last executing test programs: 4m0.181048702s ago: executing program 32 (id=1709): r0 = open(&(0x7f0000000040)='./bus\x00', 0x143142, 0x80) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000085000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4e, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f00000005c0)='sys_enter\x00', r1}, 0x10) sendfile(r0, r0, 0x0, 0x1000000201005) 2m31.603587759s ago: executing program 33 (id=3265): r0 = socket$rxrpc(0x21, 0x2, 0xa) r1 = accept4(r0, 0x0, &(0x7f0000000000), 0x6de443677002f5ee) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000140)={&(0x7f0000000080)={0x88, 0x1403, 0x100, 0x70bd26, 0x25dfdbfb, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'rxe\x00'}, {0x14, 0x33, 'geneve1\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'bond_slave_0\x00'}}, {{0x9, 0x2, 'syz2\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'ipvlan1\x00'}}]}, 0x88}, 0x1, 0x0, 0x0, 0x1}, 0x20040830) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x4000, &(0x7f0000000c00)={[{@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@nombcache}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x4}}, {@mblk_io_submit}, {@resuid}, {@norecovery}]}, 0x8, 0x445, &(0x7f0000001dc0)="$eJzs28tvG0UYAPBv105KX8RU5dEHECiIikfSpKX0wAEQSBxAQoJDOYYkrUrdBjVBolUFBaFyRJW4I45I/AWc4IKAExJX4IwqVSiXFk5Ga+82jmunSbDrEP9+0tYzu+POfJ4de3YnG8DAGs3+SSJ2RMRvETHSyC4vMNp4ubF4cfrvxYvTSdRqb/6V1MtdX7w4XRQt3re9yJQj0k+T2Nem3vnzF05PVauz5/L8+MKZ98bnz1945tSZqZOzJ2fPTh47duTwxHNHJ5/tSpxZXNf3fji3f8+rb195ffr4lXd++iYp4m+Jo0tG2+4tN14er9W6XF1/7WxKJ+U+NoQ1KeWn5FB9/I9EKZY6byRe+aSvjQN6qlar1e7rfPhSDdjEkuh3C4D+KH7os+vfYrtDU48N4dqLjQugLO4b+dY4Uo40LzPUcn3bTaMRcfzSP19mW7Teh9jao0oBgIH2XTb/ebrd/C+N5vtCd+drKJWIuCcidkXE0YjYHRH3RtTL3h8RD6yx/tZFklvnn+nVdQW2Stn87/l8bWv5/K+Y/UWllOd21uMfSk6cqs4eyj+TgzG0JctPrFDH9y//+nmnY83zv2zL6i/mgnk7rpa3LH/PzNTC1H+Judm1jyP2ltvFn9xcCUgiYk9EvLDOOk49+fX+Tsc6xD+8qv+4C+tMta8inmj0/6Voib+QrLw+OX5XVGcPjRdnxa1+/uXyG53qv33/91bW/9vanv9F/H9Ukub12vm113H59886XlOu9/wfTt5atu+DqYWFcxMRw8lr9Xylef9kS7nJpfJZ/AcPtB//u2Lpk9gXEdlJ/GBEPBQRD+dtfyQiHo2IAyvE/+NLj727/vh7K4t/ZsX+j5b+X0oMR+ue9onS6R++XVZpZS3xZ/1/pJ46mO9Zzfffatq1vrMZAAAA/n/SiNgRSTp2M52mY2ONv+HfHdvS6tz8wlMn5t4/O9N4RqASQ2lxp2uk6X7oRH5ZX+QnW/KH8/vGX5S21vNj03PVmX4HDwNue4fxn/mz1O/WAT3neS0YXMY/DC7jHwaX8Q+Dq8349+gZDIh2v/8f9aEdwJ3XMv5XXPYzMYDNxfU/DC7jHwaX8Q8DaX5r3P4h+c2RSCNiAzRjsyQi3RDNkOhRot/fTAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAN3xbwAAAP//ynflmQ==") openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x40, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$SO_BINDTODEVICE_wg(r2, 0x1, 0x19, &(0x7f0000000080)='wg2\x00', 0x4) connect$inet6(r2, &(0x7f0000000340)={0xa, 0x4e23, 0x0, @local}, 0x1c) sendto$unix(0xffffffffffffffff, &(0x7f0000000300)="2ab2", 0x2, 0x1, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000003c0)=ANY=[@ANYBLOB="480000001000030500"/20, @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800e00010069703665727370616e000000140002800600020030000000080004000009"], 0x48}}, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006940)=[{{0x0, 0x0, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/6, 0x6}], 0x1}, 0x53}], 0x1, 0x2, 0x0) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$sock(r3, &(0x7f00000044c0), 0x4000000000001c0, 0x0) recvfrom(r4, &(0x7f00000000c0)=""/60, 0x3c, 0x40, 0x0, 0x0) 1m38.520503116s ago: executing program 6 (id=4792): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r1, 0x0, 0x1}, 0x18) r2 = socket$isdn(0x22, 0x3, 0x26) accept4(r2, &(0x7f0000000100)=@generic, &(0x7f0000000080)=0x80, 0x80800) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) syz_open_dev$tty1(0xc, 0x4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0xc6, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) unshare(0x2c020400) r3 = timerfd_create(0x0, 0x0) timerfd_settime(r3, 0x3, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x1d7a3f134c51dade) epoll_create(0x9) 1m38.501489988s ago: executing program 6 (id=4793): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000fdff00000000000000000000180100002020702500000000002120207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xe, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000003580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0xffffffffffffffff}], 0x9, 0x0) 1m38.425010354s ago: executing program 6 (id=4794): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0, 0x7}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) socket(0x10, 0x803, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'team_slave_1\x00'}) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r3, 0x8933, &(0x7f0000000b40)={'wpan0\x00', 0x0}) r6 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000e00), 0xffffffffffffffff) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(r4, &(0x7f0000000f00)={0x0, 0x0, &(0x7f0000000ec0)={&(0x7f0000000e40)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r6, @ANYBLOB="01002abd7000fcdbdf000800000008000300", @ANYRES32=r5], 0x1c}, 0x1, 0x0, 0x0, 0x8004}, 0x40000) sendmsg$NL802154_CMD_NEW_SEC_LEVEL(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000180)={&(0x7f0000000040)={0x1c, 0x0, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x408c040}, 0x20000000) 1m38.273366356s ago: executing program 6 (id=4795): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f0000000140), 0x2, 0xbca, &(0x7f0000000600)="$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") r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x3000) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYRESOCT=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) r3 = socket$pppl2tp(0x18, 0x1, 0x1) bind$can_j1939(0xffffffffffffffff, 0x0, 0x0) connect$pppl2tp(r3, &(0x7f0000000100)=@pppol2tpv3={0x18, 0x1, {0x0, r2, {0x2, 0x0, @loopback}, 0x4}}, 0x2e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x4, 0x1, 0x8, 0x20005, 0xb, 0x0, 0xfffffffd, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xffffffff, 0x6, 0x4, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r5, &(0x7f0000001240)=""/102400, 0x200000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0), 0x2002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001a240)=ANY=[@ANYBLOB="1b00000000000000000000000280000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000063607ea926cd0cf4f0b61872463671315814ed85a6ef43a3f7f0fdef73e53d7a18e9bc6ce243143da6552c0c81b6282b281746a20ebd2055e4f3c786a6e5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300"/28], 0x50) syz_clone(0x100000, &(0x7f0000000400)="81c42f2753a6be92c0f34d3027c973a981d4c249fd94e2b14640fe222e4dee8d217061df9ea9472a79438e13edc0507ec8123e74d4d7b420b72ce6acd66e7dcfcea04da332bddc4f546c0e86db5ee89cf34b7300f07ede59de3803da98eb70eb06ee29", 0x63, &(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)="48f4a80fa13c13a45fe756b850a095665885fda15f8871e0f359f3b94aa71ba58fcdcd17ddce7796cfb395d0cf8404c0d670d374458c29283e9c87d4e7c9525ae648e53f18cb6fe78ee4adf24dee1a9bc73bfe27940acbee38bdaa9e3df8c6ba372a7fabce4ae201b6335988876f62704f157c626bb6d6aa01932420605169912207b89fffd0f27d7c4b7a6844cacba44e03e1de4872f79384bbcefd026ce90e3d72bc7f479c") 1m37.880547358s ago: executing program 6 (id=4798): mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x402, 0x80000000, 0x0) 1m36.75172253s ago: executing program 6 (id=4807): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f0000000140), 0x2, 0xbca, &(0x7f0000000600)="$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") openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0xa02, 0xbc) truncate(&(0x7f0000000900)='./file1\x00', 0x3000000) 1m36.751534179s ago: executing program 34 (id=4807): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f0000000140), 0x2, 0xbca, &(0x7f0000000600)="$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") openat$dir(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0xa02, 0xbc) truncate(&(0x7f0000000900)='./file1\x00', 0x3000000) 1m35.839697524s ago: executing program 0 (id=4812): r0 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000480)=ANY=[@ANYRES8=r2], 0x4c}}, 0x2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) sendmsg$IPSET_CMD_ADD(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000080)=ANY=[@ANYBLOB="50000000090601020000ffff00000000020000000900020073797a31000000000500010006000000280007800c00018008000140ffffffff0500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0xc4) r5 = socket(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r5, 0x0, 0x40000) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000340)={'macsec0\x00', 0x0}) r8 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000a00)=ANY=[@ANYBLOB="54000000100003052bbd7000249d020000000000", @ANYRES32=0x0, @ANYBLOB="1544010001800000240012800b0001006d616373656300001400028005000c0001000000080005000400000008000500", @ANYRES32=r7], 0x54}, 0x1, 0x0, 0x0, 0x2040}, 0x800) r9 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="020000590700000000080000de"], 0x48) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYRESHEX=r4], &(0x7f00000006c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='kfree\x00', r10, 0x0, 0x4ab}, 0x18) r11 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r11, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000fc0)={0x20, 0x3, 0x1, 0x101, 0x0, 0x0, {0xa, 0x0, 0x7}, [@CTA_FILTER={0xc, 0x19, 0x0, 0x1, [@CTA_FILTER_REPLY_FLAGS={0x8, 0x2, 0x1}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x4000144}, 0x44080) r12 = mq_open(&(0x7f0000000100)='GPL\x00', 0x40, 0x0, &(0x7f0000000140)={0x9, 0x0, 0x83, 0x10000}) clock_gettime(0x0, &(0x7f0000000640)={0x0, 0x0}) mq_timedsend(r12, &(0x7f0000000580)="5c3699f09809a93dd610bc794b3f90f6dc0e135d396a01e74ac971ec615d4aa7afe80661627b6295c98a3bd621e463371942e4ea31620f00221bdb3ec5fbd85fa12088bec243c01cf3b2a1497a5f5fb2caff7cf2d3918263d731f140926f53158ce6638e06fde1dbd41b970913f0d5ddd7de0dad6566ff93d0b65859a8157f84fc854571933c88946d793ccc81dc356df70c86246fe3936bc35e0451e7fbc6994c2cc32e1ef1c7d0f507a32b5b", 0xad, 0x3, &(0x7f0000000680)={r13, r14+10000000}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r9}, 0x18) mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x122) move_pages(0x0, 0x20000000000000fe, &(0x7f0000000080)=[&(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffb000/0x3000)=nil], 0x0, &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0) munlock(&(0x7f0000ffd000/0x3000)=nil, 0x3000) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x800000000f, 0x0, 0x0) bind$inet6(0xffffffffffffffff, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}, 0x1, 0x0, 0x0, 0x44}, 0x4000080) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) 1m32.865370745s ago: executing program 0 (id=4841): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x68, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x9, 0x7, 0x8000, 0x1}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, 0xffffffffffffffff}, &(0x7f00000002c0), &(0x7f0000000280)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000d0039000000000000b4a518110000", @ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) perf_event_open(&(0x7f0000000800)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) write$cgroup_int(0xffffffffffffffff, &(0x7f0000000100), 0x1001) bpf$MAP_UPDATE_CONST_STR(0x2, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) mkdir(0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000780)={@cgroup=r3, 0x2b, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x40) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x84d03, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file2\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0xfb, 0x11ff, &(0x7f0000001280)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file2\x00', 0x105042, 0x40) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[], 0x48) r5 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xc3, 0x0, 0x0, 0x0, 0x0, 0x100000000003, 0x10, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xa19a, 0x1000}, 0x0, 0x0, 0xffffffff, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r5, 0x40082406, &(0x7f0000000340)='cpu\t&-&&\t') mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x100000b, 0x2013, r4, 0x0) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r6) sendmsg$IEEE802154_LIST_PHY(r6, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000003c0)={0x14, r7, 0x30b, 0x0, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x4851}, 0x20000004) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, 0x0, &(0x7f0000000340)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000780)={r8, 0x18000000000002a0, 0xd, 0x0, &(0x7f0000000040)="5aee41dea43e63a3f7fb7f11c7", 0x0, 0xf000, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) socket$inet6_sctp(0xa, 0x801, 0x84) 1m31.762300744s ago: executing program 0 (id=4871): syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000980)='./file1\x00', 0x280809a, &(0x7f0000000f40)=ANY=[], 0xd, 0x2c0, &(0x7f0000001a80)="$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") openat(0xffffffffffffff9c, 0x0, 0x80881, 0x82) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, 0x0, 0x4000800) sendmsg$netlink(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000000200)=ANY=[@ANYBLOB="140100002800010004000000f8dbdf2503"], 0x114}], 0x1, 0x0, 0x0, 0x1}, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001600)={&(0x7f0000000f00)='kfree\x00', r3, 0x0, 0x77}, 0x18) syz_read_part_table(0x105e, &(0x7f0000000000)="$eJzsz71NA0EYBNC55eCO4FohoQMqICGhGbohoA96ISG3LFuftSf/dGA7eC9YjTSzWm24rZZtVT3Wb6WGJE/9+Gp5yZw8p62jt3FO5k1V1ZQh+e/33ntT0/64SS/aX6Y1f74Ou6rLM8vDKX2Py3n/8XO9jwIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADA/ToEAAD//zfUF2I=") statx(0xffffffffffffff9c, &(0x7f00000011c0)='./file0\x00', 0x1000, 0x4, &(0x7f0000001200)) r4 = socket(0x10, 0x3, 0x0) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(0xffffffffffffffff, r5) setregid(r5, 0xffffffffffffffff) newfstatat(0xffffffffffffff9c, &(0x7f0000001300)='./file0\x00', &(0x7f0000001340), 0x1000) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000caaffb)={0x0, 0x0, 0x0}, &(0x7f0000cab000)=0xc) setregid(r6, 0x0) setregid(r6, 0x0) r7 = creat(&(0x7f00000000c0)='./file0\x00', 0x9c) stat(&(0x7f0000000cc0)='./file0\x00', &(0x7f0000001c80)) sendmsg$RDMA_NLDEV_CMD_NEWLINK(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x77ff, &(0x7f0000001200)={&(0x7f00000004c0)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020073797a30000000000800410073697700140033006c6f"], 0xffaf}, 0x1, 0x0, 0x0, 0x854}, 0x0) ioctl$LOOP_SET_BLOCK_SIZE(r7, 0x4c09, 0x3) 1m31.621961176s ago: executing program 0 (id=4876): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f0000000140), 0x2, 0xbca, &(0x7f0000000600)="$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") r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x3000) fallocate(r0, 0x0, 0x0, 0x1000f4) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000340)=ANY=[@ANYRESOCT=r1, @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) r2 = socket$inet6_udp(0xa, 0x2, 0x0) bind$inet6(r2, &(0x7f0000000000)={0xa, 0xe22, 0x0, @empty}, 0x1c) socket$pppl2tp(0x18, 0x1, 0x1) bind$can_j1939(0xffffffffffffffff, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x4, 0x1, 0x8, 0x20005, 0xb, 0x0, 0xfffffffd, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xffffffff, 0x6, 0x4, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r4, &(0x7f0000001240)=""/102400, 0x200000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0), 0x2002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001a240)=ANY=[@ANYBLOB="1b00000000000000000000000280000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000063607ea926cd0cf4f0b61872463671315814ed85a6ef43a3f7f0fdef73e53d7a18e9bc6ce243143da6552c0c81b6282b281746a20ebd2055e4f3c786a6e5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300"/28], 0x50) syz_clone(0x100000, &(0x7f0000000400)="81c42f2753a6be92c0f34d3027c973a981d4c249fd94e2b14640fe222e4dee8d217061df9ea9472a79438e13edc0507ec8123e74d4d7b420b72ce6acd66e7dcfcea04da332bddc4f546c0e86db5ee89cf34b7300f07ede59de3803da98eb70eb06ee29", 0x63, &(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)="48f4a80fa13c13a45fe756b850a095665885fda15f8871e0f359f3b94aa71ba58fcdcd17ddce7796cfb395d0cf8404c0d670d374458c29283e9c87d4e7c9525ae648e53f18cb6fe78ee4adf24dee1a9bc73bfe27940acbee38bdaa9e3df8c6ba372a7fabce4ae201b6335988876f62704f157c626bb6d6aa01932420605169912207b89fffd0f27d7c4b7a6844cacba44e03e1de4872f79384bbcefd026ce90e3d72bc7f479c") 1m31.483112987s ago: executing program 0 (id=4883): r0 = socket(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x33, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x74, 0x8, 0x0, 0xfffffffd}]}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{0xffffffffffffffff, 0xffffffffffffffff}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) getpeername$packet(r0, &(0x7f0000000400)={0x11, 0x0, 0x0}, &(0x7f0000000440)=0x14) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r6 = syz_open_dev$tty1(0xc, 0x4, 0x4) r7 = dup(r6) write$UHID_INPUT(r7, &(0x7f0000000000)={0x7, {"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", 0x1000}}, 0x1006) r8 = syz_open_dev$mouse(&(0x7f0000000500), 0x2f3, 0x80) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000540)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x15, &(0x7f0000000240)=@raw=[@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r2}}, @btf_id={0x18, 0xa, 0x3, 0x0, 0x5}, @map_idx={0x18, 0x7, 0x5, 0x0, 0xe}, @ldst={0x2, 0x1, 0x0, 0x3, 0x1, 0x0, 0x8}, @jmp={0x5, 0x1, 0x4, 0x8, 0xb, 0x20, 0xffffffffffffffe4}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0xd, 0x0, 0x0, 0x0, 0x200000}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}}], &(0x7f0000000300)='GPL\x00', 0x2, 0xae, &(0x7f0000000340)=""/174, 0x41100, 0x1, '\x00', r4, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000480)={0xa, 0x2}, 0x8, 0x10, &(0x7f00000004c0)={0x5, 0xd, 0x401, 0x7}, 0x10, 0x0, 0x0, 0x9, &(0x7f0000000580)=[r5, r7, 0x1, r8, r9], &(0x7f00000005c0)=[{0x3, 0x2, 0x8, 0xa}, {0x3, 0x5, 0x7, 0xa}, {0x5, 0x4, 0xc, 0xc}, {0x2, 0x2, 0x6, 0x8}, {0x4, 0x5, 0xe, 0x9}, {0x3, 0x2, 0x7, 0xa}, {0x1, 0x1, 0xf, 0xc}, {0x1, 0x5, 0xa, 0xb}, {0x3, 0x5, 0x5, 0xb}], 0x10, 0x100}, 0x94) 1m30.834384419s ago: executing program 0 (id=4890): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2, 0x0, 0x4}, 0x18) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff01800400080039503230"], 0x15) r5 = dup(r4) write$P9_RLERRORu(r5, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$binfmt_elf64(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) open(&(0x7f00000001c0)='./file0\x00', 0x500, 0x40) 1m30.83409404s ago: executing program 35 (id=4890): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2, 0x0, 0x4}, 0x18) creat(&(0x7f00000000c0)='./file0\x00', 0x48) pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff01800400080039503230"], 0x15) r5 = dup(r4) write$P9_RLERRORu(r5, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r5, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={0x0}}, 0x20) write$binfmt_elf64(r5, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r5]) open(&(0x7f00000001c0)='./file0\x00', 0x500, 0x40) 1m10.610349551s ago: executing program 8 (id=5301): r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="080008000700000000031400000045f0003a00000000002f9078ac1414bbffffffffa20022eb9e13254ac01f8f37b266393682a1ff217bd54edfc57651de719acd18570291c792ae621c018e6f7a25d77490627cbc38e564237fb219667caba7d9a720acccb7ee7e7bbcffc43a03462f3adfb812040878c3b53805cd1f1db89c0e1321f0f54f72d4163c5f5088bf6eb8f79b34af85687011628f37", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50000000907800004adcda08f6e83e2aa00e133f88a8349f246e"], 0xfc6d) pipe2$9p(&(0x7f0000001900), 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) munmap(&(0x7f0000002000/0x4000)=nil, 0x4000) r4 = getpgrp(0x0) r5 = syz_pidfd_open(r4, 0x0) pidfd_send_signal(r5, 0xc, &(0x7f0000001fc0)={0x19, 0x1, 0xc}, 0x0) ioctl$PTP_PIN_SETFUNC(r3, 0x40603d07, &(0x7f00000001c0)={'\x00', 0x2, 0x3, 0x4}) socket$nl_route(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000001400000018000180140002006e657464657673696d3000000000000005001900010000000800160000000100080017"], 0x44}}, 0x0) 1m10.534132397s ago: executing program 8 (id=5302): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0), r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xfec8d000) mlock(&(0x7f0000656000/0x3000)=nil, 0x3000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@broadcast, @remote, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "f7d8ff", 0x34, 0x3c, 0x0, @local, @mcast2, {[@hopopts={0x0, 0x2, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00'}]}, @hopopts], {0x0, 0x0, 0xfffffffffffffe35, 0x0, @gue={{0x1, 0x0, 0x1, 0xe, 0x0, @void}}}}}}}}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000004240)=0x40000006, 0x4) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_TIOCINQ(r2, 0x541b, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000000300)={0xa, 0x4e20, 0x5, @mcast1}, 0x1c) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3, 0x0, 0x7fff}, 0x18) r4 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000180)) fchdir(r4) getcwd(&(0x7f0000000340)=""/182, 0xb6) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$VT_RESIZEX(r5, 0x560a, &(0x7f0000000240)={0x19, 0x3d24, 0x1575, 0x0, 0x0, 0xfffe}) r6 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r6, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty, 0x80}, 0x1c) recvmmsg(r6, &(0x7f0000001640)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)=""/8, 0x8}, 0xe69}], 0x1, 0x2, 0x0) setsockopt$inet6_int(r6, 0x29, 0x4, &(0x7f0000000000)=0x1, 0x4) 1m9.684941136s ago: executing program 8 (id=5307): r0 = socket$inet_sctp(0x2, 0x5, 0x84) close(r0) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000040)={0x0, 0x10, &(0x7f0000000000)=[@in={0x2, 0x0, @private=0xa010101}]}, &(0x7f0000000080)=0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r1, 0x84, 0x1d, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f0000000240)=0x8) sendmsg$inet_sctp(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000300), 0x0, 0x2400e044}, 0x0) 1m8.797644138s ago: executing program 8 (id=5315): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f0000000140), 0x2, 0xbca, &(0x7f0000000600)="$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") r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x3000) fallocate(r0, 0x0, 0x0, 0x1000f4) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x4, 0x1, 0x8, 0x20005, 0xb, 0x0, 0xfffffffd, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xffffffff, 0x6, 0x4, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r2, &(0x7f0000001240)=""/102400, 0x200000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0), 0x2002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001a240)=ANY=[@ANYBLOB="1b00000000000000000000000280000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000063607ea926cd0cf4f0b61872463671315814ed85a6ef43a3f7f0fdef73e53d7a18e9bc6ce243143da6552c0c81b6282b281746a20ebd2055e4f3c786a6e5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300"/28], 0x50) syz_clone(0x100000, &(0x7f0000000400)="81c42f2753a6be92c0f34d3027c973a981d4c249fd94e2b14640fe222e4dee8d217061df9ea9472a79438e13edc0507ec8123e74d4d7b420b72ce6acd66e7dcfcea04da332bddc4f546c0e86db5ee89cf34b7300f07ede59de3803da98eb70eb06ee29", 0x63, &(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)="48f4a80fa13c13a45fe756b850a095665885fda15f8871e0f359f3b94aa71ba58fcdcd17ddce7796cfb395d0cf8404c0d670d374458c29283e9c87d4e7c9525ae648e53f18cb6fe78ee4adf24dee1a9bc73bfe27940acbee38bdaa9e3df8c6ba372a7fabce4ae201b6335988876f62704f157c626bb6d6aa01932420605169912207b89fffd0f27d7c4b7a6844cacba44e03e1de4872f79384bbcefd026ce90e3d72bc7f479c") 1m8.589030285s ago: executing program 8 (id=5318): socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r0, &(0x7f0000000340)=ANY=[@ANYBLOB="080008000700000000031400000045f0003a00000000002f9078ac1414bbffffffffa20022eb9e13254ac01f8f37b266393682a1ff217bd54edfc57651de719acd18570291c792ae621c018e6f7a25d77490627cbc38e564237fb219667caba7d9a720acccb7ee7e7bbcffc43a03462f3adfb812040878c3b53805cd1f1db89c0e1321f0f54f72d4163c5f5088bf6eb8f79b34af85687011628f37", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50000000907800004adcda08f6e83e2aa00e133f88a8349f246e"], 0xfc6d) pipe2$9p(&(0x7f0000001900)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000500)='9p_client_req\x00'}, 0x10) r4 = dup(r3) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[], [], 0x6b}}) 1m7.857226134s ago: executing program 8 (id=5332): r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$int_in(r2, 0x5452, &(0x7f0000000180)=0x401) listen(r2, 0x3) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x80, 0x2, 0x8b6}, &(0x7f0000000000)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r4, 0x0, 0x0, 0x64, 0x183000, 0x23456}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) io_uring_enter(r4, 0x47f6, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setreuid(0xee01, 0xee01) r9 = getpid() r10 = syz_pidfd_open(r9, 0x0) setns(r10, 0x6a000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'tunl0\x00', 0x0}) ioctl$sock_qrtr_TIOCINQ(r3, 0x541b, &(0x7f00000001c0)) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4000000010001fff000000000000000000060000", @ANYRES32=0x0, @ANYBLOB="81fffffff4ffffff172c01007769726567756172640000000400028008000a0000000000000000000000000000000073f830252541f53ab61d44a06036c27f0957b40654df096d7b07f175f1efa97c97f4d7f7f701ef12eb66d1235732", @ANYRES32=r11, @ANYBLOB], 0x40}}, 0x0) r13 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r13, 0x84, 0x84, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e23, 0x8, @empty, 0x8}}, 0x2, 0x9}, &(0x7f00000000c0)=0x90) r14 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r14, 0x6, 0x0, 0x0, 0x0) 1m7.837591506s ago: executing program 36 (id=5332): r0 = socket$inet_udplite(0x2, 0x2, 0x88) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0xf, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$inet_mptcp(0x2, 0x1, 0x106) ioctl$int_in(r2, 0x5452, &(0x7f0000000180)=0x401) listen(r2, 0x3) r3 = accept4(r2, 0x0, 0x0, 0x0) r4 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x80, 0x2, 0x8b6}, &(0x7f0000000000)=0x0, &(0x7f0000000300)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, r4, 0x0, 0x0, 0x64, 0x183000, 0x23456}) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r7}, 0x10) io_uring_enter(r4, 0x47f6, 0x0, 0x0, 0x0, 0x0) shutdown(r2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setreuid(0xee01, 0xee01) r9 = getpid() r10 = syz_pidfd_open(r9, 0x0) setns(r10, 0x6a000000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r8}, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'tunl0\x00', 0x0}) ioctl$sock_qrtr_TIOCINQ(r3, 0x541b, &(0x7f00000001c0)) r12 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)=ANY=[@ANYBLOB="4000000010001fff000000000000000000060000", @ANYRES32=0x0, @ANYBLOB="81fffffff4ffffff172c01007769726567756172640000000400028008000a0000000000000000000000000000000073f830252541f53ab61d44a06036c27f0957b40654df096d7b07f175f1efa97c97f4d7f7f701ef12eb66d1235732", @ANYRES32=r11, @ANYBLOB], 0x40}}, 0x0) r13 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r13, 0x84, 0x84, &(0x7f0000000400)={0x0, @in6={{0xa, 0x4e23, 0x8, @empty, 0x8}}, 0x2, 0x9}, &(0x7f00000000c0)=0x90) r14 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r14, 0x6, 0x0, 0x0, 0x0) 1m7.018007992s ago: executing program 7 (id=5342): r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="080008000700000000031400000045f0003a00000000002f9078ac1414bbffffffffa20022eb9e13254ac01f8f37b266393682a1ff217bd54edfc57651de719acd18570291c792ae621c018e6f7a25d77490627cbc38e564237fb219667caba7d9a720acccb7ee7e7bbcffc43a03462f3adfb812040878c3b53805cd1f1db89c0e1321f0f54f72d4163c5f5088bf6eb8f79b34af85687011628f37", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50000000907800004adcda08f6e83e2aa00e133f88a8349f246e"], 0xfc6d) pipe2$9p(&(0x7f0000001900), 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) munmap(&(0x7f0000002000/0x4000)=nil, 0x4000) r3 = getpgrp(0x0) syz_pidfd_open(r3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000000000001400000018000180140002006e657464657673696d3000000000000005001900010000000800160000000100080017"], 0x44}}, 0x0) 1m6.884160223s ago: executing program 7 (id=5345): r0 = io_uring_setup(0x4c02, &(0x7f0000000000)={0x0, 0xd74, 0x44, 0x1, 0x15e}) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x9, 0x100010, r0, 0x0) mq_timedreceive(0xffffffffffffffff, &(0x7f0000000080)=""/69, 0x45, 0x8, &(0x7f0000000100)) remap_file_pages(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x7, 0x80000000, 0x1000) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$TIPC_NL_NET_GET(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x74, r1, 0x100, 0x70bd29, 0x25dfdbfd, {}, [@TIPC_NLA_NET={0x54, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fff}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x8}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x5}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1c000000}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x9}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x7fffffff}]}, @TIPC_NLA_SOCK={0xc, 0x2, 0x0, 0x1, [@TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x1}]}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000862}, 0x24004014) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f00000002c0)='mountstats\x00') fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f0000000300)='$@^]{f^\x00', 0x0, r0) fadvise64(r0, 0x6, 0x1b89, 0x2) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) mmap$usbmon(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x4, 0x50, r2, 0x9) write$bt_hci(r2, &(0x7f0000000380)={0x1, @link_key_neg_reply={{0x40c, 0x6}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}}}}, 0xa) ioctl$BLKTRACESETUP(r2, 0xc0481273, &(0x7f00000003c0)={'\x00', 0x6, 0x5, 0x2, 0x8000000000000001, 0xb, 0x0}) prlimit64(r3, 0xe, &(0x7f0000000440)={0x8, 0x32f}, &(0x7f0000000480)) capget(&(0x7f00000004c0)={0x20080522, r3}, &(0x7f0000000500)={0xd604, 0x2, 0x2, 0x8000, 0x2}) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_CAPBSET_DROP(0x18, 0x17) pipe2(&(0x7f0000000540)={0xffffffffffffffff}, 0x0) syz_genetlink_get_family_id$mptcp(&(0x7f0000000580), r4) capset(&(0x7f00000005c0)={0x20071026, r3}, &(0x7f0000000600)={0x300, 0x6, 0x9, 0xfffffff8, 0x6, 0x10}) capset(&(0x7f0000000640)={0x19980330, r3}, &(0x7f0000000680)={0x4, 0x9, 0x40, 0x1, 0x7fff, 0x6727}) getsockopt$inet_IP_IPSEC_POLICY(r4, 0x0, 0x10, &(0x7f00000006c0)={{{@in6=@mcast2, @in6=@remote}}, {{@in=@remote}, 0x0, @in=@private}}, &(0x7f00000007c0)=0xe8) r5 = socket$qrtr(0x2a, 0x2, 0x0) sendto(r5, &(0x7f0000000800)="e91ec6b15795d8", 0x7, 0x810, 0x0, 0x0) r6 = openat$cgroup_subtree(r4, &(0x7f0000000840), 0x2, 0x0) read(r6, &(0x7f0000000880)=""/63, 0x3f) r7 = syz_io_uring_setup(0x24c3, &(0x7f00000008c0)={0x0, 0x8e3d, 0x4, 0x0, 0x94, 0x0, r4}, &(0x7f0000000940), &(0x7f0000000980)) io_uring_register$IORING_REGISTER_CLONE_BUFFERS(r7, 0x1e, &(0x7f00000009c0)={r5}, 0x1) truncate(&(0x7f0000000a00)='./file0\x00', 0x40) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000a40)='/sys/kernel/uevent_helper', 0x0, 0x84) 1m6.818508938s ago: executing program 7 (id=5347): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000c5000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7020000140000fbb703000000e31f008500000083000000bf090000000000005509010000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000c00)='sys_enter\x00', r1}, 0x10) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x1ee) 1m6.817916498s ago: executing program 7 (id=5349): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f0000000140), 0x2, 0xbca, &(0x7f0000000600)="$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") r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x3000) fallocate(r0, 0x0, 0x0, 0x1000f4) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x17, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x4, 0x1, 0x8, 0x20005, 0xb, 0x0, 0xfffffffd, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xffffffff, 0x6, 0x4, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r2, &(0x7f0000001240)=""/102400, 0x200000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0), 0x2002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001a240)=ANY=[@ANYBLOB="1b00000000000000000000000280000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000063607ea926cd0cf4f0b61872463671315814ed85a6ef43a3f7f0fdef73e53d7a18e9bc6ce243143da6552c0c81b6282b281746a20ebd2055e4f3c786a6e5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300"/28], 0x50) syz_clone(0x100000, &(0x7f0000000400)="81c42f2753a6be92c0f34d3027c973a981d4c249fd94e2b14640fe222e4dee8d217061df9ea9472a79438e13edc0507ec8123e74d4d7b420b72ce6acd66e7dcfcea04da332bddc4f546c0e86db5ee89cf34b7300f07ede59de3803da98eb70eb06ee29", 0x63, &(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)="48f4a80fa13c13a45fe756b850a095665885fda15f8871e0f359f3b94aa71ba58fcdcd17ddce7796cfb395d0cf8404c0d670d374458c29283e9c87d4e7c9525ae648e53f18cb6fe78ee4adf24dee1a9bc73bfe27940acbee38bdaa9e3df8c6ba372a7fabce4ae201b6335988876f62704f157c626bb6d6aa01932420605169912207b89fffd0f27d7c4b7a6844cacba44e03e1de4872f79384bbcefd026ce90e3d72bc7f479c") 1m6.508535003s ago: executing program 7 (id=5356): r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mknodat$null(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0, 0x103) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r2 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @broadcast}) write$tun(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="080008000700000000031400000045f0003a00000000002f9078ac1414bbffffffffa20022eb9e13254ac01f8f37b266393682a1ff217bd54edfc57651de719acd18570291c792ae621c018e6f7a25d77490627cbc38e564237fb219667caba7d9a720acccb7ee7e7bbcffc43a03462f3adfb812040878c3b53805cd1f1db89c0e1321f0f54f72d4163c5f5088bf6eb8f79b34af85687011628f37", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="50000000907800004adcda08f6e83e2aa00e133f88a8349f246e"], 0xfc6d) pipe2$9p(&(0x7f0000001900), 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) openat$ptp0(0xffffffffffffff9c, &(0x7f0000000080), 0x400, 0x0) munmap(&(0x7f0000002000/0x4000)=nil, 0x4000) getpgrp(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r0) sendmsg$ETHTOOL_MSG_COALESCE_SET(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000001400000018000180140002006e657464657673696d3000000000000005001900010000000800160000000100080017"], 0x44}}, 0x0) 1m5.918595041s ago: executing program 7 (id=5363): r0 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000040)) fdatasync(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socket$packet(0x11, 0xa, 0x300) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x42, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x24, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xdc8, 0x0, 0x0, 0x0, 0x4}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0x5, 0x4, 0x3, 0x8, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x28bc}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}, @ldst={0x2, 0x2, 0x0, 0x3, 0x4, 0xc, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}]}, &(0x7f00000007c0)='GPL\x00', 0x200, 0x5e, &(0x7f0000000800)=""/94, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000008c0)={0x3, 0x9}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000900)=[r1, r1, r1, r1], &(0x7f0000000940)=[{0x1, 0x5, 0x3, 0xc}, {0x5, 0x5, 0xd, 0x7}, {0x2, 0x5, 0x8, 0xc}, {0x1, 0x4, 0x10, 0x7}, {0x5, 0x5, 0x10}, {0x1, 0x3, 0x0, 0x1}, {0x2, 0x3, 0xd, 0x6}, {0x3, 0x1, 0xd, 0xc}], 0x10, 0x8000}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x21, 0xc8, 0x7, 0x3, 0x10010, r1, 0x4000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x50) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_ext={0x1c, 0x10, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffa3}, [@map_fd={0x18, 0x1, 0x1, 0x0, r1}, @alu={0x4, 0x0, 0x7, 0xb, 0x9, 0x1, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x92, &(0x7f0000000400)=""/146, 0x41100, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x7, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x25d98, 0xffffffffffffffff, 0x2, &(0x7f0000000300)=[r1, r3, r4, r1], &(0x7f00000004c0)=[{0x0, 0x3, 0xf, 0x4}, {0x4, 0x5, 0x10, 0xea7a95ffb500ea4}], 0x10, 0x10001}, 0x94) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}]}}) 1m5.894252123s ago: executing program 37 (id=5363): r0 = syz_open_procfs$pagemap(0xffffffffffffffff, &(0x7f0000000040)) fdatasync(r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r2}, 0x10) socket$packet(0x11, 0xa, 0x300) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000680)={0x6, 0x3, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000020000000000000000ee000095"], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x14, &(0x7f0000000340)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x42, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000ac0)={0x0, 0x24, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0xdc8, 0x0, 0x0, 0x0, 0x4}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r1}}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}, @jmp={0x5, 0x1, 0x5, 0x4, 0x3, 0x8, 0xfffffffffffffff0}, @func={0x85, 0x0, 0x1, 0x0, 0x3}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x28bc}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, 0x1}}, @map_fd={0x18, 0xa, 0x1, 0x0, r1}, @ldst={0x2, 0x2, 0x0, 0x3, 0x4, 0xc, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x1}}]}, &(0x7f00000007c0)='GPL\x00', 0x200, 0x5e, &(0x7f0000000800)=""/94, 0x40f00, 0x4, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000880)={0x6, 0x2}, 0x8, 0x10, &(0x7f00000008c0)={0x3, 0x9}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000900)=[r1, r1, r1, r1], &(0x7f0000000940)=[{0x1, 0x5, 0x3, 0xc}, {0x5, 0x5, 0xd, 0x7}, {0x2, 0x5, 0x8, 0xc}, {0x1, 0x4, 0x10, 0x7}, {0x5, 0x5, 0x10}, {0x1, 0x3, 0x0, 0x1}, {0x2, 0x3, 0xd, 0x6}, {0x3, 0x1, 0xd, 0xc}], 0x10, 0x8000}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=@base={0x21, 0xc8, 0x7, 0x3, 0x10010, r1, 0x4000, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5, 0x4}, 0x50) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000005c0)=@bpf_ext={0x1c, 0x10, &(0x7f0000000280)=@framed={{0x18, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0xffffffa3}, [@map_fd={0x18, 0x1, 0x1, 0x0, r1}, @alu={0x4, 0x0, 0x7, 0xb, 0x9, 0x1, 0xffffffffffffffff}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x3}}, @func={0x85, 0x0, 0x1, 0x0, 0x8}]}, &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x92, &(0x7f0000000400)=""/146, 0x41100, 0x40, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180)={0x7, 0x2}, 0x8, 0x10, 0x0, 0x0, 0x25d98, 0xffffffffffffffff, 0x2, &(0x7f0000000300)=[r1, r3, r4, r1], &(0x7f00000004c0)=[{0x0, 0x3, 0xf, 0x4}, {0x4, 0x5, 0x10, 0xea7a95ffb500ea4}], 0x10, 0x10001}, 0x94) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) mount$9p_fd(0x0, &(0x7f0000000500)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000a40)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@version_u}]}}) 1m1.316247485s ago: executing program 9 (id=5427): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mprotect(&(0x7f00002b4000/0x2000)=nil, 0x2000, 0x2000009) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x10) mmap$perf(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x13, 0xffffffffffffffff, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD(0x5, 0x0, 0x0) ptrace(0x10, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff0000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x18, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = epoll_create1(0x80000) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r3, &(0x7f0000000180)={0x2000101c}) close_range(r2, 0xffffffffffffffff, 0x0) 1m1.287939767s ago: executing program 9 (id=5429): bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x50) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x4008040, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) pselect6(0x0, 0x0, &(0x7f0000000100)={0x9, 0x3ff0000000000, 0x0, 0xe, 0x10, 0x401, 0x40, 0x1000}, &(0x7f0000000300)={0x2, 0xa1d, 0x9, 0x2, 0xc, 0x6, 0x5, 0x4}, &(0x7f0000000ec0)={0x0, 0x989680}, &(0x7f0000000f40)={&(0x7f0000000f00)={[0x7f]}, 0x8}) 1m1.218185103s ago: executing program 9 (id=5431): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r0, 0x0, 0x1}, 0x18) r1 = accept4(0xffffffffffffffff, &(0x7f0000000100)=@generic, &(0x7f0000000080)=0x80, 0x80800) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) syz_open_dev$tty1(0xc, 0x4, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0xc6, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x94) unshare(0x2c020400) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x3, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000600)={0x0, 0x10, &(0x7f00000005c0)=[@in={0x2, 0x4e23, @private=0xa010101}]}, &(0x7f0000000640)=0x10) socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x1d7a3f134c51dade) r3 = epoll_create(0x9) epoll_wait(r3, &(0x7f0000000080)=[{}, {}, {}, {}, {}, {}, {}, {}, {}], 0x9, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) timerfd_gettime(r2, &(0x7f0000000040)) 1m1.190028335s ago: executing program 9 (id=5434): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000240)='./file1\x00', 0x4000, &(0x7f0000000140), 0x2, 0xbca, &(0x7f0000000600)="$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") r0 = open(&(0x7f0000000180)='./bus\x00', 0x14927e, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x27fffff, 0x4002011, r0, 0x3000) fallocate(r0, 0x0, 0x0, 0x1000f4) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) socket$pppl2tp(0x18, 0x1, 0x1) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x17, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x7a, 0x0, 0x0, 0x41000, 0x44, '\x00', 0x0, @cgroup_sysctl=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x4, 0x1, 0x8, 0x20005, 0xb, 0x0, 0xfffffffd, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xffffffff, 0x6, 0x4, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000180)='pagemap\x00') pread64(r1, &(0x7f0000001240)=""/102400, 0x200000, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000ec0), 0x2002, 0x0) bpf$MAP_CREATE(0x0, &(0x7f000001a240)=ANY=[@ANYBLOB="1b00000000000000000000000280000000000000", @ANYRES32, @ANYBLOB="000000000000000000000000000000000000000063607ea926cd0cf4f0b61872463671315814ed85a6ef43a3f7f0fdef73e53d7a18e9bc6ce243143da6552c0c81b6282b281746a20ebd2055e4f3c786a6e5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0300"/28], 0x50) syz_clone(0x100000, &(0x7f0000000400)="81c42f2753a6be92c0f34d3027c973a981d4c249fd94e2b14640fe222e4dee8d217061df9ea9472a79438e13edc0507ec8123e74d4d7b420b72ce6acd66e7dcfcea04da332bddc4f546c0e86db5ee89cf34b7300f07ede59de3803da98eb70eb06ee29", 0x63, &(0x7f0000000300), &(0x7f0000000480), &(0x7f00000004c0)="48f4a80fa13c13a45fe756b850a095665885fda15f8871e0f359f3b94aa71ba58fcdcd17ddce7796cfb395d0cf8404c0d670d374458c29283e9c87d4e7c9525ae648e53f18cb6fe78ee4adf24dee1a9bc73bfe27940acbee38bdaa9e3df8c6ba372a7fabce4ae201b6335988876f62704f157c626bb6d6aa01932420605169912207b89fffd0f27d7c4b7a6844cacba44e03e1de4872f79384bbcefd026ce90e3d72bc7f479c") 1m0.819372295s ago: executing program 9 (id=5443): r0 = socket$inet6(0xa, 0x3, 0x8000000003c) connect$inet6(r0, 0x0, 0x0) sendmsg(r0, &(0x7f00000000c0)={0x0, 0x9504, &(0x7f0000000100)=[{&(0x7f0000000000)="2b10", 0xd8ef}], 0x1, 0x0, 0x0, 0x2c}, 0x4) 1m0.078415815s ago: executing program 9 (id=5459): r0 = socket(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x33, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x74, 0x8, 0x0, 0xfffffffd}]}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) getpeername$packet(r0, &(0x7f0000000400), &(0x7f0000000440)=0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r3 = syz_open_dev$tty1(0xc, 0x4, 0x4) r4 = dup(r3) write$UHID_INPUT(r4, &(0x7f0000000000)={0x7, {"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", 0x1000}}, 0x1006) syz_open_dev$mouse(&(0x7f0000000500), 0x2f3, 0x80) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000540)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 1m0.078107085s ago: executing program 38 (id=5459): r0 = socket(0xa, 0x3, 0x3a) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x33, &(0x7f0000000040)={0x1, &(0x7f0000000140)=[{0x74, 0x8, 0x0, 0xfffffffd}]}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000100)={{}, &(0x7f0000000080), &(0x7f00000000c0)}, 0x20) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{}, &(0x7f0000000180), &(0x7f00000001c0)}, 0x20) getpeername$packet(r0, &(0x7f0000000400), &(0x7f0000000440)=0x14) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000059"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r3 = syz_open_dev$tty1(0xc, 0x4, 0x4) r4 = dup(r3) write$UHID_INPUT(r4, &(0x7f0000000000)={0x7, {"a2e3ad21ed0d52f91b5d520987f70e06d038e7ff7fc6e5539b0d47078b089b3907376d090890e0878f0e1ac6e7049b334a959b669a240d5d67f3988f7ef319520100ffe8d178708c523c921b1b5b31070d07670936cd3b78130daa61d8e809ea882f5802b77f07227227b7ba67e0e78657a6f5c2a874e62a9ccdc0d31a0c9f318c0da1993bd160e233df4a62179c6f30e065cd5b91cd0ae193973735b36d5b1b63dd1c00305d3f46635eb016d5b1dda98e2d749be7bd1df1fb3b231fdcdb5075a9aaa1b469c3090000000000000075271b286329d169934288fd789aa37d6e98b224fd44b65b31334ffc55cc82cd3ac32ecdb08ced6f9081b4dd0d8b38f3cd4498bee800490841bdb114f6b76383709d8f5c55432a909fda039aec54a1236e80f6a8abadea7662496bddbb42be6bfb2f17959d1f416e56c71b1931870262f5e801119242ca026bfc821e7e7daf2451138e645bb80c617669314e2fbe70fe98ec76a9e40dad47f36fd9f7d0d42a4b5f1185ccdcf1a34af674f3f39fe23491237c08822dec110911e893d0a8c4f677747abc360934b82910ff85bfd995083bba2987a67399eac427d145d546a40b9f6ff14ac488ec130fb3850a27af9544ae15a7e470dea05918b41243513f000800000000000a3621c56cea8d20fa911a0c41db6ebe8cac64f17679141d54b34bbc9963ac4f4bb3309603f1d4ab966203861b5b15a841f2b575a8bd0d78248ebe4d9a80002695104f674c2431dca141fae269cab70e9a66f3e3a9a63e9639e1f59c0ede26c6b5d74b078a5e15c31634e5ae098ce9ee70771aaa18119a867e1088334975e9f73483b6a62fa678ca14ffd9f9db2a7869d85864056526f889af43a6056080572286522449df466c632b3570243f989cce3803f465e41e610c20d80421d653a5520000008213b704c7fb082ff27590678ef9f190bae97909507041d860420c5664b27921b14d9fdb8892fd32d0ad7bc946813591ad8deff4b05f60cea0da7710ac0000000000008000bea37ce0d0d4aa202f928f28381aab144a5d429a04a6a2b83c7068ae949ed06e288e810bac9c76600025e19c907f8ea2e2010000008271a1f5f8528f227e79c1389dbdfffe492f21579d2c15b8c70cdb1c332d86d87341432750861ec2bc3451edca194b221cfec4603d276bbaa1dfa6d4fb8a48a76eafc9a9a0270e4c10d64cd5a62427264f2377fe763c43470833ac96c45f357cbba8f1b1fdcc7cbb61a7cdb9744ed7f9129aede2be21ccfdc4e9134f8684b3a4f354da9a795e96334e207dff70f1988037b2ed3aaf575c0b88d8f146684078416d59fdee5325928974d12dad99dac44c3f0008047096a44002bebc2420aed92fa9b6578b4779415d97b9a6d6d5495c118045651cf41c2fc48b778efa5ea5677747430af4162b987b80c3e001cd34e5c92f76cc4c24eeb8bc4e9ac2aed9e53803ed0ca4ae3a19000000000000006f1783e287b3bee96e3a726eafe2fdfaa78d1f48c13b64df07847754b8400daaa69b15c9f4350aeae9ca1207e78283cd0b20ceb360c7e658828163e2d25c4aa348561f927e88f63aa70e73a5e69b3df3495903f06572e1e007fa55a2999f596d067312f5779e8dbfdcf3427138f3d44400009a10477f9bec4b0bbb6e3c04be68981f392203dd0ee3ef478e16dacfc5e3e03cf7ab8e3902f1b0ff034ef655b253ca509383815b1b6fc6522d4e4fdc01008cf42d48604675fde2b94cf00500a2690891abf8ab9c015073014d9e08d4338b8780bdecd436cf0541359bafffa45237f104b96210403b2de9efed496f42355bc7872c827467cfa5c4e72730d56bd068ed211cf847535edecb7b373f78b095b68441a34cb51682a8ae4d24ad0465f3927f889b813076038e79a7962fb385a882e8020f06c4c2ba1dd5cac7c16c02ed4b5d258734dd73583df292892448039ef799cf0630becdcce04579b5561dc825ab829827945e020c1f67ee615feb6243378e0610060f02cca4e91b2f001edb3d78fb4b55668dda93aec92a5de203717aa49c2d284acfabe262fccfcbb2b75a2183c46eb65ca8104e1b4da7fbb77ab2fc043aead87c32ab875ee7c2e7b7019c982cd3b43eaab1a5fb135c0c7dcee8fe6516a328032f88c042891824659e9e94265c803b35ee5f83a2b210520106d26658b50ab7a1fa89af9c251fe5294b3d1802d5676d95f160ec97b1ad94872cb2044642c37b4a6cc6b14effc1672db7e4b68d787d9a7a508ae54b3cd7369dde50e8c77d95a3d361c040babb171607caac2a3559ad4f75465f49c0d0ae3716db6e00cb11db4a5fade2a57c10238e204a67737c3b42aae501b20f7694a00f16e2d0174035a2c22656dc29880acebdbe8ddbd75c2f998d8ac2dfad2ba3a504767b6b45a45957f24d758ed024b3849c110000a2a03b4047497022d9c30e23ef4df5c89644f48bb536f7945b59d7bcddff754413d135273ea8e75f22f216c6b9990ae71806f2c00b4025c48b75c0f73cdb9a7b8fa367b51028067e7f16f4dd569d462f4f19eacdb3ed70eeebb4483f8fd777d443e8b40426db6fe29068c0ca3d2414442e8f3a154704b0e51bc664a137b26be719f4f7c9a5678a674dfc95df80b9ce375dd649c8c704e509bd88c8e63d8c7dd67071115c8982ba46af4d6adcc9f68a75b9397b035153faf46366e7205dd8d6f37525c1a0e94610dd94323f6815d085197149bfd6655548cfd9c52c9711937f79abb1a124f1210465483cd3b2d78378cfb85ed82e7da0f6eb6d279f2ae455925d0f6f1ba571eba281f2a654fb39ddff3b484439ff158e7c5419e037f3f3ad038f2211f1033195563c7f93cd54b9094f226e783271e1e5a2a2c10712eab625d64931cd4ffe6738d97b9b5ef828ee9fb059fc01af0e79c1e14b1d25988c69a399567c1d93768f7971d31488b8658a20878b7c1dd7ba02fc42939dde3d4a3339a65d507dc59c51090840517705da56e9ebf0afa53282bf86dbb58c548069ff6eb95aade7cc66d7bbef724779ca1f731b3346ff177050373d79ff7b3e7f9bc0c1b4e004a8878b90baaa039d3e3b63979ac3df6e6f4859afd50238c7547a39b60810938044ae185d2ba3e00a4e73676864ae090d81eaee5ee6ce1d0ab378dd4dd891e937c2ea5410e0513005000000000000003911fab964c271550027697b52160687461602f88df165d884b36ec2b6c25a2f33c715687e9d4afb96d6861aca47da73d6f3144345f48843dd014e5c5ad8fe995754bd9cf32fce1e31919c4b2082fb0a30b9deae84bed4b28045634073c9c58c89d9e99c817e9177c6d594f88a4facfd4c735a20307c737afae5136651b1b9bd522d60399473296b831dbd933d93994ba3064279b10ea0c5833f41f157ea2302993dbe433b1aa3a3766d543902113c4c859465c3c115c3432f81db8719539d5bf372aaaea1cc43a6c5cbe59758bfee2916580dac4b008e595f437491d87abed02cefcd9db53d94d02dae17b118e5d6787463183b4b87c1050000002f7809959bc248850613d17ca51055f2f416a44fe180d2d50c312cca7cb14a2bdc331f57a9817139a206fc76957227ffff2de20a4b8e3737fbb42913777c06376f799eba367e21f94ca598705f5dcb767d6f0900d6b0f6095e53c4c4234d0c1fbe434f6ab8f43c0013ee93b83946ee7759e89d7bdd1a32d7b311711b757fe43c06d21a35810d8fe98b27faea8aa12bc8716eefc5c97c45ac33eeec964c5214bc3a9359bdea1cccab94f15e36319cb34ebcacedb82c2ed3de5a8a8f0011e8f74e82d7f96093530e76692839d7961939adfdeeeaff19d11efcafb6d546fef271e89d6cc2389e81ff58cefcce3fbf4625a7e7de40e42e07b34449e15e065cc7340002000000000000f288a4510de03dab19d26285eda89156d50dd385a60333ba5bbf5d77cd7007ad1519ad5470de3dd6d6080cafcc009fc074bb6b68a1f0c4649820a73c880f475f732ae00398e8bd1f4908b7807fb33b72685ec37a2d3f766413a60459516246e5a1d998a2017aef0948998cf255315ab80dd349e891aef595dc4d470e8ac32a308e15fc37d06aeac289c0523f483e1ff7408c6087f1ab652f2ef91d4f2b01987b0f46da034e5c3f745a7ee8101a3934c54e24b48ec0275e2d0687dc746b0827cbf652f406c6b95f2722e58c05f752ce2126596e1cd7655b904801784c416b22f73d324678e2724f43f1fe687c7e8a60c28b82b6528341b648cdd56fed7cdcbb1575912d5ecd36dea3bca0b7427d8392c6289455e8f8d2ab2242729251ae033a9e02210e62df0546a74b333a1c48f95fd54acb5741259e8c5488efeee327415cc19451432c6f14c27693102a3cd84857cd6586fc5ca9a93eb0145fac0662ff86107f998a8ef7df8aa14046c55b03d3d47f88a8d60f7774a2ee08758897fb411a94b3c2fc5d5f0db42c0456ec015f08e5247d33ae2d35603ff8454c16f8342856935125102bb784ed7148b6ce431b63ee356b0c785f2fd40195af4486220d702e30bfc43c10ec23ea6283994a7dde4dcb61fea6b651fb1d62458d0741a12830052fcc460db043afe525629b40d7cee458e4cb5e930ed624806c43a006e39336d07c2b8081c128ad2706f48261f7897484c297a1a6613bc18f5a38d442768af38041efe03d152ef95ff569e76db2391f4509d7f339d92fdb4a89364949da398000000000000000d80a4fe654578376e599aff3565b1d531f30912b9945030b81ea9935fd46edb44a78f615255490a4b621501f2a9e4d24624c4dac9274118c67584f5dc4ff8f0104000000000000df72279fdb0d2b9e936e5a983c12fded79dfc248c1f5aea4b8b32c5d295e57079d0fe662a46b7f71cd47744db86c50b704c971d90295c7b2c7439a2d78ccfa79b5fc2bff6bbf840262bf89394b3e0691953264d3700c838fa2c7b3425260f59554e502dcea39cb313b0000000000004ca7c12f45858d6284ca6270d6b2f0e58fded8a7b4a302a97bc641df07720ba2b26bbfcc807ca0abb1b44322269c21c5ec68cb068ea88067d905ea917bb03eefdaebdeabf2d0dce80997c915c8949de992587c2cb5fe36d7d3e5db21b094b8b77940b5f07722e47a08d367e5f84c96ec664b72934b99b3109af65d77e86abd6859cddf4bbae1f0930462df15fddbc48562ea3511a8065ef028cf12f14dcf6ebecd8d884836174faf1aa6e5f1ee1162dfa13bdc1fa7cfaadba85c72e9758f03a755d0be53f8d2a1dfb1c68cc164b0a0780d971a96ea2c4d4ca0398c2235980a9f07b3d5bd3b01faffd0a5dbed2881a9700af561ac8c7e3ebb2fc4c40e9cf96f06817fb903729a7db6ff957697c9ede7885d94ffb0969be0daf60af93109eb1dee72e4363f51af62af6fb2a6df3fec89822a7a0b678058fa3fef86faec216eb6992162f8dcbf719c148cd2f9c55f4901203a9a8a2c3e90f3943dbc10360a1a49700d1dfbf66d69f6fbaf506c8bcce8bb0d872a02238926407a4cddd5d0fc5a752f9000", 