last executing test programs: 7m6.50567548s ago: executing program 32 (id=449): openat$tun(0xffffffffffffff9c, 0x0, 0x13d400, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), 0x0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$rds(0x15, 0x5, 0x0) bind$rds(r1, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r2, 0x0, 0x0) r3 = openat$selinux_attr(0xffffffffffffff9c, 0x0, 0x2, 0x0) write$selinux_attr(r3, 0x0, 0x0) socket$netlink(0x10, 0x3, 0xf) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket(0x1e, 0x4, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="d129f64edfa4559a0000000006c0000000000000", @ANYRES32, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000008200000095"], &(0x7f0000000000)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x6b, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$rds(r1, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000780)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x410200}], 0x1}}], 0x48}, 0x0) 7m3.107143167s ago: executing program 4 (id=486): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000000000000000000000ff010000850000000e000000850000005000000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x9) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, 0x0, 0x0) (fail_nth: 10) 7m2.722217203s ago: executing program 4 (id=487): r0 = syz_io_uring_setup(0x10b, &(0x7f0000000600)={0x0, 0xd737, 0x8, 0x3, 0xbffffffa}, 0x0, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r1 = socket(0x2, 0x80805, 0x0) sendmmsg$inet(r1, &(0x7f0000000880)=[{{&(0x7f0000000080)={0x2, 0x0, @rand_addr=0xac1414bb}, 0x10, &(0x7f0000000100)}, 0x20000000}, {{&(0x7f0000000180)={0x2, 0x0, @remote}, 0x10, &(0x7f0000000400)=[{&(0x7f0000000240)="b9", 0x1}], 0x1}}], 0x2, 0x0) syz_io_uring_setup(0x1491, &(0x7f0000000000)={0x0, 0x4d06, 0x8, 0x3, 0x301, 0x0, r0}, &(0x7f0000000080), &(0x7f00000000c0)) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r3, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000080050005000200000011000300686173683a69702c706f7274"], 0x4c}}, 0x2) socket$nl_route(0x10, 0x3, 0x0) sched_setscheduler(0x0, 0x2, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xc, 0xc, &(0x7f00000004c0)=ANY=[], 0x0, 0x8, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$GTP_CMD_GETPDP(r0, &(0x7f00000004c0)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000480)={&(0x7f0000000680)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="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"], 0x28}, 0x1, 0x0, 0x0, 0x20000014}, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0900000004000000060000000012"], 0x50) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r6, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)=r7}, 0x20) bpf$OBJ_PIN_MAP(0x6, &(0x7f0000000340)=@generic={&(0x7f0000000200)='./file0\x00', r8}, 0x18) sendmsg$IPSET_CMD_ADD(r2, &(0x7f00000002c0)={0x0, 0x4001, &(0x7f0000000240)={&(0x7f0000000300)=ANY=[@ANYBLOB="50000000090601020000000000000000020000840900020073797a31000000000500010007000000280007800c00018008000140fffffff70500070084000000060004404e22000006000540"], 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) 7m1.913910834s ago: executing program 4 (id=493): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000040)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) ioctl$EXT4_IOC_SWAP_BOOT(r2, 0x6611) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) accept4$packet(0xffffffffffffffff, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000280)=0x14, 0x800) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r5, 0x0, 0x0) unshare(0x44040000) syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000080)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1, &(0x7f00000001c0), 0x6, 0x51c, &(0x7f0000000c00)="$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") 7m0.996444456s ago: executing program 4 (id=496): r0 = socket$nl_route(0x10, 0x3, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000feffff10850000000700000095"], 0x0, 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_IPV6_FLOWLABEL_MGR(r1, 0x29, 0x20, 0x0, &(0x7f00000004c0)) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r3 = syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNADD(r3, 0x400448c8, &(0x7f0000000340)={r2, r2, 0x8, 0x0, 0x0, 0x82, 0x4a, 0x15c2, 0x3, 0x809, 0x4, 0x8, 'syz1\x00'}) r4 = openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x20842, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x16, 0x4, &(0x7f0000000200)=ANY=[], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x5a, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file2\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0xfb, 0x11ff, &(0x7f0000001280)="$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") mknod$loop(&(0x7f0000000000)='./file2\x00', 0x0, 0x0) rename(&(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000f40)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r6 = syz_clone(0x11, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000012c0)={r5, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)=[0x9], 0x0, 0x0, 0x100000, 0x1, r6}}, 0x40) r7 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x40000, 0x0) ioctl$SIOCGSKNS(r7, 0x894c, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'sit0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000240)={{{@in=@dev, @in6=@private1}}, {{@in=@loopback}, 0x0, @in6=@private0}}, &(0x7f0000000180)=0xe8) sendmsg$nl_route_sched(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000380)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x25dfdbfb, {0x0, 0x0, 0x0, r8, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_codel={{0xa}, {0x4}}]}, 0x34}, 0x1, 0x0, 0x0, 0x48801}, 0x0) 7m0.669776871s ago: executing program 4 (id=500): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x2d) r1 = open(&(0x7f0000000040)='./file2\x00', 0x85481, 0x104) ioprio_set$pid(0x2, 0x0, 0x0) r2 = syz_io_uring_setup(0x24fd, &(0x7f0000000f80)={0x0, 0xfffffffb, 0x20, 0x0, 0x80}, &(0x7f00000000c0), &(0x7f0000000280)) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, 0xffffffffffffffff, 0x0) io_uring_enter(r2, 0x2d3e, 0x0, 0x62, 0x0, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000b40)={0x11, 0xf, &(0x7f0000000a00)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000d1f763a6645407a02e852968efc9d4a8a23aaa03a1895b4748bbf3b6251531c9b7ff2288b6e311bd6c3d90ec84e6d5f889241302bdf9e8488740385451b91c993ea0c66cd8ff27c137a63f97f6d161ab6839914267bd61a41a0d196f3e83f9fced91a5e3775aae0ca846fbe4ed4e1a98b41c4f128227dc94f68b3fcbddce474dd8070dc4070ad8d3f0b2255e96a40f73943af53c0ea84ef2a82709d4d8a8e8ebe3dab5abe743ebd434b1d255c08569427d", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, @void, @value}, 0x94) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000004c0)=0x14) ioctl$SIOCX25CALLACCPTAPPRV(0xffffffffffffffff, 0x89e8) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x3, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000006a1199000000000016000000000000109500740000b61ca5"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) set_mempolicy(0x3, &(0x7f00000002c0)=0x1ff, 0x5) ioctl$SG_IO(r1, 0x2285, &(0x7f0000000440)={0x0, 0xffffffffffffffff, 0xae, 0x7, @buffer={0x0, 0xa8, &(0x7f00000001c0)=""/168}, &(0x7f0000000280)="7540395dd1812189fc91715b489f658c6bf57642daae8c9f8bfd3c4c81b7135588213f4225e76b7ee24ffed3479f09810ae7c3b8737a4bf7aa0c09bb95a9d8ec36e28df4ef20df0c661c5fe53b185230fc50d8379bc931d38c5c823168fdaa5e5229cebfa9a3a7558b6f5e1e734abb619558db737d08038abe7050e9ccefeb47e1b7dec28ebf779ecc96935ae9328fd168993e17da2851d0098633ea72e2792916771d9f9ec96821125d02d7299d", &(0x7f00000003c0)=""/58, 0x0, 0x10002, 0x2, &(0x7f0000000400)}) 7m0.272674556s ago: executing program 4 (id=502): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000100)='sched_switch\x00', r1, 0x0, 0x2}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0xe031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000040)=""/133, 0xfffffffffffffdde, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000005d40)=@newtaction={0x14, 0x30, 0x2, 0x70bd2a, 0x25dfdbfe}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x8, 0x3, 0x4c0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3f0, 0xffffffff, 0xffffffff, 0x3f0, 0xffffffff, 0xb, 0x0, {[{{@ipv6={@dev={0xfe, 0x80, '\x00', 0x1a}, @dev={0xfe, 0x80, '\x00', 0x28}, [0xffffff00, 0xffffff00, 0x0, 0xff000000], [0xff, 0x0, 0x9f19fd7a5e924fa7, 0xff], 'macvtap0\x00', 'bridge0\x00', {0xff}, {0xff}, 0x2b, 0x7, 0x5, 0x10}, 0x0, 0x1a0, 0x1c0, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x81, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x1c8, 0x230, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@tcpmss={{0x28}, {0x39d3, 0x9, 0x1}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) 7m0.113589009s ago: executing program 33 (id=502): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffc0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000100)='sched_switch\x00', r1, 0x0, 0x2}, 0x18) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0xe031, 0xffffffffffffffff, 0x0) getrandom(&(0x7f0000000040)=""/133, 0xfffffffffffffdde, 0x2) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000070000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x4, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000005d40)=@newtaction={0x14, 0x30, 0x2, 0x70bd2a, 0x25dfdbfe}, 0x14}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$TOKEN_CREATE(0x24, &(0x7f00000002c0)={0x0, r0}, 0x8) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f0000000600)=@raw={'raw\x00', 0x8, 0x3, 0x4c0, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x3f0, 0xffffffff, 0xffffffff, 0x3f0, 0xffffffff, 0xb, 0x0, {[{{@ipv6={@dev={0xfe, 0x80, '\x00', 0x1a}, @dev={0xfe, 0x80, '\x00', 0x28}, [0xffffff00, 0xffffff00, 0x0, 0xff000000], [0xff, 0x0, 0x9f19fd7a5e924fa7, 0xff], 'macvtap0\x00', 'bridge0\x00', {0xff}, {0xff}, 0x2b, 0x7, 0x5, 0x10}, 0x0, 0x1a0, 0x1c0, 0x60030000, {0x0, 0xff000000}, [@common=@inet=@recent0={{0xf8}, {0x81, 0x0, 0x24, 0x0, 'syz1\x00'}}]}, @unspec=@TRACE={0x20}}, {{@uncond, 0x0, 0x1c8, 0x230, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@tcpmss={{0x28}, {0x39d3, 0x9, 0x1}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x520) 3m25.419293674s ago: executing program 5 (id=3919): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r1}, 0x18) r2 = getpid() syz_pidfd_open(r2, 0x0) 3m25.299775565s ago: executing program 5 (id=3921): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000880)={{r0}, &(0x7f0000000800), &(0x7f0000000840)=r1}, 0x20) r2 = socket$inet6(0xa, 0x80002, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x20000, @loopback, 0x2}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000003cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x4000000) 3m25.252211786s ago: executing program 5 (id=3923): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="020000000400000008"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1, 0x7, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095", @ANYRESHEX=r0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000038000511d25a80698c63940d0124fc602f6e35400c000200001ec00037153e370a00018025581d00d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x39c}, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r4}, 0x18) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000000)="2e00000029008188e6b62aa73772cc9f1ba1f848430000005e140602000006020e00280010000700028000001294", 0x2e}], 0x1}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x1e, &(0x7f0000000180)=0x400000001, 0xc2) setsockopt$inet6_tcp_int(r7, 0x6, 0x2000000000000022, &(0x7f0000000040)=0x1, 0x4) connect$inet6(r7, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendto$inet6(r7, 0x0, 0x2, 0x0, 0x0, 0x0) fcntl$notify(0xffffffffffffffff, 0x402, 0x80000016) bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000580)={&(0x7f0000000440)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=0x0, @ANYBLOB="000829bd70b66a03265b7addc748a7449f00fddbdf25019228895200000002410000001874"], 0x34}, 0x1, 0x0, 0x0, 0x20000811}, 0x20004090) r8 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r8, &(0x7f0000000040)={0x0, 0x18, &(0x7f00000009c0)=[{&(0x7f0000000140)="d800000018007b29e00212ba0d8105040a601800fe0f040b067c55a1bc000900b80006990600000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04fb95cae8c9010000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad8ffd5e1cace81ccd40dd601edef3d93452a92307ff0ff0e97031e9f05e9f16e9cb500"/216, 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x0) 3m25.196308897s ago: executing program 5 (id=3925): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb9394b2890000000000000000000000000000020000000000"], 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) (async) r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)=ANY=[@ANYBLOB="9feb9394b2890000000000000000000000000000020000000000"], 0x0, 0x1a, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x28) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000001680)={0x18, 0xc, &(0x7f00000003c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x7fff}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x5}}]}, &(0x7f0000000240)='syzkaller\x00', 0x8, 0x1000, &(0x7f0000000680)=""/4096, 0x41000, 0x40, '\x00', 0x0, 0x0, r0, 0x8, &(0x7f0000000340)={0x5, 0x5}, 0x8, 0x10, &(0x7f0000000440)={0x4, 0x10, 0x10, 0x3}, 0x10, 0x0, 0x0, 0xa, &(0x7f0000000480)=[0x1, 0x1], &(0x7f00000004c0)=[{0x1, 0x3, 0xf, 0x4}, {0x3, 0x1, 0x9, 0x1}, {0x4, 0x2, 0x1, 0xc}, {0x0, 0x5, 0xe, 0x7}, {0x0, 0x5, 0x7, 0x6}, {0x3, 0x1, 0x2, 0xa}, {0x5, 0x3, 0x1, 0x4}, {0x2, 0x4, 0x5, 0xc}, {0x4, 0x1, 0xf, 0xa}, {0x0, 0x5, 0xb, 0x4}], 0x10, 0xa, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000200)='qdisc_dequeue\x00', r1, 0x0, 0x40}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000040000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000680)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000040000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000095"], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f0000000180)='sys_enter\x00', r2}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000740)='\x00\a\a\x00\x00\x01\x00\x00\x00\x00\xcf\x80o\xdb\xc7q\x00\x00\x00!\x83\xf8\xad\x17\xcf\xa7\xd6R\x88\xf9\xed\xcdC\x8a\x8b\xf0\x7f\xf1<\x94\xdf\xe1\xaa\xb7j\\\xdf\x1eN\xab\xc9PA:\xdf\a\x0f\xf6\x13\xf2\x16\xf54U\x85C\xdb\x8bkQ\xfarw]\xbd\xf4\x10\x1aG\xc5\xbe\x17\xf0}gb\x8e\x02@a\xb8\xbc\xd4\xd2\xa2\xbc\xc9\x02\xb0\xf8\xc0\xcb\xe4\xfaE5!\xad\x90\xb2\xc7Dw\xf2X,j$6Aj1ho\x12\xc0v\xcd\x1e\x9f\xadA\x84\xc4\xf8\xb3%g\xac}\x86\x80\\/\xa1\xdf\xd4KM\t\xb0dK\x0e$\xf2\xad;E[\xf5\xc9 \xf9\t\x00\x00\x00\x00\x00\x00\x00\xbc\xa5I\xf6\xba7\xcb\xc7\x81\xc4Q\xcd\xa6&\xc5\xd8\x7fa4\x8b\xb9\x104\xfc+x\xaazY\xf0\xe2\xa8\x1b\x9b\xa2\xfdx\x00\xab&:\xa7\x17\x1d\x03.\xdb\xe5\xa9\xc6\x1ba\n\xe5Br\b\x8e:E\xb7\x18\xf2S\xc4\xc9\"T\x8c\f\xbf\xad\xe2\x89\xd1\xaf\xef\xd4\xac\xcf4\xab\xf3\xc5\xfb\xb2\xf1\x14`I\xb1\xd7\xd1\xb0B\x12') mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) (async) r3 = mq_open(&(0x7f0000000080)='eth0\x00#\x13\xaeu\xe0\xfbu0*\xf3\x11i\xdd\xd9\xc6\x87\xde\xbf_\xa0\xf6\xdfk\xbf.\"\xa6\xc0#p\xcd\x1c/\xa6\xf2\xbcyL\x85a\xb5\xbb~+>\xbc\x93\xf8\xab\x9a3\x85l\x1d\x15\x11\x1a{@!2\xb6!\xae\xf79k\x90\x88\v8I$\xfdQ\x1d\x90=r\xd8\xc0\xd8\t/\x8dv\xb8\x93\xc3C\xae\x9dc\xd1T\xdd\x14\xd3\xe1\xbe_$A=z\xee\xbd/X\xbemOX)s\x94\xde\xbe_\v\x01\xbe\xeb\xbb\x91\x11z\xc2|d\x1b\x04\xd2\xf9yx\xb2\x1b\bLTrw\x88\x9e0\t\xc6\xe2\x9c\xed\\\xd8[\xc8\x04 \xf3\xac]V\x1d:\xfc\xc3\x9e\x02\ax\xef\xfe\x1c.TT\xcf\xbf\xf5\x80a%\xdcQ\xb3CuT\xcc7\x8avs\xb2\a\xfe\xb3j*\xad\x18I\xcc\xe9\xaa{]\xef\xb7\xf2\xee*\xf95\bJt\xd0s\xc4\xaa\xc8\x13~\xb2\xf20\xbdf\xdb\xaeG\xe3\xfb\xef\x94\xef:Q\x1b\xe3\xa3\xa4}\xef`e\xcdL\xab\xdb\r\xf2y\x9fg1\xf4\t\x18i/!\x13\xf1,\x8cu\xaa\xbf~)\x94\x1b2\x93\x86\xe7\x9a\xf2j\xa8\x96\xa6\xa2\xfcN\x81\xafTh\xb3\x1bo:\xe8\vq7S\xe4H\xf3L\xa0\x9c\x97B\x12\x10\x9d\xaa\x7fq\x06\xb9(\xf6\x1c\x83\xb1J\xec\x926\xb5a0\xa0B\xae|', 0x42, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d000000850000005000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xf4f3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r4}, 0x18) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000f00)='kfree\x00', r4}, 0x18) open(&(0x7f00000000c0)='.\x00', 0x51bd02, 0x44) (async) open(&(0x7f00000000c0)='.\x00', 0x51bd02, 0x44) mq_timedsend(r3, 0x0, 0x0, 0x6, 0x0) mq_timedreceive(r3, &(0x7f0000004600)=""/102381, 0xfffffceb, 0x0, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) r5 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r5, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) (async) move_mount(r5, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f0000000280)='./file0/file0\x00', 0x0, 0x1adc51, 0x0) mount$bind(&(0x7f00000000c0)='.\x00', &(0x7f0000000080)='./file0/file0/file0\x00', 0x0, 0x80700a, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000000)=@newtaction={0x8c, 0x30, 0xb, 0x0, 0x0, {}, [{0x78, 0x1, [@m_tunnel_key={0x0, 0x15, 0x0, 0x0, {{}, {0x0, 0x2, 0x0, 0x1, [@TCA_TUNNEL_KEY_ENC_IPV4_DST={0x0, 0x4, @broadcast}, @TCA_TUNNEL_KEY_ENC_IPV6_SRC={0x0, 0x5, @mcast2}]}, {0x0, 0x6, "fc8cda51a771734bab1ad932828e72280fd5c64b6edb3f6a0cc986e6d4136a8d91012178e85f61d81def3ee3cad5f3f6dff212d96324c6ab0f4a58a7eca1e4e3e3b4c7dda8c9e6144bb36d85ef1dc4500d9498b2890ae5f29c715c25ea8d7846028ae58ab470876a6a417527cc60505ba25b4693fdf4959224f1f96c6f40211cf0610d313e95d0406e59092aebd6661ad8a4bfe6029d1f5caa8d24de1a146b363828050dfbc1fbbc8a1929e1ae00002956e1"}, {0x0, 0x7, {0x1, 0x1}}, {0x0, 0x8, {0x1, 0x2}}}}]}]}, 0x8c}}, 0x0) 3m25.073550719s ago: executing program 5 (id=3927): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000001700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='itimer_state\x00', r1}, 0x10) setitimer(0x0, 0x0, 0x0) 3m24.850127142s ago: executing program 5 (id=3930): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x208, 0x98, 0x8, 0xfa04, 0x98, 0x6c02, 0x1e0, 0x194, 0x194, 0x1e0, 0x194, 0x3, 0x0, {[{{@ip={@broadcast, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'veth0_virt_wifi\x00', {}, {}, 0x6}, 0x0, 0x70, 0x98, 0x0, {0x0, 0x74020000}}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@multicast2, @dev, 0x0, 0x0, '\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x268) 3m24.849809082s ago: executing program 34 (id=3930): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r0}, 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x208, 0x98, 0x8, 0xfa04, 0x98, 0x6c02, 0x1e0, 0x194, 0x194, 0x1e0, 0x194, 0x3, 0x0, {[{{@ip={@broadcast, @broadcast, 0x0, 0x0, 'veth0_to_hsr\x00', 'veth0_virt_wifi\x00', {}, {}, 0x6}, 0x0, 0x70, 0x98, 0x0, {0x0, 0x74020000}}, @common=@inet=@TCPMSS={0x28}}, {{@ip={@multicast2, @dev, 0x0, 0x0, '\x00', 'batadv_slave_0\x00'}, 0x0, 0x70, 0xd8}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'snmp\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x268) 3m15.918602906s ago: executing program 6 (id=4110): syz_usb_connect(0x2, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="120100007e3dc410cd0621013ddd010203010902"], 0x0) syz_usb_connect$printer(0x2, 0x2d, &(0x7f0000000080)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0xff, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x3, 0x10, 0x40, [{{0x9, 0x4, 0x0, 0xa, 0x2, 0x7, 0x1, 0x2, 0x9, "", {{{0x9, 0x5, 0x1, 0x2, 0x40, 0x0, 0x7, 0x81}}}}}]}}]}}, 0x0) syz_usb_connect(0x3, 0x3d, &(0x7f00000002c0)=ANY=[], 0x0) syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x43}, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000240), &(0x7f00000003c0)=r5}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r4, r1, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x15, &(0x7f0000000300)={@random="6ea88d319b8c", @multicast, @val={@void, {0x8100, 0x0, 0x1, 0x4}}, {@x25={0x805, {0x0, 0x1, 0xb}}}}, 0x0) 3m15.028596208s ago: executing program 6 (id=4123): socket$packet(0x11, 0x2, 0x300) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1f0000000000000000000000000004e3ff0000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/24], 0x50) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000000c0)={0x1a, 0x5, &(0x7f0000000540)=ANY=[@ANYBLOB="160000000000000000000000000080001800000001c6e842000000004e0e00009500ff460000000076fdf8ea7f345cacd0356391b0131507b99970dee824743e25083595443b784cb7a854e57ead602fbb4df55c44b4ef78532ffbb0b76ad7cb48ef05c902f56f1d371b284d75b6ad4d8149900c5905f72e23f1084b043747d8fee5105c44d2"], &(0x7f0000000000)='syzkaller\x00', 0x4, 0x27, 0xfffffffffffffffc, 0x0, 0x19, '\x00', 0x0, 0x38, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='ns\x00') sendmsg$IPVS_CMD_ZERO(r3, &(0x7f0000000380)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000340)={&(0x7f0000000440)=ANY=[@ANYBLOB="97100000", @ANYRES16, @ANYBLOB="000426bd7000fbdbdf25100000000c000280060002004e22000008000500060000004400018008000b00736970000c0007002200000000000000080005000000000008000b00736970000c0007003c000000000000000700060073680000080009000a0000000800060066680000080005000700000008000400ff03000030000280080003000100000014000100e000000100000000000000000000000006000b0002000000080008000200000008000600040000000800040008000000080005000d0000003000038008000100010000001400060000000000000000000000ffffe000000108000100020000000600040006000000"], 0xfc}, 0x1, 0x0, 0x0, 0x20040041}, 0x40000000) ioctl$FS_IOC_GETVERSION(r2, 0x80087601, &(0x7f0000000300)) readlinkat(r4, &(0x7f0000000140)='./mnt\x00', &(0x7f0000000180)=""/10, 0xa) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x1000, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000640)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) name_to_handle_at(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000180), 0x0) open_by_handle_at(0xffffffffffffff9c, &(0x7f00000000c0)=ANY=[], 0x200000000000000) 3m14.998581779s ago: executing program 6 (id=4125): open(&(0x7f0000000040)='.\x00', 0x418601, 0x10) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x161281, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x10000000, 0x0, 0x0, 0x0, "0040001e1d113c812e5d6000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5434, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b00000"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r2}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000640)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0xfffffece, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x8, 0x0, 0x0, 0x1, 0x3}}, @TCA_CT_LABELS={0x0, 0x7, "be2908dda1566b6679c9eaaf48b78fec"}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xaf}, 0x1, 0x0, 0x0, 0x60000090}, 0x10000000) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r6 = fcntl$dupfd(r5, 0x0, r5) write$sndseq(r6, &(0x7f0000000180)=[{0xff, 0x0, 0x10, 0x0, @time={0x800, 0x400}, {0x6}, {}, @result={0x1, 0x2}}, {0x0, 0x0, 0xff, 0x3, @tick=0xf27, {0x1, 0x31}, {}, @queue={0x96, {0x9, 0x8}}}], 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r7}, 0x10) fadvise64(r3, 0x8, 0x0, 0x6) r8 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="bfc60000050000001fb98b812e2e1212d49ffa987b4d00000000000000000000000000980d00006997a72cb5042cc90000000000"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', 0xffffffffffffffff, 0x0, 0x8000000000000000}, 0x18) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) 3m14.93394823s ago: executing program 6 (id=4128): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(r1, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) 3m14.91127037s ago: executing program 6 (id=4129): r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x6, 0x10, &(0x7f0000000240)=@raw=[@tail_call={{0x18, 0x2, 0x1, 0x0, 0x1}}, @ldst={0x2, 0x1, 0x3, 0xa, 0x9, 0xfffffffffffffff8, 0xfffffffffffffffc}, @tail_call, @func={0x85, 0x0, 0x1, 0x0, 0x8}, @exit, @btf_id={0x18, 0x2, 0x3, 0x0, 0x1}, @kfunc={0x85, 0x0, 0x2, 0x0, 0x3}], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x1e, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f0000000300)={0x4, 0x2}, 0x8, 0x10, &(0x7f0000000340)={0x4, 0x8, 0x0, 0xa}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000380)=[0x1, 0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x1], &(0x7f00000003c0)=[{0x4, 0x3, 0x4, 0x6}, {0x3, 0x3, 0x9, 0x7}, {0x2, 0x5, 0x1, 0xb}], 0x10, 0x8, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000002c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {0x3}}, './file0\x00'}) getsockopt$PNPIPE_IFINDEX(r3, 0x113, 0x2, &(0x7f0000000540), &(0x7f0000000580)=0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) r4 = syz_io_uring_setup(0x34fc, &(0x7f0000000100)={0x0, 0x645e, 0x800, 0x400002, 0x250}, &(0x7f0000000400)=0x0, &(0x7f0000000200)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000240)=0xfffffc04, 0x0, 0x4) io_uring_register$IORING_REGISTER_PERSONALITY(r4, 0x9, 0x0, 0x0) syz_io_uring_submit(r5, r6, &(0x7f00000004c0)=@IORING_OP_FSYNC={0x3, 0x40, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x1, 0x1}) syz_io_uring_setup(0x3c00, &(0x7f00000005c0)={0x0, 0x8ecf, 0x1000, 0x1, 0x2ef}, 0x0, 0x0) (async) syz_io_uring_setup(0x3c00, &(0x7f00000005c0)={0x0, 0x8ecf, 0x1000, 0x1, 0x2ef}, 0x0, 0x0) io_uring_enter(r4, 0x47f6, 0x0, 0x0, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000b40)={&(0x7f0000000000)='kmem_cache_free\x00', r1, 0x0, 0x7ff}, 0x18) open(&(0x7f0000000300)='.