000000000 R09: 0000000000000000 [ 371.673780][T16303] R10: 0000000002040000 R11: 0000000000000246 R12: 0000000000000001 [ 371.673793][T16303] R13: 00007f1d29da6038 R14: 00007f1d29da5fa0 R15: 00007ffd20e31688 [ 371.673878][T16303] [ 372.004217][T16310] lo speed is unknown, defaulting to 1000 [ 372.068754][T16313] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4332'. [ 372.193346][ T29] audit: type=1326 audit(1756074532.424:9308): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16320 comm="syz.4.4339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 372.216878][ T29] audit: type=1326 audit(1756074532.424:9309): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16320 comm="syz.4.4339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 372.240426][ T29] audit: type=1326 audit(1756074532.424:9310): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16320 comm="syz.4.4339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 372.263911][ T29] audit: type=1326 audit(1756074532.424:9311): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16320 comm="syz.4.4339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 372.287474][ T29] audit: type=1326 audit(1756074532.424:9312): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16320 comm="syz.4.4339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 372.310981][ T29] audit: type=1326 audit(1756074532.424:9313): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16320 comm="syz.4.4339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 372.334450][ T29] audit: type=1326 audit(1756074532.424:9314): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16320 comm="syz.4.4339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 372.358072][ T29] audit: type=1326 audit(1756074532.424:9315): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16320 comm="syz.4.4339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 372.381575][ T29] audit: type=1326 audit(1756074532.424:9316): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16320 comm="syz.4.4339" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f93f346ebe9 code=0x7ffc0000 [ 372.428631][T16333] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4341'. [ 372.633574][T16349] netlink: 144 bytes leftover after parsing attributes in process `syz.5.4348'. [ 372.643568][T16349] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4348'. [ 373.117639][T16365] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4352'. [ 373.319921][T16376] lo speed is unknown, defaulting to 1000 [ 373.352970][T16376] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4353'. [ 374.831436][T16422] random: crng reseeded on system resumption [ 374.837774][T16419] lo speed is unknown, defaulting to 1000 [ 374.864485][T16419] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4371'. [ 374.922534][T16428] FAULT_INJECTION: forcing a failure. [ 374.922534][T16428] name failslab, interval 1, probability 0, space 0, times 0 [ 374.936436][T16428] CPU: 1 UID: 0 PID: 16428 Comm: +}[@ Not tainted syzkaller #0 PREEMPT(voluntary) [ 374.936463][T16428] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 374.936477][T16428] Call Trace: [ 374.936554][T16428] [ 374.936562][T16428] __dump_stack+0x1d/0x30 [ 374.936582][T16428] dump_stack_lvl+0xe8/0x140 [ 374.936606][T16428] dump_stack+0x15/0x1b [ 374.936639][T16428] should_fail_ex+0x265/0x280 [ 374.936658][T16428] should_failslab+0x8c/0xb0 [ 374.936761][T16428] __kmalloc_noprof+0xa5/0x3e0 [ 374.936786][T16428] ? get_callchain_buffers+0xbe/0x2f0 [ 374.936809][T16428] ? static_key_slow_inc+0x21/0x30 [ 374.936858][T16428] get_callchain_buffers+0xbe/0x2f0 [ 374.936880][T16428] perf_event_alloc+0x1573/0x1740 [ 374.936912][T16428] __se_sys_perf_event_open+0x615/0x11c0 [ 374.936953][T16428] ? __rcu_read_unlock+0x4f/0x70 [ 374.936988][T16428] __x64_sys_perf_event_open+0x67/0x80 [ 374.937012][T16428] x64_sys_call+0x7bd/0x2ff0 [ 374.937029][T16428] do_syscall_64+0xd2/0x200 [ 374.937094][T16428] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 374.937207][T16428] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 374.937227][T16428] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 374.937245][T16428] RIP: 0033:0x7f1d29b7ebe9 [ 374.937261][T16428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 374.937274][T16428] RSP: 002b:00007f1d285df038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 374.937294][T16428] RAX: ffffffffffffffda RBX: 00007f1d29da5fa0 RCX: 00007f1d29b7ebe9 [ 374.937305][T16428] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: 0000200000000100 [ 374.937319][T16428] RBP: 00007f1d285df090 R08: 0000000000000000 R09: 0000000000000000 [ 374.937332][T16428] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 374.937361][T16428] R13: 00007f1d29da6038 R14: 00007f1d29da5fa0 R15: 00007ffd20e31688 [ 374.937381][T16428] [ 376.662063][T16465] lo speed is unknown, defaulting to 1000 [ 376.687486][T16465] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4384'. [ 377.852227][ T29] kauditd_printk_skb: 150 callbacks suppressed [ 377.852243][ T29] audit: type=1326 audit(1756074538.367:9467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16510 comm="syz.0.4399" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 377.856848][T16518] random: crng reseeded on system resumption [ 377.889228][ T29] audit: type=1326 audit(1756074538.367:9468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16510 comm="syz.0.4399" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 377.912808][ T29] audit: type=1326 audit(1756074538.367:9469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16510 comm="syz.0.4399" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 377.936324][ T29] audit: type=1326 audit(1756074538.367:9470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16510 comm="syz.0.4399" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 377.959883][ T29] audit: type=1326 audit(1756074538.367:9471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16510 comm="syz.0.4399" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 377.983562][ T29] audit: type=1326 audit(1756074538.367:9472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16510 comm="syz.0.4399" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 378.007062][ T29] audit: type=1326 audit(1756074538.367:9473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16510 comm="syz.0.4399" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 378.030555][ T29] audit: type=1326 audit(1756074538.367:9474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16510 comm="syz.0.4399" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 378.054034][ T29] audit: type=1326 audit(1756074538.367:9475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16510 comm="syz.0.4399" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 378.077516][ T29] audit: type=1326 audit(1756074538.367:9476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16510 comm="syz.0.4399" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 378.104441][T16521] netlink: 76 bytes leftover after parsing attributes in process `syz.6.4402'. [ 378.644020][T16532] batadv0: entered promiscuous mode [ 378.684074][T16532] macsec0: entered promiscuous mode [ 378.722186][T16532] batadv0: left promiscuous mode [ 378.818022][T16534] FAULT_INJECTION: forcing a failure. [ 378.818022][T16534] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 378.831166][T16534] CPU: 0 UID: 0 PID: 16534 Comm: syz.3.4407 Not tainted syzkaller #0 PREEMPT(voluntary) [ 378.831193][T16534] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 378.831206][T16534] Call Trace: [ 378.831212][T16534] [ 378.831225][T16534] __dump_stack+0x1d/0x30 [ 378.831244][T16534] dump_stack_lvl+0xe8/0x140 [ 378.831260][T16534] dump_stack+0x15/0x1b [ 378.831275][T16534] should_fail_ex+0x265/0x280 [ 378.831317][T16534] should_fail+0xb/0x20 [ 378.831334][T16534] should_fail_usercopy+0x1a/0x20 [ 378.831420][T16534] _copy_to_user+0x20/0xa0 [ 378.831448][T16534] simple_read_from_buffer+0xb5/0x130 [ 