0x1000}}, 0x1006) syz_open_dev$mouse(&(0x7f0000000500), 0x2f3, 0x80) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000540)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) 4.867952855s ago: executing program 1 (id=6621): r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000005c0), r0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xfec8d000) mlock(&(0x7f0000656000/0x3000)=nil, 0x3000) mbind(&(0x7f0000001000/0x800000)=nil, 0x800000, 0x4, 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@broadcast, @remote, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "f7d8ff", 0x34, 0x3c, 0x0, @local, @mcast2, {[@hopopts={0x0, 0x2, '\x00', [@hao={0xc9, 0x10, @rand_addr=' \x01\x00'}]}, @hopopts], {0x0, 0x0, 0xfffffffffffffe35, 0x0, @gue={{0x1, 0x0, 0x1, 0xe, 0x0, @void}}}}}}}}, 0x0) bind$inet6(0xffffffffffffffff, &(0x7f0000f5dfe4)={0xa, 0x4e20, 0x0, @empty}, 0x1c) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x3, &(0x7f0000004240)=0x40000006, 0x4) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x8) r2 = socket$rds(0x15, 0x5, 0x0) ioctl$sock_TIOCINQ(r2, 0x541b, 0x0) recvmmsg(r2, 0x0, 0x0, 0x2, 0x0) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x4, 0x0, 0x0) sendto$inet6(0xffffffffffffffff, 0x0, 0x0, 0x20000001, &(0x7f0000000300)={0xa, 0x4e20, 0x5, @mcast1}, 0x1c) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0x7fff}, 0x18) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='\x00', 0x89901) ioctl$sock_SIOCGIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r2, 0x8982, &(0x7f0000000180)) fchdir(r3) getcwd(&(0x7f0000000340)=""/182, 0xb6) ioctl$VT_RESIZEX(0xffffffffffffffff, 0x560a, &(0x7f0000000240)={0x19, 0x3d24, 0x1575, 0x0, 0x0, 0xfffe}) r4 = socket$inet6(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r4, 0x29, 0x3b, &(0x7f0000001000)=ANY=[], 0x8) recvmmsg(r4, &(0x7f0000001640)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000f40)=""/8, 0x8}, 0xe69}], 0x1, 0x2, 0x0) setsockopt$inet6_int(r4, 0x29, 0x4, &(0x7f0000000000)=0x1, 0x4) 4.394661253s ago: executing program 1 (id=6627): socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000cc0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000500)=[{&(0x7f0000000380)="75c1cc54649640be1983f79c5bfe88cd6a6a000070ab59578db363168a2559f334d436138406b699de69cb13fd737428808940bcd0940dc930c81aaad8b665cd232c5831977dd63ce2c88d43b17760a6e0df533940a702485bb198e47be6f2b546c27ebfdb041df6bbc2d10b61eb755df569c9cb7c4951ddb54505f67244cd16e376fbbdebc994d22a474b7bc494cafcac137748c8ebff7807053222d67c3ee79861e8cf4ff092236fccfbe08dcb5d7c2ba08b25883740695452a401800e63c157d64d90e4108e5eb8e917c00e9e52df03723ce3", 0xd4}, {&(0x7f0000000f80)="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", 0x205}, {&(0x7f00000004c0)="ef28a2", 0x3}], 0x3}, 0x0) recvmsg(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/233, 0xe9}], 0x1, &(0x7f0000001d00)=""/4080, 0xff0}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000240)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000080)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) 3.93220188s ago: executing program 2 (id=6635): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="180000000000fbff000000000000001d8500000007000000850000002a000000"], &(0x7f0000000400)='GPL\x00', 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f00000001c0)='kmem_cache_free\x00', r0}, 0x10) r1 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000240)=ANY=[@ANYBLOB="020d000014000000000000000000000005000600000000000a0080ff00000000fc010000000000000000000000000000000000000000000005000500000000000a000000000000000000000000000000000000000000deff00000000000000000800120002000200000000000000000030002b000303"], 0xa0}}, 0x0) 3.920552971s ago: executing program 2 (id=6636): syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, &(0x7f0000000540)={[{@grpquota}, {@bsdgroups}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@acl}]}, 0x1, 0xbaf, &(0x7f0000002f00)="$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") socket$can_raw(0x1d, 0x3, 0x1) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="54000000100001040000000000000001000000", @ANYRES32=0x0, @ANYBLOB="fff00000000000002c0012800e00010069703667726574617000000018000280140007002001000000000000000000000000000208000a00", @ANYRES32], 0x54}, 0x1, 0x0, 0x0, 0x20081}, 0x0) signalfd4(r0, &(0x7f00000003c0)={[0x6]}, 0xfffffffffffffe68, 0x800) prctl$PR_SET_SECUREBITS(0x1c, 0xc) syz_usb_connect(0x3, 0x1c, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r1 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r1, &(0x7f0000000100)={0x1d, r2, 0x2, {0x3}}, 0x18) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="050100"/17, @ANYBLOB="e15b32c592d00714c13c4a2751e5fd094a83387018fe3df3ed1ff9a2d1d153af751380f0853ce9021a67e4362ac755569838efadf2d2b3bc3775b222e5b466f053bd24ca2f3ac1c22139e342dd7e270710ecc635430c1d96ee236f4b361f3c6a8c44605fb565694b33f6e0af95b5df22d5f1eae73574a476d4df63899cc6632c74adf9e3f1788f2c0da544769fb29d4766b791c65ac72e63f774b7b5a50c1b908584811fddc26524b8c8f311b480a7906bbacbf0393c2d9a757ed255f70ef4d07583"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000bb00551a000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b703000000000000850000001b000000b7"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', r2, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x18) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), r1) sendmsg$TIPC_NL_KEY_SET(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="67ba12ec", @ANYRES16=r5, @ANYBLOB="00082cbd7000fddbdf2517000000"], 0x14}}, 0x11) 3.529970253s ago: executing program 1 (id=6640): mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x4, 0x40010, 0xffffffffffffffff, 0x27216000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) getgroups(0x0, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) r0 = socket$igmp(0x2, 0x3, 0x2) setsockopt$MRT_INIT(r0, 0x0, 0xc8, &(0x7f0000003d40), 0x4) pipe(&(0x7f0000000d00)={0xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) r3 = socket$inet_udp(0x2, 0x2, 0x0) close(r3) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r4, &(0x7f0000000500)=[{{&(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='p'], 0x70}}], 0x1, 0x2000c044) syncfs(r4) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000180)={'syz_tun\x00'}) write$binfmt_misc(r2, &(0x7f0000000240), 0xfffffecc) splice(r1, 0x0, r3, 0x0, 0x714f, 0x0) 2.686969771s ago: executing program 1 (id=6649): r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) 2.657257904s ago: executing program 1 (id=6650): r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) setsockopt$TIPC_GROUP_JOIN(r0, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) (fail_nth: 2) 2.413783244s ago: executing program 1 (id=6652): syz_mount_image$ext4(&(0x7f0000000b80)='ext4\x00', &(0x7f0000000bc0)='./file0\x00', 0x0, &(0x7f0000000540)={[{@grpquota}, {@bsdgroups}, {@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@acl}]}, 0x1, 0xbaf, &(0x7f0000002f00)="$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") r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f0000000040), &(0x7f0000000080)=0x4) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=ANY=[@ANYBLOB="54000000100001040000000000000001000000", @ANYRES32=0x0, @ANYBLOB="fff00000000000002c0012800e00010069703667726574617000000018000280140007002001000000000000000000000000000208000a00", @ANYRES32], 0x54}, 0x1, 0x0, 0x0, 0x20081}, 0x0) prctl$PR_SET_SECUREBITS(0x1c, 0xc) syz_usb_connect(0x3, 0x1c, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r2, 0x8933, &(0x7f0000000000)={'vxcan0\x00', 0x0}) bind$can_j1939(r2, &(0x7f0000000100)={0x1d, r3, 0x2, {0x3}}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="050100"/17, @ANYBLOB="e15b32c592d00714c13c4a2751e5fd094a83387018fe3df3ed1ff9a2d1d153af751380f0853ce9021a67e4362ac755569838efadf2d2b3bc3775b222e5b466f053bd24ca2f3ac1c22139e342dd7e270710ecc635430c1d96ee236f4b361f3c6a8c44605fb565694b33f6e0af95b5df22d5f1eae73574a476d4df63899cc6632c74adf9e3f1788f2c0da544769fb29d4766b791c65ac72e63f774b7b5a50c1b908584811fddc26524b8c8f311b480a7906bbacbf0393c2d9a757ed255f70ef4d07583"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x18) r4 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000180), r2) sendmsg$TIPC_NL_KEY_SET(r2, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=ANY=[@ANYBLOB="67ba12ec", @ANYRES16=r4, @ANYBLOB="00082cbd7000fddbdf2517000000"], 0x14}}, 0x11) 2.349722879s ago: executing program 5 (id=6655): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffb}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f00000002c0)='mm_page_alloc\x00', r0}, 0x10) set_mempolicy(0x4005, &(0x7f0000000080)=0x4, 0x8) r1 = socket$netlink(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={&(0x7f0000000300)=ANY=[@ANYBLOB, @ANYRES16=r2, @ANYBLOB="080000000000fbdbdf2525000000080001007063690011000200303030303a30303a31302e3000000000"], 0x30}, 0x1, 0x0, 0x0, 0x41}, 0x0) r3 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f00000004c0)={'vcan0\x00'}) socket$nl_xfrm(0x10, 0x3, 0x6) openat$selinux_user(0xffffffffffffff9c, 0x0, 0x2, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='xprt_retransmit\x00', r4, 0x0, 0x6}, 0x18) r5 = socket$netlink(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)=ANY=[@ANYBLOB="380000000314010000000000000000000900020073797a3200000000080041007278650014003300626f6e6430000000000000000000000072103baacbf21e2fab12a98bbd83d61f6224c6d3"], 0x38}, 0x1, 0x0, 0x0, 0x4040000}, 0x100) socket(0x1d, 0x2, 0x6) syz_io_uring_setup(0x10d, &(0x7f0000000140)={0x0, 0x334e, 0x10000, 0x80000004, 0x33e}, &(0x7f0000000280)=0x0, &(0x7f00000002c0)=0x0) r8 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000400)='cpuset.memory_pressure_enabled\x00', 0x275a, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_TEE={0x21, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x1, 0x7}) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002a20702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000280)='kfree\x00', r9}, 0x18) lsetxattr$security_capability(0x0, 0x0, 0x0, 0x0, 0x0) r10 = socket(0x40000000015, 0x5, 0x0) setsockopt$SO_RDS_TRANSPORT(r10, 0x114, 0x8, &(0x7f00000008c0), 0x4) bind$inet6(r10, &(0x7f0000000000)={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, '\x00', 0xf}, 0xfffffffc}, 0x1c) write$UHID_CREATE2(r8, &(0x7f00000001c0)=ANY=[@ANYBLOB="06"], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, r8, 0x0) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_OPENAT={0x12, 0x0, 0x0, 0xffffffffffffff9c, 0x0, 0x0, 0x60, 0x185100}) 2.004299727s ago: executing program 5 (id=6659): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @empty, @multicast1}, &(0x7f0000000100)=0xc) io_setup(0x4, &(0x7f00000014c0)=0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='mounts\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x2, 0x14, 0xffff, 0x1}}, 0x80, 0x0, 0x44}, 0x4048850) r4 = socket$netlink(0x10, 0x3, 0x4) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40000000010800034000000014480000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c0003801800008008000340000000020c0004400000000000000c7f14000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) close_range(r4, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001900599c6d0e000091d028ef8020ab0700040005234538ba55"], 0xfe33) io_submit(r2, 0x1, &(0x7f0000000280)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0xfffe, r3, 0x0}]) r7 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000140)={0x0, r0}, 0x8) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x3, 0xffffff7f, 0x1, 0x30194, 0x1, 0x7, '\x00', r1, r3, 0x2, 0x1, 0x1, 0x6, @void, @value, @value=r7}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r9}, 0x18) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000910095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r11 = syz_open_dev$evdev(&(0x7f0000000000), 0x1, 0x8a0602) unshare(0x26020400) ioctl$EVIOCGRAB(r11, 0x40044590, &(0x7f0000000080)=0xe) ioctl$EVIOCGRAB(r11, 0x40044590, &(0x7f0000000040)) r12 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r10, r10, 0x2f, 0x0, @void}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000140)=r12, 0x4) futimesat(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1800000068000100ffff0f00fdffff7fb59a7c38a6000000"], 0x18}, 0x1, 0x0, 0x0, 0x4008018}, 0x4000080) 1.908121055s ago: executing program 5 (id=6661): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1/file3\x00', 0x0) renameat2(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file3\x00', 0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x0) 1.890727126s ago: executing program 5 (id=6663): r0 = socket$inet_smc(0x2b, 0x1, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0600000004000000080000000a00000000000000", @ANYRES32, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000000000800000000000000000000000000000000000000008bd5dba785df36d7411c2b9482ef855d0bc051b69e07c22c9d867f3fd289e0a668408eb8bf79ab2de8d84a4fbd8d4191ed10a8d7c455d25b7039dc683e88ed7aee106a052459d68a73180654721a8fd2a89f69ebc235c051ee15fcd7b3ad6dcf87729c5d15690b5ef54cf19b99f81428f31c392adae91220665edca5936b104678c4f5d9207ffbeb25"], 0x50) mount(0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x14) umount2(0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$eJzs3ctvW1UaAPDPdpMmaWb6mNGo7UjTSh2p81DjPDRqMjObWc3MotJoKrEBqYTEDSVOHMVOaaIuUth1wQKBQEIs2PMXsKErKiTEGvaIBSqCEiRAQjK613abOHGwII1p7u8n3ebch/2dU+s7Ovf4Xt8AMuts8k8uYjgiPoyIo43VrQecbfzZuH9zJllyUa9f/iKXHpestw5tve5IRKxHxEBE/P/fEc/ktsetrq7NT5fLpeXmerG2sFSsrq5duLYwPVeaKy2OTV6cmpocnRif2rO23n7puduX3vlv/9vfvHjv7svvvZtUa7i5b3M79lKj6X1xfNO2QxHxz0cRrAcKzfYM9roi/CTJ5/ebiDiX5v/RKKSfJpAF9Xq9/n39cKfd63XgwMqnY+BcfiQiGuV8fmSkMYb/bQzly5Vq7a9XKyuLs42x8rHoy1+9Vi6NNs8VjkVfLlkfS8sP18fb1ici0jHwK4XBdH1kplKe3d+uDmhzpC3/vy408h/ICKf8kF3yH7JL/kN2yX/ILvkP2SX/IbvkP2SX/Ifskv+QXfIfskv+Qyb979KlZKm37n+fvb66Ml+5fmG2VJ0fWViZGZmpLC+NzFUqc+k9Ows/9n7lSmVp7G+xcqNYK1Vrxerq2pWFyspi7Up6X/+VUt++tAroxvEzdz7ORcT63wfTJdHf3CdX4WCr13PR63uQgd4o9LoDAnrG1B9kl3N8oP0netvHBQOdXrj0cL4QeLzke10BoGfOn/L9H2SV+X/ILvP/kF3G+MAOj+jbYrf5f+DxZP4fsmu4w/O/frXp2V2jEfHriPio0He49awv4CDIf5Zrjv/PH/3jcPve/ty36VcE/RHx/BuXX7sxXastjyXbv3ywvfZ6c/v4phd2PGEAeqWVp608BgCya+P+zZnWsp9xP/9X4yKE7fEPNecmB9LvKIc2cluuVcjt0bUL67ci4uRO8XPN5503TmSGNgrb4p9o/s013iKt76H0uen7E//Upvh/2BT/9M/+X4FsuJP0P6M75V8+zel4kH9b+5/hPbp2onP/l3/Q/xU69H9nuozx7JsvfNox/q2I0zvGb8UbSGO1x0/qdr7L+PeeeuJ3nfbV32q8z07xW5JSsbawVKyurl1If0durrQ4NnlxampydGJ8qpjOURdbM9Xb/ePkB3d3a/9Qh/i7tT/Z9ucu2//d799/8uwu8f90bufP/8Qu8Qcj4i9dxv9q/JOnO+1L4s92aH9+l/jJtoku41df/c/hLg8FAPZBdXVtfrpcLi0rKCj0pHDrl1GNtkKveybgUauuJqfmSdL3uiYAAAAAAAAAAABAt/bjcuJetxEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4CD4IQAA//9HcdTQ") r3 = creat(&(0x7f00000000c0)='./bus\x00', 0x182) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x181242, 0x148) pwrite64(r4, &(0x7f0000000140)='2', 0xfdef, 0xfecc) fallocate(r3, 0x0, 0xbf5, 0x2000402) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f0000000040)={0xc, r3, 0x0, 0x0, 0x0, 0xfffffffffdffffff}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000b2e900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x37e2f4aba9289b81, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5, 0x0, 0xffffffffffffffff}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000380)={0x18, 0x7, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000e50003000000000085100000fcffffff250000001000000006000000faffffff95"], &(0x7f0000000280)='GPL\x00', 0x1, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x80000}, 0x94) ioctl$int_in(r0, 0x5421, &(0x7f0000000100)=0x100000001) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xd3, 0x1, 0x0, 0x0, 0x0, 0xf, 0x9211, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={0x0, 0xc}, 0x14ce3, 0x100004, 0x0, 0x2, 0x6, 0x3}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 1.643395196s ago: executing program 5 (id=6665): pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{}, &(0x7f0000000200), 0x0}, 0x20) prctl$PR_SET_SECCOMP(0x16, 0x1, 0x0) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x18) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000140)="2e00000011008188040f80ec59acbc0413a1810031000000000f000000028002002d1f00"/46, 0x2e}], 0x1}, 0x0) 1.340825531s ago: executing program 4 (id=6669): perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_create_resource$binfmt(0x0) r1 = openat$binfmt(0xffffffffffffff9c, r0, 0x42, 0x1ff) write$binfmt_script(r1, &(0x7f0000000080)={'#! ', './file1'}, 0xb) close(r1) socket$tipc(0x1e, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000140), 0x800, 0x0) ioctl$TIOCSETD(r4, 0x5423, &(0x7f0000000040)=0x14) (fail_nth: 1) 1.334034141s ago: executing program 2 (id=6670): r0 = gettid() ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x42) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) write$UHID_INPUT(0xffffffffffffffff, &(0x7f00000001c0)={0xd, {"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", 0x1000}}, 0xffffff5c) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = epoll_create1(0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/wakeup_count', 0x141000, 0x20) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000200)={0xa000000a}) finit_module(r5, 0x0, 0x3) 1.285421315s ago: executing program 2 (id=6671): bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8) r0 = syz_open_procfs$pagemap(0x0, &(0x7f0000000040)) ioctl$PAGEMAP_SCAN(r0, 0xc0606610, &(0x7f0000000180)={0x60, 0x0, &(0x7f0000fef000/0x11000)=nil, &(0x7f000037b000/0x3000)=nil, 0x8, &(0x7f0000000080)=[{0x101, 0xffff, 0x4}, {0x7, 0x0, 0x2e0}, {0x0, 0xffffffff, 0x80}, {0x5, 0x6, 0xdd}, {0x80000000, 0x101, 0xffffffffffffffe4}, {0x3, 0x4, 0x6}, {0x4, 0xfffffffffffffffe, 0x3}, {0x1, 0x5, 0x401}, {0x68, 0x5, 0x8}, {0xffff, 0x8}], 0xa, 0x0, 0x14, 0x9, 0x0, 0x68}) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) munlockall() bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x2, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x45, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) r2 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000280), 0x40900, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000d00000000080000000850000007d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f00000004c0)='netlink_extack\x00', r4, 0x0, 0xfffffffffffffffe}, 0x18) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000300)={@private2, 0x0, r6}) r7 = syz_io_uring_setup(0x497, &(0x7f0000000180)={0x0, 0x79ab, 0x8, 0x8000, 0x400250}, &(0x7f00000003c0)=0x0, &(0x7f0000000400)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r8, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r8, r9, &(0x7f0000000140)=@IORING_OP_READ=@pass_buffer={0x16, 0x40, 0x2007, @fd=r2, 0x6, &(0x7f0000000580)=""/207, 0xcf, 0x2, 0x1}) io_uring_enter(r7, 0x74d1, 0x4c3, 0x43, 0x0, 0xfffffffffffffd1d) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r10}, 0x2a) r11 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$restrict_keyring(0x1d, r11, 0x0, 0x0) r12 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000080)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r12, &(0x7f0000000240)='asymmetric\x00', &(0x7f0000000540)=@keyring={'key_or_keyring:', r11}) r13 = socket(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r13, 0x0, 0x40000) r14 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r14}, 0x18) 1.030186426s ago: executing program 4 (id=6672): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000000c0)={0x0, @empty, @multicast1}, &(0x7f0000000100)=0xc) io_setup(0x4, &(0x7f00000014c0)=0x0) r3 = syz_open_procfs(0x0, &(0x7f00000002c0)='mounts\x00') sendmsg$kcm(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}, 0x2, 0x14, 0xffff, 0x1}}, 0x80, 0x0, 0x44}, 0x4048850) r4 = socket$netlink(0x10, 0x3, 0x4) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000300)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a44000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40000000010800034000000014480000000c0a010100000000000000000a0000060900020073797a31000000000900010073797a31000000001c0003801800008008000340000000020c0004400000000000000c7f14000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x4000850}, 0x40) close_range(r4, 0xffffffffffffffff, 0x0) r6 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r6, &(0x7f0000000000)=ANY=[@ANYBLOB="563f00001900599c6d0e000091d028ef8020ab0700040005234538ba55"], 0xfe33) io_submit(r2, 0x1, &(0x7f0000000280)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x5, 0xfffe, r3, 0x0}]) r7 = bpf$TOKEN_CREATE(0x24, &(0x7f0000000140)={0x0, r0}, 0x8) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@bloom_filter={0x1e, 0x3, 0xffffff7f, 0x1, 0x30194, 0x1, 0x7, '\x00', r1, r3, 0x2, 0x1, 0x1, 0x6, @void, @value, @value=r7}, 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r8, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r9}, 0x18) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x3, 0x3, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000910095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x94) r11 = syz_open_dev$evdev(&(0x7f0000000000), 0x1, 0x8a0602) unshare(0x26020400) ioctl$EVIOCGRAB(r11, 0x40044590, &(0x7f0000000080)=0xe) ioctl$EVIOCGRAB(r11, 0x40044590, &(0x7f0000000040)) r12 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000000)={r10, r10, 0x2f, 0x0, @void}, 0x10) bpf$LINK_DETACH(0x22, &(0x7f0000000140)=r12, 0x4) futimesat(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1800000068000100ffff0f00fdffff7fb59a7c38a6000000"], 0x18}, 0x1, 0x0, 0x0, 0x4008018}, 0x4000080) 978.8019ms ago: executing program 3 (id=6674): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYRESDEC, @ANYRESOCT=0x0, @ANYRES8=0x0, @ANYRES64, @ANYRESHEX], 0x48) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB='\t\x00'/18, @ANYRES32=0x0, @ANYRES32=r0, @ANYBLOB="04000000030000000200"/28], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa20000000000000702"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r0}, &(0x7f0000000200), &(0x7f0000000240)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0xc, '\x00', 0x0, @fallback=0x3c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000014000000b7030000010000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$netlink(0x10, 0x3, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x4}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x1, 0x0, 0x7ffc0002}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$inet6(0xa, 0x1, 0xff) r3 = syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x4}, &(0x7f0000000300)=0x0, &(0x7f0000000580)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000080)=0xfffffff8, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000004c0)=@IORING_OP_TIMEOUT={0xb, 0x18, 0x0, 0x0, 0x4, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x40, 0x1}) io_uring_enter(r3, 0x6e2, 0x3900, 0x1, 0x0, 0xe00) rt_sigsuspend(&(0x7f00000002c0)={[0x225c17d03]}, 0x8) r6 = memfd_create(&(0x7f0000000bc0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x00\x00.