last executing test programs: 49m33.626418241s ago: executing program 32 (id=504): socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r0}, 0x10) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x40980, 0x0) 40m40.961340221s ago: executing program 2 (id=3214): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB], 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2], 0x0}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r4, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 40m34.29029774s ago: executing program 4 (id=3258): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x33) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 40m34.196985988s ago: executing program 4 (id=3260): seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x0, 0x0}) mkdir(0x0, 0x8) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=@newtaction={0x14, 0x30, 0x1, 0x70bd2b}, 0x14}, 0x1, 0x0, 0x0, 0x804}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeef, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x400000000000041, 0x0) sched_setaffinity(r0, 0x8, &(0x7f0000000240)=0x2) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r3, &(0x7f0000000080)={0x24, @long={0x3, 0x3, {0xaaaaaaaaaaaa0002}}}, 0x14) r4 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r4) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_FLUSH(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c000000040601020000040000000000820000020500010007"], 0x1c}, 0x1, 0x0, 0x0, 0x8000}, 0x4) connect$802154_dgram(r3, &(0x7f0000000000)={0x24, @short={0x2, 0x0, 0xaaa0}}, 0x14) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x1, 0x7fff0000}]}) fstatfs(r6, &(0x7f0000000140)=""/166) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\b\x00\x00\x00\f', @ANYRES32=0x1, @ANYBLOB='\x00'/19, @ANYRES32=0x0, @ANYBLOB='\x00'/24], 0x48) r7 = syz_init_net_socket$nfc_llcp(0x27, 0x3, 0x1) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$eJzs3ctvW1UaAPDPdpMmaWb6mNGo7UjTSh2p81DjPDRqMjObWc3MotJoKrEBqYTEDSVOHMVOaaIuUth1wQKBQEIs2PMXsKErKiTEGvaIBSqCEiRAQjK613abOHGwII1p7u8n3ebch/2dU+s7Ovf4Xt8AMuts8k8uYjgiPoyIo43VrQecbfzZuH9zJllyUa9f/iKXHpestw5tve5IRKxHxEBE/P/fEc/ktsetrq7NT5fLpeXmerG2sFSsrq5duLYwPVeaKy2OTV6cmpocnRif2rO23n7puduX3vlv/9vfvHjv7svvvZtUa7i5b3M79lKj6X1xfNO2QxHxz0cRrAcKzfYM9roi/CTJ5/ebiDiX5v/RKKSfJpAF9Xq9/n39cKfd63XgwMqnY+BcfiQiGuV8fmSkMYb/bQzly5Vq7a9XKyuLs42x8rHoy1+9Vi6NNs8VjkVfLlkfS8sP18fb1ici0jHwK4XBdH1kplKe3d+uDmhzpC3/vy408h/ICKf8kF3yH7JL/kN2yX/ILvkP2SX/IbvkP2SX/Ifskv+QXfIfskv+Qyb979KlZKm37n+fvb66Ml+5fmG2VJ0fWViZGZmpLC+NzFUqc+k9Ows/9n7lSmVp7G+xcqNYK1Vrxerq2pWFyspi7Up6X/+VUt++tAroxvEzdz7ORcT63wfTJdHf3CdX4WCr13PR63uQgd4o9LoDAnrG1B9kl3N8oP0netvHBQOdXrj0cL4QeLzke10BoGfOn/L9H2SV+X/ILvP/kF3G+MAOj+jbYrf5f+DxZP4fsmu4w/O/frXp2V2jEfHriPio0He49awv4CDIf5Zrjv/PH/3jcPve/ty36VcE/RHx/BuXX7sxXastjyXbv3ywvfZ6c/v4phd2PGEAeqWVp608BgCya+P+zZnWsp9xP/9X4yKE7fEPNecmB9LvKIc2cluuVcjt0bUL67ci4uRO8XPN5503TmSGNgrb4p9o/s013iKt76H0uen7E//Upvh/2BT/9M/+X4FsuJP0P6M75V8+zel4kH9b+5/hPbp2onP/l3/Q/xU69H9nuozx7JsvfNox/q2I0zvGb8UbSGO1x0/qdr7L+PeeeuJ3nfbV32q8z07xW5JSsbawVKyurl1If0durrQ4NnlxampydGJ8qpjOURdbM9Xb/ePkB3d3a/9Qh/i7tT/Z9ucu2//d799/8uwu8f90bufP/8Qu8Qcj4i9dxv9q/JOnO+1L4s92aH9+l/jJtoku41df/c/hLg8FAPZBdXVtfrpcLi0rKCj0pHDrl1GNtkKveybgUauuJqfmSdL3uiYAAAAAAAAAAABAt/bjcuJetxEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA4CD4IQAA//9HcdTQ") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) ioctl$sock_FIOGETOWN(r7, 0x8903, &(0x7f0000000100)=0x0) sched_setscheduler(r8, 0x2, &(0x7f0000000340)=0x5) 40m34.196707638s ago: executing program 2 (id=3215): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x1, 0x1}, 0x28) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000030000000"], 0x0}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x2, 0x4, 0x4, 0x8, 0x0, 0x1}, 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x24, 0x4, 0x9, 0x0, r1}, 