378.831488][T16534] proc_fail_nth_read+0x10e/0x150 [ 378.831513][T16534] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 378.831538][T16534] vfs_read+0x1a8/0x770 [ 378.831628][T16534] ? do_fcntl+0x524/0xdf0 [ 378.831654][T16534] ? selinux_file_fcntl+0x1b4/0x1e0 [ 378.831673][T16534] ksys_read+0xda/0x1a0 [ 378.831738][T16534] __x64_sys_read+0x40/0x50 [ 378.831760][T16534] x64_sys_call+0x27bc/0x2ff0 [ 378.831782][T16534] do_syscall_64+0xd2/0x200 [ 378.831866][T16534] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 378.831890][T16534] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 378.831915][T16534] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 378.832043][T16534] RIP: 0033:0x7ff8be5ad5fc [ 378.832056][T16534] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 378.832140][T16534] RSP: 002b:00007ff8bd00f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 378.832157][T16534] RAX: ffffffffffffffda RBX: 00007ff8be7d5fa0 RCX: 00007ff8be5ad5fc [ 378.832168][T16534] RDX: 000000000000000f RSI: 00007ff8bd00f0a0 RDI: 0000000000000005 [ 378.832179][T16534] RBP: 00007ff8bd00f090 R08: 0000000000000000 R09: 0000000000000000 [ 378.832191][T16534] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 378.832204][T16534] R13: 00007ff8be7d6038 R14: 00007ff8be7d5fa0 R15: 00007ffce0e9dae8 [ 378.832223][T16534] [ 379.204261][T16551] lo speed is unknown, defaulting to 1000 [ 379.431693][T16570] netlink: 204 bytes leftover after parsing attributes in process `syz.3.4421'. [ 380.333178][T16611] netlink: 20 bytes leftover after parsing attributes in process `syz.4.4433'. [ 381.685167][T16675] lo speed is unknown, defaulting to 1000 [ 381.715975][T16679] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4445'. [ 381.944560][T16677] FAULT_INJECTION: forcing a failure. [ 381.944560][T16677] name failslab, interval 1, probability 0, space 0, times 0 [ 381.957342][T16677] CPU: 0 UID: 0 PID: 16677 Comm: syz.3.4458 Not tainted syzkaller #0 PREEMPT(voluntary) [ 381.957365][T16677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 381.957376][T16677] Call Trace: [ 381.957381][T16677] [ 381.957388][T16677] __dump_stack+0x1d/0x30 [ 381.957454][T16677] dump_stack_lvl+0xe8/0x140 [ 381.957474][T16677] dump_stack+0x15/0x1b [ 381.957493][T16677] should_fail_ex+0x265/0x280 [ 381.957515][T16677] should_failslab+0x8c/0xb0 [ 381.957540][T16677] kmem_cache_alloc_noprof+0x50/0x310 [ 381.957566][T16677] ? security_inode_alloc+0x37/0x100 [ 381.957631][T16677] security_inode_alloc+0x37/0x100 [ 381.957731][T16677] inode_init_always_gfp+0x4b7/0x500 [ 381.957750][T16677] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 381.957771][T16677] alloc_inode+0x58/0x170 [ 381.957793][T16677] new_inode+0x1d/0xe0 [ 381.957821][T16677] shmem_get_inode+0x244/0x750 [ 381.957841][T16677] shmem_mknod+0x46/0x180 [ 381.957861][T16677] shmem_create+0x34/0x50 [ 381.957882][T16677] ? __pfx_shmem_create+0x10/0x10 [ 381.957946][T16677] path_openat+0x1105/0x2170 [ 381.957973][T16677] do_filp_open+0x109/0x230 [ 381.958001][T16677] do_sys_openat2+0xa6/0x110 [ 381.958101][T16677] __x64_sys_openat+0xf2/0x120 [ 381.958126][T16677] x64_sys_call+0x2e9c/0x2ff0 [ 381.958231][T16677] do_syscall_64+0xd2/0x200 [ 381.958256][T16677] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 381.958277][T16677] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 381.958298][T16677] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 381.958315][T16677] RIP: 0033:0x7ff8be5aebe9 [ 381.958395][T16677] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 381.958433][T16677] RSP: 002b:00007ff8bd00f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 381.958450][T16677] RAX: ffffffffffffffda RBX: 00007ff8be7d5fa0 RCX: 00007ff8be5aebe9 [ 381.958464][T16677] RDX: 000000000000275a RSI: 0000200000000440 RDI: ffffffffffffff9c [ 381.958474][T16677] RBP: 00007ff8bd00f090 R08: 0000000000000000 R09: 0000000000000000 [ 381.958548][T16677] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 381.958560][T16677] R13: 00007ff8be7d6038 R14: 00007ff8be7d5fa0 R15: 00007ffce0e9dae8 [ 381.958633][T16677] [ 383.048980][T16706] IPv6: Can't replace route, no match found [ 383.234051][ C1] sd 0:0:1:0: [sda] tag#1363 FAILED Result: hostbyte=DID_ERROR driverbyte=DRIVER_OK cmd_age=0s [ 383.244481][ C1] sd 0:0:1:0: [sda] tag#1363 CDB: Read(6) 08 00 0c 6a 08 48 [ 383.457837][ T29] kauditd_printk_skb: 117 callbacks suppressed [ 383.457900][ T29] audit: type=1326 audit(1756074544.257:9594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16726 comm="syz.3.4475" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 383.505611][ T29] audit: type=1326 audit(1756074544.288:9595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16726 comm="syz.3.4475" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 383.530320][ T29] audit: type=1326 audit(1756074544.288:9596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16726 comm="syz.3.4475" exe="/root/syz-executor" sig=0 arch=c000003e syscall=137 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 383.535299][T16731] netlink: 664 bytes leftover after parsing attributes in process `syz.0.4477'. [ 383.555305][ T29] audit: type=1326 audit(1756074544.288:9597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16726 comm="syz.3.4475" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 383.587893][ T29] audit: type=1326 audit(1756074544.288:9598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16726 comm="syz.3.4475" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 383.612052][ T29] audit: type=1326 audit(1756074544.288:9599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16726 comm="syz.3.4475" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 383.636729][ T29] audit: type=1326 audit(1756074544.288:9600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16726 comm="syz.3.4475" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 383.636758][ T29] audit: type=1326 audit(1756074544.288:9601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16726 comm="syz.3.4475" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 383.636855][ T29] audit: type=1326 audit(1756074544.288:9602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16726 comm="syz.3.4475" exe="/root/syz-executor" sig=0 arch=c000003e syscall=18 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 383.636943][ T29] audit: type=1326 audit(1756074544.288:9603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16726 comm="syz.3.4475" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 383.705721][T16722] lo speed is unknown, defaulting to 1000 [ 383.709283][T16740] lo speed is unknown, defaulting to 1000 [ 384.068696][T16759] TCP: request_sock_subflow_v4: Possible SYN flooding on port [::]:20002. Sending cookies. [ 384.737184][T16788] FAULT_INJECTION: forcing a failure. [ 384.737184][T16788] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 384.750285][T16788] CPU: 0 UID: 0 PID: 16788 Comm: syz.6.4492 Not tainted syzkaller #0 PREEMPT(voluntary) [ 384.750309][T16788] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 384.750319][T16788] Call Trace: [ 384.750333][T16788] [ 384.750340][T16788] __dump_stack+0x1d/0x30 [ 384.750359][T16788] dump_stack_lvl+0xe8/0x140 [ 384.750379][T16788] dump_stack+0x15/0x1b [ 384.750392][T16788] should_fail_ex+0x265/0x280 [ 384.750410][T16788] should_fail+0xb/0x20 [ 384.750424][T16788] should_fail_usercopy+0x1a/0x20 [ 384.750473][T16788] _copy_to_user+0x20/0xa0 [ 384.750568][T16788] simple_read_from_buffer+0xb5/0x130 [ 384.750661][T16788] proc_fail_nth_read+0x10e/0x150 [ 384.750718][T16788] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 384.750744][T16788] vfs_read+0x1a8/0x770 [ 384.750770][T16788] ? __rcu_read_unlock+0x4f/0x70 [ 384.750792][T16788] ? __fget_files+0x184/0x1c0 [ 384.750822][T16788] ksys_read+0xda/0x1a0 [ 384.750840][T16788] __x64_sys_read+0x40/0x50 [ 384.750857][T16788] x64_sys_call+0x27bc/0x2ff0 [ 384.750874][T16788] do_syscall_64+0xd2/0x200 [ 384.750941][T16788] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 