\xd4`=z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x80\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xad\b\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc00xffffffffffffffff, 0xffffffffffffffff}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x0, &(0x7f0000000040)}) r5 = socket$inet_udp(0x2, 0x2, 0x0) close(r5) r6 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r5, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) sendmmsg$inet(r6, &(0x7f0000000500)=[{{&(0x7f0000000080)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='p'], 0x70}}], 0x1, 0x2000c044) syncfs(r6) r7 = socket$nl_route(0x10, 0x3, 0x0) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) sendmsg$nl_route(r7, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="200000001100010100"/20, @ANYRES32=r9], 0x20}}, 0x0) write$binfmt_misc(r4, &(0x7f0000000240), 0xfffffecc) splice(r3, 0x0, r5, 0x0, 0x714f, 0x0) 245.96542ms ago: executing program 2 (id=6677): bpf$MAP_CREATE(0x0, 0x0, 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000280)={{r1}, &(0x7f0000000180), &(0x7f0000000240)=r0}, 0x20) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x40f00}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) close(0xffffffffffffffff) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0xb, 0xc3072, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000180)=ANY=[], 0x7c}, 0x1, 0x0, 0x0, 0x4010}, 0x4000004) sendmsg$NFT_BATCH(r2, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000002180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x8923, &(0x7f0000000140)={'wg2\x00', @local}) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r4}, 0x18) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000001c0), 0x2001, 0x0) syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) syz_usb_connect$cdc_ncm(0x6, 0xf3, &(0x7f0000000840)=ANY=[], 0x0) r6 = inotify_init1(0x0) inotify_add_watch(r6, &(0x7f0000000080)='./file0\x00', 0x40000012) close(r2) ioctl$PTP_ENABLE_PPS(r5, 0x40043d04, 0x1) 112.40742ms ago: executing program 3 (id=6678): r0 = socket$tipc(0x1e, 0x2, 0x0) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000340)=@nameseq={0x1e, 0x1, 0x3, {0x43}}, 0x10) r2 = socket$kcm(0x21, 0x2, 0xa) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000740), 0x1, r3}, 0x38) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x67, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r4, 0x0, 0x2}, 0x18) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01020000000000000000010000000900010073797a300000000058000000160a01000000000000000000010000000900010073797a30000000000900020073797a31000000002c0003800800014000000000180003801400010076657468315f746f5f626f6e6400000008000240000000006c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a30000000004000038008000140000000002c0003801400010067656e657665300000000000000000001400010076657468315f746f5f626f6e64000000080002"], 0x10c}}, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0xfc00) socket$kcm(0x21, 0x2, 0xa) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000780)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000100442800"/28], 0x50) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/asound/timers\x00', 0x0, 0x0) close(r6) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x5, &(0x7f0000000100)=ANY=[@ANYRESDEC=r3], &(0x7f0000000140)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x801}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r7, 0x0, 0x3}, 0x18) r8 = socket$rds(0x15, 0x5, 0x0) bind$rds(r8, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r8, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000500)=[@fadd={0x58, 0x114, 0x6, {{0x1ff, 0x2111}, &(0x7f00000001c0)=0x3, 0x0, 0x2224, 0x5, 0xc9, 0x101, 0x68, 0x1}}], 0x58}, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x4, 0x3, 0x3}, 0x10) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) r10 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000700)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRESOCT=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0}, 0x94) r11 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) r12 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r6, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000800)=ANY=[@ANYRES8=r10, @ANYRES16=r11, @ANYBLOB="495200000000fbdbdf256700000008000300879f53ba8058f314aaa7b9a52fe9ff9e9989fd4ae9f4591e23eaf47e9ab6544895fbd301569608ac71dc66d83fe0fa6218dce40ce34baeb43220727d3a301f8b349ac58a281c8fe4d7a78e20b8625a6607bf900b485b5845cb12ba4600", @ANYRES32=0x0, @ANYRES8=r12], 0x2c}, 0x1, 0x0, 0x0, 0x4008001}, 0x80) r13 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x20000, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r13}, 0x10) 108.138371ms ago: executing program 4 (id=6679): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f00000002c0)=ANY=[@ANYBLOB="180000001800ff0f00000000001b0000850000006d000000850000002300000095"], &(0x7f0000000080)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000080)='sys_enter\x00', r0, 0x0, 0x8001}, 0x18) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000023c0), 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002010000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1], 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value=0x2000000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r2}, 0x10) setresgid(0x0, 0xee01, 0x0) 62.770184ms ago: executing program 4 (id=6680): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) r0 = openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000680), 0x1, 0x0) write$selinux_validatetrans(r0, 0x0, 0x79) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x22d3, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000001900007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000002c0)={&(0x7f0000000780)=ANY=[], 0x0, 0x39, 0x0, 0x1}, 0x28) r3 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$selinux_load(r3, &(0x7f0000000280)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e75"], 0x65) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={0x0, 0x2344}, 0x1, 0x0, 0x0, 0x20000000}, 0x4c000) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00'}, 0x10) sigaltstack(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x5, 0x7fff0006}]}) r4 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x9, 0x7, 0x0, 0x0, 0x0, 0x40008, 0x590, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x4c58, 0x4, 0x0, 0x0, 0x8, 0x4ac, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x1) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x13, r4, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='attr/prev\x00') mount(0x0, &(0x7f0000000080)='.\x00', &(0x7f0000000000)='proc\x00', 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0xc2f00, 0x4d, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 61.216864ms ago: executing program 3 (id=6681): r0 = gettid() ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) syz_open_pts(0xffffffffffffffff, 0x42) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000100)={r1, 0xffffffffffffffff}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$TCGETS2(0xffffffffffffffff, 0x802c542a, &(0x7f0000000080)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r3}, 0x10) write$UHID_INPUT(0xffffffffffffffff, &(0x7f00000001c0)={0xd, {"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", 0x1000}}, 0xffffff5c) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r0}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r4 = epoll_create1(0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000140)='/sys/power/wakeup_count', 0x141000, 0x20) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f0000000200)={0xa000000a}) finit_module(r5, 0x0, 0x3) 37.684846ms ago: executing program 3 (id=6682): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb70200"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={0x0, r0}, 0x18) r1 = socket$inet6(0xa, 0x80002, 0x0) setsockopt$sock_linger(r1, 0x1, 0x3c, &(0x7f0000000100)={0x200000000000001}, 0x8) connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev, 0x5}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f0000001440)=ANY=[@ANYBLOB="0017"], 0xc0) sendmmsg$inet6(r1, &(0x7f0000003cc0)=[{{0x0, 0x0, &(0x7f0000000780)=[{&(0x7f00000001c0)="0cc66b44a7d92afb950a9289fe85479fe3fc8d859cd531db559707d145959469cc0d3778fc6c922e58cb962363ca87024ec71404982c912b5ecbffcf545c56077b4b1ca3d1d4fcc743b7f8ce448a62", 0x4f}, {&(0x7f0000000080)="16a439ae43cfabfb498d581de205bfca16c2a9", 0x13}, {&(0x7f0000000240)="ad7fd4a1e60d7a14068e318d940cb8b2495d1c18131613976214c558e342d91e28bbc091797cdc3fc2a8281c7787ed17509f68a3f6a8289a9f35b54366b751bf4a1959369d83c0ae0fca8574d873caf394fa184087c1b5b686049aae2b1962d77dfbed4723abbe47de206ba10a327a5c7339eff019f3b7dd1959c3caa39227b1e3373f08d7bcb44040fd2ed3596e98d7acda1b311b23c2debb927671b82635e2045cf3d48cd6574ac3c8acc20e1b018a5feb8161b47d26b8", 0xb8}, {&(0x7f0000000340)="2f5ecb0e57dd2f01469ea7a25e0b2a7311558d9455a63ac83f93b4814a99f9adf5528a50d0c2895eef964421308ce593c1a0f5c9923c378cf747558e09ff7b4ab9244b5eb3815e6611e5de6b747312a1aecb7768dca4779446297b05b1b7876baed9ae03f9cc9c59147a932e45042989d7641237bd2485da3c4032a6583ee411515aabc133d70862eb00b7605018ebdb03612459943d9c4728a544524babc8068a4fd0154e4078cfb5a832f742642e3ffd9edeb84c684cd907cbde20ec535852f4be13701dfcdfe843376f28663688ead01f3335b29c7d395ca5245cf8e90dcf53b15f87b0f6ca03827696", 0xeb}, {&(0x7f0000000440)="4b012534ffc97c5ba2bc17ff649b72911dfd877a4668c73ce422d968bb75cbb8a7897c6c9d3d312bb854b7020f96100dcf3517e84c48e9be1d326a922cf8ccd01b90f2ca0cc6352109f57fe159942ef7f82a3b9acaf15e9dcfc18b7d8ef571058c01e68f5527b34b892faca77a473881ab8a9d1b5ea5c1a83b9af810b07e5479cb8c03db6bda61c5cb6bae70d19aa99021cc5bab61da7b741d541fc7a2e9ec6b54884a009e7a6c2e2195bb09e2bc1f1b2fad85f060dd0613123d2e35205959dadd559a9707825fab", 0xc8}, {&(0x7f0000000540)="cbbbc959562986234077fce10829de5384a71ee3957c74ca7cac2bc0bd6583dfeb5f0ac89beccb518871f37fcbf5b3d7df65d36cc36e81a7c77b521baa0e0a8b432c4da03863f92c3f97d6477748eae0c3bdab7a92fdbf08b9f5a3dc002cd43bcc1f988f247c722c0e934f21686bc12c74b750d70d3ca38f868023f4c4da4f4d8e540bb35e468c4919ffeecb9214dd815538a357f6a3ba38569c55504a1e307508a4478b1df1bb5fb19dad05e34ccfce5349d85262f5bde02bafb34bfb717a2eac91fa184d26c1de8e2c3b9cea23bb02f39201278f23e36d5174f416b301159c7555ac", 0xe3}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000000640)="1341ae9045370e5acf745864048300deb50d96b37db2f8a9f31a6447dd02097752512ff00ed201eee341f81ab73c85eed0e11f4c1d4f6cefd834cd363b056e6f891a27216c1b80e7f35400e5411f4b7c5f671dfdc5cbee3ab54cd6419c2ecc69519e279c8c745dc2d660d62962c8d72fdf4425637b5bbcc372d6b16aad8b6b1ac7b1246917c3657074238d95e3f8568f837d2fec6211ba6975f1c5fd095b5398492bab014ae023c6c8511de5f19420bc569cbccd63ce68473549bc9984acb0677e1308f1f33ad7a66644d7c32c9d7aec8230f00b9a543146c611428fb5a13f94b12389fd36111d54d140c21b7915b6541c33850b", 0xf4}, {&(0x7f0000000740)="ae8be628337b6d0d22bc4e3eefd01d3b6c7e1851dccfad", 0x17}], 0x9}}], 0x1, 0x4000000) 31.412917ms ago: executing program 4 (id=6683): r0 = socket(0x40000000015, 0x5, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @loopback}, 0x10) setsockopt$SO_RDS_TRANSPORT(r0, 0x114, 0x8, &(0x7f00000008c0)=0x2, 0x4) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00006dbffc), 0x4) bind$inet(r0, &(0x7f0000000340)={0x2, 0x4e20, @loopback}, 0x57) sendmsg$xdp(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)="0000000000aa303e97380e90231bdbdaf6a4bd866226b7cdb7c26858c4e4fd703be2f51ed6ddc4a47116ec2db75c7042a22491af0ffea4174a9de3350c0a498396b28c7d1784d04aa38922721cb7816094cb82950fd012efd26d", 0x5a}, {&(0x7f0000000900)="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", 0x3f1}, {&(0x7f00000003c0)="128b9306006d4810e5ac5040ad9201847839fc378469d5765b9cc241840896c1498194a7197b45d74a8532b82037b02c9e6045c361eb", 0x36}], 0x3}, 0x0) setsockopt$RDS_CONG_MONITOR(r0, 0x114, 0x6, &(0x7f0000000680)=0x1, 0x4) sendmsg$NL80211_CMD_JOIN_MESH(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000240)=ANY=[], 0x30}}, 0x40) recvmmsg(r0, &(0x7f00000040c0)=[{{0x0, 0x0, 0x0}, 0x6}, {{0x0, 0x0, 0x0}, 0x6}], 0x2, 0x100, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x640, 0x0) 1.077649ms ago: executing program 3 (id=6685): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000740)={0x18, 0x20000000000002b8, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x8000, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r0}, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000c80)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f0000001200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001240)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x4, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x0, 0x7, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x25cf, 0x800000, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x10000, 0x401, 0xfffffffe, 0x0, 0x80000001, 0xffffffff, 0xffffffff, 0x0, 0xfffffffc, 0x0, 0x0, 0x400, 0x0, 0xfffffffe, 0x0, 0xffffffff, 0x0, 0x8, 0x0, 0x0, 0x0, 0xfffffffb, 0x0, 0x0, 0x0, 0x0, 0x80, 0x1ff, 0x0, 0x0, 0x0, 0x80000000, 0xfffffffa, 0x7, 0x9, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0xfffffffd, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xfffe, 0x0, 0xd5a9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7b2, 0x0, 0x0, 0x0, 0x10, 0x0, 0x9, 0xfffffeff, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x8, 0x0, 0x0, 0x0, 0x100000, 0x201000, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7, 0xd4, 0x8000c, 0x5, 0x0, 0x0, 0xffffffff, 0x3032, 0x0, 0x1, 0x0, 0x6, 0x8, 0x0, 0x1, 0x0, 0xfffffffc, 0x0, 0x0, 0x8, 0x0, 0x1, 0x20000000, 0x4, 0x0, 0x0, 0x3, 0x0, 0x9, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, 0x3ff, 0xfffffffc, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x9, 0x0, 0x0, 0x40000000, 0x0, 0x2, 0x0, 0xfffffffa, 0x0, 0x3, 0x0, 0x0, 0x10000, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x2, 0x0, 0xff, 0x0, 0x0, 0x3, 0x0, 0x4, 0x0, 0x4, 0x7, 0x0, 0x0, 0x0, 0x0, 0x9]}, @TCA_TBF_PARMS={0x28, 0x1, {{}, {0x2, 0x0, 0x5, 0x0, 0x0, 0x40}}}]}}]}, 0x45c}}, 0x0) 0s ago: executing program 3 (id=6686): munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) (async) munmap(&(0x7f0000002000/0x2000)=nil, 0x2000) r0 = syz_open_dev$usbfs(&(0x7f0000000040), 0x20000007d, 0x0) read(r0, &(0x7f0000002a80)=""/4086, 0xff6) (async) read(r0, &(0x7f0000002a80)=""/4086, 0xff6) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, &(0x7f0000000440)=@framed, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x13, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='kmem_cache_free\x00', r1}, 0x10) syz_clone3(&(0x7f0000000900)={0x4184100, 0x0, 0x0, 0x0, {0xd}, 0x0, 0x0, 0x0, &(0x7f00000008c0)=[0x0], 0x1}, 0x58) kernel console output (not intermixed with test programs): e team0 [ 306.494219][T13109] bridge0: port 1(bridge_slave_0) entered blocking state [ 306.501548][T13109] bridge0: port 1(bridge_slave_0) entered forwarding state [ 306.523415][T18553] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 306.534407][T18553] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 306.550420][T13109] bridge0: port 2(bridge_slave_1) entered blocking state [ 306.557853][T13109] bridge0: port 2(bridge_slave_1) entered forwarding state [ 306.678453][T18553] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 306.906898][T18553] veth0_vlan: entered promiscuous mode [ 306.927129][T18553] veth1_vlan: entered promiscuous mode [ 306.958359][T18553] veth0_macvtap: entered promiscuous mode [ 306.979375][T18553] veth1_macvtap: entered promiscuous mode [ 307.013231][T18730] netlink: 256 bytes leftover after parsing attributes in process `syz.2.5393'. [ 307.024750][T18553] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 307.046827][T18553] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 307.101020][T13114] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.113144][T13114] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.123222][T13114] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.143169][T13114] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.283747][ T29] kauditd_printk_skb: 350 callbacks suppressed [ 307.283764][ T29] audit: type=1326 audit(1756428674.475:33511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18750 comm="syz.1.5394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68f19aebe9 code=0x7ffc0000 [ 307.287637][T18754] loop4: detected capacity change from 0 to 4096 [ 307.301803][ T29] audit: type=1326 audit(1756428674.485:33512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18750 comm="syz.1.5394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68f19aebe9 code=0x7ffc0000 [ 307.346505][ T29] audit: type=1326 audit(1756428674.485:33513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18750 comm="syz.1.5394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=115 compat=0 ip=0x7f68f19aebe9 code=0x7ffc0000 [ 307.346614][ T29] audit: type=1326 audit(1756428674.485:33514): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18750 comm="syz.1.5394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68f19aebe9 code=0x7ffc0000 [ 307.346640][ T29] audit: type=1326 audit(1756428674.485:33515): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18750 comm="syz.1.5394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68f19aebe9 code=0x7ffc0000 [ 307.420314][ T29] audit: type=1326 audit(1756428674.485:33516): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18750 comm="syz.1.5394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f68f19aebe9 code=0x7ffc0000 [ 307.444259][ T29] audit: type=1326 audit(1756428674.485:33517): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18750 comm="syz.1.5394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68f19aebe9 code=0x7ffc0000 [ 307.468869][ T29] audit: type=1326 audit(1756428674.485:33518): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18750 comm="syz.1.5394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f68f19aebe9 code=0x7ffc0000 [ 307.492537][ T29] audit: type=1326 audit(1756428674.495:33519): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18750 comm="syz.1.5394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68f19aebe9 code=0x7ffc0000 [ 307.516708][ T29] audit: type=1326 audit(1756428674.495:33520): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=18750 comm="syz.1.5394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f68f19aebe9 code=0x7ffc0000 [ 307.657901][T18764] syzkaller1: entered promiscuous mode [ 307.663579][T18764] syzkaller1: entered allmulticast mode [ 307.701418][T18764] 9pnet_fd: Insufficient options for proto=fd [ 308.009625][T18796] syzkaller0: entered promiscuous mode [ 308.015352][T18796] syzkaller0: entered allmulticast mode [ 308.222126][T18822] syzkaller1: entered promiscuous mode [ 308.227904][T18822] syzkaller1: entered allmulticast mode [ 308.267641][T18822] 9pnet_fd: Insufficient options for proto=fd [ 308.306398][T18828] loop9: detected capacity change from 0 to 512 [ 308.345639][T18828] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 308.364669][T18828] ext4 filesystem being mounted at /11/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 308.683298][T18448] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 309.149687][T18868] loop9: detected capacity change from 0 to 4096 [ 309.166779][T18873] loop5: detected capacity change from 0 to 256 [ 309.178765][T18871] geneve2: entered promiscuous mode [ 309.194178][T18873] netlink: 256 bytes leftover after parsing attributes in process `syz.5.5436'. [ 309.197898][T18868] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 309.243536][T18871] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 309.454255][T18873] loop5: detected capacity change from 0 to 8192 [ 309.466021][T18448] EXT4-fs error (device loop9): ext4_readdir:264: inode #12: block 80: comm syz-executor: path /20/file1/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=6, rec_len=0, size=4096 fake=0 [ 309.492597][T18448] EXT4-fs error (device loop9): ext4_empty_dir:3096: inode #12: block 80: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=6, rec_len=0, size=4096 fake=0 [ 309.528964][T18873] loop5: p1 p2 p4 [ 309.543556][T18873] loop5: p1 size 65536 extends beyond EOD, truncated [ 309.555658][T18873] loop5: p2 start 861536256 is beyond EOD, truncated [ 309.562630][T18873] loop5: p4 size 65536 extends beyond EOD, truncated [ 309.570439][T18448] EXT4-fs warning (device loop9): ext4_empty_dir:3099: inode #12: comm syz-executor: directory missing '..' [ 309.582636][T18448] EXT4-fs error (device loop9): ext4_readdir:264: inode #12: block 80: comm syz-executor: path /20/file1/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=6, rec_len=0, size=4096 fake=0 [ 309.605907][T18448] EXT4-fs error (device loop9): ext4_empty_dir:3096: inode #12: block 80: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=6, rec_len=0, size=4096 fake=0 [ 309.626418][T18448] EXT4-fs warning (device loop9): ext4_empty_dir:3099: inode #12: comm syz-executor: directory missing '..' [ 309.626634][T18448] EXT4-fs error (device loop9): ext4_readdir:264: inode #12: block 80: comm syz-executor: path /20/file1/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=6, rec_len=0, size=4096 fake=0 [ 309.660187][T18448] EXT4-fs error (device loop9): ext4_empty_dir:3096: inode #12: block 80: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=6, rec_len=0, size=4096 fake=0 [ 309.660356][T18448] EXT4-fs warning (device loop9): ext4_empty_dir:3099: inode #12: comm syz-executor: directory missing '..' [ 309.660469][T18448] EXT4-fs error (device loop9): ext4_readdir:264: inode #12: block 80: comm syz-executor: path /20/file1/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=6, rec_len=0, size=4096 fake=0 [ 309.661435][T18448] EXT4-fs error (device loop9): ext4_empty_dir:3096: inode #12: block 80: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=6, rec_len=0, size=4096 fake=0 [ 309.735073][T18448] EXT4-fs warning (device loop9): ext4_empty_dir:3099: inode #12: comm syz-executor: directory missing '..' [ 309.735255][T18448] EXT4-fs error (device loop9): ext4_readdir:264: inode #12: block 80: comm syz-executor: path /20/file1/file0: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=6, rec_len=0, size=4096 fake=0 [ 309.769724][T18448] EXT4-fs error (device loop9): ext4_empty_dir:3096: inode #12: block 80: comm syz-executor: bad entry in directory: rec_len is smaller than minimal - offset=12, inode=6, rec_len=0, size=4096 fake=0 [ 309.770085][T18448] EXT4-fs warning (device loop9): ext4_empty_dir:3099: inode #12: comm syz-executor: directory missing '..' [ 309.771627][T18448] EXT4-fs warning (device loop9): ext4_empty_dir:3099: inode #12: comm syz-executor: directory missing '..' [ 309.815523][T18448] EXT4-fs warning (device loop9): ext4_empty_dir:3099: inode #12: comm syz-executor: directory missing '..' [ 309.815802][T18448] EXT4-fs warning (device loop9): ext4_empty_dir:3099: inode #12: comm syz-executor: directory missing '..' [ 309.840975][T18448] EXT4-fs warning (device loop9): ext4_empty_dir:3099: inode #12: comm syz-executor: directory missing '..' [ 309.841410][T18448] EXT4-fs warning (device loop9): ext4_empty_dir:3099: inode #12: comm syz-executor: directory missing '..' [ 310.019754][T18914] loop4: detected capacity change from 0 to 4096 [ 310.109234][T13114] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 310.137652][T18448] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 310.177558][T13114] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 310.200004][T18924] syzkaller1: entered promiscuous mode [ 310.205607][T18924] syzkaller1: entered allmulticast mode [ 310.257878][T13114] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 310.323863][T13114] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 310.404170][T13114] bridge_slave_1: left allmulticast mode [ 310.409933][T13114] bridge_slave_1: left promiscuous mode [ 310.415698][T13114] bridge0: port 2(bridge_slave_1) entered disabled state [ 310.437824][T13114] bridge_slave_0: left allmulticast mode [ 310.443713][T13114] bridge_slave_0: left promiscuous mode [ 310.449586][T13114] bridge0: port 1(bridge_slave_0) entered disabled state [ 310.458511][T18952] netlink: 14 bytes leftover after parsing attributes in process `syz.4.5466'. [ 310.603991][T13114] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 310.622481][T13114] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 310.641327][T13114] bond0 (unregistering): Released all slaves [ 310.668601][T18952] hsr_slave_0: left promiscuous mode [ 310.683761][T18952] hsr_slave_1: left promiscuous mode [ 310.715159][T18970] syzkaller1: entered promiscuous mode [ 310.720868][T18970] syzkaller1: entered allmulticast mode [ 310.726681][T18972] netlink: 52 bytes leftover after parsing attributes in process `syz.2.5476'. [ 310.745234][T13114] hsr_slave_0: left promiscuous mode [ 310.752156][T13114] hsr_slave_1: left promiscuous mode [ 310.758213][T13114] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 310.766656][T13114] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 310.775854][T13114] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 310.783568][T13114] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 310.796987][T13114] veth1_macvtap: left promiscuous mode [ 310.802924][T13114] veth0_macvtap: left promiscuous mode [ 310.809053][T13114] veth1_vlan: left promiscuous mode [ 310.815299][T13114] veth0_vlan: left promiscuous mode [ 310.890199][T13114] team0 (unregistering): Port device team_slave_1 removed [ 310.908306][T13114] team0 (unregistering): Port device team_slave_0 removed [ 310.924125][T18976] 9pnet: Could not find request transport: r [ 311.003320][T18933] chnl_net:caif_netlink_parms(): no params data found [ 311.052500][T18933] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.059793][T18933] bridge0: port 1(bridge_slave_0) entered disabled state [ 311.067762][T18933] bridge_slave_0: entered allmulticast mode [ 311.111646][T18933] bridge_slave_0: entered promiscuous mode [ 311.120023][T18933] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.127425][T18933] bridge0: port 2(bridge_slave_1) entered disabled state [ 311.148889][T18933] bridge_slave_1: entered allmulticast mode [ 311.165477][T18933] bridge_slave_1: entered promiscuous mode [ 311.216198][T18933] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 311.235758][T18933] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 311.269668][T18933] team0: Port device team_slave_0 added [ 311.278380][T18933] team0: Port device team_slave_1 added [ 311.298368][T18933] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 311.305420][T18933] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 311.333088][T18933] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 311.349331][T18933] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 311.356836][T18933] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 311.384218][T18933] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 311.414950][T18933] hsr_slave_0: entered promiscuous mode [ 311.424097][T18933] hsr_slave_1: entered promiscuous mode [ 311.430610][T18933] debugfs: 'hsr0' already exists in 'hsr' [ 311.436548][T18933] Cannot create hsr debugfs directory [ 311.467415][T19008] loop5: detected capacity change from 0 to 512 [ 311.567500][T19017] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5491'. [ 311.736206][T18933] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 311.746314][T18933] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 311.756381][T18933] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 311.766299][T18933] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 311.804409][T18933] 