\x00', 0x0, 0x0) (async) r7 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f00000001c0)=0x10) (async) ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f00000001c0)=0x10) creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) (async) creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x21081e, &(0x7f00000002c0), 0xfe, 0x4f2, &(0x7f0000000600)="$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") 3m14.724876472s ago: executing program 6 (id=4133): syz_usb_connect(0x2, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="120100007e3dc410cd0621013ddd010203010902"], 0x0) syz_usb_connect$printer(0x2, 0x2d, &(0x7f0000000080)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0xff, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x3, 0x10, 0x40, [{{0x9, 0x4, 0x0, 0xa, 0x2, 0x7, 0x1, 0x2, 0x9, "", {{{0x9, 0x5, 0x1, 0x2, 0x40, 0x0, 0x7, 0x81}}}}}]}}]}}, 0x0) syz_usb_connect(0x3, 0x3d, &(0x7f00000002c0)=ANY=[], 0x0) syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x43}, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000240), &(0x7f00000003c0)=r5}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r4, r1, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x15, &(0x7f0000000300)={@random="6ea88d319b8c", @multicast, @val={@void, {0x8100, 0x0, 0x1, 0x4}}, {@x25={0x805, {0x0, 0x1, 0xb}}}}, 0x0) 2m58.637300767s ago: executing program 35 (id=4133): syz_usb_connect(0x2, 0x2d, &(0x7f0000000000)=ANY=[@ANYBLOB="120100007e3dc410cd0621013ddd010203010902"], 0x0) syz_usb_connect$printer(0x2, 0x2d, &(0x7f0000000080)={{0x12, 0x1, 0x110, 0x0, 0x0, 0x0, 0xff, 0x525, 0xa4a8, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x1b, 0x1, 0x1, 0x3, 0x10, 0x40, [{{0x9, 0x4, 0x0, 0xa, 0x2, 0x7, 0x1, 0x2, 0x9, "", {{{0x9, 0x5, 0x1, 0x2, 0x40, 0x0, 0x7, 0x81}}}}}]}}]}}, 0x0) syz_usb_connect(0x3, 0x3d, &(0x7f00000002c0)=ANY=[], 0x0) syz_io_uring_setup(0x5c2, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x43}, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_generic(0x10, 0x3, 0x10) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) socket$nl_generic(0x10, 0x3, 0x10) socket$inet_udp(0x2, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='memory.events\x00', 0x275a, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000180)={'syz_tun\x00', 0x0}) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=@base={0xe, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0x10, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000000850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r5 = openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r3}, &(0x7f0000000240), &(0x7f00000003c0)=r5}, 0x20) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000000)={r4, r1, 0x25, 0x2, @void}, 0x10) syz_emit_ethernet(0x15, &(0x7f0000000300)={@random="6ea88d319b8c", @multicast, @val={@void, {0x8100, 0x0, 0x1, 0x4}}, {@x25={0x805, {0x0, 0x1, 0xb}}}}, 0x0) 2m55.387522494s ago: executing program 8 (id=4414): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) prlimit64(0x0, 0x2, &(0x7f0000000040)={0x0, 0xffffffffffffffff}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = mq_open(&(0x7f000084dff0)='\xa1sxt\x1a\x00\x00\x00\x00\x00\x00\x00\x01\x88\xbdd', 0x6e93ebbbcc0884f2, 0x100, &(0x7f0000000300)={0x0, 0x1, 0x3}) mq_timedsend(r1, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r1, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0xc000, 0x0, &(0x7f0000ff4000/0xc000)=nil) socket$igmp6(0xa, 0x3, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, 0x0, 0x0) syz_emit_ethernet(0xbe, &(0x7f0000000000)=ANY=[@ANYBLOB="aaabaaaaaaaa0180c20000000800450000b00000000000119078000000000000000000004e20009c907801000000000000007b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af584cbf2649a50f2dbc43efa8698dfa870300852e4451b57d037ad3c045942824251d7d17b5191584cdd4fbe40a27424dbcfd56f1373669caaa2f19935e6996c7096ffe3eea4745a8f762b9649a3bfbc1f39cb307b3472eb9cdb042d2643fcbb2c5a57df67d544af6e8dafe"], 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080004000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b, @void, @value}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x4, &(0x7f00000000c0)=ANY=[@ANYBLOB="1801000000001f00000000000000ea1f850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xec, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r4, 0x0, 0xffffffbffffffffc}, 0x18) ioctl$SIOCPNDELRESOURCE(r4, 0x89ef, &(0x7f00000006c0)=0x4) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x2e3, &(0x7f0000000280)="$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") stat(&(0x7f0000000b00)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r5, 0x0, r7, 0x0, 0x88000cc, 0x0) write$eventfd(r6, &(0x7f0000000240), 0xffffff14) getrlimit(0x1, &(0x7f0000000000)) syz_io_uring_setup(0x3c0c, &(0x7f0000000400)={0x0, 0xc890, 0x4002}, 0x0, 0x0) 2m54.368525948s ago: executing program 8 (id=4428): open(&(0x7f0000000040)='.\x00', 0x418601, 0x10) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000300), 0x161281, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000080)={0x0, 0x10000000, 0x0, 0x0, 0x0, "0040001e1d113c812e5d6000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETA(r1, 0x5434, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000000c0)={0x18, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000580)='sched_switch\x00', r2}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000640)=@newtaction={0x64, 0x30, 0xb, 0x0, 0x0, {}, [{0x50, 0x1, [@m_ct={0x4c, 0x1, 0x0, 0x0, {{0x7}, {0xfffffece, 0x2, 0x0, 0x1, [@TCA_CT_PARMS={0x18, 0x1, {0x8, 0x0, 0x0, 0x1, 0x3}}, @TCA_CT_LABELS={0x0, 0x7, "be2908dda1566b6679c9eaaf48b78fec"}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xaf}, 0x1, 0x0, 0x0, 0x60000090}, 0x10000000) socket$inet6_tcp(0xa, 0x1, 0x0) r5 = syz_open_dev$sg(0x0, 0x0, 0x8002) r6 = fcntl$dupfd(r5, 0x0, r5) write$sndseq(r6, &(0x7f0000000180)=[{0xff, 0x0, 0x10, 0x0, @time={0x800, 0x400}, {0x6}, {}, @result={0x1, 0x2}}, {0x0, 0x0, 0xff, 0x3, @tick=0xf27, {0x1, 0x31}, {}, @queue={0x96, {0x9, 0x8}}}], 0x38) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2500000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r7}, 0x10) fadvise64(r3, 0x8, 0x0, 0x6) r8 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000020"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001000000000000000640000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000005000000020000000400000005000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="bfc60000050000001fb98b812e2e1212d49ffa987b4d00000000000000000000000000980d00006997a72cb5042cc90000000000"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kfree\x00', 0xffffffffffffffff, 0x0, 0x8000000000000000}, 0x18) keyctl$KEYCTL_MOVE(0x1e, 0x0, 0xffffffffffffffff, 0x0, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000440), 0x2, 0x0) 2m54.309709939s ago: executing program 8 (id=4430): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xd, &(0x7f0000000940)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x64, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x2}, 0x18) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') execve(&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x0) 2m54.27973374s ago: executing program 8 (id=4433): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001400)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='fdinfo\x00') lseek(r1, 0x1, 0x0) getdents(r1, &(0x7f0000020940)=""/224, 0xe0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, 0x0, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) syz_mount_image$ext4(&(0x7f0000000440)='ext4\x00', &(0x7f00000000c0)='./file1\x00', 0x200000, &(0x7f0000000200), 0x3, 0x570, &(0x7f0000000680)="$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") r3 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x4181, 0x104) fallocate(r3, 0x8, 0x4020, 0x4000) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42031, 0xffffffffffffffff, 0x0) madvise(&(0x7f0000bc0000/0x400000)=nil, 0x400000, 0x9) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r5 = ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x54e3, 0x0) r6 = syz_clone(0x100000, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r6, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) r7 = creat(&(0x7f00000000c0)='./file0\x00', 0x271ae92ffd210aa4) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x203, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8, 0x0, 0xffffffffffffffff}, 0x13) syz_emit_ethernet(0x36, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa009569cb83c338"], 0x0) r9 = open_tree(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x80100) r10 = syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') getdents(r10, &(0x7f0000001fc0)=""/184, 0xb8) r11 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r11, &(0x7f00000000c0), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r11, 0x8933, &(0x7f0000000080)={'vxcan1\x00', 0x0}) sendmsg$can_bcm(r11, &(0x7f0000000000)={&(0x7f0000000040)={0x1d, r12, 0x2000000}, 0x10, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="0400"/16, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=r12, @ANYBLOB="000000000100000000000000840004"], 0x48}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000cc0)={0x11, 0x1e, &(0x7f0000000500)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}, {{0x18, 0x1, 0x1, 0x0, r10}}, {}, [@jmp={0x5, 0x1, 0x9, 0x6, 0x0, 0xffffffffffffffe0, 0x1}, @initr0={0x18, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4000000}, @printk={@lx, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x8}}, @map_idx={0x18, 0x2, 0x5, 0x0, 0x8}, @map_val={0x18, 0x0, 0x2, 0x0, r0, 0x0, 0x0, 0x0, 0x7}], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000380)='GPL\x00', 0x4, 0x3a, &(0x7f0000000400)=""/58, 0x41100, 0x44, '\x00', r12, @fallback=0x13, r7, 0x8, &(0x7f0000000600)={0x6, 0x3}, 0x8, 0x10, &(0x7f0000000640)={0x2, 0xd, 0xa, 0xd}, 0x10, 0x0, r9, 0x6, &(0x7f0000000c00)=[r7, r7, 0x1, r9, r9], &(0x7f0000000c40)=[{0x3, 0x3, 0x9, 0x1}, {0x1, 0xfffffe00, 0x10, 0x3}, {0x5, 0x4, 0x2, 0x3}, {0x3, 0x5, 0xa, 0x6}, {0x5, 0x5, 0x6, 0x8}, {0x0, 0x1, 0xc, 0x7}], 0x10, 0x3, @void, @value}, 0x94) sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000140)={&(0x7f0000000240)={0xf4, 0x0, 0x10, 0x70bd27, 0x25dfdbfb, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r5}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r7}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r2}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r9}}]}, 0xf4}}, 0x20000800) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) 2m54.104513723s ago: executing program 8 (id=4438): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(r0, &(0x7f0000019200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x34, r1, 0x200, 0x70bd2b, 0x25dfdbfc, {}, [@MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0xb5}, @MPTCP_PM_ATTR_LOC_ID={0x5}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x7f}, @MPTCP_PM_ATTR_LOC_ID={0x5, 0x5, 0x1}]}, 0x34}, 0x1, 0x0, 0x0, 0x4004090}, 0x4054) perf_event_open(&(0x7f0000000d00)={0x2, 0x80, 0x6c, 0x1, 0x0, 0x0, 0x0, 0x443e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x100400, 0x0, 0x0, 0x7, 0x0, 0x0, 0xfffe, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x6, &(0x7f0000001380)) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/ip_tables_names\x00') r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000780)='netlink_extack\x00', r3}, 0x10) r4 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r4, 0x10e, 0xc, &(0x7f00000000c0)={0x9}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r5 = getpid() sched_setscheduler(r5, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f0000000180)=@abs={0x0, 0x0, 0x4e22}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r6}, 0x10) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) pread64(r2, &(0x7f0000000200)=""/102400, 0x19000, 0x1000000000) 2m52.12557416s ago: executing program 8 (id=4522): r0 = socket(0x840000000002, 0x3, 0xff) r1 = socket$igmp6(0xa, 0x3, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x800, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x7, &(0x7f0000000380)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0xba}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x8b}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r3}, 0x18) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x80, 0x4) sendmmsg$inet6(r1, &(0x7f0000000000)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r4, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)=r5}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000080000000600000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003"], 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYRESHEX=r5, @ANYRESDEC, @ANYRESDEC=r7], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000080000000000180003801400038010"], 0x44}}, 0x0) recvfrom(r1, 0x0, 0x3600, 0x40002000, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x420, 0x2e8, 0xc0, 0x2e8, 0x250, 0x250, 0x388, 0x388, 0x388, 0x388, 0x388, 0x6, &(0x7f0000000080), {[{{@ip={@remote, @rand_addr=0x64010102, 0xffffff00, 0xffffffff, 'pimreg1\x00', 'team0\x00', {0xff}, {}, 0x2f, 0x2, 0x30}, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x4}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x40, 0x2}}}, {{@ip={@remote, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0xff, 'ip_vti0\x00', 'ipvlan0\x00', {0xff}, {0xff}, 0x16, 0x1, 0x8}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00', 0x0, {0x11, 0xfe, 0x1}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x2, [0x7, 0x8fa7387d78064a62, 0x1, 0x2, 0x4, 0x1], 0x5, 0x4}, {0xffffffffffffffff, [0x7, 0x1, 0x0, 0x1, 0x4, 0x7], 0x0, 0x5}}}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0xff, 0x1}}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0xc3, @local, 0x4e22}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x480) sendmmsg$inet(r0, &(0x7f0000003a40)=[{{&(0x7f00000003c0)={0x2, 0x1, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000540)="a9050000000074000000000035528c2771cc874d997efa5ff0850d2cf1bde5c064c60000", 0x24}], 0x1}}], 0x1, 0x840) 2m52.124882671s ago: executing program 36 (id=4522): r0 = socket(0x840000000002, 0x3, 0xff) r1 = socket$igmp6(0xa, 0x3, 0x2) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x800, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0xa, 0x7, &(0x7f0000000380)=@framed={{0x5, 0x0, 0x0, 0x0, 0x0, 0x63, 0x11, 0xba}, [@map_idx={0x18, 0x9, 0x5, 0x0, 0x7}, @call={0x85, 0x0, 0x0, 0x8b}, @exit], {0x95, 0x0, 0x5a5}}, &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r3}, 0x18) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000080)=0x80, 0x4) sendmmsg$inet6(r1, &(0x7f0000000000)=[{{&(0x7f00000001c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c, 0x0}}], 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x3, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r4, 0xffffffffffffffff}, &(0x7f0000000280), &(0x7f00000002c0)=r5}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) bpf$MAP_CREATE(0x100000000000000, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000080000000600000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000003"], 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffc, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYRESHEX=r5, @ANYRESDEC, @ANYRESDEC=r7], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r10, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='D\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="0100000000000000000005000000180001801400020073797a5f74756e000000080000000000180003801400038010"], 0x44}}, 0x0) recvfrom(r1, 0x0, 0x3600, 0x40002000, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000580)=@mangle={'mangle\x00', 0x1f, 0x6, 0x420, 0x2e8, 0xc0, 0x2e8, 0x250, 0x250, 0x388, 0x388, 0x388, 0x388, 0x388, 0x6, &(0x7f0000000080), {[{{@ip={@remote, @rand_addr=0x64010102, 0xffffff00, 0xffffffff, 'pimreg1\x00', 'team0\x00', {0xff}, {}, 0x2f, 0x2, 0x30}, 0x0, 0x98, 0xc0, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x4}}]}, @ECN={0x28, 'ECN\x00', 0x0, {0x0, 0x40, 0x2}}}, {{@ip={@remote, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x0, 0xff, 'ip_vti0\x00', 'ipvlan0\x00', {0xff}, {0xff}, 0x16, 0x1, 0x8}, 0x0, 0x70, 0x98}, @ECN={0x28, 'ECN\x00', 0x0, {0x11, 0xfe, 0x1}}}, {{@uncond, 0x0, 0x98, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x1}}]}, @common=@SET={0x60, 'SET\x00', 0x0, {{0x2, [0x7, 0x8fa7387d78064a62, 0x1, 0x2, 0x4, 0x1], 0x5, 0x4}, {0xffffffffffffffff, [0x7, 0x1, 0x0, 0x1, 0x4, 0x7], 0x0, 0x5}}}}, {{@uncond, 0x0, 0x70, 0x98}, @inet=@TOS={0x28, 'TOS\x00', 0x0, {0xff, 0x1}}}, {{@uncond, 0x0, 0x70, 0xa0}, @TPROXY={0x30, 'TPROXY\x00', 0x0, {0x8, 0xc3, @local, 0x4e22}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x480) sendmmsg$inet(r0, &(0x7f0000003a40)=[{{&(0x7f00000003c0)={0x2, 0x1, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000540)="a9050000000074000000000035528c2771cc874d997efa5ff0850d2cf1bde5c064c60000", 0x24}], 0x1}}], 0x1, 0x840) 2m49.151720193s ago: executing program 7 (id=4572): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000400)=ANY=[@ANYRES64=0x0], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES64=r0, @ANYRES8=r0], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f00000002c0)='./file0\x00', 0x120040a, &(0x7f0000000240), 0x2, 0x24d, &(0x7f0000000440)="$eJzs3T9oJFUcB/DvzO4ac7fIqY0g/gER0UA4O8HmbBQO5DhEBBVORGyUixAT7LJWNhZaq6SyCWJntJQ0wUYRrKKmiI2gwcJgocXK7iQSNytqNtk5Mp8PTGYm89783rDzfbvN7AZorAtJLiVpJZlL0klSHG5wb7Vc2N9dnd28lvT7T/1SDNtV+5WDfueT9JI8kmSjLPJKO1lef27nt60nHnh7qXP/h+vPzk71Ivft7mw/uffBlbc+ufzw8lff/HSlyKV0/3ZdJ68Y8792kdx2GsVuEEW77hHwX1x94+NvB7m/Pcl9w/x3UqZ68d5ZvGmjk4fe/6e+7/789Z3THCtw8vr9zuA9sNcHGqdM0k1Rzieptstyfr76DP9d61z56sLi63MvLyxdf6numQo4Kd1k+/HPZj49P5L/H1tV/oGza5D/p6+ufT/Y3muNHOzP1DMo4HTdVa0G+Z97YeXBjMs/cKbJPzSX/ENzyT80l/xDc8k/NJf8wxnWOdjojT0s/9Bc8g/NJf/QXIfzDwA0S3+m7ieQgbrUPf8AAAAAAAAAAAAAAAAAAABHrc5uXjtYplXzi/eS3ceStMfVbw1/jzi5efj33K/FoNlfiqrbRJ6/Z8ITTOijmp++vuWHeut/eXe99VeuJ703k1xst4/ef8X+/Xd8t/7L8c6LExb4n4qR/UefmW79UX+s1Vv/8lby+WD+uThu/ilzx3A9fv7pHv6K5WN67fcJTwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAMDU/BkAAP//d4lu0g==") open(&(0x7f0000000480)='.\x00', 0x0, 0x0) r2 = io_uring_setup(0x3b72, &(0x7f0000000800)={0x0, 0xddcb, 0x4000, 0x2, 0x260}) r3 = syz_io_uring_setup(0x832, &(0x7f0000000300)={0x0, 0x0, 0x10100, 0x0, 0x0, 0x0, r2}, &(0x7f0000000100)=0x0, &(0x7f0000000080)=0x0) socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$xdp(0x2c, 0x3, 0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r3, 0x16, &(0x7f0000000380)={&(0x7f0000001000)={[{0x0, 0x0, 0x1}, {0x0}, {0x0}, {0x0}]}, 0x4}, 0x1) r6 = socket$rds(0x15, 0x5, 0x0) syz_io_uring_submit(r4, r5, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x2, r6, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1}) clock_gettime(0x0, &(0x7f00000000c0)) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) memfd_create(&(0x7f0000000bc0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x00\x00.\xd4`=z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x80\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xad\b\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc00x0, &(0x7f0000000080)=0x0) io_uring_register$IORING_REGISTER_PBUF_RING(r0, 0x16, &(0x7f0000000380)={&(0x7f0000001000)={[{0x0, 0x0, 0x1}, {0x0}, {0x0}, {0x0}]}, 0x4}, 0x1) r3 = socket$rds(0x15, 0x5, 0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECVMSG={0xa, 0x20, 0x2, r3, 0x0, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x0, 0x1}) memfd_create(&(0x7f0000000bc0)='[\v\xdbX\xae[\x1a\xa9\xfd\xfa\xad\xd1md\xc8\x85HX\xa9%\f\x1ae\xe0\x00\x00\x00\x00\xfb\xff\x00\x00\x81\x9eG\xd9,\xe2\xc6a\x9f\xe8\xf1\xb3\x86\xe2+Op\xd0\xa2\x82\x1eb;(\xb5\xe1jS\xd6\x91%||\xa0\x8ez\xadT\xc8\f\xe5\x89\xbf#2\x99\x1e\xa1`\xc3\xcf\xd3\xae\xd2\a\x11\xa9\xa5^\xff\xf5\x95\f<\x8f\xc1\x99\x89r\xe1?\xbdu\x98\xc3\xf8\xd2Q#\xc6g\xa0\x85\xd6G\x85\x11X\x8d,\x02\xd45\xb8\xca\x97\x9d\xcb\x1e\x80\xd6\xd5>N&\xf8#\x80z8Z\xd2}\xf5\xe4\x9f5\x9b\x01\xf9t\xbb\x1er\x14\xdb\xd3\xcd\xfd\xbdnC\xec\x8aog\x87BR\x9d\xad\xd4FcB\xda\x95\xc3\xdd\x9d\x8f\x1a\xce\x18\x80\"j\xe1\xba\x1e\x97uX\xccv\xd6\vcz\x92A^\xbc\xceF\xf7\xe5:\xaf\xc5~\xbcJ e\r\x88c\x9d\xb92\xb6i4zq\xb3c\x0f\xb2t\x93\xf2E6b\xfa\xcdJ5\xe3W]`4\xd8D\x05\v\xfc)\xca\xedQ\xd0]Ot\'\xc2tDF\xf9\xa7\xb5(\x83\xa5\x0f\x1d\x1d\x06Dg\x13>\x19\xe85#\aaT\x89=\x104\xd5\x85Q\x96\x91\xea\x172P\xb3:\xadZ\xbc\xbe\x00\xf0\x14\x96\xd9M\xd7\x88QZs\xb2\xe1+$jfQodH\x05/y`~Mx\x02\x00(v\xe6`\x026\xfcgC\xb5\xf0\x13.zb\xc5bj+@\x00\x00\x00\x00\x00\x00\x00.\xd4`=z\xd1n\x8d\x8f\xa5hS\x8e[\xb3\xa3\x87\xb9\xe2_Z\x11\xef\xc2]V\xf3\x03\x94\xb9\xe1\xa68\x8d\\\xe5\xef\xacpM\xf0\xa6\x04\x10\xb7\xc0t\x83\\\xf7\x12k\x9f\x10\xd5Z\x19\xc1\xc1\x80\\o\x97\xce=U\xdd\xaa\x1b\x05\x14\x13\xa6\xbd#\xde\x04\xe6$\xec$3\xf6\x97\xc6\xeaSL\xb7A72M\x88k@\xe5\xa3\n&\x1e\xc84\xa9\xe2\xccM\x906\x95xQ-2p\xd62\'\xec\x0f\x13;I\x95fE_\r\xe7\t!A\x05\xe4\x8f\x9e0\xf8/T\x18\xf7\xa1\x9f\xde1\xd5\x80<\xf5\b\xa9\xec\x85\xaeW\xb3\xd8#)bn \xfb\xf2\x88\xfaR\xff\xdd\x80\x96_\xec5\xf0\x1c\a\x8a\x80\x00@=\r8u+%f:\x1e\x82\xfap\xf6\x89\xea\xba\xe3\xbbM%F\xdb\\\xd1eJJ*\xc67\xca\x03\xa3\xf7(\xbb\xecN\xd4\xe7\xf2:u\x8a\b\xd5\v\xca\xfd\\\xd6\xe3\x05\xb3\x03\xd5\xe0\xd2\xf2{\'\x8b\xdf\xa1\xbe}\xb2\xe4y\xbb\xe6\x1f\x10c\xf5WQ\x82\x04\x01C\x83,\x90\x1a\xfa\x8e\x17\x89\xe2\xedX\x8d\rmq\t\xb5$\xb4\x9b\x92z\xd6/-\x13,\xb5%\x8eM/\x04\xa7\x7f\x1b\x85\xf1\xa4X\x17\xbb\x1cR14\xfb!\b\x10\xe8\xb2\xd41gK\xe4\xea\xe39d\bL\xe5\x1b\xbd[\x9bWD:\r&\xe9\vn^\xcc\x86\xe3\xce1>3{\xaa{\xbd0P\x9f\xa68\xf5\x82\xb8\x9aD\x9c{\xe6\xf8\xcbD\xb5aJ\xb0\x92\x89\xbc\x80\x1ch\x89\xe7\xdd]q,\xec\xc4\xa5\x93\xe5,\x0e,>/\xaf|\xf0\x01V\x7f\xc9?\xba\x16\xe4$+}5dy\xb1\xef\xf1m\xa5\x94d9\xaf\xcfq\x8b=\x026\xef\r\x91\x18\xc5\xb6\xb9fM\x8ayZ\xbcd\xa5\x8a\x88\x98\xc3\xfc`\xa6\xba\x1f\x17\v$\x88g\xb4\xad\b\xc1\xddW\xa6\xc1\xb7\xb0\xa3\x84Q\x13GoU\xe2\xb7\x03\x9c\xd5\x0f\xa8\x0ef\"\x15\x82\xe7\xbd\xf8\xca\x10f\xfe6h\xe9\xc3\xc2\xa0O:\xac~\x1a\xf7\xbeF\xbe\xe5\xf0\x81\xd6&\xc00x0}) sendmsg$can_bcm(r6, &(0x7f0000000000)={&(0x7f0000000040)={0x1d, r7, 0x2000000}, 0x10, &(0x7f0000000180)={&(0x7f0000000340)=ANY=[@ANYBLOB="0400"/16, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=r7, @ANYBLOB="000000000100000000000000840004"], 0x48}}, 0x0) 2m48.577988761s ago: executing program 7 (id=4584): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000040)={0x3, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=ANY=[@ANYBLOB="020300031200000000000000000000000400090088000000e3d36433c4920893924540ac18fabaf0c70000000000000005000600000000000a0000000000000000000000000000000000000000000000000000000000000002000100000000000000020c0000000005000500000000000a"], 0x90}, 0x1, 0x7}, 0x0) 2m48.165988737s ago: executing program 7 (id=4589): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(r1, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) 2m48.165726927s ago: executing program 37 (id=4589): bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_WOL_GET(r1, 0x0, 0x0) bpf$BPF_GET_MAP_INFO(0xf, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) 8.47538295s ago: executing program 0 (id=7081): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000380)={0xa, 0x14e24}, 0x1c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg$inet6(r1, 0x0, 0x0, 0xc8040) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x1, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b70400000000000085"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3, 0x0, 0x2}, 0x18) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) splice(r1, 0x0, r0, 0x0, 0x7ffff000, 0x6) pipe2$9p(&(0x7f0000000000), 0x0) 5.208022967s ago: executing program 0 (id=7113): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0xe2b, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x9}, 0x10182}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x800000000001}, 0x1180, 0x5dd8, 0x0, 0x8, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 5.133764697s ago: executing program 9 (id=7118): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000400000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000b800000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f00000002c0)='kmem_cache_free\x00', r2}, 0x18) sendmsg$NFT_BATCH(r0, &(0x7f0000000000)={0x0, 0xf5ff, &(0x7f0000000040)={&(0x7f0000000100)=ANY=[@ANYBLOB="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"], 0x122}}, 0x10) 5.049286518s ago: executing program 9 (id=7119): munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) r1 = fcntl$dupfd(r0, 0x0, r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x0, &(0x7f0000000140)}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) write$selinux_load(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757875c5a9645328cd14a335b84f4589e6939244c483230d87a12d07fcdeeb933a589423b1ef844ad6e3706324888f77a382f005d7d42e6f4f4cb31bbed8f5e794081380039ab5041c940845f72c67fabeca8643d00286938dfccbaf73fb1edd9d43a44ab316c0833d821482cb84e32f82638b40d738e3f3c0c4b5e7f466a91905e8a79e49cf06be1196693ade833af5309e0c4ce2289fe0bec15496f937273cb929220c002b203da469ba8b730a92486a2515d7fc944ed49b99ca154ecb5eb7141a6f6542f4dc1680276cf412ac"], 0xdc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000640)={{0x2, 0x0, r5, 0x0, 0x0, 0x49, 0x6}, 0x81, 0x5, 0x8001, 0x1, 0x0, 0x0, 0x9}) setresuid(r4, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000cc0), &(0x7f0000000c80)='./file1\x00', 0x1004491, &(0x7f0000000380)=ANY=[], 0x2, 0x826, &(0x7f00000012c0)="$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") sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x24040840) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x0, 0xb, 0x0, 0x0, 0x7995}, 0xfcb5, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) 4.96217035s ago: executing program 0 (id=7120): bpf$PROG_LOAD(0x5, &(0x7f00000009c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18060000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000003000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x3, 0x0, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file1\x00', 