384.751011][T16788] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 384.751089][T16788] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 384.751110][T16788] RIP: 0033:0x7f38b34dd5fc [ 384.751123][T16788] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 384.751214][T16788] RSP: 002b:00007f38b1f47030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 384.751230][T16788] RAX: ffffffffffffffda RBX: 00007f38b3705fa0 RCX: 00007f38b34dd5fc [ 384.751242][T16788] RDX: 000000000000000f RSI: 00007f38b1f470a0 RDI: 0000000000000009 [ 384.751256][T16788] RBP: 00007f38b1f47090 R08: 0000000000000000 R09: 0000000000000000 [ 384.751269][T16788] R10: 000000000000003e R11: 0000000000000246 R12: 0000000000000001 [ 384.751285][T16788] R13: 00007f38b3706038 R14: 00007f38b3705fa0 R15: 00007ffec0c8c1a8 [ 384.751304][T16788] [ 385.074579][T16801] loop0: detected capacity change from 0 to 1024 [ 385.089082][T16801] EXT4-fs: Ignoring removed bh option [ 385.116671][T16801] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 385.389768][T16800] lo speed is unknown, defaulting to 1000 [ 385.755746][T16841] ÿ: renamed from bond_slave_0 (while UP) [ 385.857012][T12650] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 386.310136][T16846] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4509'. [ 386.332459][T16846] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4509'. [ 387.254121][T16878] lo speed is unknown, defaulting to 1000 [ 387.280993][T16882] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4518'. [ 387.366079][T16880] sg_write: data in/out 11329/120 bytes for SCSI command 0x0-- guessing data in; [ 387.366079][T16880] program syz.3.4520 not setting count and/or reply_len properly [ 387.366764][T16890] vlan0: entered allmulticast mode [ 387.389765][T16890] dummy0: entered allmulticast mode [ 387.686027][T16901] lo speed is unknown, defaulting to 1000 [ 387.726077][T16903] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4523'. [ 388.442399][ T29] kauditd_printk_skb: 128 callbacks suppressed [ 388.442415][ T29] audit: type=1326 audit(1756074549.485:9732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16916 comm="syz.3.4531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 388.472213][ T29] audit: type=1326 audit(1756074549.485:9733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16916 comm="syz.3.4531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 388.495839][ T29] audit: type=1326 audit(1756074549.485:9734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16916 comm="syz.3.4531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 388.519265][ T29] audit: type=1326 audit(1756074549.485:9735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16916 comm="syz.3.4531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 388.543016][ T29] audit: type=1326 audit(1756074549.485:9736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16916 comm="syz.3.4531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 388.568202][ T29] audit: type=1326 audit(1756074549.527:9737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16918 comm="syz.6.4532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 388.591790][ T29] audit: type=1326 audit(1756074549.527:9738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16918 comm="syz.6.4532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 388.615280][ T29] audit: type=1326 audit(1756074549.527:9739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16918 comm="syz.6.4532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 388.638757][ T29] audit: type=1326 audit(1756074549.527:9740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16918 comm="syz.6.4532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 388.662232][ T29] audit: type=1326 audit(1756074549.527:9741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16918 comm="syz.6.4532" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 388.689493][T16923] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4533'. [ 388.723225][T16925] lo speed is unknown, defaulting to 1000 [ 388.875225][T16942] tracefs: Bad value for 'mode' [ 388.886102][T16944] loop0: detected capacity change from 0 to 512 [ 388.894398][T16944] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 388.907547][T16944] EXT4-fs (loop0): 1 truncate cleaned up [ 388.917026][T16944] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 389.031369][T12650] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 389.233412][T16962] netlink: 20 bytes leftover after parsing attributes in process `syz.6.4546'. [ 389.255355][T16967] netlink: 20 bytes leftover after parsing attributes in process `syz.6.4547'. [ 389.338546][T16970] lo speed is unknown, defaulting to 1000 [ 389.734599][T16986] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4555'. [ 389.876517][T16994] netlink: 20 bytes leftover after parsing attributes in process `syz.0.4558'. [ 390.039376][T16996] Invalid ELF header type: 3 != 1 [ 390.195973][T17022] FAULT_INJECTION: forcing a failure. [ 390.195973][T17022] name failslab, interval 1, probability 0, space 0, times 0 [ 390.209829][T17022] CPU: 1 UID: 0 PID: 17022 Comm: syz.6.4565 Not tainted syzkaller #0 PREEMPT(voluntary) [ 390.209856][T17022] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 390.209870][T17022] Call Trace: [ 390.209877][T17022] [ 390.209885][T17022] __dump_stack+0x1d/0x30 [ 390.209907][T17022] dump_stack_lvl+0xe8/0x140 [ 390.209937][T17022] dump_stack+0x15/0x1b [ 390.209953][T17022] should_fail_ex+0x265/0x280 [ 390.210019][T17022] ? audit_log_d_path+0x8d/0x150 [ 390.210047][T17022] should_failslab+0x8c/0xb0 [ 390.210066][T17022] __kmalloc_cache_noprof+0x4c/0x320 [ 390.210240][T17022] audit_log_d_path+0x8d/0x150 [ 390.210272][T17022] audit_log_d_path_exe+0x42/0x70 [ 390.210365][T17022] audit_log_task+0x1e9/0x250 [ 390.210389][T17022] audit_seccomp+0x61/0x100 [ 390.210415][T17022] ? __seccomp_filter+0x68c/0x10d0 [ 390.210432][T17022] __seccomp_filter+0x69d/0x10d0 [ 390.210530][T17022] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 390.210557][T17022] ? vfs_write+0x7e8/0x960 [ 390.210643][T17022] ? __rcu_read_unlock+0x4f/0x70 [ 390.210737][T17022] ? __fget_files+0x184/0x1c0 [ 390.210763][T17022] __secure_computing+0x82/0x150 [ 390.210818][T17022] syscall_trace_enter+0xcf/0x1e0 [ 390.210842][T17022] do_syscall_64+0xac/0x200 [ 390.210867][T17022] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 390.210898][T17022] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 390.210923][T17022] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 390.210944][T17022] RIP: 0033:0x7f38b34debe9 [ 390.210962][T17022] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 390.210986][T17022] RSP: 002b:00007f38b1f47038 EFLAGS: 00000246 ORIG_RAX: 000000000000010a [ 390.211003][T17022] RAX: ffffffffffffffda RBX: 00007f38b3705fa0 RCX: 00007f38b34debe9 [ 390.211014][T17022] RDX: 0000200000000140 RSI: 0000000000000005 RDI: 0000200000000000 [ 390.211027][T17022] RBP: 00007f38b1f47090 R08: 0000000000000000 R09: 0000000000000000 [ 390.211086][T17022] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 390.211099][T17022] R13: 00007f38b3706038 R14: 00007f38b3705fa0 R15: 00007ffec0c8c1a8 [ 390.211116][T17022] [ 390.556550][T17029] lo speed is unknown, defaulting to 1000 [ 390.584393][T17029] netlink: 24 bytes leftover after parsing attributes in process `syz.5.4563'. [ 390.894769][T17040] wireguard0: entered promiscuous mode [ 390.900286][T17040] wireguard0: entered allmulticast mode [ 390.978285][T17053] random: crng reseeded on system resumption [ 390.989166][T17053] vhci_hcd: invalid port number 23 [ 392.091605][T17090] lo speed is unknown, defaulting to 1000 [ 392.117581][T17090] __nla_validate_parse: 1 callbacks suppressed [ 392.117597][T17090] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4583'. [ 392.152128][T17081] lo speed is unknown, defaulting to 1000 [ 392.170613][T17087] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4586'. [ 392.187248][T17087] veth0: entered promiscuous mode [ 