0x48) bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f0000000300)={r2, &(0x7f0000000240), &(0x7f0000000540)=""/32}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x0) r4 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r5 = openat$cgroup_ro(r4, &(0x7f0000000040)='cgroup.freeze\x00', 0x275a, 0x0) write$cgroup_int(r5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x0, 0x25c, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) perf_event_open(&(0x7f0000000700)={0x7, 0x80, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0xa0a40, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x12201, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x3) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) write$cgroup_int(r6, &(0x7f00000000c0), 0x12) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r7, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180), 0x4) 40m33.663393461s ago: executing program 3 (id=3263): r0 = socket$kcm(0x11, 0x200000000000002, 0x300) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r2) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f0000008500000023"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000d00)='kfree\x00', r3}, 0x18) recvmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) setsockopt$sock_attach_bpf(r0, 0x107, 0x12, &(0x7f00000008c0)=r4, 0x4) close(r0) 40m33.644445862s ago: executing program 2 (id=3265): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="01000000120000007f00"], 0x48) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000002c0)={{r0}, &(0x7f0000000240), &(0x7f0000000280)='%pS \x00'}, 0x20) bpf$MAP_DELETE_ELEM(0x3, &(0x7f0000001380)={r0, &(0x7f00000004c0)}, 0x20) 40m33.613600195s ago: executing program 3 (id=3266): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00'}, 0x18) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x201, 0x20, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x440, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x0, 0x6, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x67152944, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000b40)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x800000000001ff, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xe}}, 0x0, 0xafffffffffffffff, 0xffffffffffffffff, 0x8) sendmsg$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[@ANYBLOB="28010000000000000100000001"], 0x128}, 0x0) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100c, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000001b00)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001d80)=ANY=[], 0x128}, 0x0) recvmsg$unix(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000700)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x80}, 0x100) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000400)='blkio.bfq.sectors_recursive\x00', 0x275a, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x19, 0x3, 0x0, &(0x7f0000000000)='GPL\x00', 0x5, 0x0, 0x0, 0x41100, 0x8, '\x00', 0x0, @fallback=0x25}, 0x94) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'veth1_virt_wifi\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x8946, &(0x7f0000000080)) 40m33.579352078s ago: executing program 2 (id=3268): perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3010, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x9}, 0x0, 0xc8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000940)={0x0, 0x0, 0x0}, 0x80) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000005700000095"], 0x0}, 0x90) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="17000000000000000400000003"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) recvmsg$unix(r0, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r3, &(0x7f0000000300)=ANY=[@ANYBLOB="8fedcb791f6f9875f37538e486dd6317ce8102030400fe08000e40000200875a65969ff57b00ff020000000000000000000000000001"], 0xfdef) 40m33.578911348s ago: executing program 2 (id=3269): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='netlink_extack\x00', r0}, 0x10) sched_setscheduler(0x0, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs={0x0, 0x0, 0xfffffffe}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="19000000040000000400000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001500000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r5}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000001c80)={{r4}, &(0x7f0000001c00)=0x8000000, &(0x7f0000001c40)=r5}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0xe, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x12, 0x7, 0x8, 0x22}, 0x48) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000400)={@map=r7, r6, 0x5}, 0x10) r8 = socket(0x1, 0x3, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000000c0)={r7, &(0x7f0000000240), &(0x7f0000000240)=@tcp6=r8, 0x2}, 0x20) 40m33.531472172s ago: executing program 3 (id=3270): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x33) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 40m33.464746967s ago: executing program 3 (id=3272): socket$netlink(0x10, 0x3, 0x0) openat$uhid(0xffffffffffffff9c, &(0x7f0000000400), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x1, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f0000000400)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x20, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r4}, 0x10) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x800000, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x40980, 0x0) r5 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000680)=@newsa={0x150, 0x10, 0x713, 0xfffffffe, 0x25dfdbfc, {{@in=@multicast1, @in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x4e21, 0x2, 0x2, 0x0, 0x20, 0x6c, 0x0, 0xee00}, {@in6=@private1, 0x400fe, 0x32}, @in6=@ipv4={'\x00', '\xff\xff', @remote}, {0x0, 0x0, 0x0, 0x8, 0x0, 0x10000, 0x0, 0x543}, {0x4, 0x7fffffffffffffff, 0x2000000000}, {0x2}, 0x70bd2c, 0x3500, 0x2, 0x4, 0x0, 0x50}, [@algo_aead={0x60, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0xa0, 0x40, "210466d38547aa140db9a200000000c538c7cb7a"}}]}, 0x150}, 0x1, 0x0, 0x0, 0x880}, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) syz_emit_ethernet(0x12d, &(0x7f0000000c40)={@local, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, @void, {@ipv6={0x86dd, @udp={0x5, 0x6, "e956a5", 0xf7, 0x11, 0x0, @private2, @private1, {[@hopopts={0x87, 0x3, '\x00', [@pad1, @enc_lim={0x4, 0x1, 0xa}, @ra={0x5, 0x2, 0x8}, @pad1, @enc_lim={0x4, 0x1, 0x7}, @ra={0x5, 0x2, 0x7}, @generic={0x1, 0x2, "fb43"}, @enc_lim={0x4, 0x1, 0x3}]}, @hopopts={0x4, 0x5, '\x00', [@padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x8000}, @hao={0xc9, 0x10, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, @enc_lim={0x4, 0x1, 0xff}, @jumbo, @enc_lim={0x4, 0x1, 0x9}]}, @routing={0xb5, 0x2, 0x1, 0x3, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}]}, @hopopts={0x6c, 0x4, '\x00', [@enc_lim={0x4, 0x1, 0x7}, @jumbo={0xc2, 0x4, 0x2}, @jumbo={0xc2, 0x4, 0x8000}, @enc_lim={0x4, 0x1, 0x80}, @generic={0x3, 0x13, "e2d76ca64bd3be571d1c8a35e3fbe84697f389"}]}], {0x4e21, 0x4e23, 0x4f, 0x0, @opaque="9152f582427f4c3af878d87a420f20ff6687317ce14c1a5c530144bfd43c3e438cdae97d8d5f7b5ee23feff9ced08f1886d78ccf11b4f401535b07521d64cbc9c7983622dc50f8"}}}}}}, 0x0) 40m33.366843995s ago: executing program 4 (id=3277): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000003c0)={'netdevsim0\x00', 0x0}) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000280)=@bpf_lsm={0x6, 0x3, &(0x7f00000003c0)=ANY=[@ANYBLOB="180000000400000000000000000000f195"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', r1}, 0x94) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000440)=ANY=[@ANYRES64, @ANYRES32=0x0, @ANYBLOB="00000000000000006c00128009000100766c616e000000005c00028006000100000000004c0003800c15010000000000010000000c00010065000000000000000c00010003000000000000000c00010005000000000000000c00010000000000000000000c000100000000000000000004000480080005"], 