0x8000, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2b2, &(0x7f0000000880)="$eJzs3NFLU28cx/Hvz6mbE91+EEFB9aVu6uag6w+oEQrRoDAn1UVwzLMaO21yzlgsIncT3fZ3SJfdBdU/4E100313EgTdeBGd8Jwd3XTa1M2t+X6BnO/xeT4+jzrlewSf9XtvnhZyrpEzyzIUUxkSqcmGSHKzqvuvfh3y61FpVJMr4z+/nrt7/8GtdCYzM6c6m56/mlLVyQsfnr14e/FTeXzh3eT7qKwlH67/SH1bO712Zv33/JO8q3lXi6WymrpYKpXNRdvSpbxbMFTv2JbpWpovupbTNJ6zS8vLVTWLSxPxZcdyXTWLVS1YVS2XtOxU1Xxs5otqGIZOxOVkG25jTnZ1bs5M7znsRTq6I3RetPl2rNUcx0nXWg9mV7u1LwAA0L/27/+DXn/v/j+zEFw73P+L0P93Sa3p7i/9PwaC46TNeP3ntxn9PwAAAAAAAAAAAAAAAAAAAAAA/4INz0t4npcIr+FbVERiIhLe93qf6I5Dfv+v9Wi76LCGf9yLidivK9lKNrgG4+mc5MUWS6YkIb/810NdUM/ezMxMqW+k/iE38yuVbMQ/m8DPh5Kt8uf/nw7yKh83c5V6fkTijeunJCGnWq+f2s6HxyGsVLKjcvlSQ96QhHx+JCWxZcl/XW/nX06r3rid2bH+mD8PAAAAAIBBYOiWZPPzb3D2o+FPiMnu8SB/gL8P7Hi+Hpaz7RxRCQAAAAAAjsytPi+Ytm05hyiiInKE+KAWEemLbeworotIH2zjuIqYiATv0cPEv2/F20p5bcwZFpGef1kOUPT6NxMAAACATttu+g8Q+vKqizsCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAODkafc8sHD+rqFwYJ94w3KRY/8EAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgD7yJwAA//+j7Rqj") r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_elf32(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="7f454c4605030908770000000000000003000600155eef2e5a020002380000000b03010008000000e10a200003000100070403000000420e0400000009000000ffff000020000000010400000080000005000000010000000100000003000000bd0400000700100003000000fffbffff000000000800000003"], 0x98) close(r0) execve(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) 4.896621171s ago: executing program 9 (id=7121): r0 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x10000) ioctl$GIO_UNIMAP(r0, 0x4b66, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000500), 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x200000a, 0x80010, r0, 0xcee2a000) perf_event_open(&(0x7f0000000fc0)={0x4, 0x80, 0x10, 0xfc, 0x0, 0x0, 0x0, 0x8, 0x6108, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000700), 0x3}, 0x0, 0xfffffffffffffffe, 0x3, 0x1, 0x0, 0xd}, 0x0, 0x6, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x14, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000900)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000000000000000000001000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x18, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000500)={&(0x7f0000000280)='netlink_extack\x00', r3}, 0x10) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000600)=ANY=[@ANYBLOB="54010000100001000000000000000000fe8000000000000000000000000000aaff01000000000000000000000000000100000000000000000000800000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000000000000000000000000000000000000032000000ac1414bb000000000000000000000000feffffffffffffff000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000075ca000000000000000000000600000000000000000000000000000002000400af00000000000000480002"], 0x154}}, 0x200080c0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x6f9e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x1, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x8002, 0x0, 0x0, 0x7, 0x0, 0x1, 0xfffd, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r5, 0x0, 0x40, &(0x7f0000000140)=@raw={'raw\x00', 0x8, 0x3, 0x490, 0x360, 0xa, 0x148, 0x360, 0x60, 0x3f8, 0x2a8, 0x2a8, 0x3f8, 0x2a8, 0x3, 0x0, {[{{@ip={@multicast2, @multicast2, 0x0, 0x0, 'bridge0\x00', 'rose0\x00'}, 0x0, 0x2f8, 0x360, 0x0, {0x200003ae, 0x7f00}, [@common=@inet=@hashlimit1={{0x58}, {'veth1_to_team\x00', {0x0, 0x0, 0x2, 0x0, 0x4, 0xffffffff, 0x7}}}, @common=@unspec=@bpf1={{0x230, 'bpf\x00', 0x0}, @pinned={0x1, 0x8601, 0x6, './file0\x00'}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x1, 0x6, 0x3, 0x81, 'snmp_trap\x00', 'syz0\x00', {0x30f6a663}}}}, {{@ip={@empty, @empty, 0x0, 0x0, 'syzkaller0\x00', 'veth0_to_team\x00'}, 0x0, 0x70, 0x98}, @common=@unspec=@MARK={0x28}}], {{'\x00', 0xc8, 0x70, 0x98}, {0x28}}}}, 0x4f0) syz_open_procfs(0x0, &(0x7f0000000140)='cgroup\x00') r6 = socket$inet6_sctp(0xa, 0x801, 0x84) sendto$inet6(r6, 0x0, 0x0, 0x80c1, &(0x7f00000001c0)={0xa, 0xfffc, 0x400, @remote, 0xffffffff}, 0x1c) openat$pidfd(0xffffffffffffff9c, 0x0, 0x800, 0x0) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) socket$can_raw(0x1d, 0x3, 0x1) openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r7 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$IP_VS_SO_SET_ADD(r7, 0x0, 0x482, &(0x7f0000000040)={0x84, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e26, 0x3, 'dh\x00', 0x1, 0x7, 0x4b}, 0x2c) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x42032, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x108c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffff6, 0x4}, 0x100000, 0x0, 0x0, 0x3, 0x2, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) 4.877003551s ago: executing program 0 (id=7122): syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x1004800, &(0x7f0000000340), 0x1, 0x5a6, &(0x7f00000020c0)="$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") bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x50) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0, 0xffffffffffffffff}, 0x4) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0a000000050000000200000007"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000640), &(0x7f0000000740), 0x20075, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0xfffffffffffffe8b, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) setgroups(0x400000000000026f, &(0x7f0000000080)=[0x0, 0xee00]) r5 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc4}, &(0x7f0000000100)={0x0, "de442bfc7910e10ac69ac014b0fa7807b11d2c99ed1f40d47a6edb3367b5cc888e1fd5102ae2d3d05f251f8d49025ceab4152b6e6d87cd6088e97a9d06d29143"}, 0x48, 0xffffffffffffffff) keyctl$chown(0x4, r5, 0xee01, 0xee00) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='sys_enter\x00', r4}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000a80)='kfree\x00', 0xffffffffffffffff, 0x0, 0x68f}, 0x18) kexec_load(0x4, 0xa, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x200001bd, &(0x7f0000000400)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000640)='f2fs_filemap_fault\x00', r3}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r6, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r6, &(0x7f0000000140)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r6, 0x6, 0x16, &(0x7f0000000180)=[@window={0x3, 0x9, 0x1}, @mss={0x2, 0x1}, @mss={0x2, 0x81}, @sack_perm, @timestamp, @timestamp, @mss={0x2, 0xfffffffc}, @timestamp], 0x8) getsockopt$inet_tcp_buf(r6, 0x6, 0xb, 0x0, &(0x7f00000014c0)) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000600)={{r1}, &(0x7f0000000540), &(0x7f00000005c0)='%-5lx \x00'}, 0x20) r7 = signalfd4(0xffffffffffffffff, &(0x7f00000000c0), 0x8, 0x0) faccessat2(r7, &(0x7f0000001400)='\x00', 0x0, 0x1100) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000340)='timer_start\x00'}, 0x10) 4.796748422s ago: executing program 9 (id=7123): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000380)={0xa, 0x14e24}, 0x1c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) sendmmsg$inet6(r1, 0x0, 0x0, 0xc8040) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x1, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b70400000000000085"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3, 0x0, 0x2}, 0x18) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) splice(r1, 0x0, r0, 0x0, 0x7ffff000, 0x6) pipe2$9p(&(0x7f0000000000), 0x0) 3.932704864s ago: executing program 0 (id=7126): pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000380)={0xa, 0x14e24}, 0x1c) connect$inet6(r1, &(0x7f00000002c0)={0xa, 0x4e24}, 0x1c) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='\v\x00\x00\x00\b\x00\x00\x00\f'], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x1, r2}, 0x38) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3, 0x0, 0x2}, 0x18) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) splice(r1, 0x0, r0, 0x0, 0x7ffff000, 0x6) 2.535293614s ago: executing program 3 (id=7141): socket$igmp(0x2, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x5, 0x7, 0x8, 0x5, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) unlink(0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0xfffffffe}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r3, 0xc0105500, &(0x7f00000001c0)={0x0, 0x1, 0x8, 0x3, 0x0, 0x0, 0x0}) syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x42, 0x0, 0x0) 2.483194715s ago: executing program 2 (id=7142): munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) r1 = fcntl$dupfd(r0, 0x0, r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x0, &(0x7f0000000140)}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) write$selinux_load(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757875c5a9645328cd14a335b84f4589e6939244c483230d87a12d07fcdeeb933a589423b1ef844ad6e3706324888f77a382f005d7d42e6f4f4cb31bbed8f5e794081380039ab5041c940845f72c67fabeca8643d00286938dfccbaf73fb1edd9d43a44ab316c0833d821482cb84e32f82638b40d738e3f3c0c4b5e7f466a91905e8a79e49cf06be1196693ade833af5309e0c4ce2289fe0bec15496f937273cb929220c002b203da469ba8b730a92486a2515d7fc944ed49b99ca154ecb5eb7141a6f6542f4dc1680276cf412ac"], 0xdc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000640)={{0x2, 0x0, r5, 0x0, 0x0, 0x49, 0x6}, 0x81, 0x5, 0x8001, 0x1, 0x0, 0x0, 0x9}) setresuid(r4, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000cc0), &(0x7f0000000c80)='./file1\x00', 0x1004491, &(0x7f0000000380)=ANY=[], 0x2, 0x826, &(0x7f00000012c0)="$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") sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x24040840) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x0, 0xb, 0x0, 0x0, 0x7995}, 0xfcb5, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) 2.373693527s ago: executing program 2 (id=7143): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0xbb) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r3}, 0x10) listen(r1, 0x3) 2.246416218s ago: executing program 2 (id=7144): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000100)="de17945db0fd7ba4d5bf97bc0ab98aa7e96541", 0x45, r0}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f0000000600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1, 0x0, 0x3}, 0x18) socket$inet(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f0000000180)={0xa, 0x4e22, 0x4, @loopback}, 0x1c) listen(r3, 0x5) accept4(r3, 0x0, 0x0, 0x80800) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r4, 0x0, 0x0, 0x24040014, &(0x7f0000000000)={0xa, 0x4e22, 0x0, @empty}, 0x1c) sendmsg$nl_route_sched(r2, 0x0, 0x0) gettid() r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$can_j1939(0x1d, 0x2, 0x7) ioctl$ifreq_SIOCGIFINDEX_vcan(r6, 0x8933, &(0x7f00000000c0)={'vcan0\x00', 0x0}) bind$can_j1939(r6, &(0x7f0000000340)={0x1d, r7, 0x0, {0x2, 0x0, 0x6}, 0xfe}, 0x18) setsockopt$sock_int(r6, 0x1, 0x6, &(0x7f0000000040)=0x1, 0x4) sendmsg$inet(r6, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000000540)="81b641f1f3843704b6", 0x9}], 0x1}, 0x4048081) connect$can_j1939(r6, 0x0, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000005000)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x74, r7, {0xfffd, 0x89c77fb34cc3db7f}, {0xa, 0x1}, {0xfff2, 0x7}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x4012}, 0x850) 1.951935813s ago: executing program 1 (id=7145): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000004c0)='dlm_send\x00'}, 0xfffffffffffffefb) r1 = socket$inet6(0xa, 0x3, 0xff) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r2, 0xffffffffffffffff}, &(0x7f0000000700), &(0x7f0000000340)}, 0x20) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_dev$loop(0x0, 0xd, 0x401) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) mkdir(0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'veth1_to_hsr\x00', 0x0}) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000000000)=0xf3f, 0x4) socket$packet(0x11, 0xa, 0x300) sendto$packet(r6, &(0x7f00000000c0)="3f031c000302140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r7, 0x1, 0x0, 0x6, @multicast}, 0x14) syz_emit_ethernet(0x4e, &(0x7f0000001bc0)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}, @void, {@ipv6={0x86dd, @udp={0x4, 0x6, "6598bc", 0x18, 0x11, 0x1, @ipv4={'\x00', '\xff\xff', @remote}, @empty, {[], {0x4e24, 0x4e24, 0x18, 0x0, @wg=@data={0x4, 0x0, 0x905}}}}}}}, 0x0) signalfd(r6, &(0x7f0000000380)={[0x6b48b951]}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8, 0x0, 0x10000002}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r3}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r9, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038002e001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000)=0x80, 0x4) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 1.895401073s ago: executing program 1 (id=7146): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x2, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) prlimit64(0x0, 0x2, &(0x7f0000000040)={0x0, 0xffffffffffffffff}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = mq_open(&(0x7f000084dff0)='\xa1sxt\x1a\x00\x00\x00\x00\x00\x00\x00\x01\x88\xbdd', 0x6e93ebbbcc0884f2, 0x100, &(0x7f0000000300)={0x0, 0x1, 0x3}) mq_timedsend(r1, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r1, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0xc000, 0x0, &(0x7f0000ff4000/0xc000)=nil) socket$igmp6(0xa, 0x3, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, 0x0, 0x0) syz_emit_ethernet(0xbe, &(0x7f0000000000)=ANY=[@ANYBLOB="aaabaaaaaaaa0180c20000000800450000b00000000000119078000000000000000000004e20009c907801000000000000007b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af584cbf2649a50f2dbc43efa8698dfa870300852e4451b57d037ad3c045942824251d7d17b5191584cdd4fbe40a27424dbcfd56f1373669caaa2f19935e6996c7096ffe3eea4745a8f762b9649a3bfbc1f39cb307b3472eb9cdb042d2643fcbb2c5a57df67d544af6e8dafe09"], 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000a40)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080004000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r3, @ANYBLOB="0000000000000000b704000008000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b, @void, @value}, 0x94) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xec, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r4, 0x0, 0xffffffbffffffffc}, 0x18) ioctl$SIOCPNDELRESOURCE(r4, 0x89ef, &(0x7f00000006c0)=0x4) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000600)='./file0\x00', 0xc8d0, &(0x7f0000000140)=ANY=[@ANYRES8=0x0], 0x1, 0x2e3, &(0x7f0000000280)="$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") stat(&(0x7f0000000b00)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r5, 0x0, r7, 0x0, 0x88000cc, 0x0) write$eventfd(r6, &(0x7f0000000240), 0xffffff14) getrlimit(0x1, &(0x7f0000000000)) syz_io_uring_setup(0x3c0c, &(0x7f0000000400)={0x0, 0xc890, 0x4002}, 0x0, 0x0) 1.372024901s ago: executing program 9 (id=7147): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) bind$inet6(r0, &(0x7f00004b8fe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000600)={0x0, 0x247}, &(0x7f0000000640)=0x8) 1.339307061s ago: executing program 2 (id=7148): bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000001c0)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300", 0xffffffff}, 0x48, 0xffffffffffffffff) r0 = socket$nl_rdma(0x10, 0x3, 0x14) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) r1 = syz_open_dev$vcsn(&(0x7f0000000300), 0x4, 0x82582) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)={0x14, r3, 0x1, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x20000) sendmsg$IPVS_CMD_NEW_DAEMON(r1, &(0x7f0000000640)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000600)={&(0x7f0000000500)=ANY=[@ANYRES32, @ANYRESHEX=r2, @ANYBLOB="000028bd7000fddbdf25090000000800050005000000080005000600000040000280df1affdc4e21000006000f000300000206000f000b000000080006000d00000006000b000200000014000100fc000000000000000000000000000001"], 0x64}, 0x1, 0x0, 0x0, 0x4044000}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r6 = timerfd_create(0x0, 0x0) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000d00)=""/161, 0xa1}, {0x0}], 0x2) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="180000000f1401002bbd7000fadbdf2508004500e0ae3baa"], 0x18}, 0x1, 0x0, 0x0, 0x20040045}, 0x4000) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "6035ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r8, 0x0, 0xffffffffffffffff}, 0x18) r9 = socket$inet(0x2, 0x2, 0x1) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x4000) sendmsg$inet(r9, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0xffff, @multicast2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f00000004c0)="1ed8b7f9d457", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[], 0x48) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0), &(0x7f0000000140), 0x5, r10}, 0x38) 1.036512715s ago: executing program 3 (id=7149): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24040800}, 0x8d0) 1.016486226s ago: executing program 3 (id=7150): r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000002c0)={'bridge_slave_0\x00', 0x0}) r2 = socket(0x10, 0x80002, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r3 = syz_open_dev$ttys(0xc, 0x2, 0x1) ioctl$TCSETS(r3, 0x5402, &(0x7f0000000000)={0x400, 0x400, 0x5, 0x3, 0x10, "d2ec05e220e147f722195186a55930ac341180"}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0xfc, 0x0, 0x0, 0x0, 0xff, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100002, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r5}, 0x10) syz_emit_ethernet(0x3e, &(0x7f0000000100)={@multicast, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x8, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @local}, @time_exceeded={0x3, 0x5, 0x0, 0x3, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x1, 0x65, 0x0, 0x1, 0x2f, 0x0, @dev={0xac, 0x14, 0x14, 0xb}, @remote}}}}}}, 0x0) syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x414, &(0x7f0000000000)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000f40)="$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") mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) sendmsg$nl_route(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000280)=ANY=[@ANYBLOB="440000001100a7cc4a372eaf541d002007000000", @ANYRES32=r1, @ANYBLOB="00000000100000001c001a80", @ANYRES16=r2, @ANYRES32=r2], 0x44}, 0x1, 0x0, 0x0, 0x8010}, 0x0) 996.138046ms ago: executing program 3 (id=7151): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x41000, 0x8, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r0}, 0x10) prlimit64(0x0, 0x2, &(0x7f0000000040)={0x0, 0xffffffffffffffff}, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r1 = mq_open(&(0x7f000084dff0)='\xa1sxt\x1a\x00\x00\x00\x00\x00\x00\x00\x01\x88\xbdd', 0x6e93ebbbcc0884f2, 0x100, &(0x7f0000000300)={0x0, 0x1, 0x3}) mq_timedsend(r1, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r1, 0x0, 0x0, 0x0, 0x0) mq_timedreceive(r1, &(0x7f0000000180)=""/204, 0xcc, 0x0, 0x0) mremap(&(0x7f0000ff8000/0x3000)=nil, 0x3000, 0xc000, 0x0, &(0x7f0000ff4000/0xc000)=nil) socket$igmp6(0xa, 0x3, 0x2) r2 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r2, 0x0, 0x0) syz_emit_ethernet(0xbe, &(0x7f0000000000)=ANY=[@ANYBLOB="aaabaaaaaaaa0180c20000000800450000b00000000000119078000000000000000000004e20009c907801000000000000007b4b143b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af584cbf2649a50f2dbc43efa8698dfa870300852e4451b57d037ad3c045942824251d7d17b5191584cdd4fbe40a27424dbcfd56f1373669caaa2f19935e"], 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6b, @void, @value}, 0x94) ioctl$SIOCPNDELRESOURCE(0xffffffffffffffff, 0x89ef, &(0x7f00000006c0)=0x4) stat(&(0x7f0000000b00)='./file0\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x26e1, 0x0) pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) splice(r3, 0x0, r5, 0x0, 0x88000cc, 0x0) write$eventfd(r4, &(0x7f0000000240), 0xffffff14) syz_io_uring_setup(0x3c0c, &(0x7f0000000400)={0x0, 0xc890, 0x4002}, 0x0, 0x0) 987.251216ms ago: executing program 1 (id=7152): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000ac0)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x8004}, 0x20000000) rmdir(0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_script(r1, &(0x7f0000000740)={'#! ', '', [{0x20, '\x05R\xd6\xa9#hcK\xee%J\xd6\xa0] \x1c8\x8e\ah\xe3\xb5@\xd9W\x99\xa5\x16\xf7VV\xef9\xa4L\x05\xeb\x02\x00\x00\x00\x00\x00\x00\x00\xf2\t\x1c\xf5\xb0!\xc1\"\x9dty\xd0\xb3\x00a\x03\x00A\xb5\xa81:\xcdaVD\"q\xa7)S+W\xb4\xf7S\xf3s\xac\xfc\xffR\xd3v\xef\xe7\xc6\xf4\t\xb5\x9cx\x06\xf9\xf4\xb0u\x02\x8f\xb6\xcf\\\x10\xfb\xc3\x83\xad\xb4U\x10\x8f\x96\x9c\bC\xf2\x0e\xef/B\x0e\xe8\xbar\x87\xcbX\x01pn\x1a\"am\x1d\xffz\xea\xd2\xe6\xdd\x86\xa5\x16\f\a\xd9m\x9da\xe2\xb9\xcew9,g\x1ax\x1d%\xa17\vXO\x86J\x8aD\xea\xd3,Hc\x01\x02<\xff4\xe4\xea\x94sj\xc4F\xc1\xab\xf5\xc4Q\x05\xdb\xe4^#5\x80\x00\x00\x00\x00\x00\x00\x00\xfe\x8c\xe0,\xdf\xfbBsf\xb0\x0f\x1a\xf1\xc3\xeb\xb7N\xd8\x15\xd1\x18H\xc9\x96\xee\xf5.NJ\xc2\x14\x1c\t\n\x1d\xa5\x1d\xe6cY\x1d\xc0a\x8c\xd8f\xd5>G\x80d\xf2&m\xd5\x9f\xe6q\xab\xf1V2\xc1CB\xaf\xa3\xda\xa5bd\x11\x96\x9f\x9em4|\x87\x83\xc1\xa2C\xd0Lv\x87h\xb1\x11\xc2\xb0\xff\x06\xb8\xae\xf4Z\xb5d[\xa3eY15\x0f\"\x8e*\x9f\xdc0\x0f\x04\xad\xc1\xda>~\xb0\x1e\xc6H\xde2/\xec\xc4\'`\x1a\xcc\xc6\xd4a\x8e+\xabXy\xc1K7#'}]}, 0x169) close(r1) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x400000, 0x5, 0x0, "ff00f7000000000000000000af88008300"}) syz_open_pts(r2, 0x141601) openat$cgroup_int(r1, &(0x7f0000000080)='blkio.reset_stats\x00', 0x2, 0x0) r3 = socket$isdn(0x22, 0x3, 0x23) close_range(0xffffffffffffffff, r3, 0x2) ioctl$EXT4_IOC_GET_ES_CACHE(r2, 0xc020662a, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="18010000bc0000000000000000030000850000007b00000095", @ANYRES64=r2, @ANYBLOB="e60cef854db5c6932b0faa3cfe983d38a0d79fdd1e5391d75592349e37c5d94fdd1cc93c740b749d653a64f1329d1ee5e15da83545853423c835310f24ec8de84192b9d3947eac7f92ce01b89dae9d3077c01a84748e66e2941013b4d8e1b823454d67e4035bd04919bae3c1abe6ff962d938fa0310a1a13fedf8ee50a8284d66045d8ba3adca453c98e30a151316771984271a325a89e951c0535480ae417be9e4223184ab58fc31ec9dbf100ad2019a21bffcca826ad38fba3400d0c757085a9cd0fd857931417dba14279", @ANYRES16], &(0x7f0000000100)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r4, 0x0, 0x3}, 0x18) r5 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) setsockopt$TIPC_GROUP_JOIN(0xffffffffffffffff, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) close(r5) 974.472537ms ago: executing program 1 (id=7153): munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r0 = syz_open_dev$usbfs(&(0x7f0000000100), 0x205, 0x8401) r1 = fcntl$dupfd(r0, 0x0, r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000300)={0x0, &(0x7f0000000140)}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x4, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000080)='percpu_create_chunk\x00', r3}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xa, 0x101, 0x7fff, 0xcc, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4, 0x0, 0x0, @void, @value, @void, @value}, 0x50) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f00000000c0)=0xc) write$selinux_load(r1, &(0x7f00000006c0)=ANY=[@ANYBLOB="8cff7cf9080000005345204c696e757875c5a9645328cd14a335b84f4589e6939244c483230d87a12d07fcdeeb933a589423b1ef844ad6e3706324888f77a382f005d7d42e6f4f4cb31bbed8f5e794081380039ab5041c940845f72c67fabeca8643d00286938dfccbaf73fb1edd9d43a44ab316c0833d821482cb84e32f82638b40d738e3f3c0c4b5e7f466a91905e8a79e49cf06be1196693ade833af5309e0c4ce2289fe0bec15496f937273cb929220c002b203da469ba8b730a92486a2515d7fc944ed49b99ca154ecb5eb7141a6f6542f4dc1680276cf412ac"], 0xdc) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000500)={0x0, 0x0, 0x0}, &(0x7f0000000540)=0xc) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000640)={{0x2, 0x0, r5, 0x0, 0x0, 0x49, 0x6}, 0x81, 0x5, 0x8001, 0x1, 0x0, 0x0, 0x9}) setresuid(r4, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000cc0), &(0x7f0000000c80)='./file1\x00', 0x1004491, &(0x7f0000000380)=ANY=[], 0x2, 0x826, &(0x7f00000012c0)="$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") sendmsg$TEAM_CMD_OPTIONS_SET(0xffffffffffffffff, 0x0, 0x24040840) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) ioctl$USBDEVFS_SUBMITURB(r1, 0x8038550a, &(0x7f0000000000)=@urb_type_control={0x2, {}, 0x0, 0x0, &(0x7f0000000080)={0x0, 0xb, 0x0, 0x0, 0x7995}, 0xfcb5, 0x0, 0x0, 0x48000000, 0x0, 0x0, 0x0}) 913.048528ms ago: executing program 1 (id=7154): socket$igmp(0x2, 0x3, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = socket$tipc(0x1e, 0x5, 0x0) bind$tipc(r1, &(0x7f0000000000)=@nameseq={0x1e, 0x1, 0x0, {0x41}}, 0x10) listen(r1, 0x0) r2 = accept(r1, &(0x7f00000001c0)=@can={0x1d, 0x0}, &(0x7f0000000240)=0x80) r4 = socket$tipc(0x1e, 0x5, 0x0) sendmsg$tipc(r4, &(0x7f0000000080)={&(0x7f0000000040)=@id={0x1e, 0x3, 0x1, {0x4e24}}, 0xffffffffffffff44, 0x0, 0x0, 0x0, 0x0, 0x480c0}, 0xc0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000580)=@expire={0x16c, 0x18, 0x1, 0x70bd26, 0x25dfdbfe, {{{@in=@private=0xa010100, @in6=@mcast1, 0x4e20, 0x3, 0x4e20, 0x0, 0xa, 0x80, 0xa0, 0x2e, 0x0, r6}, {@in6=@local, 0x4d5, 0x2b}, @in6=@empty, {0x3, 0x1, 0x5, 0x2, 0x3, 0xc, 0x80, 0x9}, {0xb88, 0x1000000000000000, 0xffffffffffffffff, 0xbf1}, {0x3, 0x0, 0x4}, 0x70bd2d, 0x0, 0x2, 0x0, 0x4, 0x10}, 0x2}, [@coaddr={0x14, 0xe, @in6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}, @XFRMA_SET_MARK={0x8, 0x1d, 0x1}, @XFRMA_SET_MARK={0x8, 0x1d, 0x7}, @lifetime_val={0x24, 0x9, {0xffffffffffffffff, 0x1473, 0x100000001, 0x1}}, @coaddr={0x14, 0xe, @in=@loopback}, @offload={0xc, 0x1c, {r3, 0x2}}, @offload={0xc, 0x1c, {r3, 0x1}}]}, 0x16c}, 0x1, 0x0, 0x0, 0x8000}, 0x400a801) rt_sigpending(0x0, 0x0) 623.485601ms ago: executing program 0 (id=7155): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_GET_BYNAME(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000ac0)=ANY=[@ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0x8004}, 0x20000000) rmdir(0x0) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000000)={0xffffffffffffffff}, 0x4) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) write$binfmt_script(r1, &(0x7f0000000740)={'#! ', '', [{0x20, '\x05R\xd6\xa9#hcK\xee%J\xd6\xa0] \x1c8\x8e\ah\xe3\xb5@\xd9W\x99\xa5\x16\xf7VV\xef9\xa4L\x05\xeb\x02\x00\x00\x00\x00\x00\x00\x00\xf2\t\x1c\xf5\xb0!