392.193047][T17087] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4586'. [ 392.551846][T17111] loop0: detected capacity change from 0 to 2048 [ 392.568262][T17120] netlink: 'syz.6.4598': attribute type 3 has an invalid length. [ 392.580420][T17111] loop0: p1 < > p4 [ 392.585037][T17111] loop0: p4 size 8388608 extends beyond EOD, truncated [ 392.770020][T17126] : renamed from bond0 (while UP) [ 393.149704][T17153] lo speed is unknown, defaulting to 1000 [ 393.270520][T17155] lo speed is unknown, defaulting to 1000 [ 393.296263][T17155] netlink: 24 bytes leftover after parsing attributes in process `syz.3.4607'. [ 393.715339][T17162] netlink: 'syz.0.4611': attribute type 3 has an invalid length. [ 393.979005][T17170] : renamed from bond0 (while UP) [ 394.550040][T17182] loop0: detected capacity change from 0 to 1024 [ 394.573285][T17182] EXT4-fs: Ignoring removed mblk_io_submit option [ 394.600852][T17182] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 394.633639][T17182] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 394.722056][T17182] EXT4-fs (loop0): shut down requested (1) [ 394.735068][ T29] kauditd_printk_skb: 179 callbacks suppressed [ 394.735085][ T29] audit: type=1326 audit(1756074556.100:9921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17187 comm="syz.6.4621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 394.765979][ T29] audit: type=1326 audit(1756074556.100:9922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17187 comm="syz.6.4621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 394.790714][ T29] audit: type=1326 audit(1756074556.100:9923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17187 comm="syz.6.4621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 394.814306][ T29] audit: type=1326 audit(1756074556.100:9924): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17187 comm="syz.6.4621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 394.839059][ T29] audit: type=1326 audit(1756074556.100:9925): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17187 comm="syz.6.4621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 394.862903][ T29] audit: type=1326 audit(1756074556.100:9926): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17187 comm="syz.6.4621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 394.886487][ T29] audit: type=1326 audit(1756074556.100:9927): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17187 comm="syz.6.4621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 394.911452][ T29] audit: type=1326 audit(1756074556.100:9928): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17187 comm="syz.6.4621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 394.936149][ T29] audit: type=1326 audit(1756074556.100:9929): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17187 comm="syz.6.4621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 394.961152][ T29] audit: type=1326 audit(1756074556.100:9930): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17187 comm="syz.6.4621" exe="/root/syz-executor" sig=0 arch=c000003e syscall=56 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 395.041226][T12650] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 395.906774][T17231] pimreg: entered allmulticast mode [ 396.135050][T17247] netlink: 'syz.5.4637': attribute type 10 has an invalid length. [ 396.162414][T17247] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 396.184610][T17247] bond0: (slave batadv0): Enslaving as an active interface with an up link [ 396.398733][T17262] 9pnet_fd: Insufficient options for proto=fd [ 397.439302][T17299] netlink: 16 bytes leftover after parsing attributes in process `syz.3.4659'. [ 397.527806][T17302] IPv6: NLM_F_CREATE should be specified when creating new route [ 397.685416][T17320] IPVS: sync thread started: state = MASTER, mcast_ifn = veth0_virt_wifi, syncid = 33554432, id = 0 [ 397.760296][T17321] lo speed is unknown, defaulting to 1000 [ 397.800901][T17321] netlink: 24 bytes leftover after parsing attributes in process `syz.5.4664'. [ 398.160235][T17340] loop0: detected capacity change from 0 to 512 [ 398.167607][T17340] ext4: Unknown parameter 'uid>00000000000000000000' [ 398.667951][T17354] SELinux: Context system_u:object_r:crack_db_t:s0 is not valid (left unmapped). [ 399.088557][T17358] netlink: 'syz.3.4674': attribute type 10 has an invalid length. [ 399.232336][T17358] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 399.926181][T17358] : (slave batadv0): Enslaving as an active interface with an up link [ 400.099882][T17381] 9pnet_fd: Insufficient options for proto=fd [ 400.123999][T17384] netlink: 20 bytes leftover after parsing attributes in process `syz.0.4684'. [ 400.149667][T17381] mmap: syz.5.4681 (17381): VmData 165523456 exceed data ulimit 0. Update limits or use boot option ignore_rlimit_data. [ 400.226463][T17391] lo speed is unknown, defaulting to 1000 [ 400.267131][T17391] netlink: 24 bytes leftover after parsing attributes in process `syz.6.4683'. [ 400.283910][ T29] kauditd_printk_skb: 134 callbacks suppressed [ 400.283988][ T29] audit: type=1326 audit(1756074561.822:10065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17385 comm="syz.3.4685" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 400.313933][ T29] audit: type=1326 audit(1756074561.822:10066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17385 comm="syz.3.4685" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 400.337488][ T29] audit: type=1326 audit(1756074561.822:10067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17385 comm="syz.3.4685" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 400.361068][ T29] audit: type=1326 audit(1756074561.822:10068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17385 comm="syz.3.4685" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 400.384529][ T29] audit: type=1326 audit(1756074561.822:10069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17385 comm="syz.3.4685" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 400.408090][ T29] audit: type=1326 audit(1756074561.822:10070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17385 comm="syz.3.4685" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 400.431776][ T29] audit: type=1326 audit(1756074561.822:10071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17385 comm="syz.3.4685" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 400.455321][ T29] audit: type=1326 audit(1756074561.822:10072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17385 comm="syz.3.4685" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 400.573345][T17396] lo speed is unknown, defaulting to 1000 [ 400.996057][ T29] audit: type=1326 audit(1756074562.662:10073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17403 comm="syz.6.4690" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 401.131262][ T29] audit: type=1326 audit(1756074562.693:10074): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17403 comm="syz.6.4690" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38b34debe9 code=0x7ffc0000 [ 401.283693][T17416] FAULT_INJECTION: forcing a failure. [ 401.283693][T17416] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 401.297083][T17416] CPU: 0 UID: 0 PID: 17416 Comm: syz.4.4694 Not tainted syzkaller #0 PREEMPT(voluntary) [ 401.297184][T17416] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 401.297194][T17416] Call Trace: [ 401.297201][T17416] [ 401.297208][T17416] __dump_stack+0x1d/0x30 [ 401.297228][T17416] dump_stack_lvl+0xe8/0x140 [ 401.297244][T17416] dump_stack+0x15/0x1b [ 401.297258][T17416] should_fail_ex+0x265/0x280 [ 401.297322][T17416] should_fail+0xb/0x20 [ 401.297338][T17416] should_fail_usercopy+0x1a/0x20 [ 401.297383][T17416] _copy_from_user+0x1c/0xb0 [ 401.297411][T17416] ___sys_sendmsg+0xc1/0x1d0 [ 401.297445][T17416] __x64_sys_sendmsg+0xd4/0x160 [ 401.297467][T17416] x64_sys_call+0x191e/0x2ff0 [ 401.297515][T17416] do_syscall_64+0xd2/0x200 [ 401.297549][T17416] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 