0x9c}, 0x1, 0xba01}, 0x0) r2 = getpid() r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r3, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r4, 0x1, 0x70bd26, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) 40m30.995596606s ago: executing program 3 (id=3285): sendmsg$inet(0xffffffffffffffff, 0x0, 0x4040086) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b0000000500000008040000cd00000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000540)='fib6_table_lookup\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={0xffffffffffffffff, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000100), 0x0, 0x0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x50) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x100b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 40m30.994301767s ago: executing program 4 (id=3286): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000500000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x26, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000280)=0xffffffffffffffff, 0x4) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000006c0)={{}, &(0x7f0000000400), 0x0}, 0x20) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000008"], 0x48) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000800)='fib6_table_lookup\x00', r1}, 0x10) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffc, 0x0, 0x0, 0x0, 0x80000001}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{}, 0x0, &(0x7f00000002c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000580)={&(0x7f0000000540)='fib6_table_lookup\x00', r2}, 0x10) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'ip6_vti0\x00', 0x200}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f1, &(0x7f0000000080)) 40m30.987676457s ago: executing program 2 (id=3289): r0 = memfd_create(&(0x7f0000000040)='\xf3e\t\x9f\x918\xc0y\x01c\x1fnux\x00sV\ad\xb0l \xfd\xd7\x8e\x7f\x89\xb8\xc5;~\x04\x03~K\xfbP\x84=\xfa\x81\f\x1et\x10\x0e\xcf^9\xbe\\:\xd4+J\x8f\"-\xf4^.\x94\xc3\xb5nI\xc1\x17\xf1\xd2\x1b^\xf2}\xf3\x13\xd8\xca\xfa\x17\x19\xf3\x86\xad\nLF\xf0\xf7\xbb\xea?C\xcd\x04\xb7\xae\xb7\xb3\xf8\xcc\xbcT@s\x19Z\xf4\x88\x1c\xee8\x88\xfb\xcf\xd2\x03\xa7\x87\xc5\x85\x9e\x19m\xab\xc6\x92\x8a-\xe2\x13c\xbe\x13\xa67D\x87\xc3\xb7\xfa~X]\xdbZ\x0fS1M\xef\x86\x1f_si\xf3P\xfe8\x91\x15\xe1B\xc6\xd5\x9a\xe6\xd36\x13\xa8\f?]A\xb6i\xa6\x19\xd8\f', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x2000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000d40)={'sit0\x00', 0x0, 0x700, 0x20, 0x3, 0x4, {{0x1a, 0x4, 0x2, 0x28, 0x68, 0x67, 0x1000, 0x7, 0x29, 0x0, @multicast1, @rand_addr=0x64010100, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x3, 0x3d}, @timestamp_prespec={0x44, 0x24, 0xb6, 0x3, 0xa, [{@empty, 0x14b}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffffffd}, {@empty, 0x3}, {@loopback, 0x7}]}, @lsrr={0x83, 0xb, 0xa3, [@local, @multicast1]}, @lsrr={0x83, 0xf, 0x54, [@rand_addr=0x64010101, @private=0xa010101, @private=0xa010100]}, @ra={0x94, 0x4, 0x1}, @generic={0x88, 0xa, "875daf616ddf872a"}]}}}}}) openat(0xffffffffffffffff, &(0x7f0000000280)='./file1\x00', 0x600, 0xc6) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f0000002540)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000140)={0x0, 0x2, 0x7fffffff, 0x7ec, 0x2000010000, 0x2000000000002, 0x3, 0x0, 0x7ffc}) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) 40m30.938750031s ago: executing program 3 (id=3290): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x6}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x0, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @bytecode={0x0, 0x21, 0x0, [{}, {}, {0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x4}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0xf}]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}, {0x0, 