\xc1\"\x9dty\xd0\xb3\x00a\x03\x00A\xb5\xa81:\xcdaVD\"q\xa7)S+W\xb4\xf7S\xf3s\xac\xfc\xffR\xd3v\xef\xe7\xc6\xf4\t\xb5\x9cx\x06\xf9\xf4\xb0u\x02\x8f\xb6\xcf\\\x10\xfb\xc3\x83\xad\xb4U\x10\x8f\x96\x9c\bC\xf2\x0e\xef/B\x0e\xe8\xbar\x87\xcbX\x01pn\x1a\"am\x1d\xffz\xea\xd2\xe6\xdd\x86\xa5\x16\f\a\xd9m\x9da\xe2\xb9\xcew9,g\x1ax\x1d%\xa17\vXO\x86J\x8aD\xea\xd3,Hc\x01\x02<\xff4\xe4\xea\x94sj\xc4F\xc1\xab\xf5\xc4Q\x05\xdb\xe4^#5\x80\x00\x00\x00\x00\x00\x00\x00\xfe\x8c\xe0,\xdf\xfbBsf\xb0\x0f\x1a\xf1\xc3\xeb\xb7N\xd8\x15\xd1\x18H\xc9\x96\xee\xf5.NJ\xc2\x14\x1c\t\n\x1d\xa5\x1d\xe6cY\x1d\xc0a\x8c\xd8f\xd5>G\x80d\xf2&m\xd5\x9f\xe6q\xab\xf1V2\xc1CB\xaf\xa3\xda\xa5bd\x11\x96\x9f\x9em4|\x87\x83\xc1\xa2C\xd0Lv\x87h\xb1\x11\xc2\xb0\xff\x06\xb8\xae\xf4Z\xb5d[\xa3eY15\x0f\"\x8e*\x9f\xdc0\x0f\x04\xad\xc1\xda>~\xb0\x1e\xc6H\xde2/\xec\xc4\'`\x1a\xcc\xc6\xd4a\x8e+\xabXy\xc1K7#'}]}, 0x169) close(r1) r2 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000140)={0x0, 0x0, 0x400000, 0x5, 0x0, "ff00f7000000000000000000af88008300"}) syz_open_pts(r2, 0x141601) openat$cgroup_int(r1, &(0x7f0000000080)='blkio.reset_stats\x00', 0x2, 0x0) r3 = socket$isdn(0x22, 0x3, 0x23) close_range(0xffffffffffffffff, r3, 0x2) ioctl$EXT4_IOC_GET_ES_CACHE(r2, 0xc020662a, &(0x7f0000000340)={0x4, 0x2d, 0x2, 0x7fff, 0x2, 0x0, [{0x2, 0x6, 0x43c7, '\x00', 0x8e}, {0x3, 0xb7ba110, 0x8, '\x00', 0x284}]}) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x4, &(0x7f00000008c0)=ANY=[@ANYBLOB="18010000bc0000000000000000030000850000007b00000095", @ANYRES64=r2, @ANYBLOB="e60cef854db5c6932b0faa3cfe983d38a0d79fdd1e5391d75592349e37c5d94fdd1cc93c740b749d653a64f1329d1ee5e15da83545853423c835310f24ec8de84192b9d3947eac7f92ce01b89dae9d3077c01a84748e66e2941013b4d8e1b823454d67e4035bd04919bae3c1abe6ff962d938fa0310a1a13fedf8ee50a8284d66045d8ba3adca453c98e30a151316771984271a325a89e951c0535480ae417be9e4223184ab58fc31ec9dbf100ad2019a21bffcca826ad38fba3400d0c757085a9cd0fd857931417dba14279", @ANYRES16], &(0x7f0000000100)='GPL\x00', 0x9, 0x0, 0x0, 0x41100, 0x6, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000040)='kfree\x00', r4, 0x0, 0x3}, 0x18) r5 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) r6 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) close(r5) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) bind$inet6(r7, &(0x7f0000000280)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) sendto$inet6(r7, &(0x7f00000002c0)="9e", 0x1, 0x0, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @loopback, 0xe}, 0x1c) sendmsg$inet(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000040)=[{&(0x7f0000000540)='`', 0x1}], 0x1}, 0x4010) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, &(0x7f0000000300)={0x0, 0x200003, 0x20}, 0xc) setsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r7, 0x84, 0x72, 0x0, 0x0) 495.832053ms ago: executing program 9 (id=7156): bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f00000001c0)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300", 0xffffffff}, 0x48, 0xffffffffffffffff) r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000040), 0x8) syz_open_dev$vcsn(0x0, 0x4, 0x82582) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000440)={0x14, r3, 0x1, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x20000) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYRESDEC=r1, @ANYRES32=r1, @ANYBLOB="0000000000000080b7080000000000007b8af8ff00000000bfa20000000000000766f8fc10a90000000000000004000100000095000000000000e1330d13950f9d120000000000e9ffffc0d89626e801ced23653f522b77b27cce3c51c6b558dbc0ec0af91963b4b90a0817af450d2b3a261367ff3a2"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = gettid() timer_create(0x0, &(0x7f0000000000)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r6 = timerfd_create(0x0, 0x0) readv(r6, &(0x7f0000000380)=[{&(0x7f0000000d00)=""/161, 0xa1}, {0x0}], 0x2) sendmsg$RDMA_NLDEV_CMD_GET_CHARDEV(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000340)=ANY=[@ANYBLOB="180000000f1401002bbd7000fadbdf2508004500e0ae3baa"], 0x18}, 0x1, 0x0, 0x0, 0x20040045}, 0x4000) add_key$fscrypt_v1(&(0x7f0000000040), &(0x7f0000000080)={'fscrypt:', @desc2}, &(0x7f00000000c0)={0x0, "f1a1173fb9462d3589e67197f90be6e423ceb0ab4912f9f6a31854ec98e950cfed21fcad7ff0fbcb566a0982f8938caa52dd8d39af14c31ed56ad59300"}, 0x52ba, 0xffffffffffffffff) add_key$fscrypt_v1(&(0x7f0000000400), &(0x7f0000000440)={'fscrypt:', @desc1}, &(0x7f0000000480)={0x0, "6035ae1e0fe721441705322225930e6c1e3e2a51a92fd796bc34d7cf6e0236805b4377f7ab1a9b01c103a4c6a7ef54e6763fd7264c39ea00c508ba6062696138"}, 0x48, 0xfffffffffffffffe) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000c00)=ANY=[@ANYBLOB="05000000040000000800000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = socket$inet(0x2, 0x2, 0x1) sendmsg$NL80211_CMD_DEL_TX_TS(0xffffffffffffffff, 0x0, 0x4000) sendmsg$inet(r8, &(0x7f0000000600)={&(0x7f0000000040)={0x2, 0xffff, @multicast2}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f00000004c0)="1ed8b7f9d457", 0x6}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[], 0x48) 432.412714ms ago: executing program 2 (id=7157): r0 = socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000002c0)='kfree\x00', r1}, 0x18) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000400), r0) sendmsg$ETHTOOL_MSG_CHANNELS_GET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000180)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010326bd6000000000002d"], 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x20040814) 410.163224ms ago: executing program 2 (id=7158): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x3, &(0x7f0000000480)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000100)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r1, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000d80)="bc14", 0x2}], 0x1, 0x0, 0x0, 0x4000010}, 0x4000001) r2 = open(&(0x7f0000000080)='./bus\x00', 0x400141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x580000a, 0x13, r2, 0x0) pwritev2(r2, &(0x7f0000000440)=[{&(0x7f00000000c0)='3', 0x1}, {&(0x7f0000001580)="bd", 0x1}, {&(0x7f0000000240)="9bc43d0db0", 0x5}], 0x3, 0x1002020, 0x1020884, 0x12) syz_emit_ethernet(0x7f, &(0x7f0000000080)={@link_local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x13}, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "ecff80", 0x49, 0x11, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @mcast2, {[], {0x0, 0x4e22, 0x49, 0x0, @opaque="a69e56041bb9bfae698b437c9a369928daa857cf153975e8dd77fef49d8cfa94846d73823ef2efd8dc8a80ac74703c7745af69607106a5176e740c1d4696ad2656"}}}}}}, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000880)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000040)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) syz_init_net_socket$x25(0x9, 0x5, 0x0) recvmsg$unix(r0, &(0x7f0000000580)={0x0, 0x0, 0x0}, 0x10002) 91.904759ms ago: executing program 3 (id=7159): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000040)={0x1, &(0x7f0000000340)=[{0x6, 0x0, 0x0, 0x67b}]}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f00000004c0)='dlm_send\x00'}, 0xfffffffffffffefb) r1 = socket$inet6(0xa, 0x3, 0xff) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000500)={{r2, 0xffffffffffffffff}, &(0x7f0000000700), &(0x7f0000000340)}, 0x20) r4 = bpf$PROG_LOAD(0x5, 0x0, 0x0) syz_open_dev$loop(0x0, 0xd, 0x401) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000800)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) mkdir(0x0, 0x0) r6 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f00000001c0)={'veth1_to_hsr\x00', 0x0}) setsockopt$packet_int(r6, 0x107, 0xf, &(0x7f0000000000)=0xf3f, 0x4) socket$packet(0x11, 0xa, 0x300) sendto$packet(r6, &(0x7f00000000c0)="3f031c000302140006001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c1511fdf9435e3ffe46", 0xe90c, 0x0, &(0x7f0000000540)={0xc9, 0x0, r7, 0x1, 0x0, 0x6, @multicast}, 0x14) syz_emit_ethernet(0x4e, &(0x7f0000001bc0)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x3a}, @void, {@ipv6={0x86dd, @udp={0x4, 0x6, "6598bc", 0x18, 0x11, 0x1, @ipv4={'\x00', '\xff\xff', @remote}, @empty, {[], {0x4e24, 0x4e24, 0x18, 0x0, @wg=@data={0x4, 0x0, 0x905}}}}}}}, 0x0) signalfd(r6, &(0x7f0000000380)={[0x6b48b951]}, 0x8) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r8, 0x0, 0x10000002}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000440)={{r3}, &(0x7f00000003c0), &(0x7f0000000400)}, 0x20) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000), 0x4) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r9, &(0x7f0000000080)={0x0, 0x74, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038002e001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) setsockopt$inet6_int(r1, 0x29, 0x16, &(0x7f0000fcb000)=0x80, 0x4) sendto$inet6(r0, &(0x7f0000847fff)='X', 0xfee4, 0x0, &(0x7f000005ffe4)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) 41.13962ms ago: executing program 3 (id=7160): socket$igmp(0x2, 0x3, 0x2) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=@base={0x5, 0x7, 0x8, 0x5, 0x80, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f00000000c0)=ANY=[@ANYBLOB="58000000020605000000000000000000000000000900020073797a3100000000050005000a000000050001000600000013000300686173683a6e65742c696661636500000c0007800800124005000000050004"], 0x58}, 0x1, 0x0, 0x0, 0x1}, 0x800) unlink(0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = syz_open_dev$usbfs(&(0x7f0000000100), 0x77, 0x101301) ioctl$USBDEVFS_CONTROL(r3, 0xc0105500, &(0x7f00000001c0)={0x0, 0x1, 0x8, 0x3, 0x0, 0x0, 0x0}) syz_init_net_socket$x25(0x9, 0x5, 0x0) mq_open(0x0, 0x42, 0x0, 0x0) 0s ago: executing program 1 (id=7161): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000280)={0x1c, 0x3, 0x6, 0x5, 0x0, 0x0, {0x0, 0x0, 0x6}, [@IPSET_ATTR_PROTOCOL={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x24040800}, 0x8d0) kernel console output (not intermixed with test programs): 12 bytes leftover after parsing attributes in process `syz.1.6647'. [ 453.069099][T22938] EXT4-fs (loop0): free_blocks=66060288 [ 453.069121][T22938] EXT4-fs (loop0): dirty_blocks=16 [ 453.130931][T22955] FAULT_INJECTION: forcing a failure. [ 453.130931][T22955] name failslab, interval 1, probability 0, space 0, times 0 [ 453.135889][T22938] EXT4-fs (loop0): Block reservation details [ 453.135903][T22938] EXT4-fs (loop0): i_reserved_data_blocks=1 [ 453.215989][T22955] CPU: 1 UID: 0 PID: 22955 Comm: syz.1.6649 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 453.216077][T22955] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 453.216089][T22955] Call Trace: [ 453.216096][T22955] [ 453.216104][T22955] __dump_stack+0x1d/0x30 [ 453.216126][T22955] dump_stack_lvl+0xe8/0x140 [ 453.216229][T22955] dump_stack+0x15/0x1b [ 453.216245][T22955] should_fail_ex+0x265/0x280 [ 453.216269][T22955] should_failslab+0x8c/0xb0 [ 453.216288][T22955] __kvmalloc_node_noprof+0x126/0x4f0 [ 453.216312][T22955] ? rhashtable_init_noprof+0x316/0x4f0 [ 453.216343][T22955] rhashtable_init_noprof+0x316/0x4f0 [ 453.216362][T22955] rhltable_init_noprof+0x1d/0x40 [ 453.216379][T22955] nf_tables_newtable+0x522/0xea0 [ 453.216404][T22955] nfnetlink_rcv+0xb99/0x1690 [ 453.216478][T22955] netlink_unicast+0x59e/0x670 [ 453.216499][T22955] netlink_sendmsg+0x58b/0x6b0 [ 453.216522][T22955] ? __pfx_netlink_sendmsg+0x10/0x10 [ 453.216565][T22955] __sock_sendmsg+0x142/0x180 [ 453.216595][T22955] ____sys_sendmsg+0x31e/0x4e0 [ 453.216689][T22955] ___sys_sendmsg+0x17b/0x1d0 [ 453.216727][T22955] __x64_sys_sendmsg+0xd4/0x160 [ 453.216866][T22955] x64_sys_call+0x2999/0x2fb0 [ 453.216893][T22955] do_syscall_64+0xd2/0x200 [ 453.216915][T22955] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 453.216951][T22955] ? clear_bhb_loop+0x40/0x90 [ 453.216970][T22955] ? clear_bhb_loop+0x40/0x90 [ 453.216987][T22955] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 453.217031][T22955] RIP: 0033:0x7f38ec18e969 [ 453.217046][T22955] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 453.217105][T22955] RSP: 002b:00007f38ea7f7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 453.217125][T22955] RAX: ffffffffffffffda RBX: 00007f38ec3b5fa0 RCX: 00007f38ec18e969 [ 453.217139][T22955] RDX: 0000000000000000 RSI: 00002000000004c0 RDI: 0000000000000005 [ 453.217156][T22955] RBP: 00007f38ea7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 453.217167][T22955] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 453.217182][T22955] R13: 0000000000000000 R14: 00007f38ec3b5fa0 R15: 00007ffc3a307be8 [ 453.217198][T22955] [ 453.446865][T22955] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6649'. [ 453.455776][T22955] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6649'. [ 453.468970][ T5374] EXT4-fs (loop0): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1 with error 28 [ 453.515544][T22962] loop0: detected capacity change from 0 to 128 [ 453.522888][T22962] FAT-fs (loop0): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 453.535002][T22962] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 453.567442][ T5374] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 453.621696][T22975] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6654'. [ 453.850628][T22983] netlink: 64 bytes leftover after parsing attributes in process `syz.1.6658'. [ 453.859630][T22983] netlink: 64 bytes leftover after parsing attributes in process `syz.1.6658'. [ 453.869518][T22983] sg_write: data in/out 2012/14 bytes for SCSI command 0x0-- guessing data in; [ 453.869518][T22983] program syz.1.6658 not setting count and/or reply_len properly [ 453.956748][T22986] loop1: detected capacity change from 0 to 128 [ 454.468886][T22997] openvswitch: netlink: Message has 6 unknown bytes. [ 454.576502][T23007] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 454.631581][T23015] sg_write: data in/out 2012/14 bytes for SCSI command 0x0-- guessing data in; [ 454.631581][T23015] program syz.3.6669 not setting count and/or reply_len properly [ 454.887861][T23029] serio: Serial port ptm0 [ 455.024952][T23036] loop9: detected capacity change from 0 to 736 [ 455.194690][T23046] sg_write: data in/out 2012/14 bytes for SCSI command 0x0-- guessing data in; [ 455.194690][T23046] program syz.9.6681 not setting count and/or reply_len properly [ 455.395173][T23051] loop9: detected capacity change from 0 to 128 [ 455.401750][T23051] FAT-fs (loop9): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 455.413835][T23051] FAT-fs (loop9): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 455.474626][T23054] loop0: detected capacity change from 0 to 128 [ 455.626212][ T4328] FAT-fs (loop9): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 455.718451][T23073] xt_hashlimit: max too large, truncated to 1048576 [ 455.725839][T23073] FAULT_INJECTION: forcing a failure. [ 455.725839][T23073] name failslab, interval 1, probability 0, space 0, times 0 [ 455.738540][T23073] CPU: 0 UID: 0 PID: 23073 Comm: syz.3.6692 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 455.738563][T23073] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 455.738575][T23073] Call Trace: [ 455.738582][T23073] [ 455.738588][T23073] __dump_stack+0x1d/0x30 [ 455.738609][T23073] dump_stack_lvl+0xe8/0x140 [ 455.738637][T23073] dump_stack+0x15/0x1b [ 455.738646][T23073] should_fail_ex+0x265/0x280 [ 455.738664][T23073] should_failslab+0x8c/0xb0 [ 455.738676][T23073] kmem_cache_alloc_noprof+0x50/0x310 [ 455.738747][T23073] ? getname_kernel+0x3c/0x1f0 [ 455.738761][T23073] getname_kernel+0x3c/0x1f0 [ 455.738773][T23073] kern_path+0x23/0x130 [ 455.738849][T23073] bpf_prog_get_type_path+0x45/0x1c0 [ 455.738861][T23073] ? strnlen+0x28/0x50 [ 455.738877][T23073] bpf_mt_check_v1+0xee/0x260 [ 455.738888][T23073] xt_check_match+0x2ad/0x4f0 [ 455.738920][T23073] ? xt_find_match+0x1d1/0x210 [ 455.738932][T23073] ? xt_find_match+0x1b5/0x210 [ 455.738953][T23073] translate_table+0xa9c/0xf90 [ 455.738969][T23073] ? _copy_from_user+0x89/0xb0 [ 455.738982][T23073] do_ipt_set_ctl+0x66f/0x820 [ 455.738997][T23073] nf_setsockopt+0x196/0x1b0 [ 455.739061][T23073] ip_setsockopt+0x102/0x110 [ 455.739073][T23073] udp_setsockopt+0x99/0xb0 [ 455.739084][T23073] sock_common_setsockopt+0x66/0x80 [ 455.739103][T23073] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 455.739176][T23073] __sys_setsockopt+0x184/0x200 [ 455.739199][T23073] __x64_sys_setsockopt+0x64/0x80 [ 455.739222][T23073] x64_sys_call+0x2bd5/0x2fb0 [ 455.739239][T23073] do_syscall_64+0xd2/0x200 [ 455.739290][T23073] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 455.739355][T23073] ? clear_bhb_loop+0x40/0x90 [ 455.739367][T23073] ? clear_bhb_loop+0x40/0x90 [ 455.739386][T23073] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 455.739397][T23073] RIP: 0033:0x7fde07dce969 [ 455.739406][T23073] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 455.739416][T23073] RSP: 002b:00007fde06437038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 455.739488][T23073] RAX: ffffffffffffffda RBX: 00007fde07ff5fa0 RCX: 00007fde07dce969 [ 455.739536][T23073] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000008 [ 455.739545][T23073] RBP: 00007fde06437090 R08: 0000000000000548 R09: 0000000000000000 [ 455.739593][T23073] R10: 0000200000002480 R11: 0000000000000246 R12: 0000000000000001 [ 455.739647][T23073] R13: 0000000000000000 R14: 00007fde07ff5fa0 R15: 00007ffd76e467b8 [ 455.739695][T23073] [ 456.349404][T23085] loop0: detected capacity change from 0 to 1024 [ 456.357386][T23085] ext4: Unknown parameter 'func' [ 456.635882][ T29] kauditd_printk_skb: 481 callbacks suppressed [ 456.635934][ T29] audit: type=1326 audit(1748679712.161:39974): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23095 comm="syz.9.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6464b6e969 code=0x7ffc0000 [ 456.705844][ T29] audit: type=1326 audit(1748679712.189:39975): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23095 comm="syz.9.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6464b6e969 code=0x7ffc0000 [ 456.729682][ T29] audit: type=1326 audit(1748679712.189:39976): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23095 comm="syz.9.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6464b6e969 code=0x7ffc0000 [ 456.753283][ T29] audit: type=1326 audit(1748679712.189:39977): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23095 comm="syz.9.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6464b6e969 code=0x7ffc0000 [ 456.777112][ T29] audit: type=1326 audit(1748679712.189:39978): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23095 comm="syz.9.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6464b6e969 code=0x7ffc0000 [ 456.800665][ T29] audit: type=1326 audit(1748679712.189:39979): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23095 comm="syz.9.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6464b6e969 code=0x7ffc0000 [ 456.824306][ T29] audit: type=1326 audit(1748679712.189:39980): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23095 comm="syz.9.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6464b6e969 code=0x7ffc0000 [ 456.848124][ T29] audit: type=1326 audit(1748679712.189:39981): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23095 comm="syz.9.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7f6464b6e969 code=0x7ffc0000 [ 456.943033][ T29] audit: type=1326 audit(1748679712.423:39982): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23095 comm="syz.9.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6464b6e969 code=0x7ffc0000 [ 456.969540][ T29] audit: type=1326 audit(1748679712.423:39983): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23095 comm="syz.9.6701" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6464b6e969 code=0x7ffc0000 [ 457.264364][T23099] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 457.269807][T23080] syz.3.6695 (23080) used greatest stack depth: 4872 bytes left [ 457.327941][T23101] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 457.540181][T23120] FAULT_INJECTION: forcing a failure. [ 457.540181][T23120] name failslab, interval 1, probability 0, space 0, times 0 [ 457.552973][T23120] CPU: 1 UID: 0 PID: 23120 Comm: syz.2.6711 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 457.552996][T23120] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 457.553026][T23120] Call Trace: [ 457.553030][T23120] [ 457.553035][T23120] __dump_stack+0x1d/0x30 [ 457.553048][T23120] dump_stack_lvl+0xe8/0x140 [ 457.553059][T23120] dump_stack+0x15/0x1b [ 457.553129][T23120] should_fail_ex+0x265/0x280 [ 457.553146][T23120] should_failslab+0x8c/0xb0 [ 457.553159][T23120] kmem_cache_alloc_node_noprof+0x57/0x320 [ 457.553175][T23120] ? __alloc_skb+0x101/0x320 [ 457.553194][T23120] __alloc_skb+0x101/0x320 [ 457.553207][T23120] __ip6_append_data+0x194b/0x23d0 [ 457.553221][T23120] ? __pfx_raw6_getfrag+0x10/0x10 [ 457.553280][T23120] ? xfrm_lookup_with_ifid+0x10c2/0x1360 [ 457.553292][T23120] ? __rcu_read_unlock+0x4f/0x70 [ 457.553303][T23120] ? __pfx_ip6_mtu+0x10/0x10 [ 457.553317][T23120] ? ip6_mtu+0xf5/0x120 [ 457.553411][T23120] ip6_append_data+0x13b/0x250 [ 457.553429][T23120] ? __pfx_raw6_getfrag+0x10/0x10 [ 457.553455][T23120] rawv6_sendmsg+0xdba/0xf70 [ 457.553508][T23120] ? __pfx_rawv6_sendmsg+0x10/0x10 [ 457.553524][T23120] inet_sendmsg+0xc5/0xd0 [ 457.553621][T23120] __sock_sendmsg+0x102/0x180 [ 457.553638][T23120] ____sys_sendmsg+0x31e/0x4e0 [ 457.553725][T23120] ___sys_sendmsg+0x17b/0x1d0 [ 457.553746][T23120] __x64_sys_sendmsg+0xd4/0x160 [ 457.553810][T23120] x64_sys_call+0x2999/0x2fb0 [ 457.553822][T23120] do_syscall_64+0xd2/0x200 [ 457.553836][T23120] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 457.553892][T23120] ? clear_bhb_loop+0x40/0x90 [ 457.553903][T23120] ? clear_bhb_loop+0x40/0x90 [ 457.553915][T23120] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 457.553926][T23120] RIP: 0033:0x7fb2755de969 [ 457.553935][T23120] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 457.553960][T23120] RSP: 002b:00007fb273c47038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 457.553977][T23120] RAX: ffffffffffffffda RBX: 00007fb275805fa0 RCX: 00007fb2755de969 [ 457.553989][T23120] RDX: 0000000000000004 RSI: 00002000000000c0 RDI: 0000000000000005 [ 457.554036][T23120] RBP: 00007fb273c47090 R08: 0000000000000000 R09: 0000000000000000 [ 457.554043][T23120] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 457.554050][T23120] R13: 0000000000000000 R14: 00007fb275805fa0 R15: 00007ffd26a04058 [ 457.554060][T23120] [ 457.865656][T23123] IPv6: Can't replace route, no match found [ 458.339804][T23130] __nla_validate_parse: 6 callbacks suppressed [ 458.339819][T23130] netlink: 64 bytes leftover after parsing attributes in process `syz.0.6714'. [ 458.355446][T23130] netlink: 64 bytes leftover after parsing attributes in process `syz.0.6714'. [ 458.365023][T23130] sg_write: data in/out 2012/14 bytes for SCSI command 0x0-- guessing data in; [ 458.365023][T23130] program syz.0.6714 not setting count and/or reply_len properly [ 458.803138][T23141] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6717'. [ 458.803151][T23140] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6717'. [ 458.821164][T23140] hsr_slave_0: left promiscuous mode [ 458.826850][T23140] hsr_slave_1: left promiscuous mode [ 459.003705][T23154] veth9: entered promiscuous mode [ 459.008833][T23154] veth9: entered allmulticast mode [ 459.021499][T23154] 9pnet: p9_errstr2errno: server reported unknown error @L O!L [ 459.055798][T23155] loop1: detected capacity change from 0 to 128 [ 459.062529][T23155] FAT-fs (loop1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 459.074482][T23155] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 459.090674][T23154] openvswitch: netlink: Message has 6 unknown bytes. [ 459.118015][T23157] random: crng reseeded on system resumption [ 459.233765][ T5374] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 459.251086][T23161] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 459.282504][T23168] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6729'. [ 459.327605][T23175] FAULT_INJECTION: forcing a failure. [ 459.327605][T23175] name failslab, interval 1, probability 0, space 0, times 0 [ 459.340360][T23175] CPU: 1 UID: 0 PID: 23175 Comm: syz.2.6732 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 459.340453][T23175] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 459.340465][T23175] Call Trace: [ 459.340473][T23175] [ 459.340480][T23175] __dump_stack+0x1d/0x30 [ 459.340502][T23175] dump_stack_lvl+0xe8/0x140 [ 459.340567][T23175] dump_stack+0x15/0x1b [ 459.340581][T23175] should_fail_ex+0x265/0x280 [ 459.340612][T23175] should_failslab+0x8c/0xb0 [ 459.340635][T23175] kmem_cache_alloc_noprof+0x50/0x310 [ 459.340704][T23175] ? audit_log_start+0x365/0x6c0 [ 459.340791][T23175] audit_log_start+0x365/0x6c0 [ 459.340816][T23175] ? __rcu_read_unlock+0x4f/0x70 [ 459.340835][T23175] audit_log_common_recv_msg+0xbe/0x190 [ 459.340929][T23175] audit_receive+0x149d/0x2180 [ 459.340950][T23175] ? __netlink_deliver_tap+0x4f5/0x500 [ 459.341000][T23175] ? __netlink_lookup+0x266/0x2a0 [ 459.341028][T23175] netlink_unicast+0x59e/0x670 [ 459.341075][T23175] netlink_sendmsg+0x58b/0x6b0 [ 459.341167][T23175] ? __pfx_netlink_sendmsg+0x10/0x10 [ 459.341192][T23175] __sock_sendmsg+0x142/0x180 [ 459.341217][T23175] ____sys_sendmsg+0x31e/0x4e0 [ 459.341245][T23175] ___sys_sendmsg+0x17b/0x1d0 [ 459.341283][T23175] __x64_sys_sendmsg+0xd4/0x160 [ 459.341312][T23175] x64_sys_call+0x2999/0x2fb0 [ 459.341332][T23175] do_syscall_64+0xd2/0x200 [ 459.341403][T23175] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 459.341429][T23175] ? clear_bhb_loop+0x40/0x90 [ 459.341450][T23175] ? clear_bhb_loop+0x40/0x90 [ 459.341484][T23175] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 459.341503][T23175] RIP: 0033:0x7fb2755de969 [ 459.341516][T23175] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 459.341530][T23175] RSP: 