401.297574][T17416] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 401.297603][T17416] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 401.297626][T17416] RIP: 0033:0x7f93f346ebe9 [ 401.297641][T17416] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 401.297715][T17416] RSP: 002b:00007f93f1ed7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 401.297778][T17416] RAX: ffffffffffffffda RBX: 00007f93f3695fa0 RCX: 00007f93f346ebe9 [ 401.297829][T17416] RDX: 0000000000040010 RSI: 0000200000006040 RDI: 0000000000000008 [ 401.297840][T17416] RBP: 00007f93f1ed7090 R08: 0000000000000000 R09: 0000000000000000 [ 401.297864][T17416] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 401.297874][T17416] R13: 00007f93f3696038 R14: 00007f93f3695fa0 R15: 00007ffd13f93348 [ 401.297890][T17416] [ 401.656525][T17431] netlink: 64 bytes leftover after parsing attributes in process `syz.5.4695'. [ 401.931198][T17449] netlink: 20 bytes leftover after parsing attributes in process `syz.0.4705'. [ 402.157705][T17473] FAULT_INJECTION: forcing a failure. [ 402.157705][T17473] name failslab, interval 1, probability 0, space 0, times 0 [ 402.170421][T17473] CPU: 1 UID: 0 PID: 17473 Comm: syz.6.4715 Not tainted syzkaller #0 PREEMPT(voluntary) [ 402.170469][T17473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 402.170548][T17473] Call Trace: [ 402.170555][T17473] [ 402.170561][T17473] __dump_stack+0x1d/0x30 [ 402.170579][T17473] dump_stack_lvl+0xe8/0x140 [ 402.170597][T17473] dump_stack+0x15/0x1b [ 402.170645][T17473] should_fail_ex+0x265/0x280 [ 402.170663][T17473] should_failslab+0x8c/0xb0 [ 402.170688][T17473] kmem_cache_alloc_noprof+0x50/0x310 [ 402.170810][T17473] ? getname_flags+0x80/0x3b0 [ 402.170839][T17473] getname_flags+0x80/0x3b0 [ 402.170866][T17473] do_sys_openat2+0x60/0x110 [ 402.170896][T17473] __x64_sys_openat+0xf2/0x120 [ 402.170953][T17473] x64_sys_call+0x2e9c/0x2ff0 [ 402.171027][T17473] do_syscall_64+0xd2/0x200 [ 402.171043][T17473] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 402.171056][T17473] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 402.171148][T17473] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 402.171162][T17473] RIP: 0033:0x7f38b34debe9 [ 402.171173][T17473] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 402.171182][T17473] RSP: 002b:00007f38b1f47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 402.171248][T17473] RAX: ffffffffffffffda RBX: 00007f38b3705fa0 RCX: 00007f38b34debe9 [ 402.171302][T17473] RDX: 0000000000000000 RSI: 0000200000000100 RDI: ffffffffffffff9c [ 402.171309][T17473] RBP: 00007f38b1f47090 R08: 0000000000000000 R09: 0000000000000000 [ 402.171316][T17473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 402.171399][T17473] R13: 00007f38b3706038 R14: 00007f38b3705fa0 R15: 00007ffec0c8c1a8 [ 402.171414][T17473] [ 402.413322][ T10] IPVS: starting estimator thread 0... [ 402.414988][T17478] netlink: 'syz.3.4716': attribute type 13 has an invalid length. [ 402.429883][T17478] batman_adv: Cannot find parent device. Skipping batadv-on-batadv check for gretap1 [ 402.440833][T17478] gretap1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 402.448806][T17478] gretap1: entered promiscuous mode [ 402.454111][T17478] gretap1: entered allmulticast mode [ 402.469866][T17483] lo speed is unknown, defaulting to 1000 [ 402.491774][T17485] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4719'. [ 402.512793][T17479] IPVS: using max 2496 ests per chain, 124800 per kthread [ 402.586066][T17498] netlink: 36 bytes leftover after parsing attributes in process `syz.3.4725'. [ 402.614284][T17501] netlink: 36 bytes leftover after parsing attributes in process `syz.3.4727'. [ 402.708163][T17510] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=17510 comm=syz.4.4730 [ 402.724810][T17512] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4731'. [ 402.742844][T17510] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4730'. [ 402.751888][T17510] netlink: 'syz.4.4730': attribute type 30 has an invalid length. [ 402.769854][T12326] netdevsim netdevsim4 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 402.778834][T12326] netdevsim netdevsim4 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 402.788734][T12326] netdevsim netdevsim4 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 402.797501][T12326] netdevsim netdevsim4 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 402.853169][T17526] netlink: 100 bytes leftover after parsing attributes in process `syz.4.4736'. [ 402.938390][T17530] loop0: detected capacity change from 0 to 512 [ 402.965265][T17530] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 402.978653][T17530] ext4 filesystem being mounted at /341/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 402.994469][T17530] EXT4-fs (loop0): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 403.657355][T17546] lo speed is unknown, defaulting to 1000 [ 403.806959][T12650] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 403.984203][T17577] loop0: detected capacity change from 0 to 512 [ 403.993067][T17577] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 404.017725][T17577] EXT4-fs (loop0): 1 truncate cleaned up [ 404.023539][T17577] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 404.109425][T12650] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 404.745544][T17612] netlink: 79 bytes leftover after parsing attributes in process `syz.4.4766'. [ 404.817360][T17620] 9p: Unknown uid 00000000004294967295 [ 404.876918][T17625] FAULT_INJECTION: forcing a failure. [ 404.876918][T17625] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 404.890922][T17625] CPU: 1 UID: 0 PID: 17625 Comm: syz.5.4772 Not tainted syzkaller #0 PREEMPT(voluntary) [ 404.890949][T17625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 404.890962][T17625] Call Trace: [ 404.890970][T17625] [ 404.890979][T17625] __dump_stack+0x1d/0x30 [ 404.891004][T17625] dump_stack_lvl+0xe8/0x140 [ 404.891029][T17625] dump_stack+0x15/0x1b [ 404.891093][T17625] should_fail_ex+0x265/0x280 [ 404.891113][T17625] should_fail+0xb/0x20 [ 404.891168][T17625] should_fail_usercopy+0x1a/0x20 [ 404.891190][T17625] _copy_from_user+0x1c/0xb0 [ 404.891278][T17625] ___sys_sendmsg+0xc1/0x1d0 [ 404.891327][T17625] __sys_sendmmsg+0x178/0x300 [ 404.891354][T17625] __x64_sys_sendmmsg+0x57/0x70 [ 404.891376][T17625] x64_sys_call+0x1c4a/0x2ff0 [ 404.891397][T17625] do_syscall_64+0xd2/0x200 [ 404.891479][T17625] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 404.891502][T17625] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 404.891523][T17625] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 404.891540][T17625] RIP: 0033:0x7f1d29b7ebe9 [ 404.891568][T17625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 404.891585][T17625] RSP: 002b:00007f1d285df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 404.891604][T17625] RAX: ffffffffffffffda RBX: 00007f1d29da5fa0 RCX: 00007f1d29b7ebe9 [ 404.891618][T17625] RDX: 0000000000000002 RSI: 0000200000000a40 RDI: 0000000000000003 [ 404.891631][T17625] RBP: 00007f1d285df090 R08: 0000000000000000 R09: 0000000000000000 [ 404.891644][T17625] R10: 0000000004004040 R11: 0000000000000246 R12: 0000000000000001 [ 404.891657][T17625] R13: 00007f1d29da6038 R14: 00007f1d29da5fa0 R15: 00007ffd20e31688 [ 404.891737][T17625] [ 405.150969][T17632] lo speed is unknown, defaulting to 1000 [ 405.184083][ T29] kauditd_printk_skb: 83 callbacks suppressed [ 405.184139][ T29] audit: type=1326 audit(1756074567.061:10158): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17630 comm="syz.0.4774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 405.214003][ T29] audit: type=1326 audit(1756074567.061:10159): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17630 comm="syz.0.4774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 405.258023][ T29] audit: type=1326 audit(1756074567.061:10160): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17630 comm="syz.0.4774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 405.283004][ T29] audit: type=1326 audit(1756074567.061:10161): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17630 comm="syz.0.4774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 405.307122][ T29] audit: type=1326 audit(1756074567.061:10162): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17630 comm="syz.0.4774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 405.333236][ T29] audit: type=1326 audit(1756074567.124:10163): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17630 comm="syz.0.4774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 405.358094][ T29] audit: type=1326 audit(1756074567.124:10164): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17630 comm="syz.0.4774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 405.382962][ T29] audit: type=1326 audit(1756074567.124:10165): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17630 comm="syz.0.4774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 405.406556][ T29] audit: type=1326 audit(1756074567.124:10166): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17630 comm="syz.0.4774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 405.431381][ T29] audit: type=1326 audit(1756074567.124:10167): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17630 comm="syz.0.4774" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 406.568861][T17702] pimreg: left allmulticast mode [ 406.620481][T17705] rdma_rxe: rxe_newlink: failed to add lo [ 406.895659][T17712] ------------[ cut here ]------------ [ 406.901157][T17712] verifier bug: REG INVARIANTS VIOLATION (true_reg1): range bounds violation u64=[0xffffdfcd, 0xffffffffffffdfcc] s64=[0x80000000ffffdfcd, 0x7fffffffffffdfcc] u32=[0xffffdfcd, 0xffffdfcc] s32=[0xffffdfcd, 0xffffdfcc] var_off=(0xffffdfcc, 0xffffffff00000000)(1) [ 406.926171][T17712] WARNING: CPU: 0 PID: 17712 at kernel/bpf/verifier.c:2728 reg_bounds_sanity_check+0x673/0x680 [ 406.936567][T17712] Modules linked in: [ 406.940460][T17712] CPU: 0 UID: 0 PID: 17712 Comm: syz.0.4805 Not tainted syzkaller #0 PREEMPT(voluntary) [ 406.950362][T17712] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 406.960476][T17712] RIP: 0010:reg_bounds_sanity_check+0x673/0x680 [ 406.966918][T17712] Code: 7c 24 18 41 ff 74 24 20 55 41 56 4d 89 ee 53 48 8b 5c 24 30 ff 74 24 40 ff 74 24 50 ff 74 24 30 e8 92 80 ba ff 48 83 c4 38 90 <0f> 0b 90 90 e9 02 fb ff ff 0f 1f 40 00 90 90 90 90 90 90 90 90 90 [ 406.986657][T17712] RSP: 0018:ffffc90000f9b440 EFLAGS: 00010292 [ 406.992788][T17712] RAX: 9774761b36cf8900 RBX: ffff888118ad8298 RCX: 0000000000080000 [ 407.000789][T17712] RDX: ffffc90007253000 RSI: 00000000000055b5 RDI: 00000000000055b6 [ 407.008797][T17712] RBP: 00000000ffffdfcc R08: 0001c90000f9b27f R09: 0000000000000000 [ 407.016773][T17712] R10: 00000000ffffffff R11: 0000000000000002 R12: ffff888118ad8258 [ 407.024812][T17712] R13: ffff888105608000 R14: ffff888105608000 R15: ffff888118ad8290 [ 407.033552][T17712] FS: 00007f1d3aed76c0(0000) GS:ffff8882aee43000(0000) knlGS:0000000000000000 [ 407.042694][T17712] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 407.049326][T17712] CR2: 00007f1d3aed6f98 CR3: 000000012c1b2000 CR4: 00000000003506f0 [ 407.057395][T17712] DR0: 0000000000000002 DR1: 0000000000000000 DR2: 0000000000000000 [ 407.064598][T17715] tipc: Started in network mode [ 407.065365][T17712] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 407.065382][T17712] Call Trace: [ 407.070286][T17715] tipc: Node identity 36aaae220263, cluster identity 4711 [ 407.078249][T17712] [ 407.081571][T17715] tipc: Enabled bearer , priority 0 [ 407.088677][T17712] reg_set_min_max+0x1c1/0x260 [ 407.088717][T17712] check_cond_jmp_op+0x1080/0x16e0 [ 407.088811][T17712] do_check+0x332a/0x7a10 [ 407.088857][T17712] do_check_common+0xc3a/0x12a0 [ 407.088889][T17712] bpf_check+0x942b/0xd9e0 [ 407.088944][T17712] ? __rcu_read_unlock+0x4f/0x70 [ 407.088967][T17712] ? __alloc_frozen_pages_noprof+0x188/0x360 [ 407.089004][T17712] ? alloc_pages_bulk_noprof+0x4b8/0x540 [ 407.089054][T17712] ? __vmap_pages_range_noflush+0xbb3/0xbd0 [ 407.089084][T17712] ? pcpu_block_update_hint_alloc+0x63d/0x660 [ 407.089154][T17712] ? pcpu_block_update_hint_alloc+0x63d/0x660 [ 407.089179][T17712] ? pcpu_alloc_area+0x59c/0x5c0 [ 407.089201][T17712] ? obj_cgroup_uncharge+0x16/0x20 [ 407.089230][T17712] ? pcpu_memcg_post_alloc_hook+0x127/0x150 [ 407.089262][T17712] ? should_fail_ex+0x30/0x280 [ 407.089283][T17712] ? selinux_bpf_prog_load+0x36/0xf0 [ 407.089361][T17712] ? should_failslab+0x8c/0xb0 [ 407.089384][T17712] ? __kmalloc_cache_noprof+0x189/0x320 [ 407.089469][T17712] ? bpf_prog_load+0xe78/0x1070 [ 407.089497][T17712] bpf_prog_load+0xedd/0x1070 [ 407.089530][T17712] ? security_bpf+0x2b/0x90 [ 407.089559][T17712] __sys_bpf+0x462/0x7b0 [ 407.089645][T17712] __x64_sys_bpf+0x41/0x50 [ 407.089669][T17712] x64_sys_call+0x2aea/0x2ff0 [ 407.089696][T17712] do_syscall_64+0xd2/0x200 [ 407.089723][T17712] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 407.089798][T17712] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 407.089824][T17712] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 407.243232][T17712] RIP: 0033:0x7f1d3c46ebe9 [ 407.247686][T17712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 407.267435][T17712] RSP: 002b:00007f1d3aed7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 407.275952][T17712] RAX: ffffffffffffffda RBX: 00007f1d3c695fa0 RCX: 00007f1d3c46ebe9 [ 407.283371][T17732] FAULT_INJECTION: forcing a failure. [ 407.283371][T17732] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 407.283972][T17712] RDX: 0000000000000048 RSI: 00002000000054c0 RDI: 0000000000000005 [ 407.283988][T17712] RBP: 00007f1d3c4f1e19 R08: 0000000000000000 R09: 0000000000000000 [ 407.298444][T17732] CPU: 1 UID: 0 PID: 17732 Comm: +}[@ Not tainted syzkaller #0 PREEMPT(voluntary) [ 407.298592][T17732] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 407.298604][T17732] Call Trace: [ 407.298611][T17732] [ 407.298620][T17732] __dump_stack+0x1d/0x30 [ 407.298661][T17732] dump_stack_lvl+0xe8/0x140 [ 407.298717][T17732] dump_stack+0x15/0x1b [ 407.298744][T17732] should_fail_ex+0x265/0x280 [ 407.298766][T17732] should_fail+0xb/0x20 [ 407.298782][T17732] should_fail_usercopy+0x1a/0x20 [ 407.298803][T17732] _copy_to_user+0x20/0xa0 [ 407.298829][T17732] simple_read_from_buffer+0xb5/0x130 [ 407.298852][T17732] proc_fail_nth_read+0x10e/0x150 [ 407.298878][T17732] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 407.298901][T17732] vfs_read+0x1a8/0x770 [ 407.298959][T17732] ? proc_comm_connector+0x159/0x2c0 [ 407.298978][T17732] ? __rcu_read_unlock+0x4f/0x70 [ 407.298998][T17732] ? __fget_files+0x184/0x1c0 [ 407.299023][T17732] ksys_read+0xda/0x1a0 [ 407.299090][T17732] __x64_sys_read+0x40/0x50 [ 407.299110][T17732] x64_sys_call+0x27bc/0x2ff0 [ 407.299133][T17732] do_syscall_64+0xd2/0x200 [ 407.299165][T17732] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 407.299264][T17732] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 407.299288][T17732] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 407.299308][T17732] RIP: 0033:0x7f38b34dd5fc [ 407.299322][T17732] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 407.299339][T17732] RSP: 002b:00007f38b1f47030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 407.299357][T17732] RAX: ffffffffffffffda RBX: 00007f38b3705fa0 RCX: 00007f38b34dd5fc [ 407.299440][T17732] RDX: 000000000000000f RSI: 00007f38b1f470a0 RDI: 0000000000000003 [ 407.299452][T17732] RBP: 00007f38b1f47090 R08: 0000000000000000 R09: 0000000000000000 [ 407.299464][T17732] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 407.299520][T17732] R13: 00007f38b3706038 R14: 00007f38b3705fa0 R15: 00007ffec0c8c1a8 [ 407.299539][T17732] [ 407.516035][T17712] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 407.524017][T17712] R13: 00007f1d3c696038 R14: 00007f1d3c695fa0 R15: 00007fff91b17c48 [ 407.531993][T17712] [ 407.535031][T17712] ---[ end trace 0000000000000000 ]--- [ 407.602793][T17715] tipc: Disabling bearer [ 