0x0, 0x3}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ptrace$ARCH_SHSTK_ENABLE(0x1e, r0, 0x0, 0x5001) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x4, &(0x7f00000002c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x6}}, {@i_version}]}, 0x6, 0x5fd, &(0x7f0000000c00)="$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") 40m30.902496774s ago: executing program 4 (id=3292): socket$kcm(0x10, 0x2, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.throttle.io_serviced_recursive\x00', 0x26e1, 0x0) socket$kcm(0x10, 0x2, 0x10) socket$kcm(0x2b, 0x1, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000004000)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x1b) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0x0, 0x0, &(0x7f0000000640), 0x0, 0x11, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, 0x50) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000000c0)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'netdevsim0\x00'}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8946, &(0x7f0000000080)) 40m30.433014142s ago: executing program 4 (id=3295): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) r1 = socket$kcm(0x2, 0x1, 0x84) close(0xffffffffffffffff) sendmsg$inet(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000440)='+', 0x1}], 0x1}, 0x8800) 38m22.410287709s ago: executing program 33 (id=3291): fsopen(0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000480)=@ipv4_newroute={0x28, 0x18, 0x35f32a6dfa748ddd, 0x0, 0x0, {0x2, 0x0, 0x10, 0x0, 0xfe, 0x4, 0x0, 0x1, 0x20000000}, [@RTA_NH_ID={0x8, 0x1e, 0x2}, @RTA_METRICS={0x4}]}, 0x28}, 0x1, 0x0, 0x0, 0x4a044}, 0x4010) sendmsg$nl_route(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)=ANY=[@ANYBLOB="5c000000100001240000000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800b00010069703667726500001800028014000600fe80"], 0x5c}, 0x1, 0x0, 0x0, 0xc845}, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, 0x0) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r4}, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) request_key(&(0x7f0000000180)='user\x00', &(0x7f0000000200)={'syz', 0x3}, &(0x7f0000000280)='\xa9\x1c)\x00', 0xfffffffffffffffd) 38m22.38508644s ago: executing program 34 (id=3294): bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x33) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1801000011000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000300)='sys_enter\x00', r1}, 0x10) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) 38m22.212770455s ago: executing program 35 (id=3289): r0 = memfd_create(&(0x7f0000000040)='\xf3e\t\x9f\x918\xc0y\x01c\x1fnux\x00sV\ad\xb0l \xfd\xd7\x8e\x7f\x89\xb8\xc5;~\x04\x03~K\xfbP\x84=\xfa\x81\f\x1et\x10\x0e\xcf^9\xbe\\:\xd4+J\x8f\"-\xf4^.\x94\xc3\xb5nI\xc1\x17\xf1\xd2\x1b^\xf2}\xf3\x13\xd8\xca\xfa\x17\x19\xf3\x86\xad\nLF\xf0\xf7\xbb\xea?C\xcd\x04\xb7\xae\xb7\xb3\xf8\xcc\xbcT@s\x19Z\xf4\x88\x1c\xee8\x88\xfb\xcf\xd2\x03\xa7\x87\xc5\x85\x9e\x19m\xab\xc6\x92\x8a-\xe2\x13c\xbe\x13\xa67D\x87\xc3\xb7\xfa~X]\xdbZ\x0fS1M\xef\x86\x1f_si\xf3P\xfe8\x91\x15\xe1B\xc6\xd5\x9a\xe6\xd36\x13\xa8\f?]A\xb6i\xa6\x19\xd8\f', 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x2000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f0000000180)=@abs, 0x6e) sendmmsg$unix(r3, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(0xffffffffffffffff, 0x89f8, &(0x7f0000000240)={'tunl0\x00', &(0x7f0000000d40)={'sit0\x00', 0x0, 0x700, 0x20, 0x3, 0x4, {{0x1a, 0x4, 0x2, 0x28, 0x68, 0x67, 0x1000, 0x7, 0x29, 0x0, @multicast1, @rand_addr=0x64010100, {[@ra={0x94, 0x4}, @ssrr={0x89, 0x3, 0x3d}, @timestamp_prespec={0x44, 0x24, 0xb6, 0x3, 0xa, [{@empty, 0x14b}, {@initdev={0xac, 0x1e, 0x1, 0x0}, 0xfffffffd}, {@empty, 0x3}, {@loopback, 0x7}]}, @lsrr={0x83, 0xb, 0xa3, [@local, @multicast1]}, @lsrr={0x83, 0xf, 0x54, [@rand_addr=0x64010101, @private=0xa010101, @private=0xa010100]}, @ra={0x94, 