002b:00007fb273c47038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 459.341546][T23175] RAX: ffffffffffffffda RBX: 00007fb275805fa0 RCX: 00007fb2755de969 [ 459.341557][T23175] RDX: 0000000004008840 RSI: 0000200000000540 RDI: 0000000000000003 [ 459.341581][T23175] RBP: 00007fb273c47090 R08: 0000000000000000 R09: 0000000000000000 [ 459.341593][T23175] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 459.341605][T23175] R13: 0000000000000000 R14: 00007fb275805fa0 R15: 00007ffd26a04058 [ 459.341623][T23175] [ 459.584068][T23178] IPv6: Can't replace route, no match found [ 459.629242][T23186] loop1: detected capacity change from 0 to 1024 [ 459.635847][T23186] ext4: Unknown parameter 'func' [ 459.647599][T23190] IPv6: Can't replace route, no match found [ 460.324366][T23192] syz.9.6738 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 460.338604][T23192] CPU: 1 UID: 0 PID: 23192 Comm: syz.9.6738 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 460.338629][T23192] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 460.338641][T23192] Call Trace: [ 460.338649][T23192] [ 460.338657][T23192] __dump_stack+0x1d/0x30 [ 460.338679][T23192] dump_stack_lvl+0xe8/0x140 [ 460.338795][T23192] dump_stack+0x15/0x1b [ 460.338805][T23192] dump_header+0x81/0x220 [ 460.338823][T23192] oom_kill_process+0x334/0x3f0 [ 460.338864][T23192] out_of_memory+0x979/0xb80 [ 460.338917][T23192] ? css_next_descendant_pre+0x138/0x160 [ 460.338930][T23192] mem_cgroup_out_of_memory+0x13d/0x190 [ 460.339028][T23192] try_charge_memcg+0x5e2/0x870 [ 460.339102][T23192] obj_cgroup_charge_pages+0xb7/0x1a0 [ 460.339126][T23192] __memcg_kmem_charge_page+0x9f/0x170 [ 460.339170][T23192] __alloc_frozen_pages_noprof+0x188/0x360 [ 460.339217][T23192] alloc_pages_mpol+0xb3/0x250 [ 460.339234][T23192] alloc_pages_noprof+0x90/0x130 [ 460.339291][T23192] __vmalloc_node_range_noprof+0x6d5/0xe40 [ 460.339395][T23192] __kvmalloc_node_noprof+0x312/0x4f0 [ 460.339417][T23192] ? ip_set_alloc+0x1f/0x30 [ 460.339430][T23192] ? ip_set_alloc+0x1f/0x30 [ 460.339441][T23192] ? __kmalloc_cache_noprof+0x189/0x320 [ 460.339508][T23192] ip_set_alloc+0x1f/0x30 [ 460.339519][T23192] hash_netiface_create+0x282/0x740 [ 460.339533][T23192] ? __pfx_hash_netiface_create+0x10/0x10 [ 460.339579][T23192] ip_set_create+0x3c9/0x960 [ 460.339598][T23192] ? __nla_parse+0x40/0x60 [ 460.339611][T23192] nfnetlink_rcv_msg+0x4c6/0x590 [ 460.339638][T23192] ? selinux_capable+0x1f9/0x270 [ 460.339718][T23192] netlink_rcv_skb+0x123/0x220 [ 460.339808][T23192] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 460.339837][T23192] nfnetlink_rcv+0x16b/0x1690 [ 460.339901][T23192] ? __kfree_skb+0x109/0x150 [ 460.339916][T23192] ? nlmon_xmit+0x4f/0x60 [ 460.339929][T23192] ? consume_skb+0x49/0x150 [ 460.340013][T23192] ? nlmon_xmit+0x4f/0x60 [ 460.340025][T23192] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 460.340041][T23192] ? __dev_queue_xmit+0x11c0/0x1fb0 [ 460.340054][T23192] ? __dev_queue_xmit+0x182/0x1fb0 [ 460.340106][T23192] ? __bpf_ringbuf_reserve+0x45a/0x530 [ 460.340119][T23192] ? ref_tracker_free+0x37d/0x3e0 [ 460.340215][T23192] ? __netlink_deliver_tap+0x4dc/0x500 [ 460.340244][T23192] netlink_unicast+0x59e/0x670 [ 460.340265][T23192] netlink_sendmsg+0x58b/0x6b0 [ 460.340282][T23192] ? __pfx_netlink_sendmsg+0x10/0x10 [ 460.340298][T23192] __sock_sendmsg+0x142/0x180 [ 460.340380][T23192] ____sys_sendmsg+0x31e/0x4e0 [ 460.340396][T23192] ___sys_sendmsg+0x17b/0x1d0 [ 460.340409][T23192] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 460.340535][T23192] __x64_sys_sendmsg+0xd4/0x160 [ 460.340627][T23192] x64_sys_call+0x2999/0x2fb0 [ 460.340663][T23192] do_syscall_64+0xd2/0x200 [ 460.340736][T23192] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 460.340753][T23192] ? clear_bhb_loop+0x40/0x90 [ 460.340764][T23192] ? clear_bhb_loop+0x40/0x90 [ 460.340776][T23192] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 460.340788][T23192] RIP: 0033:0x7f6464b6e969 [ 460.340830][T23192] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 460.340840][T23192] RSP: 002b:00007f64631d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 460.340898][T23192] RAX: ffffffffffffffda RBX: 00007f6464d95fa0 RCX: 00007f6464b6e969 [ 460.340906][T23192] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000005 [ 460.340914][T23192] RBP: 00007f6464bf0ab1 R08: 0000000000000000 R09: 0000000000000000 [ 460.340922][T23192] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 460.340928][T23192] R13: 0000000000000000 R14: 00007f6464d95fa0 R15: 00007ffe1a70ebb8 [ 460.340939][T23192] [ 460.340944][T23192] memory: usage 307200kB, limit 307200kB, failcnt 476 [ 460.715457][T23192] memory+swap: usage 307376kB, limit 9007199254740988kB, failcnt 0 [ 460.723410][T23192] kmem: usage 307172kB, limit 9007199254740988kB, failcnt 0 [ 460.730804][T23192] Memory cgroup stats for /syz9: [ 460.732674][T23197] FAULT_INJECTION: forcing a failure. [ 460.732674][T23197] name failslab, interval 1, probability 0, space 0, times 0 [ 460.750275][T23197] CPU: 0 UID: 0 PID: 23197 Comm: syz.2.6740 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 460.750365][T23197] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 460.750377][T23197] Call Trace: [ 460.750385][T23197] [ 460.750456][T23197] __dump_stack+0x1d/0x30 [ 460.750474][T23197] dump_stack_lvl+0xe8/0x140 [ 460.750490][T23197] dump_stack+0x15/0x1b [ 460.750503][T23197] should_fail_ex+0x265/0x280 [ 460.750590][T23197] should_failslab+0x8c/0xb0 [ 460.750608][T23197] kmem_cache_alloc_noprof+0x50/0x310 [ 460.750629][T23197] ? alloc_vfsmnt+0x2d/0x360 [ 460.750711][T23197] alloc_vfsmnt+0x2d/0x360 [ 460.750731][T23197] clone_mnt+0x41/0x750 [ 460.750762][T23197] copy_tree+0x2f1/0x820 [ 460.750859][T23197] copy_mnt_ns+0x120/0x5e0 [ 460.750874][T23197] ? kmem_cache_alloc_noprof+0x220/0x310 [ 460.750893][T23197] ? create_new_namespaces+0x3c/0x3d0 [ 460.750939][T23197] create_new_namespaces+0x83/0x3d0 [ 460.750962][T23197] unshare_nsproxy_namespaces+0xe8/0x120 [ 460.751038][T23197] ksys_unshare+0x3d0/0x6d0 [ 460.751059][T23197] ? trace_sys_enter+0xd0/0x110 [ 460.751097][T23197] __x64_sys_unshare+0x1f/0x30 [ 460.751182][T23197] x64_sys_call+0x2d4b/0x2fb0 [ 460.751214][T23197] do_syscall_64+0xd2/0x200 [ 460.751234][T23197] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 460.751254][T23197] ? clear_bhb_loop+0x40/0x90 [ 460.751271][T23197] ? clear_bhb_loop+0x40/0x90 [ 460.751288][T23197] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 460.751407][T23197] RIP: 0033:0x7fb2755de969 [ 460.751420][T23197] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 460.751433][T23197] RSP: 002b:00007fb273c47038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 460.751449][T23197] RAX: ffffffffffffffda RBX: 00007fb275805fa0 RCX: 00007fb2755de969 [ 460.751459][T23197] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000002c020400 [ 460.751469][T23197] RBP: 00007fb273c47090 R08: 0000000000000000 R09: 0000000000000000 [ 460.751479][T23197] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 460.751513][T23197] R13: 0000000000000000 R14: 00007fb275805fa0 R15: 00007ffd26a04058 [ 460.751529][T23197] [ 460.751758][T23192] cache 0 [ 460.776770][T23204] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6743'. [ 460.777309][T23192] rss 0 [ 460.777317][T23192] shmem 0 [ 460.777331][T23192] mapped_file 0 [ 460.777337][T23192] dirty 0 [ 460.995839][T23192] writeback 28672 [ 460.999459][T23192] workingset_refault_anon 77 [ 461.004024][T23192] workingset_refault_file 0 [ 461.008539][T23192] swap 180224 [ 461.011798][T23192] swapcached 28672 [ 461.015515][T23192] nr_memmap_boot_pages 125476 [ 461.020171][T23192] pgpgin 125469 [ 461.023670][T23192] pglazyfree 153378 [ 461.027508][T23192] pgfault 50 [ 461.030742][T23192] a_other 0 [ 461.033831][T23192] inactive_anon 28672 [ 461.037819][T23192] active_anon 0 [ 461.041267][T23192] inactive_file 0 [ 461.044879][T23192] active_file 0 [ 461.048324][T23192] hierarchical_memory_limit 314572800 [ 461.053668][T23192] hierarchical_memsw_limit 9223372036854771712 [ 461.059995][T23192] total_cache 0 [ 461.063467][T23192] total_rss 0 [ 461.066735][T23192] total_shmem 0 [ 461.070253][T23192] total_mapped_file 0 [ 461.074261][T23192] total_dirty 0 [ 461.077692][T23192] total_writeback 28672 [ 461.081979][T23192] total_workingset_refault_anon 77 [ 461.087073][T23192] total_workingset_refault_file 0 [ 461.092121][T23192] total_swap 180224 [ 461.095982][T23192] total_swapcached 28672 [ 461.100200][T23192] total_nr_memmap_boot_pages 125476 [ 461.105380][T23192] total_pgpgin 125469 [ 461.109359][T23192] total_pglazyfree 153378 [ 461.113716][T23192] total_pgfault 50 [ 461.117447][T23192] total_a_other 0 [ 461.121052][T23192] total_inactive_anon 28672 [ 461.125618][T23192] total_active_anon 0 [ 461.129642][T23192] total_inactive_file 0 [ 461.133853][T23192] total_active_file 0 [ 461.137813][T23192] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz9,task_memcg=/syz9,task=syz.9.6738,pid=23191,uid=0 [ 461.152561][T23192] Memory cgroup out of memory: Killed process 23191 (syz.9.6738) total-vm:93748kB, anon-rss:940kB, file-rss:22308kB, shmem-rss:0kB, UID:0 pgtables:124kB oom_score_adj:1000 [ 461.423047][T23217] IPv6: Can't replace route, no match found [ 462.119357][ T29] kauditd_printk_skb: 134 callbacks suppressed [ 462.119370][ T29] audit: type=1326 audit(1748679717.297:40116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23222 comm="syz.2.6749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 462.149499][ T29] audit: type=1326 audit(1748679717.297:40117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23222 comm="syz.2.6749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 462.173168][ T29] audit: type=1326 audit(1748679717.297:40118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23222 comm="syz.2.6749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb2755dd2d0 code=0x7ffc0000 [ 462.196766][ T29] audit: type=1326 audit(1748679717.297:40119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23222 comm="syz.2.6749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 462.220517][ T29] audit: type=1326 audit(1748679717.297:40120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23222 comm="syz.2.6749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 462.244003][ T29] audit: type=1326 audit(1748679717.297:40121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23222 comm="syz.2.6749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 462.267608][ T29] audit: type=1326 audit(1748679717.297:40122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23222 comm="syz.2.6749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 462.291275][ T29] audit: type=1326 audit(1748679717.297:40123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23222 comm="syz.2.6749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 462.315030][ T29] audit: type=1326 audit(1748679717.297:40124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23222 comm="syz.2.6749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 462.338656][ T29] audit: type=1326 audit(1748679717.297:40125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23222 comm="syz.2.6749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 462.368473][T23225] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 462.385975][T23227] random: crng reseeded on system resumption [ 462.597233][T23243] loop9: detected capacity change from 0 to 128 [ 462.603734][T23240] loop0: detected capacity change from 0 to 764 [ 462.603794][T23243] FAT-fs (loop9): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 462.624296][T23243] FAT-fs (loop9): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 462.726147][T23248] netlink: 64 bytes leftover after parsing attributes in process `syz.0.6759'. [ 462.735119][T23248] netlink: 64 bytes leftover after parsing attributes in process `syz.0.6759'. [ 462.745062][T23248] sg_write: data in/out 2012/14 bytes for SCSI command 0x0-- guessing data in; [ 462.745062][T23248] program syz.0.6759 not setting count and/or reply_len properly [ 462.775515][T23250] IPVS: wlc: UDP 224.0.0.2:0 - no destination available [ 463.304270][ T5394] FAT-fs (loop9): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 463.334017][T23257] veth23: entered promiscuous mode [ 463.339326][T23257] veth23: entered allmulticast mode [ 463.351269][T23257] 9pnet: p9_errstr2errno: server reported unknown error @L O!L [ 463.395243][T23263] IPv6: Can't replace route, no match found [ 463.410272][T23265] openvswitch: netlink: Message has 6 unknown bytes. [ 463.874455][T23273] netlink: 'syz.3.6768': attribute type 21 has an invalid length. [ 463.883325][T23273] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 464.244538][T23284] loop9: detected capacity change from 0 to 128 [ 464.251439][T23284] ext3: Unknown parameter 'euid' [ 464.504332][T23287] loop1: detected capacity change from 0 to 764 [ 464.547707][T23291] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 464.690389][T23296] netlink: 4 bytes leftover after parsing attributes in process `syz.9.6777'. [ 465.476692][T23312] loop9: detected capacity change from 0 to 128 [ 465.519304][T23317] loop1: detected capacity change from 0 to 128 [ 465.669392][T23321] FAULT_INJECTION: forcing a failure. [ 465.669392][T23321] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 465.682567][T23321] CPU: 1 UID: 0 PID: 23321 Comm: syz.0.6786 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 465.682658][T23321] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 465.682668][T23321] Call Trace: [ 465.682674][T23321] [ 465.682681][T23321] __dump_stack+0x1d/0x30 [ 465.682702][T23321] dump_stack_lvl+0xe8/0x140 [ 465.682724][T23321] dump_stack+0x15/0x1b [ 465.682756][T23321] should_fail_ex+0x265/0x280 [ 465.682781][T23321] should_fail+0xb/0x20 [ 465.682806][T23321] should_fail_usercopy+0x1a/0x20 [ 465.682935][T23321] _copy_from_user+0x1c/0xb0 [ 465.682958][T23321] bpf_test_init+0xdf/0x160 [ 465.683055][T23321] bpf_prog_test_run_xdp+0x274/0x910 [ 465.683075][T23321] ? kstrtouint+0x76/0xc0 [ 465.683142][T23321] ? __rcu_read_unlock+0x4f/0x70 [ 465.683166][T23321] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 465.683189][T23321] bpf_prog_test_run+0x22a/0x390 [ 465.683210][T23321] __sys_bpf+0x3dc/0x790 [ 465.683247][T23321] __x64_sys_bpf+0x41/0x50 [ 465.683309][T23321] x64_sys_call+0x2478/0x2fb0 [ 465.683328][T23321] do_syscall_64+0xd2/0x200 [ 465.683395][T23321] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 465.683409][T23321] ? clear_bhb_loop+0x40/0x90 [ 465.683421][T23321] ? clear_bhb_loop+0x40/0x90 [ 465.683450][T23321] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 465.683462][T23321] RIP: 0033:0x7f2036e5e969 [ 465.683553][T23321] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 465.683563][T23321] RSP: 002b:00007f20354c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 465.683574][T23321] RAX: ffffffffffffffda RBX: 00007f2037085fa0 RCX: 00007f2036e5e969 [ 465.683660][T23321] RDX: 0000000000000050 RSI: 0000200000000600 RDI: 000000000000000a [ 465.683668][T23321] RBP: 00007f20354c7090 R08: 0000000000000000 R09: 0000000000000000 [ 465.683675][T23321] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.683682][T23321] R13: 0000000000000000 R14: 00007f2037085fa0 R15: 00007ffd9a1bae78 [ 465.683753][T23321] [ 465.906189][T23323] FAULT_INJECTION: forcing a failure. [ 465.906189][T23323] name failslab, interval 1, probability 0, space 0, times 0 [ 465.918937][T23323] CPU: 0 UID: 0 PID: 23323 Comm: syz.0.6787 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 465.918961][T23323] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 465.918971][T23323] Call Trace: [ 465.918977][T23323] [ 465.918990][T23323] __dump_stack+0x1d/0x30 [ 465.919011][T23323] dump_stack_lvl+0xe8/0x140 [ 465.919031][T23323] dump_stack+0x15/0x1b [ 465.919048][T23323] should_fail_ex+0x265/0x280 [ 465.919143][T23323] should_failslab+0x8c/0xb0 [ 465.919165][T23323] kmem_cache_alloc_noprof+0x50/0x310 [ 465.919190][T23323] ? alloc_empty_file+0x76/0x200 [ 465.919341][T23323] ? mntput+0x4b/0x80 [ 465.919366][T23323] alloc_empty_file+0x76/0x200 [ 465.919466][T23323] path_openat+0x68/0x2170 [ 465.919493][T23323] ? _parse_integer_limit+0x170/0x190 [ 465.919522][T23323] ? kstrtoull+0x111/0x140 [ 465.919546][T23323] ? kstrtouint+0x76/0xc0 [ 465.919622][T23323] do_filp_open+0x109/0x230 [ 465.919655][T23323] do_sys_openat2+0xa6/0x110 [ 465.919679][T23323] __x64_sys_openat+0xf2/0x120 [ 465.919739][T23323] x64_sys_call+0x1af/0x2fb0 [ 465.919759][T23323] do_syscall_64+0xd2/0x200 [ 465.919784][T23323] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 465.919864][T23323] ? clear_bhb_loop+0x40/0x90 [ 465.919884][T23323] ? clear_bhb_loop+0x40/0x90 [ 465.919905][T23323] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 465.919926][T23323] RIP: 0033:0x7f2036e5e969 [ 465.919941][T23323] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 465.919957][T23323] RSP: 002b:00007f20354c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 465.919977][T23323] RAX: ffffffffffffffda RBX: 00007f2037085fa0 RCX: 00007f2036e5e969 [ 465.919990][T23323] RDX: 0000000000040400 RSI: 0000200000000180 RDI: ffffffffffffff9c [ 465.920003][T23323] RBP: 00007f20354c7090 R08: 0000000000000000 R09: 0000000000000000 [ 465.920016][T23323] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 465.920029][T23323] R13: 0000000000000000 R14: 00007f2037085fa0 R15: 00007ffd9a1bae78 [ 465.920078][T23323] [ 466.521628][T23343] netlink: 4 bytes leftover after parsing attributes in process `syz.1.6793'. [ 467.235393][T23358] loop0: detected capacity change from 0 to 1024 [ 467.248722][T23358] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 467.261019][T23358] ext4 filesystem being mounted at /465/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 467.433927][T23369] loop9: detected capacity change from 0 to 512 [ 467.534951][T23372] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6801'. [ 467.547156][T23372] bridge0: port 3(team0) entered disabled state [ 467.555671][T23372] team0 (unregistering): left allmulticast mode [ 467.564296][T23372] team_slave_0: left allmulticast mode [ 467.569898][T23372] team_slave_1: left allmulticast mode [ 467.575432][T23372] bridge0: port 3(team0) entered disabled state [ 467.590557][T23372] team_slave_0: left promiscuous mode [ 467.598330][T23372] team0 (unregistering): Port device team_slave_0 removed [ 467.610741][T23372] team_slave_1: left promiscuous mode [ 467.619753][T23372] team0 (unregistering): Port device team_slave_1 removed [ 467.681947][T23377] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 467.688618][T23376] loop1: detected capacity change from 0 to 2048 [ 467.693644][ T29] kauditd_printk_skb: 256 callbacks suppressed [ 467.693657][ T29] audit: type=1326 audit(1748679722.507:40382): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23378 comm="syz.2.6804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 467.752927][ T29] audit: type=1326 audit(1748679722.545:40383): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23378 comm="syz.2.6804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fb2755dd2d0 code=0x7ffc0000 [ 467.776560][ T29] audit: type=1326 audit(1748679722.545:40384): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23378 comm="syz.2.6804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 467.800445][ T29] audit: type=1326 audit(1748679722.545:40385): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23378 comm="syz.2.6804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 467.824012][ T29] audit: type=1326 audit(1748679722.545:40386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23378 comm="syz.2.6804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 467.847647][ T29] audit: type=1326 audit(1748679722.545:40387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23378 comm="syz.2.6804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 467.871327][ T29] audit: type=1326 audit(1748679722.545:40388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23378 comm="syz.2.6804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 467.895032][ T29] audit: type=1326 audit(1748679722.545:40389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23378 comm="syz.2.6804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 467.918805][ T29] audit: type=1326 audit(1748679722.545:40390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23378 comm="syz.2.6804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 467.942439][ T29] audit: type=1326 audit(1748679722.545:40391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23378 comm="syz.2.6804" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 467.967843][T23376] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 468.029293][T22172] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 468.058850][T23397] loop1: detected capacity change from 0 to 128 [ 468.118378][T23400] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6805'. [ 468.157974][T17340] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 468.176708][T23406] netlink: 8 bytes leftover after parsing attributes in process `syz.0.6813'. [ 469.007512][T23417] loop1: detected capacity change from 0 to 128 [ 469.015465][T23417] FAT-fs (loop1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 469.028674][T23417] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 469.100417][T23424] netlink: 12 bytes leftover after parsing attributes in process `syz.9.6820'. [ 469.183898][T23433] veth25: entered promiscuous mode [ 469.189088][T23433] veth25: entered allmulticast mode [ 469.226117][T23435] 9pnet: p9_errstr2errno: server reported unknown error @L O!L [ 469.284308][T23433] openvswitch: netlink: Message has 6 unknown bytes. [ 469.287826][T23428] netlink: 'syz.1.6821': attribute type 29 has an invalid length. [ 469.325768][T23442] netlink: 4 bytes leftover after parsing attributes in process `syz.9.6824'. [ 469.365677][T23444] vlan2: entered allmulticast mode [ 469.370827][T23444] bond1: entered allmulticast mode [ 469.445223][T23449] sg_write: data in/out 124/1 bytes for SCSI command 0x1c-- guessing data in; [ 469.445223][T23449] program syz.0.6828 not setting count and/or reply_len properly [ 469.480448][T23453] program syz.0.6830 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 469.480831][T23451] loop1: detected capacity change from 0 to 128 [ 469.497023][T23451] FAT-fs (loop1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 469.511086][T23451] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 469.566457][T23466] netlink: 'syz.0.6835': attribute type 10 has an invalid length. [ 469.570622][T23465] veth5: entered promiscuous mode [ 469.574346][T23466] netlink: 40 bytes leftover after parsing attributes in process `syz.0.6835'. [ 469.579332][T23465] veth5: entered allmulticast mode [ 469.583605][T23465] 9pnet: p9_errstr2errno: server reported unknown error @L O!L [ 469.590416][T23466] netlink: 'syz.0.6835': attribute type 10 has an invalid length. [ 469.610127][T23466] netlink: 40 bytes leftover after parsing attributes in process `syz.0.6835'. [ 469.619215][T23466] netlink: 'syz.0.6835': attribute type 10 has an invalid length. [ 469.627167][T23466] netlink: 40 bytes leftover after parsing attributes in process `syz.0.6835'. [ 469.637185][T23466] netlink: 'syz.0.6835': attribute type 10 has an invalid length. [ 469.645244][T23466] netlink: 'syz.0.6835': attribute type 10 has an invalid length. [ 469.657376][T23467] openvswitch: netlink: Message has 6 unknown bytes. [ 469.664720][T23466] netlink: 'syz.0.6835': attribute type 10 has an invalid length. [ 469.672881][T23466] netlink: 'syz.0.6835': attribute type 10 has an invalid length. [ 469.680997][T23466] netlink: 'syz.0.6835': attribute type 10 has an invalid length. [ 469.689237][T23466] netlink: 'syz.0.6835': attribute type 10 has an invalid length. [ 469.717938][T23473] FAULT_INJECTION: forcing a failure. [ 469.717938][T23473] name failslab, interval 1, probability 0, space 0, times 0 [ 469.730702][T23473] CPU: 0 UID: 0 PID: 23473 Comm: syz.0.6839 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 469.730743][T23473] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 469.730751][T23473] Call Trace: [ 469.730755][T23473] [ 469.730759][T23473] __dump_stack+0x1d/0x30 [ 469.730772][T23473] dump_stack_lvl+0xe8/0x140 [ 469.730783][T23473] dump_stack+0x15/0x1b [ 469.730801][T23473] should_fail_ex+0x265/0x280 [ 469.730866][T23473] should_failslab+0x8c/0xb0 [ 469.730879][T23473] kmem_cache_alloc_noprof+0x50/0x310 [ 469.730893][T23473] ? audit_log_start+0x365/0x6c0 [ 469.730909][T23473] ? jhash+0x2a6/0x310 [ 469.730930][T23473] audit_log_start+0x365/0x6c0 [ 469.730946][T23473] ? __htab_map_lookup_elem+0x129/0x150 [ 469.731022][T23473] audit_seccomp+0x48/0x100 [ 469.731036][T23473] ? __seccomp_filter+0x68c/0x10d0 [ 469.731048][T23473] __seccomp_filter+0x69d/0x10d0 [ 469.731062][T23473] ? getname_flags+0x2be/0x3b0 [ 469.731139][T23473] ? __traceiter_kmem_cache_free+0x35/0x60 [ 469.731151][T23473] ? getname_flags+0x2be/0x3b0 [ 469.731163][T23473] ? kmem_cache_free+0xdf/0x300 [ 469.731178][T23473] __secure_computing+0x82/0x150 [ 469.731213][T23473] syscall_trace_enter+0xcf/0x1e0 [ 469.731227][T23473] do_syscall_64+0xac/0x200 [ 469.731319][T23473] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 469.731332][T23473] ? clear_bhb_loop+0x40/0x90 [ 469.731343][T23473] ? clear_bhb_loop+0x40/0x90 [ 469.731355][T23473] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 469.731370][T23473] RIP: 0033:0x7f2036e5d37c [ 469.731379][T23473] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 469.731388][T23473] RSP: 002b:00007f20354c7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 469.731464][T23473] RAX: ffffffffffffffda RBX: 00007f2037085fa0 RCX: 00007f2036e5d37c [ 469.731471][T23473] RDX: 