407.966234][T17758] lo speed is unknown, defaulting to 1000 [ 409.269111][T17770] lo speed is unknown, defaulting to 1000 [ 409.775603][T17779] lo speed is unknown, defaulting to 1000 [ 410.367401][T17808] lo speed is unknown, defaulting to 1000 [ 410.519448][T17795] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4835'. [ 410.531863][ T29] kauditd_printk_skb: 95 callbacks suppressed [ 410.531927][ T29] audit: type=1400 audit(1756074572.678:10263): avc: denied { setopt } for pid=17793 comm="syz.4.4835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 410.646323][ T29] audit: type=1400 audit(1756074572.730:10264): avc: denied { create } for pid=17793 comm="syz.4.4835" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 410.868145][ T29] audit: type=1326 audit(1756074573.024:10265): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17818 comm="syz.3.4842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 410.891863][ T29] audit: type=1326 audit(1756074573.035:10266): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17818 comm="syz.3.4842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 410.916860][ T29] audit: type=1326 audit(1756074573.035:10267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17818 comm="syz.3.4842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 410.940567][ T29] audit: type=1326 audit(1756074573.035:10268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17818 comm="syz.3.4842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 411.007624][ T29] audit: type=1326 audit(1756074573.140:10269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17818 comm="syz.3.4842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 411.032525][ T29] audit: type=1326 audit(1756074573.140:10270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17818 comm="syz.3.4842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 411.056169][ T29] audit: type=1326 audit(1756074573.140:10271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17818 comm="syz.3.4842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 411.081035][ T29] audit: type=1326 audit(1756074573.140:10272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=17818 comm="syz.3.4842" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7ff8be5aebe9 code=0x7ffc0000 [ 411.551114][T17880] lo speed is unknown, defaulting to 1000 [ 411.982278][T17898] netlink: 268 bytes leftover after parsing attributes in process `syz.6.4866'. [ 411.991439][T17898] unsupported nla_type 65024 [ 412.120877][T17905] block device autoloading is deprecated and will be removed. [ 412.296977][T17915] loop0: detected capacity change from 0 to 512 [ 412.337304][T17915] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 412.383666][T17915] ext4 filesystem being mounted at /366/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 412.429010][T17915] EXT4-fs (loop0): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 412.556183][T12650] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 412.838448][T17958] lo speed is unknown, defaulting to 1000 [ 413.190999][T17975] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4893'. [ 413.347316][T17982] lo speed is unknown, defaulting to 1000 [ 413.355934][T17987] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4898'. [ 413.465786][T18000] loop0: detected capacity change from 0 to 512 [ 413.578710][T18000] ext4: Unknown parameter 'uid>00000000000000000000' [ 413.788758][T18018] loop0: detected capacity change from 0 to 512 [ 413.802558][T18018] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 413.816343][T18018] ext4 filesystem being mounted at /372/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 413.834935][T18018] EXT4-fs error (device loop0): ext4_do_update_inode:5653: inode #2: comm syz.0.4910: corrupted inode contents [ 413.848863][T18018] EXT4-fs error (device loop0): ext4_dirty_inode:6538: inode #2: comm syz.0.4910: mark_inode_dirty error [ 413.861644][T18018] EXT4-fs error (device loop0): ext4_do_update_inode:5653: inode #2: comm syz.0.4910: corrupted inode contents [ 413.880103][T18018] EXT4-fs error (device loop0): ext4_do_update_inode:5653: inode #2: comm syz.0.4910: corrupted inode contents [ 413.893657][T18018] EXT4-fs error (device loop0): ext4_dirty_inode:6538: inode #2: comm syz.0.4910: mark_inode_dirty error [ 413.906968][T18018] EXT4-fs error (device loop0): ext4_do_update_inode:5653: inode #2: comm syz.0.4910: corrupted inode contents [ 413.922509][T18018] netlink: 4 bytes leftover after parsing attributes in process `syz.0.4910'. [ 413.939173][T18018] team0 (unregistering): Port device C removed [ 413.949171][T18018] team0 (unregistering): Port device team_slave_1 removed [ 414.034021][T12650] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 414.044711][T18027] netlink: 20 bytes leftover after parsing attributes in process `syz.5.4912'. [ 414.379117][T18050] lo speed is unknown, defaulting to 1000 [ 414.472615][T18050] netlink: 24 bytes leftover after parsing attributes in process `syz.0.4916'. [ 414.608498][T18054] loop6: detected capacity change from 0 to 512 [ 414.651613][T18054] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 414.673927][T18054] ext4 filesystem being mounted at /401/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 414.704930][T18063] FAULT_INJECTION: forcing a failure. [ 414.704930][T18063] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 414.718193][T18063] CPU: 0 UID: 0 PID: 18063 Comm: syz.3.4924 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 414.718225][T18063] Tainted: [W]=WARN [ 414.718284][T18063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 414.718295][T18063] Call Trace: [ 414.718301][T18063] [ 414.718307][T18063] __dump_stack+0x1d/0x30 [ 414.718361][T18063] dump_stack_lvl+0xe8/0x140 [ 414.718379][T18063] dump_stack+0x15/0x1b [ 414.718395][T18063] should_fail_ex+0x265/0x280 [ 414.718415][T18063] should_fail+0xb/0x20 [ 414.718432][T18063] should_fail_usercopy+0x1a/0x20 [ 414.718486][T18063] _copy_from_user+0x1c/0xb0 [ 414.718510][T18063] ___sys_sendmsg+0xc1/0x1d0 [ 414.718542][T18063] __sys_sendmmsg+0x178/0x300 [ 414.718651][T18063] __x64_sys_sendmmsg+0x57/0x70 [ 414.718670][T18063] x64_sys_call+0x1c4a/0x2ff0 [ 414.718688][T18063] do_syscall_64+0xd2/0x200 [ 414.718764][T18063] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 414.718789][T18063] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 414.718818][T18063] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 414.718858][T18063] RIP: 0033:0x7ff8be5aebe9 [ 414.718874][T18063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 414.718890][T18063] RSP: 002b:00007ff8bd00f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 414.718962][T18063] RAX: ffffffffffffffda RBX: 00007ff8be7d5fa0 RCX: 00007ff8be5aebe9 [ 414.719043][T18063] RDX: 000000000800001d RSI: 0000200000007fc0 RDI: 0000000000000003 [ 414.719057][T18063] RBP: 00007ff8bd00f090 R08: 0000000000000000 R09: 0000000000000000 [ 414.719070][T18063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 414.719083][T18063] R13: 00007ff8be7d6038 R14: 00007ff8be7d5fa0 R15: 00007ffce0e9dae8 [ 414.719118][T18063] [ 414.719923][T18054] EXT4-fs (loop6): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 414.929856][T18071] netlink: 20 bytes leftover after parsing attributes in process `syz.3.4926'. [ 414.989041][T18078] loop0: detected capacity change from 0 to 512 [ 414.996545][T12273] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 415.021473][T18078] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 415.045902][T18078] ext4 filesystem being mounted at /375/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 415.079655][T18078] EXT4-fs (loop0): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 415.192167][T12650] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 415.643937][T18093] lo speed is unknown, defaulting to 1000 [ 415.656316][T18111] loop0: detected capacity change from 0 to 512 [ 415.668003][T18111] ext4: Unknown parameter 'uid>00000000000000000000' [ 415.678996][T18114] netlink: 20 bytes leftover after parsing attributes in process `syz.4.4939'. [ 415.708017][ T29] kauditd_printk_skb: 231 callbacks suppressed [ 415.708029][ T29] audit: type=1326 audit(1756074578.116:10504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18108 comm="syz.0.