8021q: adding VLAN 0 to HW filter on device bond0 [ 311.818759][T18933] 8021q: adding VLAN 0 to HW filter on device team0 [ 311.829067][T13111] bridge0: port 1(bridge_slave_0) entered blocking state [ 311.836560][T13111] bridge0: port 1(bridge_slave_0) entered forwarding state [ 311.847859][T13114] bridge0: port 2(bridge_slave_1) entered blocking state [ 311.854998][T13114] bridge0: port 2(bridge_slave_1) entered forwarding state [ 311.921723][T18933] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 311.988369][T18933] veth0_vlan: entered promiscuous mode [ 311.996721][T18933] veth1_vlan: entered promiscuous mode [ 312.013673][T18933] veth0_macvtap: entered promiscuous mode [ 312.021841][T18933] veth1_macvtap: entered promiscuous mode [ 312.036750][T18933] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 312.052309][T18933] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 312.066815][T13114] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.075788][T13114] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.084962][T13114] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.097017][T13114] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 312.139724][T19043] netlink: 256 bytes leftover after parsing attributes in process `syz.3.5461'. [ 312.194458][T19049] SELinux: ebitmap: truncated map [ 312.207383][T19049] SELinux: failed to load policy [ 312.249875][T19053] loop4: detected capacity change from 0 to 4096 [ 312.305178][ T29] kauditd_printk_skb: 558 callbacks suppressed [ 312.305198][ T29] audit: type=1326 audit(1756428679.485:34079): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19006 comm="syz.5.5487" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 312.336187][ T29] audit: type=1326 audit(1756428679.485:34080): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19006 comm="syz.5.5487" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 312.382192][T19062] syzkaller1: entered promiscuous mode [ 312.388324][T19062] syzkaller1: entered allmulticast mode [ 312.499981][ T29] audit: type=1326 audit(1756428679.684:34081): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19065 comm="syz.5.5503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 312.524917][ T29] audit: type=1326 audit(1756428679.684:34082): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19065 comm="syz.5.5503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 312.549442][ T29] audit: type=1326 audit(1756428679.684:34083): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19065 comm="syz.5.5503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 312.573920][ T29] audit: type=1326 audit(1756428679.684:34084): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19065 comm="syz.5.5503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 312.598474][ T29] audit: type=1326 audit(1756428679.684:34085): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19065 comm="syz.5.5503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 312.623280][ T29] audit: type=1326 audit(1756428679.684:34086): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19065 comm="syz.5.5503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 312.647212][ T29] audit: type=1326 audit(1756428679.684:34087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19065 comm="syz.5.5503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 312.671475][ T29] audit: type=1326 audit(1756428679.684:34088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19065 comm="syz.5.5503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 312.810132][T19069] syzkaller0: entered promiscuous mode [ 312.816015][T19069] syzkaller0: entered allmulticast mode [ 312.988427][T19085] loop5: detected capacity change from 0 to 512 [ 313.107051][T19092] loop4: detected capacity change from 0 to 4096 [ 313.128501][T19092] netlink: 52 bytes leftover after parsing attributes in process `syz.4.5513'. [ 313.705329][T19117] loop4: detected capacity change from 0 to 4096 [ 313.737580][T19117] netlink: 52 bytes leftover after parsing attributes in process `syz.4.5524'. [ 313.745661][T19122] SELinux: ebitmap: truncated map [ 313.761872][T19122] SELinux: failed to load policy [ 313.777518][T19124] netlink: 256 bytes leftover after parsing attributes in process `syz.1.5526'. [ 313.959889][T19140] netlink: 'syz.5.5528': attribute type 21 has an invalid length. [ 313.967922][T19140] netlink: 'syz.5.5528': attribute type 4 has an invalid length. [ 313.999197][T19135] random: crng reseeded on system resumption [ 314.054419][T19148] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5534'. [ 314.246223][T19157] loop5: detected capacity change from 0 to 4096 [ 314.345342][T19160] loop5: detected capacity change from 0 to 512 [ 314.707505][T19167] syzkaller0: entered promiscuous mode [ 314.713415][T19167] syzkaller0: entered allmulticast mode [ 315.203620][T19189] loop5: detected capacity change from 0 to 4096 [ 315.217108][T19189] netlink: 52 bytes leftover after parsing attributes in process `syz.5.5550'. [ 315.385655][T19195] loop4: detected capacity change from 0 to 4096 [ 315.504965][T19198] syzkaller0: entered promiscuous mode [ 315.510601][T19198] syzkaller0: entered allmulticast mode [ 315.614856][T19206] syzkaller1: entered promiscuous mode [ 315.620619][T19206] syzkaller1: entered allmulticast mode [ 315.651857][T19209] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 315.783935][T19217] loop5: detected capacity change from 0 to 4096 [ 315.793743][T19221] netlink: 256 bytes leftover after parsing attributes in process `syz.2.5563'. [ 315.809484][T19217] netlink: 52 bytes leftover after parsing attributes in process `syz.5.5562'. [ 315.950810][T19233] 9pnet: Could not find request transport: r [ 315.993002][T19240] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5569'. [ 316.071587][T19245] loop4: detected capacity change from 0 to 4096 [ 316.086449][T19245] netlink: 52 bytes leftover after parsing attributes in process `syz.4.5571'. [ 316.600474][T19260] netlink: 256 bytes leftover after parsing attributes in process `syz.2.5578'. [ 316.630639][T19267] netlink: 12 bytes leftover after parsing attributes in process `syz.1.5580'. [ 316.892168][T19283] netlink: 4 bytes leftover after parsing attributes in process `syz.2.5587'. [ 317.597387][ T29] kauditd_printk_skb: 717 callbacks suppressed [ 317.597402][ T29] audit: type=1326 audit(1756428684.784:34806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19293 comm="syz.2.5589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd46825ebe9 code=0x7ffc0000 [ 317.628501][ T29] audit: type=1326 audit(1756428684.784:34807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19293 comm="syz.2.5589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd46825ebe9 code=0x7ffc0000 [ 317.652610][ T29] audit: type=1326 audit(1756428684.784:34808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19293 comm="syz.2.5589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fd46825d550 code=0x7ffc0000 [ 317.652723][ T29] audit: type=1326 audit(1756428684.814:34809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19293 comm="syz.2.5589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd46825ebe9 code=0x7ffc0000 [ 317.652747][ T29] audit: type=1326 audit(1756428684.814:34810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19293 comm="syz.2.5589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7fd46825ebe9 code=0x7ffc0000 [ 317.654760][ T29] audit: type=1326 audit(1756428684.814:34811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19293 comm="syz.2.5589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd46825ebe9 code=0x7ffc0000 [ 317.654846][ T29] audit: type=1326 audit(1756428684.814:34812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19293 comm="syz.2.5589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=287 compat=0 ip=0x7fd46825ebe9 code=0x7ffc0000 [ 317.654867][ T29] audit: type=1326 audit(1756428684.814:34813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19293 comm="syz.2.5589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd46825ebe9 code=0x7ffc0000 [ 317.654978][ T29] audit: type=1326 audit(1756428684.814:34814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19293 comm="syz.2.5589" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd46825ebe9 code=0x7ffc0000 [ 317.869147][ T29] audit: type=1400 audit(1756428685.054:34815): avc: denied { prog_load } for pid=19307 comm="syz.2.5596" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 318.182204][T19327] netlink: 256 bytes leftover after parsing attributes in process `syz.3.5602'. [ 318.194183][T19328] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5598'. [ 318.282209][T19334] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 318.386149][T19338] syzkaller1: entered promiscuous mode [ 318.391726][T19338] syzkaller1: entered allmulticast mode [ 318.839842][T19367] loop5: detected capacity change from 0 to 256 [ 318.903539][T19367] loop5: detected capacity change from 0 to 8192 [ 318.942036][T19367] loop5: p1 p2 p4 [ 318.945860][T19367] loop5: p1 size 65536 extends beyond EOD, truncated [ 318.953465][T19367] loop5: p2 start 861536256 is beyond EOD, truncated [ 318.960188][T19367] loop5: p4 size 65536 extends beyond EOD, truncated [ 319.409120][T19380] SELinux: ebitmap: truncated map [ 319.415728][T19380] SELinux: failed to load policy [ 319.615541][T19392] 9pnet: Could not find request transport: r [ 319.635495][T19396] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 319.663144][T19399] syzkaller1: entered promiscuous mode [ 319.668763][T19399] syzkaller1: entered allmulticast mode [ 319.723801][T19404] loop4: detected capacity change from 0 to 256 [ 319.760761][T19404] loop4: detected capacity change from 0 to 8192 [ 319.802043][T19404] loop4: p1 p2 p4 [ 319.806024][T19404] loop4: p1 size 65536 extends beyond EOD, truncated [ 319.813964][T19404] loop4: p2 start 861536256 is beyond EOD, truncated [ 319.820748][T19404] loop4: p4 size 65536 extends beyond EOD, truncated [ 319.851887][T19404] Invalid logical block size (3) [ 319.894791][T19416] loop5: detected capacity change from 0 to 512 [ 320.794125][T19460] loop4: detected capacity change from 0 to 256 [ 320.814504][T19460] __nla_validate_parse: 4 callbacks suppressed [ 320.814552][T19460] netlink: 256 bytes leftover after parsing attributes in process `syz.4.5653'. [ 320.844673][T19464] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 320.866330][T19460] loop4: detected capacity change from 0 to 8192 [ 320.902666][T19468] syzkaller0: entered promiscuous mode [ 320.908368][T19468] syzkaller0: entered allmulticast mode [ 320.915509][T19460] loop4: p1 p2 p4 [ 320.919345][T19460] loop4: p1 size 65536 extends beyond EOD, truncated [ 320.927241][T19460] loop4: p2 start 861536256 is beyond EOD, truncated [ 320.934099][T19460] loop4: p4 size 65536 extends beyond EOD, truncated [ 321.195633][T19482] syzkaller0: entered promiscuous mode [ 321.201231][T19482] syzkaller0: entered allmulticast mode [ 321.334798][T19501] netlink: 256 bytes leftover after parsing attributes in process `syz.1.5670'. [ 321.494912][T19515] netlink: 14 bytes leftover after parsing attributes in process `syz.3.5672'. [ 321.504414][T19515] hsr_slave_0: left promiscuous mode [ 321.510235][T19515] hsr_slave_1: left promiscuous mode [ 321.540754][T19521] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 321.612952][T19529] syzkaller0: entered promiscuous mode [ 321.618543][T19529] syzkaller0: entered allmulticast mode [ 322.051700][T19547] 9pnet_virtio: no channels available for device ./bus [ 322.208172][T19564] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5697'. [ 322.289082][T19574] 9pnet_virtio: no channels available for device ./bus [ 322.337652][T19580] 9pnet: Could not find request transport: r [ 322.349932][T19579] syzkaller0: entered promiscuous mode [ 322.355601][T19579] syzkaller0: entered allmulticast mode [ 322.425015][T19590] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 322.504240][T19600] 9pnet_virtio: no channels available for device ./bus [ 322.518191][T19601] netlink: 14 bytes leftover after parsing attributes in process `syz.5.5712'. [ 322.527993][T19601] hsr_slave_0: left promiscuous mode [ 322.535506][T19601] hsr_slave_1: left promiscuous mode [ 322.698998][T19616] syzkaller0: entered promiscuous mode [ 322.704986][T19616] syzkaller0: entered allmulticast mode [ 322.712316][T19618] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 322.733217][ T29] kauditd_printk_skb: 477 callbacks suppressed [ 322.733364][ T29] audit: type=1326 audit(1756428689.923:35293): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19619 comm="syz.3.5722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 322.764305][ T29] audit: type=1326 audit(1756428689.923:35294): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19619 comm="syz.3.5722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 322.788660][ T29] audit: type=1326 audit(1756428689.923:35295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19619 comm="syz.3.5722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=283 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 322.812604][ T29] audit: type=1326 audit(1756428689.923:35296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19619 comm="syz.3.5722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 322.836828][ T29] audit: type=1326 audit(1756428689.923:35297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19619 comm="syz.3.5722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=287 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 322.860783][ T29] audit: type=1326 audit(1756428689.923:35298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19619 comm="syz.3.5722" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 322.886492][ T29] audit: type=1400 audit(1756428689.963:35299): avc: denied { execmem } for pid=19623 comm="syz.3.5724" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 322.918251][ T29] audit: type=1400 audit(1756428690.103:35300): avc: denied { create } for pid=19627 comm="syz.3.5726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 323.011900][ T29] audit: type=1400 audit(1756428690.193:35301): avc: denied { cpu } for pid=19627 comm="syz.3.5726" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 323.037818][ T29] audit: type=1400 audit(1756428690.233:35302): avc: denied { sys_module } for pid=19631 comm="syz.2.5728" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 323.124522][T19641] netlink: 'syz.4.5732': attribute type 1 has an invalid length. [ 323.139472][T19641] 8021q: adding VLAN 0 to HW filter on device bond1 [ 323.149525][T19641] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5732'. [ 323.162861][T19641] bond1 (unregistering): Released all slaves [ 323.243204][T19654] syzkaller1: entered promiscuous mode [ 323.248798][T19654] syzkaller1: entered allmulticast mode [ 323.260169][T19654] 9pnet_fd: Insufficient options for proto=fd [ 323.289274][T19656] syzkaller0: entered promiscuous mode [ 323.294982][T19656] syzkaller0: entered allmulticast mode [ 323.354833][T19662] loop4: detected capacity change from 0 to 512 [ 323.579058][T19675] netlink: 256 bytes leftover after parsing attributes in process `syz.3.5746'. [ 323.774929][T19690] syzkaller0: entered promiscuous mode [ 323.780884][T19690] syzkaller0: entered allmulticast mode [ 323.849829][T19698] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 323.896358][T19704] netlink: 256 bytes leftover after parsing attributes in process `syz.2.5759'. [ 323.969593][T19718] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5765'. [ 324.051320][T19724] syzkaller0: entered promiscuous mode [ 324.057248][T19724] syzkaller0: entered allmulticast mode [ 324.146454][T19730] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 324.249635][T19742] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5776'. [ 324.305987][T19747] loop5: detected capacity change from 0 to 256 [ 324.364501][T19747] loop5: detected capacity change from 0 to 8192 [ 324.386187][T19753] syzkaller0: entered promiscuous mode [ 324.391810][T19753] syzkaller0: entered allmulticast mode [ 324.403233][T19747] loop5: p1 p2 p4 [ 324.407064][T19747] loop5: p1 size 65536 extends beyond EOD, truncated [ 324.415245][T19747] loop5: p2 start 861536256 is beyond EOD, truncated [ 324.421966][T19747] loop5: p4 size 65536 extends beyond EOD, truncated [ 324.478605][T19757] syzkaller1: entered promiscuous mode [ 324.484423][T19757] syzkaller1: entered allmulticast mode [ 324.496010][T19757] 9pnet_fd: Insufficient options for proto=fd [ 324.878476][T19790] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 324.931523][T19796] syzkaller1: entered promiscuous mode [ 324.937221][T19796] syzkaller1: entered allmulticast mode [ 324.949044][T19796] 9pnet_fd: Insufficient options for proto=fd [ 324.954334][T19798] loop4: detected capacity change from 0 to 4096 [ 324.978461][T19800] netlink: 'syz.1.5801': attribute type 1 has an invalid length. [ 325.036760][T19803] loop5: detected capacity change from 0 to 4096 [ 325.134487][T19816] 9pnet: Could not find request transport: r [ 325.164082][T19822] 9pnet: Could not find request transport: r [ 325.461631][T19828] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 325.755610][T19840] netlink: 'syz.3.5815': attribute type 1 has an invalid length. [ 326.023175][T19859] __nla_validate_parse: 8 callbacks suppressed [ 326.023188][T19859] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5824'. [ 326.771862][T19863] netlink: 256 bytes leftover after parsing attributes in process `syz.2.5825'. [ 326.797644][T19867] netlink: 'syz.3.5826': attribute type 1 has an invalid length. [ 326.806330][T19867] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5826'. [ 326.973350][T19883] netlink: 52 bytes leftover after parsing attributes in process `syz.2.5834'. [ 327.107108][T19893] 9pnet: Could not find request transport: r [ 327.165474][T19896] netlink: 'syz.3.5838': attribute type 1 has an invalid length. [ 327.179218][T19896] 8021q: adding VLAN 0 to HW filter on device bond1 [ 327.188962][T19896] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5838'. [ 327.215139][T19899] netlink: 256 bytes leftover after parsing attributes in process `syz.3.5839'. [ 327.545107][T19925] netlink: 'syz.4.5850': attribute type 1 has an invalid length. [ 327.558419][T19925] 8021q: adding VLAN 0 to HW filter on device bond1 [ 327.574649][T19925] netlink: 4 bytes leftover after parsing attributes in process `syz.4.5850'. [ 327.599912][T19928] loop5: detected capacity change from 0 to 256 [ 327.624878][T19928] netlink: 256 bytes leftover after parsing attributes in process `syz.5.5851'. [ 327.679490][T19928] loop5: detected capacity change from 0 to 8192 [ 327.713610][T19928] loop5: p1 p2 p4 [ 327.717477][T19928] loop5: p1 size 65536 extends beyond EOD, truncated [ 327.734041][T19928] loop5: p2 start 861536256 is beyond EOD, truncated [ 327.741021][T19928] loop5: p4 size 65536 extends beyond EOD, truncated [ 327.756837][ T29] kauditd_printk_skb: 679 callbacks suppressed [ 327.756853][ T29] audit: type=1400 audit(1756428694.953:35982): avc: denied { create } for pid=19922 comm="syz.3.5849" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 327.784524][ T29] audit: type=1400 audit(1756428694.963:35983): avc: denied { ioctl } for pid=19922 comm="syz.3.5849" path="socket:[71092]" dev="sockfs" ino=71092 ioctlcmd=0x8982 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 327.842812][ T29] audit: type=1326 audit(1756428695.033:35984): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19945 comm="syz.5.5858" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 327.867438][ T29] audit: type=1326 audit(1756428695.033:35985): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19945 comm="syz.5.5858" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 327.891649][ T29] audit: type=1326 audit(1756428695.033:35986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19945 comm="syz.5.5858" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 327.915955][ T29] audit: type=1326 audit(1756428695.033:35987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19945 comm="syz.5.5858" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 327.941454][ T29] audit: type=1326 audit(1756428695.033:35988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19945 comm="syz.5.5858" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 327.965411][ T29] audit: type=1326 audit(1756428695.033:35989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19945 comm="syz.5.5858" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 327.989648][ T29] audit: type=1326 audit(1756428695.033:35990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19945 comm="syz.5.5858" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 328.013575][ T29] audit: type=1326 audit(1756428695.033:35991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19945 comm="syz.5.5858" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 328.121052][T19955] netlink: 52 bytes leftover after parsing attributes in process `syz.3.5861'. [ 328.219262][T19965] loop4: detected capacity change from 0 to 256 [ 328.228097][T19965] netlink: 256 bytes leftover after parsing attributes in process `syz.4.5865'. [ 328.249430][T19966] 9pnet: Could not find request transport: r [ 328.275074][T19965] loop4: detected capacity change from 0 to 8192 [ 328.313146][T19965] loop4: p1 p2 p4 [ 328.317317][T19965] loop4: p1 size 65536 extends beyond EOD, truncated [ 328.324913][T19965] loop4: p2 start 861536256 is beyond EOD, truncated [ 328.331677][T19965] loop4: p4 size 65536 extends beyond EOD, truncated [ 328.392886][T19965] Invalid logical block size (3) [ 328.418844][T19971] loop4: detected capacity change from 0 to 256 [ 328.456928][T19971] loop4: detected capacity change from 0 to 8192 [ 328.513241][T19971] loop4: p1 p2 p4 [ 328.517401][T19971] loop4: p1 size 65536 extends beyond EOD, truncated [ 328.525261][T19971] loop4: p2 start 861536256 is beyond EOD, truncated [ 328.532435][T19971] loop4: p4 size 65536 extends beyond EOD, truncated [ 328.572879][T19971] Invalid logical block size (3) [ 328.813449][T19993] netlink: 'syz.4.5875': attribute type 1 has an invalid length. [ 328.895001][T19995] loop4: detected capacity change from 0 to 512 [ 329.096863][T20003] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 329.618810][T20030] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 329.649101][T20034] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 330.163197][T20064] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 330.192640][T20066] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 330.341628][T20078] loop4: detected capacity change from 0 to 4096 [ 330.355129][T20080] loop5: detected capacity change from 0 to 256 [ 330.420216][T20080] loop5: detected capacity change from 0 to 8192 [ 330.463423][T20080] loop5: p1 p2 p4 [ 330.467208][T20080] loop5: p1 size 65536 extends beyond EOD, truncated [ 330.476768][T20080] loop5: p2 start 861536256 is beyond EOD, truncated [ 330.483783][T20080] loop5: p4 size 65536 extends beyond EOD, truncated [ 330.662761][T20090] netlink: 'syz.4.5915': attribute type 1 has an invalid length. [ 330.704870][T20090] 8021q: adding VLAN 0 to HW filter on device bond2 [ 330.756990][T20097] bond2 (unregistering): Released all slaves [ 331.107863][T20117] loop4: detected capacity change from 0 to 512 [ 331.465305][T20120] loop5: detected capacity change from 0 to 512 [ 331.727138][T20120] __nla_validate_parse: 9 callbacks suppressed [ 331.727185][T20120] netlink: 4 bytes leftover after parsing attributes in process `syz.5.5924'. [ 331.909198][T20153] loop4: detected capacity change from 0 to 4096 [ 331.945316][T20153] netlink: 52 bytes leftover after parsing attributes in process `syz.4.5935'. [ 332.713523][T20184] syzkaller0: entered promiscuous mode [ 332.719254][T20184] syzkaller0: entered allmulticast mode [ 332.766241][ T29] kauditd_printk_skb: 645 callbacks suppressed [ 332.766256][ T29] audit: type=1326 audit(1756428699.962:36637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20161 comm="syz.2.5939" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7fd46825ebe9 code=0x7ffc0000 [ 332.803364][ T29] audit: type=1326 audit(1756428699.972:36638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20161 comm="syz.2.5939" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7fd46825ebe9 code=0x7ffc0000 [ 332.829735][ T29] audit: type=1400 audit(1756428699.972:36639): avc: denied { execute } for pid=20185 comm="syz.1.5945" path="/168/bus" dev="tmpfs" ino=900 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 332.860975][ T29] audit: type=1400 audit(1756428700.022:36640): avc: denied { create } for pid=20185 comm="syz.1.5945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 332.865631][T20190] FAULT_INJECTION: forcing a failure. [ 332.865631][T20190] name failslab, interval 1, probability 0, space 0, times 0 [ 332.881581][ T29] audit: type=1400 audit(1756428700.022:36641): avc: denied { open } for pid=20185 comm="syz.1.5945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 332.894631][T20190] CPU: 1 UID: 0 PID: 20190 Comm: syz.3.5946 Not tainted syzkaller #0 PREEMPT(voluntary) [ 332.894656][T20190] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 332.894669][T20190] Call Trace: [ 332.894676][T20190] [ 332.894759][T20190] __dump_stack+0x1d/0x30 [ 332.894781][T20190] dump_stack_lvl+0xe8/0x140 [ 332.894800][T20190] dump_stack+0x15/0x1b [ 332.894816][T20190] should_fail_ex+0x265/0x280 [ 332.894838][T20190] should_failslab+0x8c/0xb0 [ 332.894862][T20190] kmem_cache_alloc_node_noprof+0x57/0x320 [ 332.894937][T20190] ? __alloc_skb+0x101/0x320 [ 332.894956][T20190] __alloc_skb+0x101/0x320 [ 332.894972][T20190] ? audit_log_start+0x365/0x6c0 [ 332.895071][T20190] audit_log_start+0x380/0x6c0 [ 332.895101][T20190] audit_seccomp+0x48/0x100 [ 332.895152][T20190] ? __seccomp_filter+0x68c/0x10d0 [ 332.895173][T20190] __seccomp_filter+0x69d/0x10d0 [ 332.895195][T20190] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 332.895269][T20190] ? vfs_write+0x7e8/0x960 [ 332.895328][T20190] ? __rcu_read_unlock+0x4f/0x70 [ 332.895349][T20190] ? __fget_files+0x184/0x1c0 [ 332.895375][T20190] __secure_computing+0x82/0x150 [ 332.895394][T20190] syscall_trace_enter+0xcf/0x1e0 [ 332.895417][T20190] do_syscall_64+0xac/0x200 [ 332.895472][T20190] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 332.895493][T20190] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 332.895520][T20190] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 332.895597][T20190] RIP: 0033:0x7f597b3cebe9 [ 332.895613][T20190] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 332.895628][T20190] RSP: 002b:00007f5979e37038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ac [ 332.895647][T20190] RAX: ffffffffffffffda RBX: 00007f597b5f5fa0 RCX: 00007f597b3cebe9 [ 332.895660][T20190] RDX: 0000000000080000 RSI: 0000200000000040 RDI: ffffffffffffffff [ 332.895752][T20190] RBP: 00007f5979e37090 R08: 0000000000000000 R09: 0000000000000000 [ 332.895771][T20190] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 332.895783][T20190] R13: 00007f597b5f6038 R14: 00007f597b5f5fa0 R15: 00007ffc92be4068 [ 332.895802][T20190] [ 332.895813][T20190] audit: audit_lost=5 audit_rate_limit=0 audit_backlog_limit=64 [ 332.914954][ T29] audit: type=1400 audit(1756428700.022:36642): avc: denied { kernel } for pid=20185 comm="syz.1.5945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 332.924931][T20190] audit: out of memory in audit_log_start [ 333.178385][ T29] audit: type=1400 audit(1756428700.022:36643): avc: denied { tracepoint } for pid=20185 comm="syz.1.5945" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 333.198932][ T29] audit: type=1400 audit(1756428700.052:36644): avc: denied { read write } for pid=16689 comm="syz-executor" name="loop5" dev="devtmpfs" ino=105 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 333.575166][T20213] syzkaller0: entered promiscuous mode [ 333.580764][T20213] syzkaller0: entered allmulticast mode [ 333.809963][T20232] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5960'. [ 333.858971][T20232] netlink: 48 bytes leftover after parsing attributes in process `syz.1.5960'. [ 333.868277][T20232] netlink: 8 bytes leftover after parsing attributes in process `syz.1.5960'. [ 333.879994][T20238] 9pnet_fd: Insufficient options for proto=fd [ 333.981452][T13114] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 333.992537][T20242] loop5: detected capacity change from 0 to 4096 [ 334.042101][T13114] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 334.076465][T13114] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 334.091654][T20218] chnl_net:caif_netlink_parms(): no params data found [ 334.136434][T13114] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 334.177655][T20218] bridge0: port 1(bridge_slave_0) entered blocking state [ 334.185323][T20218] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.197386][T20218] bridge_slave_0: entered allmulticast mode [ 334.220343][T20218] bridge_slave_0: entered promiscuous mode [ 334.251146][T20218] bridge0: port 2(bridge_slave_1) entered blocking state [ 334.258486][T20218] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.292406][T20218] bridge_slave_1: entered allmulticast mode [ 334.308344][T20218] bridge_slave_1: entered promiscuous mode [ 334.354001][T20218] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 334.373888][T20218] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 334.408931][T13114] bridge_slave_1: left allmulticast mode [ 334.414775][T13114] bridge_slave_1: left promiscuous mode [ 334.420568][T13114] bridge0: port 2(bridge_slave_1) entered disabled state [ 334.454521][T13114] bridge_slave_0: left allmulticast mode [ 334.460357][T13114] bridge_slave_0: left promiscuous mode [ 334.466345][T13114] bridge0: port 1(bridge_slave_0) entered disabled state [ 334.538129][T13114] bond2 (unregistering): (slave ip6erspan0): Releasing active interface [ 334.638171][T13114] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 334.656055][T13114] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 334.667714][T13114] bond0 (unregistering): Released all slaves [ 334.676894][T13114] bond1 (unregistering): Released all slaves [ 334.690307][T13114] bond2 (unregistering): Released all slaves [ 334.700096][T13114] bond3 (unregistering): Released all slaves [ 334.710336][T13114] bond4 (unregistering): Released all slaves [ 334.723742][T13114] bond5 (unregistering): Released all slaves [ 334.740939][T13114] bond6 (unregistering): Released all slaves [ 334.761964][T20218] team0: Port device team_slave_0 added [ 334.805649][T20274] syzkaller0: entered promiscuous mode [ 334.812152][T20274] syzkaller0: entered allmulticast mode [ 334.827029][T20218] team0: Port device team_slave_1 added [ 334.836995][T13114] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 334.844848][T13114] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 334.856957][T13114] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 334.861189][T20281] loop5: detected capacity change from 0 to 4096 [ 334.864980][T13114] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 334.885356][T13114] veth1_macvtap: left promiscuous mode [ 334.891513][T13114] veth0_macvtap: left promiscuous mode [ 334.897544][T13114] veth1_vlan: left promiscuous mode [ 334.897607][T20281] netlink: 52 bytes leftover after parsing attributes in process `syz.5.5973'. [ 334.982615][T13114] team0 (unregistering): Port device team_slave_1 removed [ 334.997073][T13114] team0 (unregistering): Port device team_slave_0 removed [ 335.083050][T20218] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 335.090334][T20218] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 335.091181][T20284] 9pnet: Could not find request transport: r [ 335.117762][T20218] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 335.120986][T20218] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 335.142911][T20218] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 335.169768][T20218] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 335.209739][T20218] hsr_slave_0: entered promiscuous mode [ 335.216551][T20218] hsr_slave_1: entered promiscuous mode [ 335.611260][T20315] syzkaller0: entered promiscuous mode [ 335.617344][T20315] syzkaller0: entered allmulticast mode [ 335.653264][T20316] netlink: 4 bytes leftover after parsing attributes in process `syz.1.5980'. [ 335.728942][T20318] loop4: detected capacity change from 0 to 512 [ 335.839222][T20218] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 335.882554][T20218] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 335.941705][T20218] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 335.992293][T20218] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 336.046776][T20218] 8021q: adding VLAN 0 to HW filter on device bond0 [ 336.062027][T20218] 8021q: adding VLAN 0 to HW filter on device team0 [ 336.073043][T13108] bridge0: port 1(bridge_slave_0) entered blocking state [ 336.080312][T13108] bridge0: port 1(bridge_slave_0) entered forwarding state [ 336.095643][T13108] bridge0: port 2(bridge_slave_1) entered blocking state [ 336.103788][T13108] bridge0: port 2(bridge_slave_1) entered forwarding state [ 336.229618][T20218] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 336.393915][T20218] veth0_vlan: entered promiscuous mode [ 336.407166][T20218] veth1_vlan: entered promiscuous mode [ 336.434732][T20218] veth0_macvtap: entered promiscuous mode [ 336.445561][T20218] veth1_macvtap: entered promiscuous mode [ 336.458075][T20348] netlink: 52 bytes leftover after parsing attributes in process `syz.1.5990'. [ 336.473586][T20218] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 336.496233][T20218] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 336.544191][T13114] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.570877][T13114] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.586246][T13114] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.598792][T13114] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 336.718082][T20371] netlink: 'syz.3.5998': attribute type 1 has an invalid length. [ 336.748806][T20371] 8021q: adding VLAN 0 to HW filter on device bond2 [ 336.767247][T20371] netlink: 4 bytes leftover after parsing attributes in process `syz.3.5998'. [ 337.524063][T20400] netlink: 'syz.4.6009': attribute type 1 has an invalid length. [ 337.542589][T20400] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6009'. [ 337.555987][T20402] FAULT_INJECTION: forcing a failure. [ 337.555987][T20402] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 337.569375][T20402] CPU: 0 UID: 0 PID: 20402 Comm: syz.2.6010 Not tainted syzkaller #0 PREEMPT(voluntary) [ 337.569404][T20402] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 337.569414][T20402] Call Trace: [ 337.569420][T20402] [ 337.569428][T20402] __dump_stack+0x1d/0x30 [ 337.569450][T20402] dump_stack_lvl+0xe8/0x140 [ 337.569472][T20402] dump_stack+0x15/0x1b [ 337.569515][T20402] should_fail_ex+0x265/0x280 [ 337.569560][T20402] should_fail+0xb/0x20 [ 337.569575][T20402] should_fail_usercopy+0x1a/0x20 [ 337.569593][T20402] strncpy_from_user+0x25/0x230 [ 337.569617][T20402] ? kmem_cache_alloc_noprof+0x186/0x310 [ 337.569688][T20402] ? getname_flags+0x80/0x3b0 [ 337.569714][T20402] getname_flags+0xae/0x3b0 [ 337.569757][T20402] do_sys_openat2+0x60/0x110 [ 337.569790][T20402] __x64_sys_openat+0xf2/0x120 [ 337.569820][T20402] x64_sys_call+0x2e9c/0x2ff0 [ 337.569890][T20402] do_syscall_64+0xd2/0x200 [ 337.569914][T20402] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 337.569999][T20402] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 337.570019][T20402] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 337.570037][T20402] RIP: 0033:0x7fc9926febe9 [ 337.570132][T20402] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 337.570226][T20402] RSP: 002b:00007fc991167038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 337.570247][T20402] RAX: ffffffffffffffda RBX: 00007fc992925fa0 RCX: 00007fc9926febe9 [ 337.570332][T20402] RDX: 0000000000121602 RSI: 00002000000000c0 RDI: ffffffffffffff9c [ 337.570343][T20402] RBP: 00007fc991167090 R08: 0000000000000000 R09: 0000000000000000 [ 337.570354][T20402] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 337.570367][T20402] R13: 00007fc992926038 R14: 00007fc992925fa0 R15: 00007ffc8e4ef8a8 [ 337.570386][T20402] [ 337.600897][T20404] loop4: detected capacity change from 0 to 4096 [ 338.019466][T20414] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 338.165518][ T29] kauditd_printk_skb: 573 callbacks suppressed [ 338.165535][ T29] audit: type=1326 audit(1756428705.362:37218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20386 comm="syz.3.6004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 338.196392][ T29] audit: type=1326 audit(1756428705.362:37219): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20386 comm="syz.3.6004" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 338.233214][T20420] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 338.509420][T20438] netlink: 52 bytes leftover after parsing attributes in process `syz.2.6024'. [ 338.650344][T20441] 9pnet: Could not find request transport: r [ 338.753774][T20444] loop5: detected capacity change from 0 to 4096 [ 338.965707][T20451] loop5: detected capacity change from 0 to 512 [ 338.986453][ T29] audit: type=1326 audit(1756428706.181:37220): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20450 comm="syz.5.6028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 339.010399][ T29] audit: type=1326 audit(1756428706.181:37221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20450 comm="syz.5.6028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=115 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 339.035050][ T29] audit: type=1326 audit(1756428706.181:37222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20450 comm="syz.5.6028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 339.068385][ T29] audit: type=1326 audit(1756428706.261:37223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20450 comm="syz.5.6028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 339.093095][ T29] audit: type=1326 audit(1756428706.261:37224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20450 comm="syz.5.6028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 339.099280][T20449] syzkaller0: entered promiscuous mode [ 339.117543][ T29] audit: type=1326 audit(1756428706.261:37225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20450 comm="syz.5.6028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 339.144125][ T29] audit: type=1326 audit(1756428706.331:37226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20450 comm="syz.5.6028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 339.147396][T20449] syzkaller0: entered allmulticast mode [ 339.218159][ T29] audit: type=1326 audit(1756428706.371:37227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20450 comm="syz.5.6028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 339.227903][T20457] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 339.413898][T20471] loop4: detected capacity change from 0 to 4096 [ 339.685560][T20481] loop4: detected capacity change from 0 to 4096 [ 339.718119][T20481] netlink: 52 bytes leftover after parsing attributes in process `syz.4.6039'. [ 339.825474][T20484] loop5: detected capacity change from 0 to 256 [ 339.859712][T20484] netlink: 256 bytes leftover after parsing attributes in process `syz.5.6040'. [ 339.968127][T20485] loop5: detected capacity change from 0 to 8192 [ 340.005194][T20485] loop5: p1 p2 p4 [ 340.009487][T20485] loop5: p1 size 65536 extends beyond EOD, truncated [ 340.018025][T20485] loop5: p2 start 861536256 is beyond EOD, truncated [ 340.025719][T20485] loop5: p4 size 65536 extends beyond EOD, truncated [ 340.264198][T20494] syzkaller0: entered promiscuous mode [ 340.269837][T20494] syzkaller0: entered allmulticast mode [ 340.321938][T20496] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 340.361273][T20498] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6045'. [ 340.371678][T20498] netlink: 48 bytes leftover after parsing attributes in process `syz.1.6045'. [ 340.381136][T20498] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6045'. [ 340.390687][T20500] FAULT_INJECTION: forcing a failure. [ 340.390687][T20500] name failslab, interval 1, probability 0, space 0, times 0 [ 340.403515][T20500] CPU: 0 UID: 0 PID: 20500 Comm: syz.3.6046 Not tainted syzkaller #0 PREEMPT(voluntary) [ 340.403541][T20500] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 340.403553][T20500] Call Trace: [ 340.403562][T20500] [ 340.403590][T20500] __dump_stack+0x1d/0x30 [ 340.403614][T20500] dump_stack_lvl+0xe8/0x140 [ 340.403631][T20500] dump_stack+0x15/0x1b [ 340.403644][T20500] should_fail_ex+0x265/0x280 [ 340.403668][T20500] should_failslab+0x8c/0xb0 [ 340.403692][T20500] kmem_cache_alloc_noprof+0x50/0x310 [ 340.403715][T20500] ? mas_alloc_nodes+0x265/0x520 [ 340.403738][T20500] mas_alloc_nodes+0x265/0x520 [ 340.403768][T20500] mas_preallocate+0x33e/0x520 [ 340.403797][T20500] __split_vma+0x240/0x650 [ 340.403819][T20500] ? mas_find+0x5d5/0x700 [ 340.403838][T20500] vms_gather_munmap_vmas+0x2b2/0x7b0 [ 340.403861][T20500] mmap_region+0x53f/0x1630 [ 340.403884][T20500] ? mntput_no_expire+0x6f/0x460 [ 340.403913][T20500] ? mntput+0x4b/0x80 [ 340.403948][T20500] do_mmap+0x9b3/0xbe0 [ 340.403975][T20500] vm_mmap_pgoff+0x17a/0x2e0 [ 340.404005][T20500] ksys_mmap_pgoff+0xc2/0x310 [ 340.404033][T20500] ? __x64_sys_mmap+0x49/0x70 [ 340.404056][T20500] x64_sys_call+0x14a3/0x2ff0 [ 340.404074][T20500] do_syscall_64+0xd2/0x200 [ 340.404099][T20500] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 340.404125][T20500] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 340.404147][T20500] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 340.404167][T20500] RIP: 0033:0x7f597b3cebe9 [ 340.404182][T20500] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 340.404197][T20500] RSP: 002b:00007f5979e37038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 340.404215][T20500] RAX: ffffffffffffffda RBX: 00007f597b5f5fa0 RCX: 00007f597b3cebe9 [ 340.404227][T20500] RDX: 000000000000000b RSI: 0000000000b36000 RDI: 0000200000000000 [ 340.404240][T20500] RBP: 00007f5979e37090 R08: ffffffffffffffff R09: 0000000000000000 [ 340.404253][T20500] R10: 0000000004008032 R11: 0000000000000246 R12: 0000000000000001 [ 340.404265][T20500] R13: 00007f597b5f6038 R14: 00007f597b5f5fa0 R15: 00007ffc92be4068 [ 340.404283][T20500] [ 341.048505][T20533] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6058'. [ 341.157680][T20543] FAULT_INJECTION: forcing a failure. [ 341.157680][T20543] name failslab, interval 1, probability 0, space 0, times 0 [ 341.170895][T20543] CPU: 1 UID: 0 PID: 20543 Comm: syz.2.6062 Not tainted syzkaller #0 PREEMPT(voluntary) [ 341.170920][T20543] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 341.170931][T20543] Call Trace: [ 341.170939][T20543] [ 341.170947][T20543] __dump_stack+0x1d/0x30 [ 341.171042][T20543] dump_stack_lvl+0xe8/0x140 [ 341.171082][T20543] dump_stack+0x15/0x1b [ 341.171116][T20543] should_fail_ex+0x265/0x280 [ 341.171188][T20543] should_failslab+0x8c/0xb0 [ 341.171244][T20543] kmem_cache_alloc_noprof+0x50/0x310 [ 341.171282][T20543] ? skb_clone+0x151/0x1f0 [ 341.171306][T20543] skb_clone+0x151/0x1f0 [ 341.171326][T20543] __netlink_deliver_tap+0x2c9/0x500 [ 341.171347][T20543] netlink_unicast+0x66b/0x690 [ 341.171423][T20543] netlink_sendmsg+0x58b/0x6b0 [ 341.171489][T20543] ? __pfx_netlink_sendmsg+0x10/0x10 [ 341.171571][T20543] __sock_sendmsg+0x145/0x180 [ 341.171600][T20543] ____sys_sendmsg+0x31e/0x4e0 [ 341.171625][T20543] ___sys_sendmsg+0x17b/0x1d0 [ 341.171658][T20543] __x64_sys_sendmsg+0xd4/0x160 [ 341.171816][T20543] x64_sys_call+0x191e/0x2ff0 [ 341.171867][T20543] do_syscall_64+0xd2/0x200 [ 341.171892][T20543] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 341.171943][T20543] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 341.171967][T20543] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 341.171990][T20543] RIP: 0033:0x7fc9926febe9 [ 341.172006][T20543] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.172066][T20543] RSP: 002b:00007fc991167038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 341.172082][T20543] RAX: ffffffffffffffda RBX: 00007fc992925fa0 RCX: 00007fc9926febe9 [ 341.172093][T20543] RDX: 0000000000040000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 341.172104][T20543] RBP: 00007fc991167090 R08: 0000000000000000 R09: 0000000000000000 [ 341.172116][T20543] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 341.172140][T20543] R13: 00007fc992926038 R14: 00007fc992925fa0 R15: 00007ffc8e4ef8a8 [ 341.172158][T20543] [ 341.426880][T20547] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 341.623369][T20556] syzkaller0: entered promiscuous mode [ 341.631050][T20556] syzkaller0: entered allmulticast mode [ 341.756772][T20558] netlink: 52 bytes leftover after parsing attributes in process `syz.1.6068'. [ 341.808731][T20560] 9pnet: Could not find request transport: 0xffffffffffffffff [ 341.848967][T20565] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6072'. [ 341.878206][T20571] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6074'. [ 341.887475][T20571] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6074'. [ 341.898072][T20574] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6074'. [ 341.907235][T20574] netlink: 28 bytes leftover after parsing attributes in process `syz.5.6074'. [ 341.930972][T20573] FAULT_INJECTION: forcing a failure. [ 341.930972][T20573] name failslab, interval 1, probability 0, space 0, times 0 [ 341.944415][T20573] CPU: 1 UID: 0 PID: 20573 Comm: syz.2.6075 Not tainted syzkaller #0 PREEMPT(voluntary) [ 341.944520][T20573] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 341.944532][T20573] Call Trace: [ 341.944538][T20573] [ 341.944545][T20573] __dump_stack+0x1d/0x30 [ 341.944565][T20573] dump_stack_lvl+0xe8/0x140 [ 341.944606][T20573] dump_stack+0x15/0x1b [ 341.944622][T20573] should_fail_ex+0x265/0x280 [ 341.944653][T20573] should_failslab+0x8c/0xb0 [ 341.944744][T20573] __kmalloc_noprof+0xa5/0x3e0 [ 341.944768][T20573] ? iter_file_splice_write+0xf9/0xa60 [ 341.944785][T20573] ? bpf_probe_read_user+0x6c/0x70 [ 341.944813][T20573] iter_file_splice_write+0xf9/0xa60 [ 341.944898][T20573] ? copy_splice_read+0x623/0x660 [ 341.944996][T20573] ? copy_splice_read+0x623/0x660 [ 341.945015][T20573] ? sysvec_apic_timer_interrupt+0x44/0x80 [ 341.945044][T20573] ? __pfx_iter_file_splice_write+0x10/0x10 [ 341.945101][T20573] direct_splice_actor+0x153/0x2a0 [ 341.945127][T20573] ? shmem_mmap+0x21/0xb0 [ 341.945155][T20573] splice_direct_to_actor+0x30f/0x680 [ 341.945183][T20573] ? __pfx_direct_splice_actor+0x10/0x10 [ 341.945247][T20573] do_splice_direct+0xda/0x150 [ 341.945263][T20573] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 341.945289][T20573] do_sendfile+0x380/0x650 [ 341.945317][T20573] __x64_sys_sendfile64+0x105/0x150 [ 341.945354][T20573] x64_sys_call+0x2bb0/0x2ff0 [ 341.945397][T20573] do_syscall_64+0xd2/0x200 [ 341.945418][T20573] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 341.945444][T20573] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 341.945533][T20573] RIP: 0033:0x7fc9926febe9 [ 341.945548][T20573] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 341.945583][T20573] RSP: 002b:00007fc991167038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 341.945603][T20573] RAX: ffffffffffffffda RBX: 00007fc992925fa0 RCX: 00007fc9926febe9 [ 341.945617][T20573] RDX: 0000000000000000 RSI: 0000000000000005 RDI: 0000000000000007 [ 341.945630][T20573] RBP: 00007fc991167090 R08: 0000000000000000 R09: 0000000000000000 [ 341.945644][T20573] R10: 00008000fffffffc R11: 0000000000000246 R12: 0000000000000001 [ 341.945656][T20573] R13: 00007fc992926038 R14: 00007fc992925fa0 R15: 00007ffc8e4ef8a8 [ 341.945672][T20573] [ 341.948951][T20571] team0 (unregistering): Port device team_slave_0 removed [ 342.200828][T20571] team0 (unregistering): Port device team_slave_1 removed [ 342.244146][T20583] syzkaller0: entered promiscuous mode [ 342.250324][T20583] syzkaller0: entered allmulticast mode [ 342.267603][T20585] loop5: detected capacity change from 0 to 512 [ 342.278015][T20585] netlink: get zone limit has 8 unknown bytes [ 342.280507][T20586] netlink: get zone limit has 8 unknown bytes [ 342.413186][T20603] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6084'. [ 342.792367][T20621] netlink: 52 bytes leftover after parsing attributes in process `syz.2.6091'. [ 343.175598][ T29] kauditd_printk_skb: 265 callbacks suppressed [ 343.175745][ T29] audit: type=1326 audit(1756428710.371:37493): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20589 comm="syz.4.6081" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7efcf5f5ebe9 code=0x7ffc0000 [ 343.207823][ T29] audit: type=1326 audit(1756428710.401:37494): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20589 comm="syz.4.6081" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7efcf5f5ebe9 code=0x7ffc0000 [ 343.250699][ T29] audit: type=1400 audit(1756428710.441:37495): avc: denied { create } for pid=20626 comm="syz.1.6093" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 343.272831][T20627] 9pnet_fd: Insufficient options for proto=fd [ 343.282525][ T29] audit: type=1400 audit(1756428710.461:37496): avc: denied { mounton } for pid=20626 comm="syz.1.6093" path="/199/file0" dev="tmpfs" ino=1067 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 343.311407][T20629] smc: net device bond0 erased user defined pnetid SYZ0 [ 343.349586][T20635] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6097'. [ 343.378137][T20639] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6098'. [ 343.391035][T20639] netlink: 48 bytes leftover after parsing attributes in process `syz.4.6098'. [ 343.409631][ T29] audit: type=1326 audit(1756428710.601:37497): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.4.6098" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efcf5f5ebe9 code=0x7ffc0000 [ 343.433539][ T29] audit: type=1326 audit(1756428710.601:37498): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.4.6098" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efcf5f5ebe9 code=0x7ffc0000 [ 343.458210][ T29] audit: type=1326 audit(1756428710.601:37499): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.4.6098" exe="/root/syz-executor" sig=0 arch=c000003e syscall=312 compat=0 ip=0x7efcf5f5ebe9 code=0x7ffc0000 [ 343.482180][ T29] audit: type=1326 audit(1756428710.601:37500): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.4.6098" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efcf5f5ebe9 code=0x7ffc0000 [ 343.506289][ T29] audit: type=1326 audit(1756428710.601:37501): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.4.6098" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efcf5f5ebe9 code=0x7ffc0000 [ 343.531247][ T29] audit: type=1326 audit(1756428710.601:37502): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20637 comm="syz.4.6098" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efcf5f5ebe9 code=0x7ffc0000 [ 344.215573][T20671] FAULT_INJECTION: forcing a failure. [ 344.215573][T20671] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 344.228896][T20671] CPU: 0 UID: 0 PID: 20671 Comm: syz.1.6111 Not tainted syzkaller #0 