000000000000000f RSI: 00007f20354c70a0 RDI: 0000000000000006 [ 469.731478][T23473] RBP: 00007f20354c7090 R08: 0000000000000000 R09: 0000000000000000 [ 469.731532][T23473] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 469.731539][T23473] R13: 0000000000000000 R14: 00007f2037085fa0 R15: 00007ffd9a1bae78 [ 469.731549][T23473] [ 470.006435][T23483] loop0: detected capacity change from 0 to 128 [ 470.013989][T23483] FAT-fs (loop0): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 470.039224][T23483] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 470.156397][T23494] veth39: entered promiscuous mode [ 470.161553][T23494] veth39: entered allmulticast mode [ 470.188694][T23494] 9pnet: p9_errstr2errno: server reported unknown error @L O!L [ 470.245462][T23494] openvswitch: netlink: Message has 6 unknown bytes. [ 470.723599][T23522] __nla_validate_parse: 30 callbacks suppressed [ 470.723613][T23522] netlink: 64 bytes leftover after parsing attributes in process `syz.3.6856'. [ 470.738881][T23522] netlink: 64 bytes leftover after parsing attributes in process `syz.3.6856'. [ 470.774880][T23522] sg_write: data in/out 2012/14 bytes for SCSI command 0x0-- guessing data in; [ 470.774880][T23522] program syz.3.6856 not setting count and/or reply_len properly [ 470.870690][T23529] netlink: 48 bytes leftover after parsing attributes in process `syz.1.6858'. [ 470.894966][T23531] netlink: 20 bytes leftover after parsing attributes in process `syz.3.6860'. [ 470.999969][T23539] program syz.3.6864 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 471.011192][T23539] netdevsim netdevsim3: Direct firmware load for ./file0 failed with error -2 [ 471.097622][T23549] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.153771][T23549] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.215920][T23549] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.289887][T23549] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 471.357825][T23549] netdevsim netdevsim0 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 471.369942][T23549] netdevsim netdevsim0 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 471.381946][T23549] netdevsim netdevsim0 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 471.395242][T23549] netdevsim netdevsim0 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 471.592900][T23570] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6873'. [ 472.048222][T23592] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 472.263857][T23606] SELinux: failed to load policy [ 473.056349][T23618] FAULT_INJECTION: forcing a failure. [ 473.056349][T23618] name failslab, interval 1, probability 0, space 0, times 0 [ 473.069036][T23618] CPU: 1 UID: 0 PID: 23618 Comm: syz.1.6891 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 473.069096][T23618] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 473.069187][T23618] Call Trace: [ 473.069193][T23618] [ 473.069200][T23618] __dump_stack+0x1d/0x30 [ 473.069218][T23618] dump_stack_lvl+0xe8/0x140 [ 473.069234][T23618] dump_stack+0x15/0x1b [ 473.069261][T23618] should_fail_ex+0x265/0x280 [ 473.069292][T23618] should_failslab+0x8c/0xb0 [ 473.069355][T23618] kmem_cache_alloc_noprof+0x50/0x310 [ 473.069376][T23618] ? skb_clone+0x151/0x1f0 [ 473.069441][T23618] skb_clone+0x151/0x1f0 [ 473.069531][T23618] __netlink_deliver_tap+0x2c9/0x500 [ 473.069555][T23618] netlink_unicast+0x64c/0x670 [ 473.069628][T23618] netlink_sendmsg+0x58b/0x6b0 [ 473.069721][T23618] ? __pfx_netlink_sendmsg+0x10/0x10 [ 473.069741][T23618] __sock_sendmsg+0x142/0x180 [ 473.069768][T23618] ____sys_sendmsg+0x31e/0x4e0 [ 473.069829][T23618] ___sys_sendmsg+0x17b/0x1d0 [ 473.069863][T23618] __x64_sys_sendmsg+0xd4/0x160 [ 473.069887][T23618] x64_sys_call+0x2999/0x2fb0 [ 473.069908][T23618] do_syscall_64+0xd2/0x200 [ 473.070047][T23618] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 473.070068][T23618] ? clear_bhb_loop+0x40/0x90 [ 473.070148][T23618] ? clear_bhb_loop+0x40/0x90 [ 473.070167][T23618] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 473.070189][T23618] RIP: 0033:0x7f38ec18e969 [ 473.070204][T23618] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 473.070221][T23618] RSP: 002b:00007f38ea7f7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 473.070243][T23618] RAX: ffffffffffffffda RBX: 00007f38ec3b5fa0 RCX: 00007f38ec18e969 [ 473.070254][T23618] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000007 [ 473.070265][T23618] RBP: 00007f38ea7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 473.070279][T23618] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 473.070291][T23618] R13: 0000000000000000 R14: 00007f38ec3b5fa0 R15: 00007ffc3a307be8 [ 473.070307][T23618] [ 473.354044][T23625] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 473.597797][ T29] kauditd_printk_skb: 305 callbacks suppressed [ 473.597821][ T29] audit: type=1326 audit(1748679728.018:40695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23612 comm="syz.2.6889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 473.627735][ T29] audit: type=1326 audit(1748679728.018:40696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23612 comm="syz.2.6889" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 473.856852][T23649] netlink: 4 bytes leftover after parsing attributes in process `syz.9.6903'. [ 473.969301][ T29] audit: type=1326 audit(1748679728.373:40697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23652 comm="syz.2.6901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 473.993225][ T29] audit: type=1326 audit(1748679728.373:40698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23652 comm="syz.2.6901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 474.016886][ T29] audit: type=1326 audit(1748679728.373:40699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23652 comm="syz.2.6901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=66 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 474.040425][ T29] audit: type=1326 audit(1748679728.373:40700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23652 comm="syz.2.6901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 474.064062][ T29] audit: type=1326 audit(1748679728.373:40701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23652 comm="syz.2.6901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 474.087692][ T29] audit: type=1326 audit(1748679728.373:40702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23652 comm="syz.2.6901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 474.111360][ T29] audit: type=1326 audit(1748679728.373:40703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23652 comm="syz.2.6901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 474.134939][ T29] audit: type=1326 audit(1748679728.373:40704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23652 comm="syz.2.6901" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fb2755de969 code=0x7ffc0000 [ 474.940993][T23685] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 475.281864][ T23] hid-generic 0000:0000:0000.0003: unknown main item tag 0x0 [ 475.283788][T23706] netlink: 4 bytes leftover after parsing attributes in process `syz.3.6923'. [ 475.290038][ T23] hid-generic 0000:0000:0000.0003: hidraw0: HID v0.00 Device [syz1] on syz0 [ 475.421960][T23710] FAULT_INJECTION: forcing a failure. [ 475.421960][T23710] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 475.435293][T23710] CPU: 1 UID: 0 PID: 23710 Comm: +}[@ Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 475.435319][T23710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 475.435330][T23710] Call Trace: [ 475.435417][T23710] [ 475.435431][T23710] __dump_stack+0x1d/0x30 [ 475.435446][T23710] dump_stack_lvl+0xe8/0x140 [ 475.435485][T23710] dump_stack+0x15/0x1b [ 475.435494][T23710] should_fail_ex+0x265/0x280 [ 475.435517][T23710] should_fail+0xb/0x20 [ 475.435532][T23710] should_fail_usercopy+0x1a/0x20 [ 475.435576][T23710] _copy_from_user+0x1c/0xb0 [ 475.435660][T23710] __sys_bpf+0x178/0x790 [ 475.435686][T23710] __x64_sys_bpf+0x41/0x50 [ 475.435713][T23710] x64_sys_call+0x2478/0x2fb0 [ 475.435781][T23710] do_syscall_64+0xd2/0x200 [ 475.435795][T23710] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 475.435810][T23710] ? clear_bhb_loop+0x40/0x90 [ 475.435822][T23710] ? clear_bhb_loop+0x40/0x90 [ 475.435869][T23710] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 475.435880][T23710] RIP: 0033:0x7fde07dce969 [ 475.435889][T23710] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 475.435899][T23710] RSP: 002b:00007fde06437038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 475.435910][T23710] RAX: ffffffffffffffda RBX: 00007fde07ff5fa0 RCX: 00007fde07dce969 [ 475.435926][T23710] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000005 [ 475.435933][T23710] RBP: 00007fde06437090 R08: 0000000000000000 R09: 0000000000000000 [ 475.435955][T23710] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 475.435961][T23710] R13: 0000000000000000 R14: 00007fde07ff5fa0 R15: 00007ffd76e467b8 [ 475.435972][T23710] [ 475.450002][T23712] netlink: 20 bytes leftover after parsing attributes in process `syz.3.6925'. [ 475.612367][T23714] infiniband syz!: set down [ 475.633358][T23714] infiniband syz!: added team_slave_0 [ 475.651290][T23714] RDS/IB: syz!: added [ 475.655403][T23714] smc: adding ib device syz! with port count 1 [ 475.661982][T23714] smc: ib device syz! port 1 has pnetid [ 475.715525][T23719] veth41: entered promiscuous mode [ 475.720756][T23719] veth41: entered allmulticast mode [ 475.728792][T23719] 9pnet: p9_errstr2errno: server reported unknown error @L O!L [ 476.053879][T23731] loop1: detected capacity change from 0 to 128 [ 476.169656][T23739] loop0: detected capacity change from 0 to 1024 [ 476.188216][T23739] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 476.200396][T23739] ext4 filesystem being mounted at /494/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 476.880289][T17340] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 477.268878][T23761] IPv6: Can't replace route, no match found [ 477.330542][T23767] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 477.384758][T23771] loop1: detected capacity change from 0 to 1024 [ 477.417453][T23771] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 477.431536][T23771] ext4 filesystem being mounted at /124/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 478.023228][T22172] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 478.042559][T23785] FAULT_INJECTION: forcing a failure. [ 478.042559][T23785] name failslab, interval 1, probability 0, space 0, times 0 [ 478.055277][T23785] CPU: 0 UID: 0 PID: 23785 Comm: syz.1.6949 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 478.055300][T23785] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 478.055310][T23785] Call Trace: [ 478.055317][T23785] [ 478.055396][T23785] __dump_stack+0x1d/0x30 [ 478.055418][T23785] dump_stack_lvl+0xe8/0x140 [ 478.055438][T23785] dump_stack+0x15/0x1b [ 478.055452][T23785] should_fail_ex+0x265/0x280 [ 478.055481][T23785] should_failslab+0x8c/0xb0 [ 478.055597][T23785] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 478.055624][T23785] ? __d_alloc+0x3d/0x350 [ 478.055648][T23785] __d_alloc+0x3d/0x350 [ 478.055716][T23785] ? should_failslab+0x8c/0xb0 [ 478.055734][T23785] d_alloc_pseudo+0x1e/0x80 [ 478.055755][T23785] alloc_file_pseudo+0x71/0x160 [ 478.055860][T23785] ? security_inode_alloc+0x69/0x100 [ 478.055891][T23785] sock_alloc_file+0x9c/0x1e0 [ 478.055917][T23785] do_accept+0x1e4/0x3a0 [ 478.055939][T23785] __sys_accept4+0xbf/0x140 [ 478.056038][T23785] __x64_sys_accept4+0x51/0x60 [ 478.056059][T23785] x64_sys_call+0x23d5/0x2fb0 [ 478.056138][T23785] do_syscall_64+0xd2/0x200 [ 478.056168][T23785] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 478.056192][T23785] ? clear_bhb_loop+0x40/0x90 [ 478.056209][T23785] ? clear_bhb_loop+0x40/0x90 [ 478.056303][T23785] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 478.056323][T23785] RIP: 0033:0x7f38ec18e969 [ 478.056347][T23785] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 478.056364][T23785] RSP: 002b:00007f38ea7f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000120 [ 478.056384][T23785] RAX: ffffffffffffffda RBX: 00007f38ec3b5fa0 RCX: 00007f38ec18e969 [ 478.056398][T23785] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000003 [ 478.056410][T23785] RBP: 00007f38ea7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 478.056420][T23785] R10: 0000000000000800 R11: 0000000000000246 R12: 0000000000000001 [ 478.056431][T23785] R13: 0000000000000000 R14: 00007f38ec3b5fa0 R15: 00007ffc3a307be8 [ 478.056446][T23785] [ 478.383270][T23790] FAULT_INJECTION: forcing a failure. [ 478.383270][T23790] name failslab, interval 1, probability 0, space 0, times 0 [ 478.395970][T23790] CPU: 1 UID: 0 PID: 23790 Comm: syz.0.6951 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 478.395998][T23790] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 478.396015][T23790] Call Trace: [ 478.396034][T23790] [ 478.396041][T23790] __dump_stack+0x1d/0x30 [ 478.396060][T23790] dump_stack_lvl+0xe8/0x140 [ 478.396079][T23790] dump_stack+0x15/0x1b [ 478.396112][T23790] should_fail_ex+0x265/0x280 [ 478.396139][T23790] should_failslab+0x8c/0xb0 [ 478.396157][T23790] kmem_cache_alloc_node_noprof+0x57/0x320 [ 478.396254][T23790] ? __alloc_skb+0x101/0x320 [ 478.396273][T23790] ? tcp_chrono_stop+0x19d/0x210 [ 478.396327][T23790] __alloc_skb+0x101/0x320 [ 478.396346][T23790] tcp_stream_alloc_skb+0x2d/0x1d0 [ 478.396362][T23790] tcp_connect+0xce9/0x2290 [ 478.396414][T23790] ? tcp_fastopen_defer_connect+0x69/0x1e0 [ 478.396509][T23790] tcp_v4_connect+0x9fe/0xac0 [ 478.396537][T23790] mptcp_connect+0x4af/0x7e0 [ 478.396583][T23790] __inet_stream_connect+0x169/0x7e0 [ 478.396613][T23790] ? _raw_spin_unlock_bh+0x36/0x40 [ 478.396638][T23790] ? release_sock+0x116/0x150 [ 478.396746][T23790] ? _raw_spin_unlock_bh+0x36/0x40 [ 478.396769][T23790] ? lock_sock_nested+0x112/0x140 [ 478.396837][T23790] ? selinux_netlbl_socket_connect+0x115/0x130 [ 478.396922][T23790] inet_stream_connect+0x44/0x70 [ 478.396947][T23790] ? __pfx_inet_stream_connect+0x10/0x10 [ 478.396973][T23790] __sys_connect+0x1ef/0x2b0 [ 478.396997][T23790] __x64_sys_connect+0x3f/0x50 [ 478.397017][T23790] x64_sys_call+0x1daa/0x2fb0 [ 478.397034][T23790] do_syscall_64+0xd2/0x200 [ 478.397083][T23790] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 478.397103][T23790] ? clear_bhb_loop+0x40/0x90 [ 478.397123][T23790] ? clear_bhb_loop+0x40/0x90 [ 478.397145][T23790] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 478.397212][T23790] RIP: 0033:0x7f2036e5e969 [ 478.397224][T23790] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 478.397310][T23790] RSP: 002b:00007f20354c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 478.397422][T23790] RAX: ffffffffffffffda RBX: 00007f2037085fa0 RCX: 00007f2036e5e969 [ 478.397433][T23790] RDX: 0000000000000010 RSI: 0000200000000480 RDI: 0000000000000003 [ 478.397515][T23790] RBP: 00007f20354c7090 R08: 0000000000000000 R09: 0000000000000000 [ 478.397526][T23790] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 478.397536][T23790] R13: 0000000000000000 R14: 00007f2037085fa0 R15: 00007ffd9a1bae78 [ 478.397597][T23790] [ 479.093272][ T29] kauditd_printk_skb: 186 callbacks suppressed [ 479.093287][ T29] audit: type=1326 audit(1748679733.163:40891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23793 comm="syz.1.6953" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38ec18e969 code=0x7ffc0000 [ 479.123172][ T29] audit: type=1326 audit(1748679733.163:40892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23793 comm="syz.1.6953" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f38ec18e969 code=0x7ffc0000 [ 479.533434][T23822] loop0: detected capacity change from 0 to 128 [ 479.547557][T23824] IPv6: Can't replace route, no match found [ 479.610684][T23822] FAT-fs (loop0): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 479.705820][T23822] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 479.736632][T23833] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 479.777492][ T5374] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 479.808747][ T29] audit: type=1326 audit(1748679733.846:40893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23836 comm="syz.3.6968" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 479.833574][ T29] audit: type=1326 audit(1748679733.846:40894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23836 comm="syz.3.6968" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 479.857245][ T29] audit: type=1326 audit(1748679733.846:40895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23836 comm="syz.3.6968" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fde07dcd2d0 code=0x7ffc0000 [ 479.880910][ T29] audit: type=1326 audit(1748679733.846:40896): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23836 comm="syz.3.6968" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 479.904522][ T29] audit: type=1326 audit(1748679733.846:40897): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23836 comm="syz.3.6968" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 479.928253][ T29] audit: type=1326 audit(1748679733.846:40898): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23836 comm="syz.3.6968" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 479.952007][ T29] audit: type=1326 audit(1748679733.846:40899): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23836 comm="syz.3.6968" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 479.975616][ T29] audit: type=1326 audit(1748679733.846:40900): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23836 comm="syz.3.6968" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 480.080440][T23854] IPv6: Can't replace route, no match found [ 480.088121][T23851] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6969'. [ 480.430413][T23876] FAULT_INJECTION: forcing a failure. [ 480.430413][T23876] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 480.443732][T23876] CPU: 1 UID: 0 PID: 23876 Comm: syz.3.6982 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 480.443782][T23876] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 480.443794][T23876] Call Trace: [ 480.443799][T23876] [ 480.443806][T23876] __dump_stack+0x1d/0x30 [ 480.443824][T23876] dump_stack_lvl+0xe8/0x140 [ 480.443841][T23876] dump_stack+0x15/0x1b [ 480.443857][T23876] should_fail_ex+0x265/0x280 [ 480.443908][T23876] should_fail+0xb/0x20 [ 480.443958][T23876] should_fail_usercopy+0x1a/0x20 [ 480.443969][T23876] _copy_from_user+0x1c/0xb0 [ 480.443981][T23876] ___sys_sendmsg+0xc1/0x1d0 [ 480.444046][T23876] __x64_sys_sendmsg+0xd4/0x160 [ 480.444109][T23876] x64_sys_call+0x2999/0x2fb0 [ 480.444190][T23876] do_syscall_64+0xd2/0x200 [ 480.444204][T23876] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 480.444218][T23876] ? clear_bhb_loop+0x40/0x90 [ 480.444305][T23876] ? clear_bhb_loop+0x40/0x90 [ 480.444317][T23876] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 480.444329][T23876] RIP: 0033:0x7fde07dce969 [ 480.444339][T23876] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 480.444348][T23876] RSP: 002b:00007fde06437038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 480.444425][T23876] RAX: ffffffffffffffda RBX: 00007fde07ff5fa0 RCX: 00007fde07dce969 [ 480.444432][T23876] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000007 [ 480.444510][T23876] RBP: 00007fde06437090 R08: 0000000000000000 R09: 0000000000000000 [ 480.444517][T23876] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 480.444524][T23876] R13: 0000000000000000 R14: 00007fde07ff5fa0 R15: 00007ffd76e467b8 [ 480.444535][T23876] [ 480.682952][T23882] random: crng reseeded on system resumption [ 480.946381][T23897] IPv6: Can't replace route, no match found [ 480.960542][T23900] loop9: detected capacity change from 0 to 1024 [ 480.967608][T23900] ext4: Unknown parameter 'func' [ 481.136425][T23911] loop1: detected capacity change from 0 to 1024 [ 481.166090][T23911] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 481.178431][T23911] ext4 filesystem being mounted at /131/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 481.668372][T22172] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 481.747097][T23921] loop1: detected capacity change from 0 to 128 [ 481.802825][T23925] loop0: detected capacity change from 0 to 128 [ 481.810158][T23925] FAT-fs (loop0): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 481.822304][T23925] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 481.842714][ T5342] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 481.874288][T23932] FAULT_INJECTION: forcing a failure. [ 481.874288][T23932] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 481.887390][T23932] CPU: 1 UID: 0 PID: 23932 Comm: syz.0.7000 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 481.887418][T23932] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 481.887431][T23932] Call Trace: [ 481.887437][T23932] [ 481.887444][T23932] __dump_stack+0x1d/0x30 [ 481.887520][T23932] dump_stack_lvl+0xe8/0x140 [ 481.887537][T23932] dump_stack+0x15/0x1b [ 481.887550][T23932] should_fail_ex+0x265/0x280 [ 481.887577][T23932] should_fail+0xb/0x20 [ 481.887663][T23932] should_fail_usercopy+0x1a/0x20 [ 481.887680][T23932] _copy_from_iter+0xcf/0xe40 [ 481.887697][T23932] ? __build_skb_around+0x1a0/0x200 [ 481.887717][T23932] ? __alloc_skb+0x223/0x320 [ 481.887736][T23932] netlink_sendmsg+0x471/0x6b0 [ 481.887814][T23932] ? __pfx_netlink_sendmsg+0x10/0x10 [ 481.887839][T23932] __sock_sendmsg+0x142/0x180 [ 481.887927][T23932] ____sys_sendmsg+0x31e/0x4e0 [ 481.887950][T23932] ___sys_sendmsg+0x17b/0x1d0 [ 481.887980][T23932] __x64_sys_sendmsg+0xd4/0x160 [ 481.888007][T23932] x64_sys_call+0x2999/0x2fb0 [ 481.888094][T23932] do_syscall_64+0xd2/0x200 [ 481.888117][T23932] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 481.888191][T23932] ? clear_bhb_loop+0x40/0x90 [ 481.888211][T23932] ? clear_bhb_loop+0x40/0x90 [ 481.888293][T23932] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 481.888313][T23932] RIP: 0033:0x7f2036e5e969 [ 481.888326][T23932] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 481.888340][T23932] RSP: 002b:00007f20354c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 481.888356][T23932] RAX: ffffffffffffffda RBX: 00007f2037085fa0 RCX: 00007f2036e5e969 [ 481.888366][T23932] RDX: 0000000000008080 RSI: 0000200000000080 RDI: 0000000000000005 [ 481.888409][T23932] RBP: 00007f20354c7090 R08: 0000000000000000 R09: 0000000000000000 [ 481.888421][T23932] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 481.888432][T23932] R13: 0000000000000000 R14: 00007f2037085fa0 R15: 00007ffd9a1bae78 [ 481.888448][T23932] [ 482.118916][T23938] veth43: entered promiscuous mode [ 482.124059][T23938] veth43: entered allmulticast mode [ 482.132365][T23938] 9pnet: p9_errstr2errno: server reported unknown error @L O!L [ 482.195403][T23944] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 482.226159][T23948] loop9: detected capacity change from 0 to 1024 [ 482.235158][T23948] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 482.247470][T23948] ext4 filesystem being mounted at /467/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 482.656758][T23956] IPv6: Can't replace route, no match found [ 482.683176][T23958] loop1: detected capacity change from 0 to 128 [ 482.689973][T23958] FAT-fs (loop1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 482.703127][T23958] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 482.726597][ T5374] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 482.814000][T23970] netlink: 12 bytes leftover after parsing attributes in process `syz.3.7017'. [ 482.833842][T17149] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 482.853619][T23975] xt_SECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 482.877499][T23982] FAULT_INJECTION: forcing a failure. [ 482.877499][T23982] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 482.880255][T23977] 9pnet: Could not find request transport: 0xffffffffffffffff [ 482.890587][T23982] CPU: 0 UID: 0 PID: 23982 Comm: syz.9.7021 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 482.890614][T23982] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 482.890624][T23982] Call Trace: [ 482.890630][T23982] [ 482.890638][T23982] __dump_stack+0x1d/0x30 [ 482.890660][T23982] dump_stack_lvl+0xe8/0x140 [ 482.890682][T23982] dump_stack+0x15/0x1b [ 482.890699][T23982] should_fail_ex+0x265/0x280 [ 482.890729][T23982] should_fail+0xb/0x20 [ 482.890754][T23982] should_fail_usercopy+0x1a/0x20 [ 482.890814][T23982] _copy_to_user+0x20/0xa0 [ 482.890836][T23982] simple_read_from_buffer+0xb5/0x130 [ 482.890865][T23982] proc_fail_nth_read+0x100/0x140 [ 482.890886][T23982] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 482.890968][T23982] vfs_read+0x1a0/0x6f0 [ 482.891073][T23982] ? __rcu_read_unlock+0x4f/0x70 [ 482.891093][T23982] ? __rcu_read_unlock+0x4f/0x70 [ 482.891113][T23982] ? __fget_files+0x184/0x1c0 [ 482.891179][T23982] ksys_read+0xda/0x1a0 [ 482.891198][T23982] __x64_sys_read+0x40/0x50 [ 482.891215][T23982] x64_sys_call+0x2d77/0x2fb0 [ 482.891235][T23982] do_syscall_64+0xd2/0x200 [ 482.891259][T23982] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 482.891315][T23982] ? clear_bhb_loop+0x40/0x90 [ 482.891336][T23982] ? clear_bhb_loop+0x40/0x90 [ 482.891411][T23982] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 482.891432][T23982] RIP: 0033:0x7f6464b6d37c [ 482.891460][T23982] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 482.891479][T23982] RSP: 002b:00007f64631d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 482.891554][T23982] RAX: ffffffffffffffda RBX: 00007f6464d95fa0 RCX: 00007f6464b6d37c [ 482.891567][T23982] RDX: 