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 415.797301][ T29] audit: type=1326 audit(1756074578.148:10505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18108 comm="syz.0.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 415.822274][ T29] audit: type=1326 audit(1756074578.148:10506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18108 comm="syz.0.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=447 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 415.845952][ T29] audit: type=1326 audit(1756074578.148:10507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18108 comm="syz.0.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 415.869629][ T29] audit: type=1326 audit(1756074578.148:10508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18108 comm="syz.0.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 415.894605][ T29] audit: type=1326 audit(1756074578.148:10509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18108 comm="syz.0.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=77 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 415.920267][ T29] audit: type=1326 audit(1756074578.148:10510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18108 comm="syz.0.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 415.945179][ T29] audit: type=1326 audit(1756074578.148:10511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18108 comm="syz.0.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 415.968850][ T29] audit: type=1326 audit(1756074578.158:10512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18108 comm="syz.0.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 415.993544][ T29] audit: type=1326 audit(1756074578.158:10513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18108 comm="syz.0.4934" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f1d3c46ebe9 code=0x7ffc0000 [ 416.090800][T18122] loop0: detected capacity change from 0 to 512 [ 416.103046][T18124] loop6: detected capacity change from 0 to 512 [ 416.112952][T18122] EXT4-fs (loop0): encrypted files will use data=ordered instead of data journaling mode [ 416.123396][T18124] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 416.135216][T18124] EXT4-fs (loop6): 1 truncate cleaned up [ 416.141278][T18124] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 416.154697][T18122] EXT4-fs (loop0): 1 truncate cleaned up [ 416.160743][T18122] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 416.266432][T18134] netlink: 12 bytes leftover after parsing attributes in process `syz.3.4946'. [ 416.284802][T12273] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 416.321391][T18137] loop6: detected capacity change from 0 to 512 [ 416.343810][T18137] ext4: Unknown parameter 'uid>00000000000000000000' [ 416.355625][T12650] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 416.455111][T18146] FAULT_INJECTION: forcing a failure. [ 416.455111][T18146] name failslab, interval 1, probability 0, space 0, times 0 [ 416.467970][T18146] CPU: 0 UID: 0 PID: 18146 Comm: syz.0.4949 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 416.467999][T18146] Tainted: [W]=WARN [ 416.468005][T18146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 416.468044][T18146] Call Trace: [ 416.468049][T18146] [ 416.468056][T18146] __dump_stack+0x1d/0x30 [ 416.468074][T18146] dump_stack_lvl+0xe8/0x140 [ 416.468091][T18146] dump_stack+0x15/0x1b [ 416.468108][T18146] should_fail_ex+0x265/0x280 [ 416.468170][T18146] should_failslab+0x8c/0xb0 [ 416.468194][T18146] __kvmalloc_node_noprof+0x123/0x4e0 [ 416.468220][T18146] ? io_sqe_buffers_register+0xc2/0x530 [ 416.468251][T18146] io_sqe_buffers_register+0xc2/0x530 [ 416.468319][T18146] ? __fget_files+0x184/0x1c0 [ 416.468345][T18146] __se_sys_io_uring_register+0xa9f/0xeb0 [ 416.468367][T18146] ? fput+0x8f/0xc0 [ 416.468389][T18146] ? ksys_write+0x192/0x1a0 [ 416.468452][T18146] __x64_sys_io_uring_register+0x55/0x70 [ 416.468477][T18146] x64_sys_call+0x18a3/0x2ff0 [ 416.468516][T18146] do_syscall_64+0xd2/0x200 [ 416.468541][T18146] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 416.468561][T18146] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 416.468629][T18146] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 416.468647][T18146] RIP: 0033:0x7f1d3c46ebe9 [ 416.468660][T18146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 416.468674][T18146] RSP: 002b:00007f1d3aed7038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ab [ 416.468690][T18146] RAX: ffffffffffffffda RBX: 00007f1d3c695fa0 RCX: 00007f1d3c46ebe9 [ 416.468715][T18146] RDX: 00002000000002c0 RSI: 0000000000000000 RDI: 0000000000000003 [ 416.468728][T18146] RBP: 00007f1d3aed7090 R08: 0000000000000000 R09: 0000000000000000 [ 416.468742][T18146] R10: 100000000000011a R11: 0000000000000246 R12: 0000000000000001 [ 416.468755][T18146] R13: 00007f1d3c696038 R14: 00007f1d3c695fa0 R15: 00007fff91b17c48 [ 416.468800][T18146] [ 416.704453][T18164] geneve2: entered promiscuous mode [ 416.709693][T18164] geneve2: entered allmulticast mode [ 416.750808][T18166] IPv6: Can't replace route, no match found [ 416.773679][T18171] loop6: detected capacity change from 0 to 512 [ 416.831133][T18171] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 416.843877][T18171] ext4 filesystem being mounted at /410/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 416.858083][T18171] EXT4-fs (loop6): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 416.943989][T12273] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 416.961740][T18181] loop6: detected capacity change from 0 to 512 [ 416.968458][T18181] ext4: Unknown parameter 'uid>00000000000000000000' [ 417.034750][T18191] loop6: detected capacity change from 0 to 512 [ 417.041396][T18191] ext4: Unknown parameter 'uid>00000000000000000000' [ 417.208181][T18193] lo speed is unknown, defaulting to 1000 [ 417.518719][T18209] ================================================================== [ 417.526830][T18209] BUG: KCSAN: data-race in mas_state_walk / mas_wmb_replace [ 417.534134][T18209] [ 417.536460][T18209] write to 0xffff888104a65800 of 8 bytes by task 18205 on cpu 0: [ 417.544177][T18209] mas_wmb_replace+0x20d/0x14a0 [ 417.549038][T18209] mas_wr_store_entry+0x1773/0x2b50 [ 417.554240][T18209] mas_store_prealloc+0x74d/0x9e0 [ 417.559259][T18209] vma_iter_store_new+0x1c5/0x200 [ 417.564275][T18209] vma_complete+0x125/0x580 [ 417.568765][T18209] __split_vma+0x5d9/0x650 [ 417.573169][T18209] vma_modify+0x3f2/0xc80 [ 417.577491][T18209] vma_modify_flags+0x101/0x130 [ 417.582327][T18209] mprotect_fixup+0x2cc/0x570 [ 417.586992][T18209] do_mprotect_pkey+0x6d6/0x980 [ 417.591828][T18209] __x64_sys_mprotect+0x48/0x60 [ 417.596664][T18209] x64_sys_call+0x274e/0x2ff0 [ 417.601324][T18209] do_syscall_64+0xd2/0x200 [ 417.605818][T18209] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 417.611693][T18209] [ 417.614004][T18209] read to 0xffff888104a65800 of 8 bytes by task 18209 on cpu 1: [ 417.621611][T18209] mas_state_walk+0x119/0x650 [ 417.626290][T18209] mas_walk+0x60/0x150 [ 417.630346][T18209] lock_vma_under_rcu+0x8d/0x160 [ 417.635310][T18209] do_user_addr_fault+0x233/0x1090 [ 417.640413][T18209] exc_page_fault+0x62/0xa0 [ 417.644899][T18209] asm_exc_page_fault+0x26/0x30 [ 417.649737][T18209] [ 417.652041][T18209] value changed: 0xffff88810a0dcb01 -> 0xffff888104a65800 [ 417.659125][T18209] [ 417.661432][T18209] Reported by Kernel Concurrency Sanitizer on: [ 417.667564][T18209] CPU: 1 UID: 0 PID: 18209 Comm: syz.3.4972 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 417.678935][T18209] Tainted: [W]=WARN [ 417.682737][T18209] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 417.692774][T18209] ==================================================================