PREEMPT(voluntary) [ 344.228985][T20671] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 344.228997][T20671] Call Trace: [ 344.229003][T20671] [ 344.229011][T20671] __dump_stack+0x1d/0x30 [ 344.229100][T20671] dump_stack_lvl+0xe8/0x140 [ 344.229117][T20671] dump_stack+0x15/0x1b [ 344.229131][T20671] should_fail_ex+0x265/0x280 [ 344.229191][T20671] should_fail+0xb/0x20 [ 344.229255][T20671] should_fail_usercopy+0x1a/0x20 [ 344.229279][T20671] _copy_to_user+0x20/0xa0 [ 344.229302][T20671] simple_read_from_buffer+0xb5/0x130 [ 344.229322][T20671] proc_fail_nth_read+0x10e/0x150 [ 344.229423][T20671] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 344.229445][T20671] vfs_read+0x1a8/0x770 [ 344.229464][T20671] ? __rcu_read_unlock+0x4f/0x70 [ 344.229483][T20671] ? __fget_files+0x184/0x1c0 [ 344.229557][T20671] ksys_read+0xda/0x1a0 [ 344.229575][T20671] __x64_sys_read+0x40/0x50 [ 344.229599][T20671] x64_sys_call+0x27bc/0x2ff0 [ 344.229617][T20671] do_syscall_64+0xd2/0x200 [ 344.229641][T20671] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 344.229737][T20671] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 344.229762][T20671] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 344.229781][T20671] RIP: 0033:0x7f68f19ad5fc [ 344.229795][T20671] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 344.229811][T20671] RSP: 002b:00007f68f03ee030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 344.229861][T20671] RAX: ffffffffffffffda RBX: 00007f68f1bd6090 RCX: 00007f68f19ad5fc [ 344.229872][T20671] RDX: 000000000000000f RSI: 00007f68f03ee0a0 RDI: 0000000000000005 [ 344.229883][T20671] RBP: 00007f68f03ee090 R08: 0000000000000000 R09: 0000000000000000 [ 344.229962][T20671] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 344.229974][T20671] R13: 00007f68f1bd6128 R14: 00007f68f1bd6090 R15: 00007ffd499ef928 [ 344.229990][T20671] [ 344.722542][T20733] loop4: detected capacity change from 0 to 256 [ 344.900433][T20771] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 345.053653][T20796] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 345.077356][T20798] FAULT_INJECTION: forcing a failure. [ 345.077356][T20798] name failslab, interval 1, probability 0, space 0, times 0 [ 345.092473][T20798] CPU: 1 UID: 0 PID: 20798 Comm: syz.1.6162 Not tainted syzkaller #0 PREEMPT(voluntary) [ 345.092499][T20798] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 345.092509][T20798] Call Trace: [ 345.092517][T20798] [ 345.092535][T20798] __dump_stack+0x1d/0x30 [ 345.092557][T20798] dump_stack_lvl+0xe8/0x140 [ 345.092574][T20798] dump_stack+0x15/0x1b [ 345.092587][T20798] should_fail_ex+0x265/0x280 [ 345.092608][T20798] should_failslab+0x8c/0xb0 [ 345.092631][T20798] kmem_cache_alloc_noprof+0x50/0x310 [ 345.092653][T20798] ? mas_alloc_nodes+0x265/0x520 [ 345.092682][T20798] mas_alloc_nodes+0x265/0x520 [ 345.092709][T20798] mas_preallocate+0x33e/0x520 [ 345.092738][T20798] __split_vma+0x240/0x650 [ 345.092762][T20798] ? search_extable+0x53/0x80 [ 345.092785][T20798] ? strncpy_from_user+0x17d/0x230 [ 345.092808][T20798] ? fixup_exception+0x741/0xd50 [ 345.092826][T20798] vma_modify+0x3f2/0xc80 [ 345.092846][T20798] vma_modify_flags+0x101/0x130 [ 345.092872][T20798] mprotect_fixup+0x2cc/0x570 [ 345.092899][T20798] do_mprotect_pkey+0x6d6/0x980 [ 345.092932][T20798] __x64_sys_mprotect+0x48/0x60 [ 345.092951][T20798] x64_sys_call+0x274e/0x2ff0 [ 345.092968][T20798] do_syscall_64+0xd2/0x200 [ 345.092989][T20798] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 345.093011][T20798] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 345.093042][T20798] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 345.093063][T20798] RIP: 0033:0x7f68f19aebe9 [ 345.093078][T20798] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 345.093095][T20798] RSP: 002b:00007f68f040f038 EFLAGS: 00000246 ORIG_RAX: 000000000000000a [ 345.093112][T20798] RAX: ffffffffffffffda RBX: 00007f68f1bd5fa0 RCX: 00007f68f19aebe9 [ 345.093123][T20798] RDX: 0000000000000001 RSI: 000000000000f000 RDI: 0000200000000000 [ 345.093136][T20798] RBP: 00007f68f040f090 R08: 0000000000000000 R09: 0000000000000000 [ 345.093148][T20798] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 345.093158][T20798] R13: 00007f68f1bd6038 R14: 00007f68f1bd5fa0 R15: 00007ffd499ef928 [ 345.093241][T20798] [ 345.524969][T20825] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20825 comm=syz.2.6173 [ 345.586066][T20825] futex_wake_op: syz.2.6173 tries to shift op by -1; fix this program [ 345.759053][T20851] loop4: detected capacity change from 0 to 512 [ 345.768639][T20851] EXT4-fs: Ignoring removed nobh option [ 345.811800][T20851] loop4: detected capacity change from 0 to 8192 [ 346.179946][T20874] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 346.287173][T20876] loop4: detected capacity change from 0 to 4096 [ 346.413417][T20883] loop4: detected capacity change from 0 to 1024 [ 347.002349][T20910] FAULT_INJECTION: forcing a failure. [ 347.002349][T20910] name failslab, interval 1, probability 0, space 0, times 0 [ 347.015209][T20910] CPU: 1 UID: 0 PID: 20910 Comm: syz.2.6196 Not tainted syzkaller #0 PREEMPT(voluntary) [ 347.015284][T20910] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 347.015298][T20910] Call Trace: [ 347.015305][T20910] [ 347.015313][T20910] __dump_stack+0x1d/0x30 [ 347.015337][T20910] dump_stack_lvl+0xe8/0x140 [ 347.015358][T20910] dump_stack+0x15/0x1b [ 347.015401][T20910] should_fail_ex+0x265/0x280 [ 347.015421][T20910] should_failslab+0x8c/0xb0 [ 347.015441][T20910] kmem_cache_alloc_noprof+0x50/0x310 [ 347.015538][T20910] ? getname_kernel+0x3c/0x1f0 [ 347.015565][T20910] getname_kernel+0x3c/0x1f0 [ 347.015589][T20910] kern_path+0x23/0x130 [ 347.015618][T20910] create_local_trace_uprobe+0x53/0x2c0 [ 347.015697][T20910] perf_uprobe_init+0xc0/0x150 [ 347.015723][T20910] perf_uprobe_event_init+0xc4/0x140 [ 347.015749][T20910] perf_try_init_event+0xd9/0x540 [ 347.015776][T20910] ? perf_event_alloc+0xb1c/0x1740 [ 347.015857][T20910] perf_event_alloc+0xb27/0x1740 [ 347.015890][T20910] __se_sys_perf_event_open+0x615/0x11c0 [ 347.015949][T20910] ? __rcu_read_unlock+0x4f/0x70 [ 347.015971][T20910] __x64_sys_perf_event_open+0x67/0x80 [ 347.016058][T20910] x64_sys_call+0x7bd/0x2ff0 [ 347.016076][T20910] do_syscall_64+0xd2/0x200 [ 347.016099][T20910] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 347.016123][T20910] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 347.016179][T20910] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 347.016201][T20910] RIP: 0033:0x7fc9926febe9 [ 347.016246][T20910] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 347.016260][T20910] RSP: 002b:00007fc991125038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 347.016277][T20910] RAX: ffffffffffffffda RBX: 00007fc992926180 RCX: 00007fc9926febe9 [ 347.016288][T20910] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 347.016300][T20910] RBP: 00007fc991125090 R08: 0000000000000000 R09: 0000000000000000 [ 347.016313][T20910] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 347.016374][T20910] R13: 00007fc992926218 R14: 00007fc992926180 R15: 00007ffc8e4ef8a8 [ 347.016389][T20910] [ 347.566793][T20923] __nla_validate_parse: 10 callbacks suppressed [ 347.566815][T20923] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6199'. [ 347.622238][T20922] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6197'. [ 347.646216][T20927] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6199'. [ 347.698710][T20928] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 347.811446][T20933] netlink: 256 bytes leftover after parsing attributes in process `syz.1.6203'. [ 348.186409][ T29] kauditd_printk_skb: 972 callbacks suppressed [ 348.186426][ T29] audit: type=1326 audit(1756428715.370:38475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20955 comm="syz.3.6210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 348.219498][ T29] audit: type=1326 audit(1756428715.380:38476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20955 comm="syz.3.6210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 348.243834][ T29] audit: type=1326 audit(1756428715.380:38477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20946 comm="syz.2.6208" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 348.268813][ T29] audit: type=1326 audit(1756428715.390:38478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20946 comm="syz.2.6208" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 348.292881][ T29] audit: type=1326 audit(1756428715.400:38479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20946 comm="syz.2.6208" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 348.337277][ T29] audit: type=1326 audit(1756428715.410:38480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20955 comm="syz.3.6210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=293 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 348.361590][ T29] audit: type=1326 audit(1756428715.410:38481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20955 comm="syz.3.6210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 348.385653][ T29] audit: type=1326 audit(1756428715.410:38482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20955 comm="syz.3.6210" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 348.410340][ T29] audit: type=1326 audit(1756428715.410:38483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20946 comm="syz.2.6208" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 348.434063][ T29] audit: type=1326 audit(1756428715.420:38484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20946 comm="syz.2.6208" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 348.496186][T20966] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 348.517696][T20968] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6213'. [ 348.527527][T20968] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6213'. [ 348.692833][T20984] loop4: detected capacity change from 0 to 512 [ 348.963363][T20998] FAULT_INJECTION: forcing a failure. [ 348.963363][T20998] name failslab, interval 1, probability 0, space 0, times 0 [ 348.976517][T20998] CPU: 1 UID: 0 PID: 20998 Comm: syz.2.6224 Not tainted syzkaller #0 PREEMPT(voluntary) [ 348.976560][T20998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 348.976573][T20998] Call Trace: [ 348.976579][T20998] [ 348.976587][T20998] __dump_stack+0x1d/0x30 [ 348.976610][T20998] dump_stack_lvl+0xe8/0x140 [ 348.976629][T20998] dump_stack+0x15/0x1b [ 348.976681][T20998] should_fail_ex+0x265/0x280 [ 348.976702][T20998] ? __pfx_cgroup_show_path+0x10/0x10 [ 348.976732][T20998] ? cgroup_show_path+0x6a/0x2b0 [ 348.976757][T20998] should_failslab+0x8c/0xb0 [ 348.976800][T20998] __kmalloc_cache_noprof+0x4c/0x320 [ 348.976860][T20998] ? __pfx_cgroup_show_path+0x10/0x10 [ 348.976885][T20998] cgroup_show_path+0x6a/0x2b0 [ 348.976908][T20998] ? kernfs_sop_show_path+0xa4/0xf0 [ 348.976930][T20998] ? __pfx_cgroup_show_path+0x10/0x10 [ 348.976970][T20998] kernfs_sop_show_path+0xb3/0xf0 [ 348.976992][T20998] ? __pfx_kernfs_sop_show_path+0x10/0x10 [ 348.977012][T20998] show_path+0x5a/0x80 [ 348.977034][T20998] show_mountinfo+0xd8/0x600 [ 348.977167][T20998] m_show+0x3e/0x50 [ 348.977190][T20998] traverse+0x144/0x3a0 [ 348.977241][T20998] seq_read_iter+0x853/0x940 [ 348.977336][T20998] ? avc_policy_seqno+0x15/0x30 [ 348.977413][T20998] ? selinux_file_permission+0x1e4/0x320 [ 348.977438][T20998] ? __pfx_seq_read_iter+0x10/0x10 [ 348.977466][T20998] vfs_read+0x649/0x770 [ 348.977484][T20998] ? __pfx_seq_read_iter+0x10/0x10 [ 348.977555][T20998] __x64_sys_pread64+0xfd/0x150 [ 348.977579][T20998] x64_sys_call+0x29e2/0x2ff0 [ 348.977601][T20998] do_syscall_64+0xd2/0x200 [ 348.977627][T20998] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 348.977665][T20998] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 348.977735][T20998] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 348.977757][T20998] RIP: 0033:0x7fc9926febe9 [ 348.977773][T20998] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 348.977866][T20998] RSP: 002b:00007fc991146038 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 348.977887][T20998] RAX: ffffffffffffffda RBX: 00007fc992926090 RCX: 00007fc9926febe9 [ 348.977901][T20998] RDX: 0000000000001002 RSI: 0000200000000200 RDI: 0000000000000003 [ 348.977914][T20998] RBP: 00007fc991146090 R08: 0000000000000000 R09: 0000000000000000 [ 348.977926][T20998] R10: 0000000000000d37 R11: 0000000000000246 R12: 0000000000000001 [ 348.977962][T20998] R13: 00007fc992926128 R14: 00007fc992926090 R15: 00007ffc8e4ef8a8 [ 348.977979][T20998] [ 349.353230][T21005] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6227'. [ 349.409950][T21005] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6227'. [ 349.491190][T21015] netlink: 14 bytes leftover after parsing attributes in process `syz.4.6228'. [ 349.629707][T21027] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6236'. [ 349.682161][ T3468] hid-generic 0000:0000:0000.002D: unknown main item tag 0x0 [ 349.699008][ T3468] hid-generic 0000:0000:0000.002D: hidraw0: HID v0.00 Device [syz1] on syz0 [ 350.286558][T21086] loop4: detected capacity change from 0 to 256 [ 350.329289][T21086] loop4: detected capacity change from 0 to 8192 [ 350.340280][T21093] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 350.375931][T21086] loop4: p1 p2 p4 [ 350.380025][T21086] loop4: p1 size 65536 extends beyond EOD, truncated [ 350.387370][T21086] loop4: p2 start 861536256 is beyond EOD, truncated [ 350.394115][T21086] loop4: p4 size 65536 extends beyond EOD, truncated [ 350.592809][T21119] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 351.363435][T21166] 9pnet: Could not find request transport: r [ 351.460905][T21171] loop4: detected capacity change from 0 to 512 [ 351.674409][T21174] loop4: detected capacity change from 0 to 4096 [ 352.909851][T21266] FAULT_INJECTION: forcing a failure. [ 352.909851][T21266] name failslab, interval 1, probability 0, space 0, times 0 [ 352.923957][T21266] CPU: 0 UID: 0 PID: 21266 Comm: syz.2.6331 Not tainted syzkaller #0 PREEMPT(voluntary) [ 352.923982][T21266] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 352.923994][T21266] Call Trace: [ 352.924001][T21266] [ 352.924010][T21266] __dump_stack+0x1d/0x30 [ 352.924083][T21266] dump_stack_lvl+0xe8/0x140 [ 352.924099][T21266] dump_stack+0x15/0x1b [ 352.924113][T21266] should_fail_ex+0x265/0x280 [ 352.924134][T21266] should_failslab+0x8c/0xb0 [ 352.924157][T21266] kmem_cache_alloc_node_noprof+0x57/0x320 [ 352.924239][T21266] ? __alloc_skb+0x101/0x320 [ 352.924258][T21266] __alloc_skb+0x101/0x320 [ 352.924292][T21266] sock_omalloc+0x81/0xf0 [ 352.924318][T21266] msg_zerocopy_realloc+0x84/0x420 [ 352.924340][T21266] ? xfrm_selector_match+0x446/0x810 [ 352.924363][T21266] ? __rcu_read_unlock+0x4f/0x70 [ 352.924414][T21266] __ip6_append_data+0xa80/0x2390 [ 352.924440][T21266] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 352.924463][T21266] ? __rcu_read_unlock+0x4f/0x70 [ 352.924554][T21266] ? __pfx_ip6_mtu+0x10/0x10 [ 352.924583][T21266] ? ip6_mtu+0xf5/0x120 [ 352.924613][T21266] ip6_make_skb+0x1da/0x4a0 [ 352.924637][T21266] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 352.924774][T21266] udpv6_sendmsg+0x137e/0x1590 [ 352.924799][T21266] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 352.924825][T21266] ? __rcu_read_unlock+0x4f/0x70 [ 352.924852][T21266] ? __pfx_udpv6_sendmsg+0x10/0x10 [ 352.924926][T21266] inet6_sendmsg+0xac/0xd0 [ 352.924949][T21266] __sock_sendmsg+0x8b/0x180 [ 352.924971][T21266] ____sys_sendmsg+0x345/0x4e0 [ 352.925153][T21266] ___sys_sendmsg+0x17b/0x1d0 [ 352.925187][T21266] __sys_sendmmsg+0x178/0x300 [ 352.925212][T21266] __x64_sys_sendmmsg+0x57/0x70 [ 352.925230][T21266] x64_sys_call+0x1c4a/0x2ff0 [ 352.925284][T21266] do_syscall_64+0xd2/0x200 [ 352.925308][T21266] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 352.925328][T21266] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 352.925349][T21266] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 352.925410][T21266] RIP: 0033:0x7fc9926febe9 [ 352.925465][T21266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 352.925480][T21266] RSP: 002b:00007fc991167038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 352.925497][T21266] RAX: ffffffffffffffda RBX: 00007fc992925fa0 RCX: 00007fc9926febe9 [ 352.925509][T21266] RDX: 0400000000000172 RSI: 0000200000003cc0 RDI: 0000000000000003 [ 352.925591][T21266] RBP: 00007fc991167090 R08: 0000000000000000 R09: 0000000000000000 [ 352.925602][T21266] R10: 0000000004000000 R11: 0000000000000246 R12: 0000000000000001 [ 352.925613][T21266] R13: 00007fc992926038 R14: 00007fc992925fa0 R15: 00007ffc8e4ef8a8 [ 352.925629][T21266] [ 353.238967][T21275] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 353.240645][ T29] kauditd_printk_skb: 724 callbacks suppressed [ 353.240659][ T29] audit: type=1326 audit(1756428720.430:39209): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21274 comm="syz.2.6336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 353.278271][ T29] audit: type=1326 audit(1756428720.470:39210): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21274 comm="syz.2.6336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 353.302476][ T29] audit: type=1326 audit(1756428720.470:39211): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21274 comm="syz.2.6336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 353.326531][ T29] audit: type=1326 audit(1756428720.470:39212): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21274 comm="syz.2.6336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 353.350297][ T29] audit: type=1326 audit(1756428720.470:39213): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21274 comm="syz.2.6336" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 353.375160][ T29] audit: type=1326 audit(1756428720.470:39214): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21278 comm="syz.4.6337" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efcf5f5ebe9 code=0x7ffc0000 [ 353.399167][ T29] audit: type=1326 audit(1756428720.470:39215): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21278 comm="syz.4.6337" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efcf5f5ebe9 code=0x7ffc0000 [ 353.423450][ T29] audit: type=1326 audit(1756428720.470:39216): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21278 comm="syz.4.6337" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efcf5f5ebe9 code=0x7ffc0000 [ 353.447860][ T29] audit: type=1326 audit(1756428720.470:39217): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21278 comm="syz.4.6337" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7efcf5f5ebe9 code=0x7ffc0000 [ 353.471918][ T29] audit: type=1326 audit(1756428720.470:39218): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21278 comm="syz.4.6337" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7efcf5f5ebe9 code=0x7ffc0000 [ 353.521590][T21284] __nla_validate_parse: 13 callbacks suppressed [ 353.521606][T21284] netlink: 52 bytes leftover after parsing attributes in process `syz.2.6338'. [ 353.549213][T21284] 9pnet: Could not find request transport: r [ 353.617574][T21293] netlink: 14 bytes leftover after parsing attributes in process `syz.4.6342'. [ 354.190161][T21345] netlink: 52 bytes leftover after parsing attributes in process `syz.5.6365'. [ 354.210922][T21345] 9pnet: Could not find request transport: r [ 354.497566][T21367] loop4: detected capacity change from 0 to 2048 [ 354.510470][T21367] loop4: detected capacity change from 0 to 512 [ 354.584965][T21376] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6377'. [ 354.792128][T21394] netlink: 14 bytes leftover after parsing attributes in process `syz.4.6384'. [ 355.062179][T21418] netlink: 52 bytes leftover after parsing attributes in process `syz.5.6393'. [ 355.088670][T21418] 9pnet: Could not find request transport: r [ 355.557011][T21457] FAULT_INJECTION: forcing a failure. [ 355.557011][T21457] name failslab, interval 1, probability 0, space 0, times 0 [ 355.570114][T21457] CPU: 1 UID: 0 PID: 21457 Comm: syz.2.6409 Not tainted syzkaller #0 PREEMPT(voluntary) [ 355.570166][T21457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 355.570179][T21457] Call Trace: [ 355.570188][T21457] [ 355.570198][T21457] __dump_stack+0x1d/0x30 [ 355.570299][T21457] dump_stack_lvl+0xe8/0x140 [ 355.570317][T21457] dump_stack+0x15/0x1b [ 355.570338][T21457] should_fail_ex+0x265/0x280 [ 355.570418][T21457] should_failslab+0x8c/0xb0 [ 355.570504][T21457] kmem_cache_alloc_node_noprof+0x57/0x320 [ 355.570528][T21457] ? __alloc_skb+0x101/0x320 [ 355.570545][T21457] __alloc_skb+0x101/0x320 [ 355.570559][T21457] sock_omalloc+0x81/0xf0 [ 355.570631][T21457] msg_zerocopy_realloc+0x84/0x420 [ 355.570650][T21457] ? xfrm_selector_match+0x446/0x810 [ 355.570713][T21457] ? __rcu_read_unlock+0x4f/0x70 [ 355.570736][T21457] __ip6_append_data+0xa80/0x2390 [ 355.570761][T21457] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 355.570794][T21457] ? __rcu_read_unlock+0x4f/0x70 [ 355.570861][T21457] ? __pfx_ip6_mtu+0x10/0x10 [ 355.570889][T21457] ? ip6_mtu+0xf5/0x120 [ 355.570914][T21457] ip6_make_skb+0x1da/0x4a0 [ 355.570936][T21457] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 355.571059][T21457] udpv6_sendmsg+0x137e/0x1590 [ 355.571179][T21457] ? __pfx_ip_generic_getfrag+0x10/0x10 [ 355.571202][T21457] ? __rcu_read_unlock+0x4f/0x70 [ 355.571227][T21457] ? __pfx_udpv6_sendmsg+0x10/0x10 [ 355.571317][T21457] inet6_sendmsg+0xac/0xd0 [ 355.571474][T21457] __sock_sendmsg+0x8b/0x180 [ 355.571514][T21457] ____sys_sendmsg+0x345/0x4e0 [ 355.571535][T21457] ___sys_sendmsg+0x17b/0x1d0 [ 355.571565][T21457] __sys_sendmmsg+0x178/0x300 [ 355.571647][T21457] __x64_sys_sendmmsg+0x57/0x70 [ 355.571669][T21457] x64_sys_call+0x1c4a/0x2ff0 [ 355.571690][T21457] do_syscall_64+0xd2/0x200 [ 355.571747][T21457] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 355.571779][T21457] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 355.571836][T21457] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 355.571855][T21457] RIP: 0033:0x7fc9926febe9 [ 355.571871][T21457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 355.571958][T21457] RSP: 002b:00007fc991167038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 355.572023][T21457] RAX: ffffffffffffffda RBX: 00007fc992925fa0 RCX: 00007fc9926febe9 [ 355.572091][T21457] RDX: 0400000000000172 RSI: 0000200000003cc0 RDI: 0000000000000003 [ 355.572103][T21457] RBP: 00007fc991167090 R08: 0000000000000000 R09: 0000000000000000 [ 355.572115][T21457] R10: 0000000004000000 R11: 0000000000000246 R12: 0000000000000001 [ 355.572127][T21457] R13: 00007fc992926038 R14: 00007fc992925fa0 R15: 00007ffc8e4ef8a8 [ 355.572143][T21457] [ 356.268246][T21482] 8021q: adding VLAN 0 to HW filter on device bond3 [ 356.293936][T21486] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6419'. [ 356.387924][T21486] bond3 (unregistering): Released all slaves [ 356.490820][T21493] netlink: 64 bytes leftover after parsing attributes in process `syz.5.6421'. [ 356.519283][T21493] netlink: 'syz.5.6421': attribute type 10 has an invalid length. [ 356.544203][T21502] netlink: 14 bytes leftover after parsing attributes in process `syz.2.6422'. [ 356.567231][T21502] hsr_slave_0: left promiscuous mode [ 356.573557][T21502] hsr_slave_1: left promiscuous mode [ 356.771076][T21510] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 356.988915][T21531] 8021q: adding VLAN 0 to HW filter on device bond1 [ 357.008897][T21531] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6436'. [ 357.048338][T21531] bond1 (unregistering): Released all slaves [ 357.124766][T21542] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 357.787569][T21575] workqueue: Failed to create a rescuer kthread for wq "wg-crypt-wireguard%d": -EINTR [ 357.806805][T21583] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 358.593282][T21603] FAULT_INJECTION: forcing a failure. [ 358.593282][T21603] name failslab, interval 1, probability 0, space 0, times 0 [ 358.607385][T21603] CPU: 0 UID: 0 PID: 21603 Comm: syz.1.6462 Not tainted syzkaller #0 PREEMPT(voluntary) [ 358.607417][T21603] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 358.607510][T21603] Call Trace: [ 358.607517][T21603] [ 358.607524][T21603] __dump_stack+0x1d/0x30 [ 358.607548][T21603] dump_stack_lvl+0xe8/0x140 [ 358.607567][T21603] dump_stack+0x15/0x1b [ 358.607662][T21603] should_fail_ex+0x265/0x280 [ 358.607683][T21603] should_failslab+0x8c/0xb0 [ 358.607708][T21603] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 358.607779][T21603] ? __d_alloc+0x3d/0x340 [ 358.607805][T21603] __d_alloc+0x3d/0x340 [ 358.607827][T21603] ? mpol_shared_policy_init+0xbd/0x4c0 [ 358.607916][T21603] d_alloc_pseudo+0x1e/0x80 [ 358.607942][T21603] alloc_file_pseudo+0x71/0x160 [ 358.607972][T21603] __shmem_file_setup+0x1de/0x210 [ 358.608043][T21603] shmem_file_setup+0x3b/0x50 [ 358.608072][T21603] __se_sys_memfd_create+0x2c3/0x590 [ 358.608093][T21603] __x64_sys_memfd_create+0x31/0x40 [ 358.608151][T21603] x64_sys_call+0x2abe/0x2ff0 [ 358.608171][T21603] do_syscall_64+0xd2/0x200 [ 358.608233][T21603] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 358.608255][T21603] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 358.608271][T21603] RIP: 0033:0x7f68f19aebe9 [ 358.608369][T21603] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 358.608416][T21603] RSP: 002b:00007f68f040ee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 358.608436][T21603] RAX: ffffffffffffffda RBX: 0000000000000519 RCX: 00007f68f19aebe9 [ 358.608456][T21603] RDX: 00007f68f040eef0 RSI: 0000000000000000 RDI: 00007f68f1a327e8 [ 358.608469][T21603] RBP: 00002000000009c0 R08: 00007f68f040ebb7 R09: 00007f68f040ee40 [ 