000000000000000f RSI: 00007f64631d70a0 RDI: 0000000000000006 [ 482.891579][T23982] RBP: 00007f64631d7090 R08: 0000000000000000 R09: 0000000000000000 [ 482.891606][T23982] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 482.891618][T23982] R13: 0000000000000000 R14: 00007f6464d95fa0 R15: 00007ffe1a70ebb8 [ 482.891637][T23982] [ 482.979629][T23985] netlink: 4 bytes leftover after parsing attributes in process `syz.3.7019'. [ 483.100848][T23988] loop9: detected capacity change from 0 to 128 [ 483.123734][T23988] FAT-fs (loop9): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 483.135657][T23988] FAT-fs (loop9): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 483.149696][T23991] loop1: detected capacity change from 0 to 128 [ 483.166758][ T4337] FAT-fs (loop9): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 483.682107][T23999] syz.9.7027 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 483.696405][T23999] CPU: 1 UID: 0 PID: 23999 Comm: syz.9.7027 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 483.696436][T23999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 483.696447][T23999] Call Trace: [ 483.696453][T23999] [ 483.696460][T23999] __dump_stack+0x1d/0x30 [ 483.696482][T23999] dump_stack_lvl+0xe8/0x140 [ 483.696503][T23999] dump_stack+0x15/0x1b [ 483.696654][T23999] dump_header+0x81/0x220 [ 483.696713][T23999] oom_kill_process+0x334/0x3f0 [ 483.696764][T23999] out_of_memory+0x979/0xb80 [ 483.696789][T23999] ? css_next_descendant_pre+0x138/0x160 [ 483.696814][T23999] mem_cgroup_out_of_memory+0x13d/0x190 [ 483.696842][T23999] try_charge_memcg+0x5e2/0x870 [ 483.696910][T23999] obj_cgroup_charge_pages+0xb7/0x1a0 [ 483.697017][T23999] __memcg_kmem_charge_page+0x9f/0x170 [ 483.697043][T23999] __alloc_frozen_pages_noprof+0x188/0x360 [ 483.697103][T23999] alloc_pages_mpol+0xb3/0x250 [ 483.697174][T23999] alloc_pages_noprof+0x90/0x130 [ 483.697227][T23999] __vmalloc_node_range_noprof+0x6d5/0xe40 [ 483.697263][T23999] __kvmalloc_node_noprof+0x312/0x4f0 [ 483.697287][T23999] ? ip_set_alloc+0x1f/0x30 [ 483.697378][T23999] ? ip_set_alloc+0x1f/0x30 [ 483.697396][T23999] ? __kmalloc_cache_noprof+0x189/0x320 [ 483.697420][T23999] ip_set_alloc+0x1f/0x30 [ 483.697438][T23999] hash_netiface_create+0x282/0x740 [ 483.697515][T23999] ? __pfx_hash_netiface_create+0x10/0x10 [ 483.697604][T23999] ip_set_create+0x3c9/0x960 [ 483.697704][T23999] ? __nla_parse+0x40/0x60 [ 483.697727][T23999] nfnetlink_rcv_msg+0x4c6/0x590 [ 483.697858][T23999] ? selinux_capable+0x1f9/0x270 [ 483.697884][T23999] netlink_rcv_skb+0x123/0x220 [ 483.697943][T23999] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 483.697977][T23999] nfnetlink_rcv+0x16b/0x1690 [ 483.698033][T23999] ? __kfree_skb+0x109/0x150 [ 483.698052][T23999] ? nlmon_xmit+0x4f/0x60 [ 483.698069][T23999] ? consume_skb+0x49/0x150 [ 483.698134][T23999] ? nlmon_xmit+0x4f/0x60 [ 483.698153][T23999] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 483.698235][T23999] ? __dev_queue_xmit+0x11c0/0x1fb0 [ 483.698348][T23999] ? __dev_queue_xmit+0x182/0x1fb0 [ 483.698369][T23999] ? __bpf_ringbuf_reserve+0x45a/0x530 [ 483.698393][T23999] ? ref_tracker_free+0x37d/0x3e0 [ 483.698423][T23999] ? __netlink_deliver_tap+0x4dc/0x500 [ 483.698502][T23999] netlink_unicast+0x59e/0x670 [ 483.698527][T23999] netlink_sendmsg+0x58b/0x6b0 [ 483.698604][T23999] ? __pfx_netlink_sendmsg+0x10/0x10 [ 483.698631][T23999] __sock_sendmsg+0x142/0x180 [ 483.698724][T23999] ____sys_sendmsg+0x31e/0x4e0 [ 483.698749][T23999] ___sys_sendmsg+0x17b/0x1d0 [ 483.698797][T23999] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 483.698899][T23999] __x64_sys_sendmsg+0xd4/0x160 [ 483.698926][T23999] x64_sys_call+0x2999/0x2fb0 [ 483.698949][T23999] do_syscall_64+0xd2/0x200 [ 483.698971][T23999] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 483.699037][T23999] ? clear_bhb_loop+0x40/0x90 [ 483.699060][T23999] ? clear_bhb_loop+0x40/0x90 [ 483.699103][T23999] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 483.699146][T23999] RIP: 0033:0x7f6464b6e969 [ 483.699162][T23999] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 483.699180][T23999] RSP: 002b:00007f64631d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 483.699264][T23999] RAX: ffffffffffffffda RBX: 00007f6464d95fa0 RCX: 00007f6464b6e969 [ 483.699278][T23999] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000005 [ 483.699292][T23999] RBP: 00007f6464bf0ab1 R08: 0000000000000000 R09: 0000000000000000 [ 483.699305][T23999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 483.699315][T23999] R13: 0000000000000000 R14: 00007f6464d95fa0 R15: 00007ffe1a70ebb8 [ 483.699351][T23999] [ 484.065508][T23999] memory: usage 307200kB, limit 307200kB, failcnt 749 [ 484.072355][T23999] memory+swap: usage 307376kB, limit 9007199254740988kB, failcnt 0 [ 484.080314][T23999] kmem: usage 307172kB, limit 9007199254740988kB, failcnt 0 [ 484.087629][T23999] Memory cgroup stats for /syz9: [ 484.116256][T23999] cache 0 [ 484.124221][T23999] rss 0 [ 484.127149][T23999] shmem 0 [ 484.130336][T23999] mapped_file 0 [ 484.134222][T23999] dirty 0 [ 484.137306][T23999] writeback 28672 [ 484.140941][T23999] workingset_refault_anon 106 [ 484.145824][T23999] workingset_refault_file 0 [ 484.150424][T23999] swap 180224 [ 484.153702][T23999] swapcached 28672 [ 484.157431][T23999] nr_memmap_boot_pages 141401 [ 484.162197][T23999] pgpgin 141394 [ 484.165782][T23999] pglazyfree 172871 [ 484.169715][T23999] pgfault 65 [ 484.172915][T23999] a_other 28672 [ 484.176369][T23999] inactive_anon 0 [ 484.180163][T23999] active_anon 0 [ 484.183623][T23999] inactive_file 0 [ 484.187256][T23999] active_file 0 [ 484.190738][T23999] hierarchical_memory_limit 314572800 [ 484.196182][T23999] hierarchical_memsw_limit 9223372036854771712 [ 484.202536][T23999] total_cache 0 [ 484.206063][T23999] total_rss 0 [ 484.209335][T23999] total_shmem 0 [ 484.212812][T23999] total_mapped_file 0 [ 484.216771][T23999] total_dirty 0 [ 484.220202][T23999] total_writeback 28672 [ 484.224348][T23999] total_workingset_refault_anon 106 [ 484.229576][T23999] total_workingset_refault_file 0 [ 484.234585][T23999] total_swap 180224 [ 484.238366][T23999] total_swapcached 28672 [ 484.242586][T23999] total_nr_memmap_boot_pages 141401 [ 484.247769][T23999] total_pgpgin 141394 [ 484.251789][T23999] total_pglazyfree 172871 [ 484.256173][T23999] total_pgfault 65 [ 484.259878][T23999] total_a_other 28672 [ 484.263918][T23999] total_inactive_anon 0 [ 484.268193][T23999] total_active_anon 0 [ 484.272244][T23999] total_inactive_file 0 [ 484.274695][T24019] netlink: 4 bytes leftover after parsing attributes in process `syz.3.7035'. [ 484.276438][T23999] total_active_file 0 [ 484.289286][T23999] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz9,task_memcg=/syz9,task=syz.9.7027,pid=23998,uid=0 [ 484.303940][T23999] Memory cgroup out of memory: Killed process 23998 (syz.9.7027) total-vm:93748kB, anon-rss:936kB, file-rss:22440kB, shmem-rss:0kB, UID:0 pgtables:124kB oom_score_adj:1000 [ 484.582293][T24030] loop0: detected capacity change from 0 to 128 [ 484.589250][T24030] FAT-fs (loop0): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 484.600169][ T29] kauditd_printk_skb: 280 callbacks suppressed [ 484.600182][ T29] audit: type=1326 audit(1748679738.327:41181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24031 comm="syz.3.7039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 484.632686][T24030] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 484.658137][ T29] audit: type=1326 audit(1748679738.355:41182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24031 comm="syz.3.7039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fde07dcd2d0 code=0x7ffc0000 [ 484.681840][ T29] audit: type=1326 audit(1748679738.355:41183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24031 comm="syz.3.7039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 484.705425][ T29] audit: type=1326 audit(1748679738.355:41184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24031 comm="syz.3.7039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 484.728993][ T29] audit: type=1326 audit(1748679738.355:41185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24031 comm="syz.3.7039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 484.752467][ T29] audit: type=1326 audit(1748679738.355:41186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24031 comm="syz.3.7039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 484.776054][ T29] audit: type=1326 audit(1748679738.355:41187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24031 comm="syz.3.7039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 484.799627][ T29] audit: type=1326 audit(1748679738.355:41188): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24031 comm="syz.3.7039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 484.823257][ T29] audit: type=1326 audit(1748679738.355:41189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24031 comm="syz.3.7039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 484.846833][ T29] audit: type=1326 audit(1748679738.355:41190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24031 comm="syz.3.7039" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 484.885918][ T4337] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 484.940934][T24044] loop0: detected capacity change from 0 to 128 [ 484.968220][T24044] FAT-fs (loop0): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 484.983123][T24044] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 485.007978][ T4337] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 485.270770][T24057] veth27: entered promiscuous mode [ 485.275972][T24057] veth27: entered allmulticast mode [ 485.284156][T24057] 9pnet: p9_errstr2errno: server reported unknown error @L O!L [ 485.372778][T24067] loop1: detected capacity change from 0 to 164 [ 485.583818][T24078] FAULT_INJECTION: forcing a failure. [ 485.583818][T24078] name failslab, interval 1, probability 0, space 0, times 0 [ 485.596611][T24078] CPU: 1 UID: 0 PID: 24078 Comm: syz.1.7056 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 485.596635][T24078] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 485.596645][T24078] Call Trace: [ 485.596651][T24078] [ 485.596663][T24078] __dump_stack+0x1d/0x30 [ 485.596743][T24078] dump_stack_lvl+0xe8/0x140 [ 485.596763][T24078] dump_stack+0x15/0x1b [ 485.596781][T24078] should_fail_ex+0x265/0x280 [ 485.596810][T24078] should_failslab+0x8c/0xb0 [ 485.596831][T24078] kmem_cache_alloc_noprof+0x50/0x310 [ 485.596867][T24078] ? skb_clone+0x151/0x1f0 [ 485.596894][T24078] skb_clone+0x151/0x1f0 [ 485.596974][T24078] __netlink_deliver_tap+0x2c9/0x500 [ 485.597004][T24078] netlink_unicast+0x64c/0x670 [ 485.597027][T24078] netlink_sendmsg+0x58b/0x6b0 [ 485.597104][T24078] ? __pfx_netlink_sendmsg+0x10/0x10 [ 485.597129][T24078] __sock_sendmsg+0x142/0x180 [ 485.597193][T24078] ____sys_sendmsg+0x31e/0x4e0 [ 485.597221][T24078] ___sys_sendmsg+0x17b/0x1d0 [ 485.597303][T24078] __x64_sys_sendmsg+0xd4/0x160 [ 485.597405][T24078] x64_sys_call+0x2999/0x2fb0 [ 485.597423][T24078] do_syscall_64+0xd2/0x200 [ 485.597443][T24078] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 485.597468][T24078] ? clear_bhb_loop+0x40/0x90 [ 485.597502][T24078] ? clear_bhb_loop+0x40/0x90 [ 485.597532][T24078] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 485.597549][T24078] RIP: 0033:0x7f38ec18e969 [ 485.597562][T24078] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 485.597576][T24078] RSP: 002b:00007f38ea7f7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 485.597666][T24078] RAX: ffffffffffffffda RBX: 00007f38ec3b5fa0 RCX: 00007f38ec18e969 [ 485.597749][T24078] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000006 [ 485.597760][T24078] RBP: 00007f38ea7f7090 R08: 0000000000000000 R09: 0000000000000000 [ 485.597771][T24078] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 485.597784][T24078] R13: 0000000000000000 R14: 00007f38ec3b5fa0 R15: 00007ffc3a307be8 [ 485.597804][T24078] [ 485.869869][T24085] IPv6: Can't replace route, no match found [ 486.009944][T24095] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7063'. [ 486.020620][T24098] FAULT_INJECTION: forcing a failure. [ 486.020620][T24098] name failslab, interval 1, probability 0, space 0, times 0 [ 486.033343][T24098] CPU: 1 UID: 0 PID: 24098 Comm: syz.3.7064 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 486.033415][T24098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 486.033425][T24098] Call Trace: [ 486.033431][T24098] [ 486.033438][T24098] __dump_stack+0x1d/0x30 [ 486.033456][T24098] dump_stack_lvl+0xe8/0x140 [ 486.033536][T24098] dump_stack+0x15/0x1b [ 486.033549][T24098] should_fail_ex+0x265/0x280 [ 486.033572][T24098] ? alloc_netdev_mqs+0x829/0xab0 [ 486.033593][T24098] should_failslab+0x8c/0xb0 [ 486.033660][T24098] __kmalloc_cache_noprof+0x4c/0x320 [ 486.033684][T24098] alloc_netdev_mqs+0x829/0xab0 [ 486.033704][T24098] slip_open+0x2d1/0x920 [ 486.033760][T24098] ? vfree+0x374/0x3f0 [ 486.033781][T24098] ? up_write+0x18/0x60 [ 486.033798][T24098] tty_ldisc_open+0x5d/0xb0 [ 486.033849][T24098] tty_set_ldisc+0x1db/0x380 [ 486.033871][T24098] tiocsetd+0x51/0x60 [ 486.033928][T24098] tty_ioctl+0xa7f/0xb80 [ 486.033948][T24098] ? __pfx_tty_ioctl+0x10/0x10 [ 486.033969][T24098] __se_sys_ioctl+0xce/0x140 [ 486.034032][T24098] __x64_sys_ioctl+0x43/0x50 [ 486.034116][T24098] x64_sys_call+0x19a8/0x2fb0 [ 486.034133][T24098] do_syscall_64+0xd2/0x200 [ 486.034152][T24098] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 486.034172][T24098] ? clear_bhb_loop+0x40/0x90 [ 486.034204][T24098] ? clear_bhb_loop+0x40/0x90 [ 486.034221][T24098] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 486.034238][T24098] RIP: 0033:0x7fde07dce969 [ 486.034251][T24098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 486.034265][T24098] RSP: 002b:00007fde06416038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 486.034347][T24098] RAX: ffffffffffffffda RBX: 00007fde07ff6080 RCX: 00007fde07dce969 [ 486.034358][T24098] RDX: 00002000000002c0 RSI: 0000000000005423 RDI: 0000000000000008 [ 486.034369][T24098] RBP: 00007fde06416090 R08: 0000000000000000 R09: 0000000000000000 [ 486.034435][T24098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 486.034445][T24098] R13: 0000000000000000 R14: 00007fde07ff6080 R15: 00007ffd76e467b8 [ 486.034460][T24098] [ 486.048622][T24071] syz.0.7054 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 486.113404][T24102] veth45: entered promiscuous mode [ 486.117350][T24071] CPU: 0 UID: 0 PID: 24071 Comm: syz.0.7054 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 486.117376][T24071] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 486.117389][T24071] Call Trace: [ 486.117400][T24071] [ 486.117409][T24071] __dump_stack+0x1d/0x30 [ 486.117431][T24071] dump_stack_lvl+0xe8/0x140 [ 486.117475][T24071] dump_stack+0x15/0x1b [ 486.117492][T24071] dump_header+0x81/0x220 [ 486.117522][T24071] oom_kill_process+0x334/0x3f0 [ 486.117553][T24071] out_of_memory+0x979/0xb80 [ 486.117604][T24071] ? css_next_descendant_pre+0x138/0x160 [ 486.117626][T24071] mem_cgroup_out_of_memory+0x13d/0x190 [ 486.117690][T24071] try_charge_memcg+0x5e2/0x870 [ 486.117726][T24071] obj_cgroup_charge_pages+0xb7/0x1a0 [ 486.117754][T24071] __memcg_kmem_charge_page+0x9f/0x170 [ 486.117817][T24071] __alloc_frozen_pages_noprof+0x188/0x360 [ 486.117897][T24071] alloc_pages_mpol+0xb3/0x250 [ 486.117969][T24071] alloc_pages_noprof+0x90/0x130 [ 486.117997][T24071] __vmalloc_node_range_noprof+0x6d5/0xe40 [ 486.118038][T24071] __kvmalloc_node_noprof+0x312/0x4f0 [ 486.118126][T24071] ? ip_set_alloc+0x1f/0x30 [ 486.118146][T24071] ? ip_set_alloc+0x1f/0x30 [ 486.118167][T24071] ? __kmalloc_cache_noprof+0x189/0x320 [ 486.118220][T24071] ip_set_alloc+0x1f/0x30 [ 486.118313][T24071] hash_netiface_create+0x282/0x740 [ 486.118338][T24071] ? __pfx_hash_netiface_create+0x10/0x10 [ 486.118362][T24071] ip_set_create+0x3c9/0x960 [ 486.118399][T24071] ? __nla_parse+0x40/0x60 [ 486.118442][T24071] nfnetlink_rcv_msg+0x4c6/0x590 [ 486.118540][T24071] ? selinux_capable+0x1f9/0x270 [ 486.118570][T24071] netlink_rcv_skb+0x123/0x220 [ 486.118594][T24071] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 486.118630][T24071] nfnetlink_rcv+0x16b/0x1690 [ 486.118695][T24071] ? __kfree_skb+0x109/0x150 [ 486.118733][T24071] ? nlmon_xmit+0x4f/0x60 [ 486.118754][T24071] ? consume_skb+0x49/0x150 [ 486.118775][T24071] ? nlmon_xmit+0x4f/0x60 [ 486.118796][T24071] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 486.118824][T24071] ? __dev_queue_xmit+0x11c0/0x1fb0 [ 486.118973][T24071] ? __dev_queue_xmit+0x182/0x1fb0 [ 486.118997][T24071] ? __bpf_ringbuf_reserve+0x45a/0x530 [ 486.119019][T24071] ? ref_tracker_free+0x37d/0x3e0 [ 486.119126][T24071] ? __netlink_deliver_tap+0x4dc/0x500 [ 486.119155][T24071] netlink_unicast+0x59e/0x670 [ 486.119180][T24071] netlink_sendmsg+0x58b/0x6b0 [ 486.119261][T24071] ? __pfx_netlink_sendmsg+0x10/0x10 [ 486.119287][T24071] __sock_sendmsg+0x142/0x180 [ 486.119318][T24071] ____sys_sendmsg+0x31e/0x4e0 [ 486.119401][T24071] ___sys_sendmsg+0x17b/0x1d0 [ 486.119424][T24071] ? _raw_spin_unlock_irqrestore+0x2b/0x60 [ 486.119548][T24071] __x64_sys_sendmsg+0xd4/0x160 [ 486.119640][T24071] x64_sys_call+0x2999/0x2fb0 [ 486.119660][T24071] do_syscall_64+0xd2/0x200 [ 486.119697][T24071] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 486.119773][T24071] ? clear_bhb_loop+0x40/0x90 [ 486.119794][T24071] ? clear_bhb_loop+0x40/0x90 [ 486.119815][T24071] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 486.119836][T24071] RIP: 0033:0x7f2036e5e969 [ 486.119852][T24071] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 486.119939][T24071] RSP: 002b:00007f20354c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 486.119959][T24071] RAX: ffffffffffffffda RBX: 00007f2037085fa0 RCX: 00007f2036e5e969 [ 486.119975][T24071] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000005 [ 486.119988][T24071] RBP: 00007f2036ee0ab1 R08: 0000000000000000 R09: 0000000000000000 [ 486.120038][T24071] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 486.120051][T24071] R13: 0000000000000000 R14: 00007f2037085fa0 R15: 00007ffd9a1bae78 [ 486.120069][T24071] [ 486.120076][T24071] memory: usage 307200kB, limit 307200kB, failcnt 139 [ 486.121856][T24102] veth45: entered allmulticast mode [ 486.126652][T24071] memory+swap: usage 307704kB, limit 9007199254740988kB, failcnt 0 [ 486.233786][T24102] 9pnet: p9_errstr2errno: server reported unknown error @L O!L [ 486.236040][T24071] kmem: usage 307168kB, limit 9007199254740988kB, failcnt 0 [ 486.309927][T24109] loop1: detected capacity change from 0 to 128 [ 486.311828][T24071] Memory cgroup stats for /syz0 [ 486.316461][T24109] FAT-fs (loop1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 486.320294][T24071] : [ 486.320553][T24071] cache 4096 [ 486.325432][T24109] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 486.329725][T24071] rss 24576 [ 486.329735][T24071] shmem 0 [ 486.329741][T24071] mapped_file 0 [ 486.329747][T24071] dirty 0 [ 486.727667][T24071] writeback 24576 [ 486.731305][T24071] workingset_refault_anon 9 [ 486.735848][T24071] workingset_refault_file 35 [ 486.740413][T24071] swap 516096 [ 486.743674][T24071] swapcached 24576 [ 486.747394][T24071] nr_memmap_boot_pages 250885 [ 486.752045][T24071] pgpgin 250877 [ 486.755560][T24071] pglazyfree 261871 [ 486.759355][T24071] pgfault 16 [ 486.762528][T24071] a_other 4096 [ 486.765903][T24071] inactive_anon 0 [ 486.769628][T24071] active_anon 0 [ 486.773069][T24071] inactive_file 4096 [ 486.776973][T24071] active_file 0 [ 486.780457][T24071] hierarchical_memory_limit 314572800 [ 486.785809][T24071] hierarchical_memsw_limit 9223372036854771712 [ 486.791961][T24071] total_cache 4096 [ 486.795671][T24071] total_rss 24576 [ 486.799298][T24071] total_shmem 0 [ 486.802734][T24071] total_mapped_file 0 [ 486.806699][T24071] total_dirty 0 [ 486.810162][T24071] total_writeback 24576 [ 486.814297][T24071] total_workingset_refault_anon 9 [ 486.819374][T24071] total_workingset_refault_file 35 [ 486.824470][T24071] total_swap 516096 [ 486.828315][T24071] total_swapcached 24576 [ 486.832625][T24071] total_nr_memmap_boot_pages 250885 [ 486.837797][T24071] total_pgpgin 250877 [ 486.841762][T24071] total_pglazyfree 261871 [ 486.846063][T24071] total_pgfault 16 [ 486.849767][T24071] total_a_other 4096 [ 486.853649][T24071] total_inactive_anon 0 [ 486.857894][T24071] total_active_anon 0 [ 486.861862][T24071] total_inactive_file 4096 [ 486.866310][T24071] total_active_file 0 [ 486.870327][T24071] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz0,task_memcg=/syz0,task=syz.0.7054,pid=24070,uid=0 [ 486.884985][T24071] Memory cgroup out of memory: Killed process 24070 (syz.0.7054) total-vm:93748kB, anon-rss:936kB, file-rss:22308kB, shmem-rss:0kB, UID:0 pgtables:128kB oom_score_adj:1000 [ 486.923957][ T4337] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 487.165238][T24130] IPv6: Can't replace route, no match found [ 487.217385][T24136] loop0: detected capacity change from 0 to 512 [ 487.224052][T24136] EXT4-fs (loop0): mounting ext3 file system using the ext4 subsystem [ 487.230374][T24137] IPv6: Can't replace route, no match found [ 487.242607][T24136] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=8042c11d, mo2=0002] [ 487.251973][T24136] EXT4-fs error (device loop0): ext4_iget_extra_inode:5035: inode #15: comm syz.0.7077: corrupted in-inode xattr: e_value size too large [ 487.266257][T24136] EXT4-fs error (device loop0): ext4_orphan_get:1398: comm syz.0.7077: couldn't read orphan inode 15 (err -117) [ 487.267316][T24142] loop1: detected capacity change from 0 to 128 [ 487.279358][T24136] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 487.284942][T24142] FAT-fs (loop1): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 487.308667][T24142] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 487.327253][T17340] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 487.336496][ T4337] FAT-fs (loop1): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 487.368064][T24144] validate_nla: 26 callbacks suppressed [ 487.368079][T24144] netlink: 'syz.1.7080': attribute type 46 has an invalid length. [ 487.858586][T24154] netlink: 8 bytes leftover after parsing attributes in process `syz.3.7083'. [ 488.382531][T24182] loop1: detected capacity change from 0 to 764 [ 488.556670][T24162] syz.9.7087 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 488.570826][T24162] CPU: 0 UID: 0 PID: 24162 Comm: syz.9.7087 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 488.570870][T24162] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 488.570889][T24162] Call Trace: [ 488.570897][T24162] [ 488.570906][T24162] __dump_stack+0x1d/0x30 [ 488.570929][T24162] dump_stack_lvl+0xe8/0x140 [ 488.571011][T24162] dump_stack+0x15/0x1b [ 488.571020][T24162] dump_header+0x81/0x220 [ 488.571039][T24162] oom_kill_process+0x334/0x3f0 [ 488.571062][T24162] out_of_memory+0x979/0xb80 [ 488.571078][T24162] ? css_next_descendant_pre+0x138/0x160 [ 488.571125][T24162] mem_cgroup_out_of_memory+0x13d/0x190 [ 488.571171][T24162] try_charge_memcg+0x5e2/0x870 [ 488.571225][T24162] obj_cgroup_charge_pages+0xb7/0x1a0 [ 488.571242][T24162] __memcg_kmem_charge_page+0x9f/0x170 [ 488.571262][T24162] __alloc_frozen_pages_noprof+0x188/0x360 [ 488.571353][T24162] alloc_pages_mpol+0xb3/0x250 [ 488.571370][T24162] alloc_pages_noprof+0x90/0x130 [ 488.571432][T24162] __vmalloc_node_range_noprof+0x6d5/0xe40 [ 488.571456][T24162] __kvmalloc_node_noprof+0x312/0x4f0 [ 488.571482][T24162] ? ip_set_alloc+0x1f/0x30 [ 488.571494][T24162] ? ip_set_alloc+0x1f/0x30 [ 488.571505][T24162] ? __kmalloc_cache_noprof+0x189/0x320 [ 488.571566][T24162] ip_set_alloc+0x1f/0x30 [ 488.571591][T24162] hash_netiface_create+0x282/0x740 [ 488.571682][T24162] ? __pfx_hash_netiface_create+0x10/0x10 [ 488.571696][T24162] ip_set_create+0x3c9/0x960 [ 488.571720][T24162] ? __nla_parse+0x40/0x60 [ 488.571784][T24162] nfnetlink_rcv_msg+0x4c6/0x590 [ 488.571813][T24162] ? selinux_capable+0x1f9/0x270 [ 488.571835][T24162] netlink_rcv_skb+0x123/0x220 [ 488.571883][T24162] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 488.571936][T24162] nfnetlink_rcv+0x16b/0x1690 [ 488.571985][T24162] ? __kfree_skb+0x109/0x150 [ 488.572044][T24162] ? nlmon_xmit+0x4f/0x60 [ 488.572115][T24162] ? consume_skb+0x49/0x150 [ 488.572127][T24162] ? nlmon_xmit+0x4f/0x60 [ 488.572139][T24162] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 488.572174][T24162] ? __dev_queue_xmit+0x11c0/0x1fb0 [ 488.572188][T24162] ? __dev_queue_xmit+0x182/0x1fb0 [ 488.572207][T24162] ? __bpf_ringbuf_reserve+0x45a/0x530 [ 488.572241][T24162] ? ref_tracker_free+0x37d/0x3e0 [ 488.572273][T24162] ? __netlink_deliver_tap+0x4dc/0x500 [ 488.572371][T24162] netlink_unicast+0x59e/0x670 [ 488.572393][T24162] netlink_sendmsg+0x58b/0x6b0 [ 488.572425][T24162] ? __pfx_netlink_sendmsg+0x10/0x10 [ 488.572449][T24162] __sock_sendmsg+0x142/0x180 [ 488.572562][T24162] ____sys_sendmsg+0x31e/0x4e0 [ 488.572589][T24162] ___sys_sendmsg+0x17b/0x1d0 [ 488.572628][T24162] __x64_sys_sendmsg+0xd4/0x160 [ 488.572688][T24162] x64_sys_call+0x2999/0x2fb0 [ 488.572709][T24162] do_syscall_64+0xd2/0x200 [ 488.572814][T24162] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 488.572842][T24162] ? clear_bhb_loop+0x40/0x90 [ 488.572865][T24162] ? clear_bhb_loop+0x40/0x90 [ 488.572885][T24162] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 488.572903][T24162] RIP: 0033:0x7f6464b6e969 [ 488.572988][T24162] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 488.573001][T24162] RSP: 002b:00007f64631d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 488.573070][T24162] RAX: ffffffffffffffda RBX: 00007f6464d95fa0 RCX: 00007f6464b6e969 [ 