0x4, 0x1}, @generic={0x88, 0xa, "875daf616ddf872a"}]}}}}}) openat(0xffffffffffffffff, &(0x7f0000000280)='./file1\x00', 0x600, 0xc6) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xb, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000008500000071000000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback=0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) quotactl$Q_SETQUOTA(0xffffffff80000800, &(0x7f0000002540)=@loop={'/dev/loop', 0x0}, 0x0, &(0x7f0000000140)={0x0, 0x2, 0x7fffffff, 0x7ec, 0x2000010000, 0x2000000000002, 0x3, 0x0, 0x7ffc}) mkdirat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x0) mmap(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x4, 0x11, r0, 0x0) 38m22.164663768s ago: executing program 36 (id=3290): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x6}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x1, 0x4, 0x7fe2, 0x1}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x0, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @bytecode={0x0, 0x21, 0x0, [{}, {}, {0x0, 0x0, 0x3}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x4}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0xf}]}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x0, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}, {0x0, 0x0, 0x3}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000900)={0xffffffffffffffff, 0x0, 0x0}, 0x10) ptrace$ARCH_SHSTK_ENABLE(0x1e, r0, 0x0, 0x5001) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x4, &(0x7f00000002c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x6}}, {@i_version}]}, 0x6, 0x5fd, &(0x7f0000000c00)="$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") 38m22.093358445s ago: executing program 37 (id=3295): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x42}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000300)='fib_table_lookup\x00', r0}, 0x10) r1 = socket$kcm(0x2, 0x1, 0x84) close(0xffffffffffffffff) sendmsg$inet(r1, &(0x7f0000000380)={&(0x7f0000000040)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, &(0x7f0000000540)=[{&(0x7f0000000440)='+', 0x1}], 0x1}, 0x8800) 16m11.842250184s ago: executing program 0 (id=12994): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), &(0x7f0000000180)='%ps \x00'}, 0x20) r1 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000002100)="0800a9fc0da6b30a", 0x8}], 0x1, &(0x7f0000001d00)=ANY=[@ANYBLOB="30000000000000000000000007000000890704"], 0x30}, 0x0) 16m9.568858418s ago: executing program 0 (id=13001): syz_mount_image$vfat(&(0x7f0000000140), &(0x7f0000000200)='./bus\x00', 0x800, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYRESOCT, @ANYRES32, @ANYRESHEX], 0x1, 0x36e, &(0x7f0000000c00)="$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") fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1000f4) syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x589b}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x10) bpf$BPF_BTF_LOAD(0x12, 0x0, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) io_setup(0x7fff, &(0x7f0000000400)) 16m7.004819256s ago: executing program 0 (id=13012): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), &(0x7f0000000180)='%ps \x00'}, 0x20) r1 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r1, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000002100)="0800a9fc0da6b30a", 0x8}], 0x1, &(0x7f0000001d00)=ANY=[@ANYBLOB="30000000000000000000000007000000890704"], 0x30}, 0x0) 16m6.959125459s ago: executing program 0 (id=13013): bpf$MAP_CREATE(0x0, &(0x7f0000000800)=ANY=[@ANYBLOB], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kfree\x00', r0}, 0x18) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x24, &(0x7f0000000280)=0x1, 0x4) recvmmsg(r1, &(0x7f0000000340)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000300)=""/19, 0x13}, 0x20000}], 0x1, 