358.608482][T21603] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000980 [ 358.608523][T21603] R13: 00007f68f040eef0 R14: 00007f68f040eeb0 R15: 0000200000000100 [ 358.608542][T21603] [ 359.046827][ T29] kauditd_printk_skb: 1316 callbacks suppressed [ 359.046843][ T29] audit: type=1400 audit(1756428726.239:40535): avc: denied { ioctl } for pid=21595 comm="syz.4.6461" path="/dev/loop-control" dev="devtmpfs" ino=99 ioctlcmd=0x4c80 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:loop_control_device_t tclass=chr_file permissive=1 [ 359.114760][T21611] loop1: detected capacity change from 0 to 8192 [ 359.121217][T21622] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 359.133681][T21619] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 359.215876][ T29] audit: type=1400 audit(1756428726.299:40536): avc: denied { read write } for pid=21610 comm="syz.1.6466" name="loop1" dev="devtmpfs" ino=2732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 359.216539][T21611] loop1: p1 p2 p4 [ 359.240790][ T29] audit: type=1400 audit(1756428726.299:40537): avc: denied { open } for pid=21610 comm="syz.1.6466" path="/dev/loop1" dev="devtmpfs" ino=2732 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 359.268760][ T29] audit: type=1400 audit(1756428726.299:40538): avc: denied { ioctl } for pid=21610 comm="syz.1.6466" path="/dev/loop1" dev="devtmpfs" ino=2732 ioctlcmd=0x4c00 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=blk_file permissive=1 [ 359.296014][ T29] audit: type=1326 audit(1756428726.349:40539): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21623 comm="syz.5.6470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 359.306435][T21611] loop1: p1 size 65536 extends beyond EOD, truncated [ 359.321051][ T29] audit: type=1326 audit(1756428726.349:40540): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21623 comm="syz.5.6470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 359.353367][ T29] audit: type=1326 audit(1756428726.349:40541): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21623 comm="syz.5.6470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=53 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 359.370381][T21611] loop1: p2 start 861536256 is beyond EOD, truncated [ 359.382666][ T29] audit: type=1326 audit(1756428726.349:40542): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21623 comm="syz.5.6470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 359.390465][T21611] loop1: p4 size 65536 extends beyond EOD, truncated [ 359.415793][ T29] audit: type=1326 audit(1756428726.349:40543): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21623 comm="syz.5.6470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 359.448180][ T29] audit: type=1326 audit(1756428726.349:40544): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21623 comm="syz.5.6470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7f32954cebe9 code=0x7ffc0000 [ 359.509966][T21636] netlink: 'syz.5.6473': attribute type 3 has an invalid length. [ 359.518651][T21636] netlink: 13435 bytes leftover after parsing attributes in process `syz.5.6473'. [ 359.594203][T21629] netlink: 52 bytes leftover after parsing attributes in process `syz.2.6471'. [ 359.723777][T21648] loop4: detected capacity change from 0 to 4096 [ 359.753545][T21652] loop1: detected capacity change from 0 to 4096 [ 359.796629][T21652] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 359.932973][T21665] FAULT_INJECTION: forcing a failure. [ 359.932973][T21665] name failslab, interval 1, probability 0, space 0, times 0 [ 359.945925][T21665] CPU: 0 UID: 0 PID: 21665 Comm: syz.3.6483 Not tainted syzkaller #0 PREEMPT(voluntary) [ 359.945955][T21665] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 359.945968][T21665] Call Trace: [ 359.945977][T21665] [ 359.945995][T21665] __dump_stack+0x1d/0x30 [ 359.946020][T21665] dump_stack_lvl+0xe8/0x140 [ 359.946089][T21665] dump_stack+0x15/0x1b [ 359.946109][T21665] should_fail_ex+0x265/0x280 [ 359.946156][T21665] should_failslab+0x8c/0xb0 [ 359.946181][T21665] kmem_cache_alloc_node_noprof+0x57/0x320 [ 359.946210][T21665] ? __alloc_skb+0x101/0x320 [ 359.946227][T21665] __alloc_skb+0x101/0x320 [ 359.946243][T21665] netlink_alloc_large_skb+0xba/0xf0 [ 359.946322][T21665] netlink_sendmsg+0x3cf/0x6b0 [ 359.946384][T21665] ? __pfx_netlink_sendmsg+0x10/0x10 [ 359.946432][T21665] __sock_sendmsg+0x145/0x180 [ 359.946457][T21665] ____sys_sendmsg+0x31e/0x4e0 [ 359.946477][T21665] ___sys_sendmsg+0x17b/0x1d0 [ 359.946553][T21665] __x64_sys_sendmsg+0xd4/0x160 [ 359.946574][T21665] x64_sys_call+0x191e/0x2ff0 [ 359.946591][T21665] do_syscall_64+0xd2/0x200 [ 359.946669][T21665] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 359.946692][T21665] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 359.946714][T21665] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 359.946747][T21665] RIP: 0033:0x7f597b3cebe9 [ 359.946762][T21665] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 359.946786][T21665] RSP: 002b:00007f5979e37038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 359.946811][T21665] RAX: ffffffffffffffda RBX: 00007f597b5f5fa0 RCX: 00007f597b3cebe9 [ 359.946824][T21665] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000006 [ 359.946837][T21665] RBP: 00007f5979e37090 R08: 0000000000000000 R09: 0000000000000000 [ 359.946850][T21665] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 359.946880][T21665] R13: 00007f597b5f6038 R14: 00007f597b5f5fa0 R15: 00007ffc92be4068 [ 359.946896][T21665] [ 360.172948][T21652] netlink: 52 bytes leftover after parsing attributes in process `syz.1.6479'. [ 360.208013][T21670] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6485'. [ 360.236674][T21670] 8021q: adding VLAN 0 to HW filter on device bond1 [ 360.246256][T21670] netlink: 4 bytes leftover after parsing attributes in process `syz.5.6485'. [ 360.268314][T21652] 9pnet: Could not find request transport: r [ 360.277006][T21670] bond1 (unregistering): Released all slaves [ 360.523961][T21691] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 360.558849][T21693] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 360.640352][T21697] can: request_module (can-proto-0) failed. [ 360.654287][T21697] md: async del_gendisk mode will be removed in future, please upgrade to mdadm-4.5+ [ 360.725444][T21708] loop4: detected capacity change from 0 to 512 [ 360.809143][T17680] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 361.201137][T21731] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 361.403374][T21742] netlink: 52 bytes leftover after parsing attributes in process `syz.3.6512'. [ 361.424479][T21748] loop4: detected capacity change from 0 to 512 [ 361.440981][T21742] 9pnet: Could not find request transport: r [ 361.862766][T21770] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 361.871863][T21772] FAULT_INJECTION: forcing a failure. [ 361.871863][T21772] name failslab, interval 1, probability 0, space 0, times 0 [ 361.885242][T21772] CPU: 0 UID: 0 PID: 21772 Comm: syz.4.6523 Not tainted syzkaller #0 PREEMPT(voluntary) [ 361.885287][T21772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 361.885298][T21772] Call Trace: [ 361.885306][T21772] [ 361.885314][T21772] __dump_stack+0x1d/0x30 [ 361.885337][T21772] dump_stack_lvl+0xe8/0x140 [ 361.885357][T21772] dump_stack+0x15/0x1b [ 361.885370][T21772] should_fail_ex+0x265/0x280 [ 361.885416][T21772] ? audit_log_d_path+0x8d/0x150 [ 361.885514][T21772] should_failslab+0x8c/0xb0 [ 361.885551][T21772] __kmalloc_cache_noprof+0x4c/0x320 [ 361.885577][T21772] audit_log_d_path+0x8d/0x150 [ 361.885664][T21772] audit_log_d_path_exe+0x42/0x70 [ 361.885741][T21772] audit_log_task+0x1e9/0x250 [ 361.885771][T21772] audit_seccomp+0x61/0x100 [ 361.885875][T21772] ? __seccomp_filter+0x68c/0x10d0 [ 361.885895][T21772] __seccomp_filter+0x69d/0x10d0 [ 361.885944][T21772] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 361.885970][T21772] ? vfs_write+0x7e8/0x960 [ 361.885992][T21772] ? __rcu_read_unlock+0x4f/0x70 [ 361.886016][T21772] ? __fget_files+0x184/0x1c0 [ 361.886049][T21772] __secure_computing+0x82/0x150 [ 361.886066][T21772] syscall_trace_enter+0xcf/0x1e0 [ 361.886086][T21772] do_syscall_64+0xac/0x200 [ 361.886124][T21772] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 361.886147][T21772] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 361.886241][T21772] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 361.886263][T21772] RIP: 0033:0x7efcf5f5ebe9 [ 361.886281][T21772] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 361.886298][T21772] RSP: 002b:00007efcf49c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 361.886368][T21772] RAX: ffffffffffffffda RBX: 00007efcf6185fa0 RCX: 00007efcf5f5ebe9 [ 361.886382][T21772] RDX: 0000000000000040 RSI: 00002000000002c0 RDI: ffffffffffffff9c [ 361.886395][T21772] RBP: 00007efcf49c7090 R08: 0000000000000000 R09: 0000000000000000 [ 361.886408][T21772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 361.886478][T21772] R13: 00007efcf6186038 R14: 00007efcf6185fa0 R15: 00007ffd8a2c7cd8 [ 361.886495][T21772] [ 362.236393][T21794] loop4: detected capacity change from 0 to 512 [ 362.243244][T21796] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6534'. [ 362.257370][T21796] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6534'. [ 362.323942][T21805] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 362.366979][T21803] loop1: detected capacity change from 0 to 4096 [ 362.428866][T21803] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 362.451529][T21803] netlink: 52 bytes leftover after parsing attributes in process `syz.1.6537'. [ 362.481703][T21803] 9pnet: Could not find request transport: r [ 362.725568][T21862] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=23 sclass=netlink_tcpdiag_socket pid=21862 comm=syz.3.6562 [ 362.838979][T21873] loop4: detected capacity change from 0 to 2048 [ 362.846117][T21873] EXT4-fs: Ignoring removed orlov option [ 363.005078][T17680] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 363.068103][T21894] loop1: detected capacity change from 0 to 256 [ 363.094762][T21894] netlink: 256 bytes leftover after parsing attributes in process `syz.1.6575'. [ 363.304753][T21915] loop1: detected capacity change from 0 to 4096 [ 363.318782][T21915] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 363.344351][T21915] 9pnet: Could not find request transport: r [ 363.623255][T21936] netlink: 'syz.5.6592': attribute type 12 has an invalid length. [ 364.696385][T21979] futex_wake_op: syz.4.6608 tries to shift op by -1; fix this program [ 364.747044][ T29] kauditd_printk_skb: 519 callbacks suppressed [ 364.747135][ T29] audit: type=1400 audit(1756428731.939:41064): avc: denied { write } for pid=21984 comm="syz.4.6611" name="netlink" dev="proc" ino=4026532802 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 364.807611][T21988] FAULT_INJECTION: forcing a failure. [ 364.807611][T21988] name failslab, interval 1, probability 0, space 0, times 0 [ 364.820811][T21988] CPU: 0 UID: 0 PID: 21988 Comm: syz.4.6613 Not tainted syzkaller #0 PREEMPT(voluntary) [ 364.820836][T21988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 364.820847][T21988] Call Trace: [ 364.820852][T21988] [ 364.820858][T21988] __dump_stack+0x1d/0x30 [ 364.820882][T21988] dump_stack_lvl+0xe8/0x140 [ 364.820899][T21988] dump_stack+0x15/0x1b [ 364.820962][T21988] should_fail_ex+0x265/0x280 [ 364.820984][T21988] should_failslab+0x8c/0xb0 [ 364.821045][T21988] kmem_cache_alloc_node_noprof+0x57/0x320 [ 364.821070][T21988] ? __alloc_skb+0x101/0x320 [ 364.821088][T21988] __alloc_skb+0x101/0x320 [ 364.821106][T21988] netlink_alloc_large_skb+0xba/0xf0 [ 364.821162][T21988] netlink_sendmsg+0x3cf/0x6b0 [ 364.821217][T21988] ? __pfx_netlink_sendmsg+0x10/0x10 [ 364.821235][T21988] __sock_sendmsg+0x145/0x180 [ 364.821258][T21988] ____sys_sendmsg+0x31e/0x4e0 [ 364.821353][T21988] ___sys_sendmsg+0x17b/0x1d0 [ 364.821385][T21988] __x64_sys_sendmsg+0xd4/0x160 [ 364.821409][T21988] x64_sys_call+0x191e/0x2ff0 [ 364.821430][T21988] do_syscall_64+0xd2/0x200 [ 364.821532][T21988] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 364.821555][T21988] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 364.821583][T21988] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 364.821630][T21988] RIP: 0033:0x7efcf5f5ebe9 [ 364.821646][T21988] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 364.821662][T21988] RSP: 002b:00007efcf49c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 364.821762][T21988] RAX: ffffffffffffffda RBX: 00007efcf6185fa0 RCX: 00007efcf5f5ebe9 [ 364.821775][T21988] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000006 [ 364.821788][T21988] RBP: 00007efcf49c7090 R08: 0000000000000000 R09: 0000000000000000 [ 364.821801][T21988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.821814][T21988] R13: 00007efcf6186038 R14: 00007efcf6185fa0 R15: 00007ffd8a2c7cd8 [ 364.821833][T21988] [ 364.876874][ T29] audit: type=1326 audit(1756428732.059:41065): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21989 comm="syz.3.6614" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 365.056575][ T29] audit: type=1326 audit(1756428732.059:41066): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21989 comm="syz.3.6614" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 365.059014][T17680] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 365.135976][T21997] loop4: detected capacity change from 0 to 512 [ 365.163645][ T29] audit: type=1326 audit(1756428732.339:41067): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21999 comm="syz.2.6619" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 365.187900][ T29] audit: type=1326 audit(1756428732.339:41068): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21999 comm="syz.2.6619" exe="/root/syz-executor" sig=0 arch=c000003e syscall=115 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 365.212334][ T29] audit: type=1326 audit(1756428732.339:41069): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21999 comm="syz.2.6619" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 365.236640][ T29] audit: type=1326 audit(1756428732.339:41070): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21999 comm="syz.2.6619" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 365.260465][ T29] audit: type=1326 audit(1756428732.339:41071): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21999 comm="syz.2.6619" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 365.284527][ T29] audit: type=1326 audit(1756428732.339:41072): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21999 comm="syz.2.6619" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 365.309393][ T29] audit: type=1326 audit(1756428732.339:41073): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21999 comm="syz.2.6619" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fc9926febe9 code=0x7ffc0000 [ 365.440684][T22012] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 365.940497][T22030] loop4: detected capacity change from 0 to 4096 [ 365.958641][T22030] __nla_validate_parse: 4 callbacks suppressed [ 365.958679][T22030] netlink: 52 bytes leftover after parsing attributes in process `syz.4.6628'. [ 365.985141][T22030] 9pnet: Could not find request transport: r [ 366.150314][T22043] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6630'. [ 366.326315][T22045] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 366.375214][T22049] netlink: 52 bytes leftover after parsing attributes in process `syz.2.6636'. [ 367.050061][T22077] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 367.122370][T22080] netlink: 14 bytes leftover after parsing attributes in process `syz.5.6647'. [ 367.496271][T22082] loop4: detected capacity change from 0 to 512 [ 367.625447][T22087] FAULT_INJECTION: forcing a failure. [ 367.625447][T22087] name failslab, interval 1, probability 0, space 0, times 0 [ 367.638176][T22087] CPU: 0 UID: 0 PID: 22087 Comm: syz.1.6650 Not tainted syzkaller #0 PREEMPT(voluntary) [ 367.638270][T22087] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 367.638283][T22087] Call Trace: [ 367.638292][T22087] [ 367.638302][T22087] __dump_stack+0x1d/0x30 [ 367.638324][T22087] dump_stack_lvl+0xe8/0x140 [ 367.638348][T22087] dump_stack+0x15/0x1b [ 367.638364][T22087] should_fail_ex+0x265/0x280 [ 367.638387][T22087] ? tipc_group_create+0x66/0x290 [ 367.638426][T22087] should_failslab+0x8c/0xb0 [ 367.638450][T22087] __kmalloc_cache_noprof+0x4c/0x320 [ 367.638478][T22087] tipc_group_create+0x66/0x290 [ 367.638500][T22087] tipc_sk_join+0x130/0x2e0 [ 367.638635][T22087] tipc_setsockopt+0x598/0x620 [ 367.638704][T22087] ? __pfx_tipc_setsockopt+0x10/0x10 [ 367.638732][T22087] __sys_setsockopt+0x184/0x200 [ 367.638754][T22087] __x64_sys_setsockopt+0x64/0x80 [ 367.638774][T22087] x64_sys_call+0x20ec/0x2ff0 [ 367.638909][T22087] do_syscall_64+0xd2/0x200 [ 367.638938][T22087] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 367.638993][T22087] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 367.639048][T22087] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 367.639069][T22087] RIP: 0033:0x7f68f19aebe9 [ 367.639085][T22087] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 367.639101][T22087] RSP: 002b:00007f68f040f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 367.639122][T22087] RAX: ffffffffffffffda RBX: 00007f68f1bd5fa0 RCX: 00007f68f19aebe9 [ 367.639135][T22087] RDX: 0000000000000087 RSI: 000000000000010f RDI: 0000000000000003 [ 367.639175][T22087] RBP: 00007f68f040f090 R08: 0000000000000010 R09: 0000000000000000 [ 367.639185][T22087] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 367.639197][T22087] R13: 00007f68f1bd6038 R14: 00007f68f1bd5fa0 R15: 00007ffd499ef928 [ 367.639215][T22087] [ 367.883539][T22092] loop1: detected capacity change from 0 to 4096 [ 367.911570][T22092] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 367.979164][T22103] netlink: 180 bytes leftover after parsing attributes in process `syz.3.6656'. [ 367.989092][T22092] netlink: 52 bytes leftover after parsing attributes in process `syz.1.6652'. [ 367.989689][T22103] netlink: 180 bytes leftover after parsing attributes in process `syz.3.6656'. [ 368.013666][T22101] infiniband syz2: set active [ 368.018445][T22101] infiniband syz2: added bond0 [ 368.028665][T22105] loop4: detected capacity change from 0 to 512 [ 368.035840][T22101] RDS/IB: syz2: added [ 368.040930][T22101] smc: adding ib device syz2 with port count 1 [ 368.047308][T22101] smc: ib device syz2 port 1 has pnetid [ 368.102156][T22109] syzkaller0: entered promiscuous mode [ 368.107949][T22109] syzkaller0: entered allmulticast mode [ 368.281727][T22117] netlink: 'syz.5.6659': attribute type 2 has an invalid length. [ 368.290688][T22117] netlink: 16098 bytes leftover after parsing attributes in process `syz.5.6659'. [ 368.349097][T22119] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 368.400366][T22123] syzkaller0: entered promiscuous mode [ 368.406543][T22123] syzkaller0: entered allmulticast mode [ 368.663814][T22129] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6664'. [ 368.729508][T22132] netlink: 14 bytes leftover after parsing attributes in process `syz.5.6665'. [ 368.949474][T22141] FAULT_INJECTION: forcing a failure. [ 368.949474][T22141] name failslab, interval 1, probability 0, space 0, times 0 [ 368.962749][T22141] CPU: 1 UID: 0 PID: 22141 Comm: syz.4.6669 Not tainted syzkaller #0 PREEMPT(voluntary) [ 368.962775][T22141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 368.962786][T22141] Call Trace: [ 368.962803][T22141] [ 368.962809][T22141] __dump_stack+0x1d/0x30 [ 368.962831][T22141] dump_stack_lvl+0xe8/0x140 [ 368.962846][T22141] dump_stack+0x15/0x1b [ 368.962860][T22141] should_fail_ex+0x265/0x280 [ 368.962889][T22141] should_failslab+0x8c/0xb0 [ 368.962915][T22141] __kvmalloc_node_noprof+0x123/0x4e0 [ 368.962943][T22141] ? alloc_netdev_mqs+0xa0/0xa30 [ 368.962965][T22141] ? __pfx_caifdev_setup+0x10/0x10 [ 368.962982][T22141] alloc_netdev_mqs+0xa0/0xa30 [ 368.963007][T22141] ldisc_open+0x102/0x530 [ 368.963075][T22141] ? vfree+0x295/0x3a0 [ 368.963104][T22141] tty_ldisc_open+0x5a/0xb0 [ 368.963127][T22141] tty_set_ldisc+0x1db/0x380 [ 368.963176][T22141] tiocsetd+0x51/0x60 [ 368.963202][T22141] tty_ioctl+0xa7f/0xb80 [ 368.963259][T22141] ? __pfx_tty_ioctl+0x10/0x10 [ 368.963281][T22141] __se_sys_ioctl+0xce/0x140 [ 368.963297][T22141] __x64_sys_ioctl+0x43/0x50 [ 368.963386][T22141] x64_sys_call+0x1816/0x2ff0 [ 368.963404][T22141] do_syscall_64+0xd2/0x200 [ 368.963427][T22141] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 368.963447][T22141] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 368.963468][T22141] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 368.963562][T22141] RIP: 0033:0x7efcf5f5ebe9 [ 368.963579][T22141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 368.963653][T22141] RSP: 002b:00007efcf49c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 368.963672][T22141] RAX: ffffffffffffffda RBX: 00007efcf6185fa0 RCX: 00007efcf5f5ebe9 [ 368.963685][T22141] RDX: 0000200000000040 RSI: 0000000000005423 RDI: 0000000000000007 [ 368.963698][T22141] RBP: 00007efcf49c7090 R08: 0000000000000000 R09: 0000000000000000 [ 368.963711][T22141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 368.963722][T22141] R13: 00007efcf6186038 R14: 00007efcf6185fa0 R15: 00007ffd8a2c7cd8 [ 368.963739][T22141] [ 369.223496][T22148] netlink: 'syz.4.6672': attribute type 2 has an invalid length. [ 369.275825][T22151] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 369.759400][ T29] kauditd_printk_skb: 525 callbacks suppressed [ 369.759415][ T29] audit: type=1326 audit(1756428736.948:41599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22152 comm="syz.3.6674" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 369.791392][ T29] audit: type=1326 audit(1756428736.978:41600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22152 comm="syz.3.6674" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 369.816781][ T29] audit: type=1326 audit(1756428736.998:41601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22152 comm="syz.3.6674" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 369.842678][ T29] audit: type=1326 audit(1756428737.028:41602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22152 comm="syz.3.6674" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 369.871179][ T29] audit: type=1326 audit(1756428737.048:41603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22152 comm="syz.3.6674" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 369.895759][ T29] audit: type=1326 audit(1756428737.078:41604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22152 comm="syz.3.6674" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 369.919690][ T29] audit: type=1326 audit(1756428737.108:41605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22152 comm="syz.3.6674" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 369.943888][ T29] audit: type=1326 audit(1756428737.128:41606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22152 comm="syz.3.6674" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 369.968937][ T29] audit: type=1326 audit(1756428737.158:41607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22152 comm="syz.3.6674" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 369.993790][ T29] audit: type=1326 audit(1756428737.178:41608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22152 comm="syz.3.6674" exe="/root/syz-executor" sig=0 arch=c000003e syscall=130 compat=0 ip=0x7f597b3cebe9 code=0x7ffc0000 [ 370.182411][T22174] atomic_op ffff88810f832528 conn xmit_atomic 0000000000000000 [ 370.191599][T22179] SELinux: policydb string SE Linu does not match my string SE Linux [ 370.200671][T22179] SELinux: failed to load policy [ 370.256899][T22187] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 370.276664][T22188] ================================================================== [ 370.284850][T22188] BUG: KCSAN: data-race in mas_state_walk / mas_wmb_replace [ 370.292418][T22188] [ 370.294728][T22188] write to 0xffff888101f8f300 of 8 bytes by task 22189 on cpu 0: [ 370.302459][T22188] mas_wmb_replace+0x20d/0x14a0 [ 370.307319][T22188] mas_wr_store_entry+0x1773/0x2b50 [ 370.312826][T22188] mas_store_prealloc+0x74d/0x9e0 [ 370.318326][T22188] vma_iter_store_new+0x1c5/0x200 [ 370.323634][T22188] vma_complete+0x125/0x580 [ 370.328136][T22188] __split_vma+0x5d9/0x650 [ 370.332563][T22188] vms_gather_munmap_vmas+0x2b2/0x7b0 [ 370.337921][T22188] do_vmi_align_munmap+0x1a4/0x3d0 [ 370.343014][T22188] do_vmi_munmap+0x1db/0x220 [ 370.347593][T22188] __vm_munmap+0x1a1/0x280 [ 370.352098][T22188] __x64_sys_munmap+0x36/0x50 [ 370.356782][T22188] x64_sys_call+0x9c0/0x2ff0 [ 370.361541][T22188] do_syscall_64+0xd2/0x200 [ 370.366271][T22188] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 370.372961][T22188] [ 370.375476][T22188] read to 0xffff888101f8f300 of 8 bytes by task 22188 on cpu 1: [ 370.383096][T22188] mas_state_walk+0x485/0x650 [ 370.387963][T22188] mas_walk+0x60/0x150 [ 370.392128][T22188] lock_vma_under_rcu+0x8d/0x160 [ 370.397095][T22188] do_user_addr_fault+0x233/0x1090 [ 370.402331][T22188] exc_page_fault+0x62/0xa0 [ 370.407005][T22188] asm_exc_page_fault+0x26/0x30 [ 370.411934][T22188] [ 370.414242][T22188] value changed: 0xffff888109ec8041 -> 0xffff888101f8f300 [ 370.421689][T22188] [ 370.424179][T22188] Reported by Kernel Concurrency Sanitizer on: [ 370.430415][T22188] CPU: 1 UID: 0 PID: 22188 Comm: syz.3.6686 Not tainted syzkaller #0 PREEMPT(voluntary) [ 370.440470][T22188] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 370.450515][T22188] ================================================================== [ 370.770004][T17680] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000.