488.573081][T24162] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000005 [ 488.573131][T24162] RBP: 00007f6464bf0ab1 R08: 0000000000000000 R09: 0000000000000000 [ 488.573145][T24162] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 488.573164][T24162] R13: 0000000000000000 R14: 00007f6464d95fa0 R15: 00007ffe1a70ebb8 [ 488.573185][T24162] [ 488.932894][T24162] memory: usage 307200kB, limit 307200kB, failcnt 988 [ 488.939687][T24162] memory+swap: usage 307372kB, limit 9007199254740988kB, failcnt 0 [ 488.947594][T24162] kmem: usage 307168kB, limit 9007199254740988kB, failcnt 0 [ 488.954870][T24162] Memory cgroup stats for /syz9: [ 488.967534][T24162] cache 0 [ 488.975532][T24162] rss 4096 [ 488.978598][T24162] shmem 0 [ 488.981599][T24162] mapped_file 0 [ 488.985051][T24162] dirty 0 [ 488.987992][T24162] writeback 32768 [ 488.991652][T24162] workingset_refault_anon 134 [ 488.996337][T24162] workingset_refault_file 0 [ 489.000863][T24162] swap 176128 [ 489.004368][T24162] swapcached 32768 [ 489.008194][T24162] nr_memmap_boot_pages 141796 [ 489.012896][T24162] pgpgin 141788 [ 489.016352][T24162] pglazyfree 173822 [ 489.020158][T24162] pgfault 78 [ 489.023422][T24162] a_other 32768 [ 489.026877][T24162] inactive_anon 0 [ 489.030590][T24162] active_anon 0 [ 489.034060][T24162] inactive_file 0 [ 489.037698][T24162] active_file 0 [ 489.041210][T24162] hierarchical_memory_limit 314572800 [ 489.046586][T24162] hierarchical_memsw_limit 9223372036854771712 [ 489.052740][T24162] total_cache 0 [ 489.056227][T24162] total_rss 4096 [ 489.059751][T24162] total_shmem 0 [ 489.063186][T24162] total_mapped_file 0 [ 489.067233][T24162] total_dirty 0 [ 489.070676][T24162] total_writeback 32768 [ 489.074827][T24162] total_workingset_refault_anon 134 [ 489.080076][T24162] total_workingset_refault_file 0 [ 489.085091][T24162] total_swap 176128 [ 489.088933][T24162] total_swapcached 32768 [ 489.093233][T24162] total_nr_memmap_boot_pages 141796 [ 489.098458][T24162] total_pgpgin 141788 [ 489.102419][T24162] total_pglazyfree 173822 [ 489.106831][T24162] total_pgfault 78 [ 489.110538][T24162] total_a_other 32768 [ 489.114492][T24162] total_inactive_anon 0 [ 489.118729][T24162] total_active_anon 0 [ 489.122694][T24162] total_inactive_file 0 [ 489.126823][T24162] total_active_file 0 [ 489.130885][T24162] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz9,task_memcg=/syz9,task=syz.9.7087,pid=24161,uid=0 [ 489.145584][T24162] Memory cgroup out of memory: Killed process 24161 (syz.9.7087) total-vm:93748kB, anon-rss:936kB, file-rss:22440kB, shmem-rss:0kB, UID:0 pgtables:124kB oom_score_adj:1000 [ 489.404182][T24195] 9pnet: p9_errstr2errno: server reported unknown error pA;KZ44/@qkp [ 489.404182][T24195] C<+ [ 489.555614][T24207] loop9: detected capacity change from 0 to 764 [ 490.488405][T24218] veth47: entered promiscuous mode [ 490.493591][T24218] veth47: entered allmulticast mode [ 490.501883][ T29] kauditd_printk_skb: 231 callbacks suppressed [ 490.501894][ T29] audit: type=1326 audit(1748679743.847:41422): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24215 comm="syz.3.7111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 490.502966][T24218] 9pnet: p9_errstr2errno: server reported unknown error @L O!L [ 490.518526][ T29] audit: type=1326 audit(1748679743.856:41423): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24215 comm="syz.3.7111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 490.566740][ T29] audit: type=1326 audit(1748679743.903:41424): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24215 comm="syz.3.7111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 490.596015][ T29] audit: type=1326 audit(1748679743.903:41425): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24215 comm="syz.3.7111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 490.720850][ T29] audit: type=1326 audit(1748679744.043:41426): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24215 comm="syz.3.7111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 490.744577][ T29] audit: type=1326 audit(1748679744.043:41427): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24215 comm="syz.3.7111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 490.768368][ T29] audit: type=1326 audit(1748679744.043:41428): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24215 comm="syz.3.7111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 490.792182][ T29] audit: type=1326 audit(1748679744.043:41429): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24215 comm="syz.3.7111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 490.817741][ T29] audit: type=1326 audit(1748679744.052:41430): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24215 comm="syz.3.7111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 490.841433][ T29] audit: type=1326 audit(1748679744.137:41431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24215 comm="syz.3.7111" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 490.895743][T24239] loop0: detected capacity change from 0 to 128 [ 490.902476][T24239] FAT-fs (loop0): utf8 is not a recommended IO charset for FAT filesystems, filesystem will be case sensitive! [ 490.915596][T24239] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 490.928284][T24237] loop9: detected capacity change from 0 to 764 [ 490.954281][T24242] netlink: 28 bytes leftover after parsing attributes in process `syz.9.7121'. [ 490.963963][ T5342] FAT-fs (loop0): Invalid FSINFO signature: 0x41615252, 0x80417272 (sector = 1) [ 490.984614][T24244] loop0: detected capacity change from 0 to 1024 [ 491.015372][T24244] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 491.047530][T24244] ext4 filesystem being mounted at /523/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 491.239839][T24216] syz.3.7111 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 491.254050][T24216] CPU: 0 UID: 0 PID: 24216 Comm: syz.3.7111 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 491.254074][T24216] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 491.254111][T24216] Call Trace: [ 491.254119][T24216] [ 491.254127][T24216] __dump_stack+0x1d/0x30 [ 491.254149][T24216] dump_stack_lvl+0xe8/0x140 [ 491.254176][T24216] dump_stack+0x15/0x1b [ 491.254190][T24216] dump_header+0x81/0x220 [ 491.254241][T24216] oom_kill_process+0x334/0x3f0 [ 491.254269][T24216] out_of_memory+0x979/0xb80 [ 491.254345][T24216] ? css_next_descendant_pre+0x138/0x160 [ 491.254370][T24216] mem_cgroup_out_of_memory+0x13d/0x190 [ 491.254400][T24216] try_charge_memcg+0x5e2/0x870 [ 491.254450][T24216] obj_cgroup_charge_pages+0xb7/0x1a0 [ 491.254507][T24216] __memcg_kmem_charge_page+0x9f/0x170 [ 491.254537][T24216] __alloc_frozen_pages_noprof+0x188/0x360 [ 491.254573][T24216] alloc_pages_mpol+0xb3/0x250 [ 491.254660][T24216] alloc_pages_noprof+0x90/0x130 [ 491.254683][T24216] __vmalloc_node_range_noprof+0x6d5/0xe40 [ 491.254752][T24216] __kvmalloc_node_noprof+0x312/0x4f0 [ 491.254779][T24216] ? ip_set_alloc+0x1f/0x30 [ 491.254797][T24216] ? ip_set_alloc+0x1f/0x30 [ 491.254818][T24216] ? __kmalloc_cache_noprof+0x189/0x320 [ 491.254920][T24216] ip_set_alloc+0x1f/0x30 [ 491.254942][T24216] hash_netiface_create+0x282/0x740 [ 491.254966][T24216] ? __pfx_hash_netiface_create+0x10/0x10 [ 491.255050][T24216] ip_set_create+0x3c9/0x960 [ 491.255078][T24216] ? __nla_parse+0x40/0x60 [ 491.255096][T24216] nfnetlink_rcv_msg+0x4c6/0x590 [ 491.255147][T24216] ? selinux_capable+0x1f9/0x270 [ 491.255230][T24216] netlink_rcv_skb+0x123/0x220 [ 491.255253][T24216] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 491.255347][T24216] nfnetlink_rcv+0x16b/0x1690 [ 491.255424][T24216] ? __kfree_skb+0x109/0x150 [ 491.255449][T24216] ? nlmon_xmit+0x4f/0x60 [ 491.255472][T24216] ? consume_skb+0x49/0x150 [ 491.255495][T24216] ? nlmon_xmit+0x4f/0x60 [ 491.255526][T24216] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 491.255551][T24216] ? __dev_queue_xmit+0x11c0/0x1fb0 [ 491.255626][T24216] ? __dev_queue_xmit+0x182/0x1fb0 [ 491.255651][T24216] ? __bpf_ringbuf_reserve+0x45a/0x530 [ 491.255670][T24216] ? ref_tracker_free+0x37d/0x3e0 [ 491.255700][T24216] ? __netlink_deliver_tap+0x4dc/0x500 [ 491.255751][T24216] netlink_unicast+0x59e/0x670 [ 491.255774][T24216] netlink_sendmsg+0x58b/0x6b0 [ 491.255803][T24216] ? __pfx_netlink_sendmsg+0x10/0x10 [ 491.255828][T24216] __sock_sendmsg+0x142/0x180 [ 491.255907][T24216] ____sys_sendmsg+0x31e/0x4e0 [ 491.255937][T24216] ___sys_sendmsg+0x17b/0x1d0 [ 491.255984][T24216] __x64_sys_sendmsg+0xd4/0x160 [ 491.256011][T24216] x64_sys_call+0x2999/0x2fb0 [ 491.256029][T24216] do_syscall_64+0xd2/0x200 [ 491.256053][T24216] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 491.256093][T24216] ? clear_bhb_loop+0x40/0x90 [ 491.256142][T24216] ? clear_bhb_loop+0x40/0x90 [ 491.256165][T24216] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 491.256281][T24216] RIP: 0033:0x7fde07dce969 [ 491.256295][T24216] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 491.256309][T24216] RSP: 002b:00007fde06437038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 491.256350][T24216] RAX: ffffffffffffffda RBX: 00007fde07ff5fa0 RCX: 00007fde07dce969 [ 491.256364][T24216] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000005 [ 491.256379][T24216] RBP: 00007fde07e50ab1 R08: 0000000000000000 R09: 0000000000000000 [ 491.256392][T24216] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 491.256403][T24216] R13: 0000000000000000 R14: 00007fde07ff5fa0 R15: 00007ffd76e467b8 [ 491.256419][T24216] [ 491.616739][T24216] memory: usage 307196kB, limit 307200kB, failcnt 338 [ 491.623587][T24216] memory+swap: usage 372840kB, limit 9007199254740988kB, failcnt 0 [ 491.631496][T24216] kmem: usage 307188kB, limit 9007199254740988kB, failcnt 0 [ 491.638788][T24216] Memory cgroup stats for /syz3: [ 491.639008][T24216] cache 0 [ 491.646872][T24216] rss 0 [ 491.649626][T24216] shmem 0 [ 491.652602][T24216] mapped_file 0 [ 491.656051][T24216] dirty 0 [ 491.658978][T24216] writeback 0 [ 491.662266][T24216] workingset_refault_anon 119 [ 491.666934][T24216] workingset_refault_file 10190 [ 491.671896][T24216] swap 67219456 [ 491.675389][T24216] swapcached 4096 [ 491.679024][T24216] nr_memmap_boot_pages 1009214 [ 491.683955][T24216] pgpgin 1009212 [ 491.687493][T24216] pglazyfree 780493 [ 491.691295][T24216] pgfault 105 [ 491.694593][T24216] a_other 0 [ 491.697693][T24216] inactive_anon 4096 [ 491.701580][T24216] active_anon 0 [ 491.705085][T24216] inactive_file 4096 [ 491.708984][T24216] active_file 0 [ 491.712566][T24216] hierarchical_memory_limit 314572800 [ 491.718101][T24216] hierarchical_memsw_limit 9223372036854771712 [ 491.724331][T24216] total_cache 0 [ 491.727844][T24216] total_rss 0 [ 491.731123][T24216] total_shmem 0 [ 491.732424][T24255] loop1: detected capacity change from 0 to 512 [ 491.734561][T24216] total_mapped_file 0 [ 491.734570][T24216] total_dirty 0 [ 491.748278][T24216] total_writeback 0 [ 491.751813][T24255] EXT4-fs (loop1): mounting ext3 file system using the ext4 subsystem [ 491.752130][T24216] total_workingset_refault_anon 119 [ 491.765494][T24216] total_workingset_refault_file 10190 [ 491.767972][T24255] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=8042c11d, mo2=0002] [ 491.770864][T24216] total_swap 67219456 [ 491.770874][T24216] total_swapcached 4096 [ 491.770882][T24216] total_nr_memmap_boot_pages 1009214 [ 491.770889][T24216] total_pgpgin 1009212 [ 491.770897][T24216] total_pglazyfree 780493 [ 491.770905][T24216] total_pgfault 105 [ 491.790998][T24255] EXT4-fs error (device loop1): ext4_iget_extra_inode:5035: inode #15: comm syz.1.7125: corrupted in-inode xattr: e_value size too large [ 491.792188][T24216] total_a_other 0 [ 491.792195][T24216] total_inactive_anon 4096 [ 491.792202][T24216] total_active_anon 0 [ 491.792208][T24216] total_inactive_file 4096 [ 491.792215][T24216] total_active_file 0 [ 491.792222][T24216] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null) [ 491.823303][T24255] EXT4-fs error (device loop1): ext4_orphan_get:1398: comm syz.1.7125: couldn't read orphan inode 15 (err -117) [ 491.826528][T24216] ,cpuset=/,mems_allowed=0 [ 491.831279][T24255] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 491.834921][T24216] ,oom_memcg=/syz3,task_memcg=/syz3,task=syz.3.7111,pid=24215,uid=0 [ 491.882207][T24216] Memory cgroup out of memory: Killed process 24215 (syz.3.7111) total-vm:93748kB, anon-rss:1064kB, file-rss:22308kB, shmem-rss:0kB, UID:0 pgtables:120kB oom_score_adj:1000 [ 491.903005][T24140] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm ext4lazyinit: bg 0: block 32: padding at end of block bitmap is not set [ 491.918574][T17340] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 491.983211][T22172] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 492.030397][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.037889][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.045291][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.068652][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.076086][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.083635][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.091228][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.098618][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.106045][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.113477][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.120932][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.128344][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.135809][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.143276][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.150689][T19536] hid-generic 0006:0000:0000.0004: unknown main item tag 0x0 [ 492.165101][T19536] hid-generic 0006:0000:0000.0004: hidraw0: VIRTUAL HID vffffff.00 Device [syz0] on syz1 [ 492.273600][T24272] loop1: detected capacity change from 0 to 764 [ 492.434497][T24282] netlink: 8 bytes leftover after parsing attributes in process `+}[@'. [ 493.199992][T24287] loop1: detected capacity change from 0 to 1024 [ 493.212925][T24287] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 493.225598][T24287] ext4 filesystem being mounted at /170/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 493.734229][T24308] netlink: 4 bytes leftover after parsing attributes in process `syz.2.7144'. [ 493.889408][T22172] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 493.924196][T24312] netlink: 'syz.1.7145': attribute type 46 has an invalid length. [ 493.956557][T24314] loop1: detected capacity change from 0 to 128 [ 494.008450][T24298] syz.3.7141 invoked oom-killer: gfp_mask=0x402dc2(GFP_KERNEL_ACCOUNT|__GFP_HIGHMEM|__GFP_ZERO|__GFP_NOWARN), order=0, oom_score_adj=1000 [ 494.022754][T24298] CPU: 0 UID: 0 PID: 24298 Comm: syz.3.7141 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 494.022785][T24298] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 494.022797][T24298] Call Trace: [ 494.022805][T24298] [ 494.022815][T24298] __dump_stack+0x1d/0x30 [ 494.022843][T24298] dump_stack_lvl+0xe8/0x140 [ 494.022860][T24298] dump_stack+0x15/0x1b [ 494.022943][T24298] dump_header+0x81/0x220 [ 494.022970][T24298] oom_kill_process+0x334/0x3f0 [ 494.023068][T24298] out_of_memory+0x979/0xb80 [ 494.023096][T24298] ? css_next_descendant_pre+0x138/0x160 [ 494.023116][T24298] mem_cgroup_out_of_memory+0x13d/0x190 [ 494.023140][T24298] try_charge_memcg+0x5e2/0x870 [ 494.023210][T24298] obj_cgroup_charge_pages+0xb7/0x1a0 [ 494.023235][T24298] __memcg_kmem_charge_page+0x9f/0x170 [ 494.023260][T24298] __alloc_frozen_pages_noprof+0x188/0x360 [ 494.023306][T24298] alloc_pages_mpol+0xb3/0x250 [ 494.023332][T24298] alloc_pages_noprof+0x90/0x130 [ 494.023357][T24298] __vmalloc_node_range_noprof+0x6d5/0xe40 [ 494.023444][T24298] __kvmalloc_node_noprof+0x312/0x4f0 [ 494.023470][T24298] ? ip_set_alloc+0x1f/0x30 [ 494.023502][T24298] ? ip_set_alloc+0x1f/0x30 [ 494.023524][T24298] ? __kmalloc_cache_noprof+0x189/0x320 [ 494.023554][T24298] ip_set_alloc+0x1f/0x30 [ 494.023640][T24298] hash_netiface_create+0x282/0x740 [ 494.023667][T24298] ? __pfx_hash_netiface_create+0x10/0x10 [ 494.023688][T24298] ip_set_create+0x3c9/0x960 [ 494.023717][T24298] ? __nla_parse+0x40/0x60 [ 494.023735][T24298] nfnetlink_rcv_msg+0x4c6/0x590 [ 494.023857][T24298] ? selinux_capable+0x1f9/0x270 [ 494.023971][T24298] netlink_rcv_skb+0x123/0x220 [ 494.024057][T24298] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 494.024102][T24298] nfnetlink_rcv+0x16b/0x1690 [ 494.024130][T24298] ? __kfree_skb+0x109/0x150 [ 494.024204][T24298] ? nlmon_xmit+0x4f/0x60 [ 494.024222][T24298] ? consume_skb+0x49/0x150 [ 494.024241][T24298] ? nlmon_xmit+0x4f/0x60 [ 494.024299][T24298] ? dev_hard_start_xmit+0x3b0/0x3e0 [ 494.024323][T24298] ? __dev_queue_xmit+0x11c0/0x1fb0 [ 494.024344][T24298] ? __dev_queue_xmit+0x182/0x1fb0 [ 494.024364][T24298] ? __bpf_ringbuf_reserve+0x45a/0x530 [ 494.024389][T24298] ? ref_tracker_free+0x37d/0x3e0 [ 494.024420][T24298] ? __netlink_deliver_tap+0x4dc/0x500 [ 494.024445][T24298] netlink_unicast+0x59e/0x670 [ 494.024502][T24298] netlink_sendmsg+0x58b/0x6b0 [ 494.024526][T24298] ? __pfx_netlink_sendmsg+0x10/0x10 [ 494.024549][T24298] __sock_sendmsg+0x142/0x180 [ 494.024576][T24298] ____sys_sendmsg+0x31e/0x4e0 [ 494.024619][T24298] ___sys_sendmsg+0x17b/0x1d0 [ 494.024650][T24298] __x64_sys_sendmsg+0xd4/0x160 [ 494.024691][T24298] x64_sys_call+0x2999/0x2fb0 [ 494.024709][T24298] do_syscall_64+0xd2/0x200 [ 494.024777][T24298] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 494.024875][T24298] ? clear_bhb_loop+0x40/0x90 [ 494.024894][T24298] ? clear_bhb_loop+0x40/0x90 [ 494.024913][T24298] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 494.024931][T24298] RIP: 0033:0x7fde07dce969 [ 494.024986][T24298] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 494.025002][T24298] RSP: 002b:00007fde06437038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 494.025019][T24298] RAX: ffffffffffffffda RBX: 00007fde07ff5fa0 RCX: 00007fde07dce969 [ 494.025031][T24298] RDX: 0000000000000800 RSI: 0000200000000040 RDI: 0000000000000005 [ 494.025042][T24298] RBP: 00007fde07e50ab1 R08: 0000000000000000 R09: 0000000000000000 [ 494.025053][T24298] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 494.025064][T24298] R13: 0000000000000000 R14: 00007fde07ff5fa0 R15: 00007ffd76e467b8 [ 494.025152][T24298] [ 494.385100][T24298] memory: usage 307200kB, limit 307200kB, failcnt 545 [ 494.391916][T24298] memory+swap: usage 372820kB, limit 9007199254740988kB, failcnt 0 [ 494.399830][T24298] kmem: usage 307164kB, limit 9007199254740988kB, failcnt 0 [ 494.407135][T24298] Memory cgroup stats for /syz3: [ 494.445012][T24298] cache 0 [ 494.453000][T24298] rss 0 [ 494.455839][T24298] shmem 0 [ 494.458765][T24298] mapped_file 0 [ 494.462402][T24298] dirty 0 [ 494.465384][T24298] writeback 24576 [ 494.469221][T24298] workingset_refault_anon 147 [ 494.473943][T24298] workingset_refault_file 10254 [ 494.478825][T24298] swap 67178496 [ 494.482289][T24298] swapcached 45056 [ 494.486072][T24298] nr_memmap_boot_pages 1009551 [ 494.490900][T24298] pgpgin 1009539 [ 494.494456][T24298] pglazyfree 781245 [ 494.498363][T24298] pgfault 125 [ 494.501778][T24298] a_other 45056 [ 494.505275][T24298] inactive_anon 0 [ 494.508907][T24298] active_anon 4096 [ 494.512651][T24298] inactive_file 0 [ 494.516399][T24298] active_file 0 [ 494.519863][T24298] hierarchical_memory_limit 314572800 [ 494.525222][T24298] hierarchical_memsw_limit 9223372036854771712 [ 494.531378][T24298] total_cache 0 [ 494.534820][T24298] total_rss 0 [ 494.538153][T24298] total_shmem 0 [ 494.541591][T24298] total_mapped_file 0 [ 494.545544][T24298] total_dirty 0 [ 494.548992][T24298] total_writeback 24576 [ 494.553120][T24298] total_workingset_refault_anon 147 [ 494.558339][T24298] total_workingset_refault_file 10254 [ 494.563702][T24298] total_swap 67178496 [ 494.567731][T24298] total_swapcached 45056 [ 494.571964][T24298] total_nr_memmap_boot_pages 1009551 [ 494.577248][T24298] total_pgpgin 1009539 [ 494.581377][T24298] total_pglazyfree 781245 [ 494.585736][T24298] total_pgfault 125 [ 494.589523][T24298] total_a_other 45056 [ 494.593498][T24298] total_inactive_anon 0 [ 494.597663][T24298] total_active_anon 4096 [ 494.601917][T24298] total_inactive_file 0 [ 494.606048][T24298] total_active_file 0 [ 494.610069][T24298] oom-kill:constraint=CONSTRAINT_MEMCG,nodemask=(null),cpuset=/,mems_allowed=0,oom_memcg=/syz3,task_memcg=/syz3,task=syz.3.7141,pid=24297,uid=0 [ 494.624822][T24298] Memory cgroup out of memory: Killed process 24297 (syz.3.7141) total-vm:93748kB, anon-rss:936kB, file-rss:22440kB, shmem-rss:0kB, UID:0 pgtables:120kB oom_score_adj:1000 [ 494.913008][T24331] loop1: detected capacity change from 0 to 764 [ 495.414474][T24343] netlink: 12 bytes leftover after parsing attributes in process `syz.2.7157'. [ 495.772338][T24347] netlink: 'syz.3.7159': attribute type 46 has an invalid length. [ 495.861707][ T29] kauditd_printk_skb: 187 callbacks suppressed [ 495.861732][ T29] audit: type=1326 audit(1748679748.852:41619): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24348 comm="syz.3.7160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 495.917387][T24349] ================================================================== [ 495.925479][T24349] BUG: KCSAN: data-race in __delete_from_swap_cache / folio_mapping [ 495.933467][T24349] [ 495.935771][T24349] write to 0xffffea00048b1ea8 of 8 bytes by task 24352 on cpu 1: [ 495.943462][T24349] __delete_from_swap_cache+0x1e8/0x280 [ 495.948990][T24349] delete_from_swap_cache+0x73/0xe0 [ 495.954179][T24349] folio_free_swap+0x188/0x1a0 [ 495.958942][T24349] do_swap_page+0x1546/0x2460 [ 495.963594][T24349] handle_mm_fault+0x9a5/0x2c00 [ 495.968419][T24349] do_user_addr_fault+0x3fe/0x1090 [ 495.973529][T24349] exc_page_fault+0x62/0xa0 [ 495.978009][T24349] asm_exc_page_fault+0x26/0x30 [ 495.982836][T24349] [ 495.985139][T24349] read to 0xffffea00048b1ea8 of 8 bytes by task 24349 on cpu 0: [ 495.992740][T24349] folio_mapping+0xdd/0x120 [ 495.997220][T24349] move_folios_to_lru+0x128/0x6a0 [ 496.002221][T24349] evict_folios+0x300b/0x33d0 [ 496.006874][T24349] try_to_shrink_lruvec+0x45a/0x7e0 [ 496.012048][T24349] shrink_lruvec+0x22e/0x1a40 [ 496.016700][T24349] shrink_node+0x686/0x2110 [ 496.021180][T24349] do_try_to_free_pages+0x3f6/0xcd0 [ 496.026353][T24349] try_to_free_mem_cgroup_pages+0x1ab/0x410 [ 496.032221][T24349] try_charge_memcg+0x3ab/0x870 [ 496.037055][T24349] obj_cgroup_charge_pages+0xb7/0x1a0 [ 496.042406][T24349] __memcg_kmem_charge_page+0x9f/0x170 [ 496.047846][T24349] __alloc_frozen_pages_noprof+0x188/0x360 [ 496.053637][T24349] alloc_pages_mpol+0xb3/0x250 [ 496.058442][T24349] alloc_pages_noprof+0x90/0x130 [ 496.063374][T24349] __vmalloc_node_range_noprof+0x6d5/0xe40 [ 496.069186][T24349] __kvmalloc_node_noprof+0x312/0x4f0 [ 496.074543][T24349] ip_set_alloc+0x1f/0x30 [ 496.078879][T24349] hash_netiface_create+0x282/0x740 [ 496.084059][T24349] ip_set_create+0x3c9/0x960 [ 496.088631][T24349] nfnetlink_rcv_msg+0x4c6/0x590 [ 496.093554][T24349] netlink_rcv_skb+0x123/0x220 [ 496.098295][T24349] nfnetlink_rcv+0x16b/0x1690 [ 496.102987][T24349] netlink_unicast+0x59e/0x670 [ 496.107730][T24349] netlink_sendmsg+0x58b/0x6b0 [ 496.112474][T24349] __sock_sendmsg+0x142/0x180 [ 496.117135][T24349] ____sys_sendmsg+0x31e/0x4e0 [ 496.121876][T24349] ___sys_sendmsg+0x17b/0x1d0 [ 496.126548][T24349] __x64_sys_sendmsg+0xd4/0x160 [ 496.131378][T24349] x64_sys_call+0x2999/0x2fb0 [ 496.136038][T24349] do_syscall_64+0xd2/0x200 [ 496.140522][T24349] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 496.146394][T24349] [ 496.148694][T24349] value changed: 0x0000000000002d0f -> 0x0000000000000000 [ 496.155774][T24349] [ 496.158076][T24349] Reported by Kernel Concurrency Sanitizer on: [ 496.164221][T24349] CPU: 0 UID: 0 PID: 24349 Comm: syz.3.7160 Not tainted 6.15.0-syzkaller-09113-g8477ab143069 #0 PREEMPT(voluntary) [ 496.176355][T24349] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 496.186616][T24349] ================================================================== [ 496.194971][ T29] audit: type=1326 audit(1748679748.889:41620): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24348 comm="syz.3.7160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 496.218711][ T29] audit: type=1326 audit(1748679748.889:41621): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24348 comm="syz.3.7160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 496.242301][ T29] audit: type=1326 audit(1748679748.889:41622): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24348 comm="syz.3.7160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 496.266003][ T29] audit: type=1326 audit(1748679748.889:41623): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24348 comm="syz.3.7160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 496.289762][ T29] audit: type=1326 audit(1748679748.889:41624): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24348 comm="syz.3.7160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 496.313341][ T29] audit: type=1326 audit(1748679748.889:41625): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24348 comm="syz.3.7160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 496.336944][ T29] audit: type=1326 audit(1748679748.917:41626): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24348 comm="syz.3.7160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 496.400145][ T29] audit: type=1326 audit(1748679749.347:41627): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24348 comm="syz.3.7160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000 [ 496.423758][ T29] audit: type=1326 audit(1748679749.347:41628): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24348 comm="syz.3.7160" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fde07dce969 code=0x7ffc0000