0x40, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) syz_open_dev$evdev(&(0x7f0000001800), 0x200, 0x608801) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r6}, 0x4) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x10) syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f0000000700)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x11) 16m6.017724255s ago: executing program 0 (id=13021): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000480)='./file1\x00', 0x4, &(0x7f00000002c0)={[{@max_batch_time={'max_batch_time', 0x3d, 0x6}}, {@i_version}]}, 0x6, 0x5fd, &(0x7f0000000c00)="$eJzs3c9rHFUcAPDvzCYxaaNpRcQWxYCHFqRpUotVL7b1YA8FC/Yg4qGhSWro9gdNCrYWTMGDgoKIV5Fe/Ae8S+/eRFBvnoUqUlFQ6crszrabZDfdttmdNPP5wGTnvZnd9747eZn3dvJ2Aiit8exHGrEj4taJJGKsZdtoNDaO5/vd/OPKyWxJolZ78/ckkjyvuX+SP27NE8MR8f3hiMcrq8tduHT59HS11vBBxN7FM+f3Lly6vGf+zPSp2VOzZ6f2vbT/wOTLU/un1iXOrfnjkaNvPP3ph+++OPdDdU8SB+P44PszsSKO9TIe43ErD7E1fyAiDmQrbd6Xh80mCKHUKvnv42BEPBljUamnGsZi/pNCKwf0VK0SUQNKKtH+oaSa/YDm2L67cfDxHvdK+ufGocYAaHX8A43PRmK4PjbacjNpGRk1PtvYtg7lZ2X8d2Xnl9kSyz6H+Pv20RlYh3I6WboaEU+1iz+p121bPdIs/nTZWD+JiMmIGMrr99oD1CFpWe/F5zBruZf4W49DGhEH88cs//B9lj++It3v+AEop+uH8hP5Upa6c/7L+h7N/k+06f+Mtjl33Y+iz3+d+3/N8/1wvd+TruiHZX2WY+1fcnBlxi8fH/m8U/mt/b9sycpv9gX74cbViJ0r4v8oCzbv/2TxJ22Of7bLiYPdlfH6j78d6bSt6Phr1yJ2tR3/3OmVZmtrXJ/cOzdfnZ1s/GxbxrffvfN1p/KLjj87/ls6xN9y/NOVz8vek/NdlvHNsWtnOm0bvWv86a9DSWO8OZTnvDe9uHhhKmIoOZrv0pK/b+26NPdpvkYW/+7n2rf/Zb//V5e/zkjzT2YXzr91+manbfdz/FsuJt+qdVmHTrL4Z+5+/Fe1/yzvsy7L+Ovti8902rZW/CMPEhgAAAAAAACUUFq/BpukE7fX03RiojFf9onYklbPLSw+P3fu4tmZiN31/4ccTJtXusca6SRLT+X/D9tM71uRfiEitkfEF5WRenri5LnqTNHBAwAAAAAAAAAAAAAAAAAAwAaxNZ//37xP9Z+Vxvx/oCR6eYM5YGPT/qG86u1/1S2egDJw/ofy0v6hvLR/KC/tH8pL+4fy0v6hvLR/KC/tHwAAAAA2pe3PXv85iYilV0bqS2Yo32ZGEGxug0VXAChMpegKAIW5felfZx9Kp6v+/z/5lwP2vjpAAZJ2mfXOQW3txn+97TMBAAAAAAAAAAAAgB7YtaPz/H9zg2FzM+0PyusB5v/76gB4yPnqfygvY3zgbrP4hzttMP8fAAAAAAAAAAAAAPpmtL4k6UQ+F3g00nRiIuLRiNgWg8ncfHV2MiIei4ifKoOPZOmpoisNAAAAAAAAAAAAAAAAAAAAm8zCpcunp6vV2QutK/+uytncK827oPahrFfjHp8VSf/flpGIKPyg9GxloCUniVjKjvyGqNiFhdgY1aivFPyHCQAAAAAAAAAAAAAAAAAASqhl7nF7O7/qc40AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoP/u3P+/dytFxwgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAPJz+DwAA///LLUAr") 16m4.306956544s ago: executing program 0 (id=13027): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000002c0)={'erspan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0xc3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x55666}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='mnt\x00', 0x4, &(0x7f0000000000), 0x0, 0x236, &(0x7f0000000300)="$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") r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000002440), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = socket(0x400000000010, 0x3, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r8, {0x0, 0x1}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000002480)=@newtfilter={0x87c, 0x2c, 0xd3f, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0xffff, 0xfff3}, {}, {0x7, 0x300}}, [@filter_kind_options=@f_basic={{0xa}, {0x84c, 0x2, [@TCA_BASIC_POLICE={0x848, 0x4, [@TCA_POLICE_TBF={0x3c, 0x1, {0x80000001, 0x7, 0x9, 0x1, 0x80, {0x1, 0x2, 0x6, 0x4, 0x4, 0xff}, {0x1, 0x0, 0xfffa, 0xff, 0x8, 0xf}, 0x7fff, 0xfffffffa, 0xfffffff8}}, @TCA_POLICE_RATE={0x404, 0x2, [0xff, 0x2, 0x6, 0x0, 0x3, 0x4, 0x7, 0x0, 0x3a, 0x7, 0x3, 0x6, 0xae, 0x247, 0x499, 0x50000, 0x6, 0xc71, 0x0, 0x41f, 0x0, 0x800, 0x2, 0x6, 0xffff7fff, 0x5, 0x9, 0xff, 0x7f, 0xd, 0x5, 0x9c8, 0x5, 0x7, 0x5, 0xe087, 0x7, 0xffffff42, 0x3, 0x278, 0x6, 0x6b7, 0x6, 0xff, 0x0, 0x8, 0x4, 0xdf01, 0x8, 0x7fffffff, 0x2, 0x51, 0x9, 0x1ff, 0x6, 0x3, 0x2, 0x9, 0x2, 0x1, 0x8, 0xffffff1d, 0x9000, 0x839, 0x1, 0x3, 0x4, 0x5, 0xff, 0x9dc, 0x4, 0xf, 0x6, 0x0, 0x200, 0x7ff, 0x1f20, 0x5, 0x2, 0x9, 0x8, 0x5, 0x3, 0x40, 0x8, 0x4, 0xc, 0x789, 0x80, 0x9, 0x8, 0x4, 0x0, 0x1, 0x1, 0x16d000, 0x400, 0x7ff, 0x7, 0x3, 0x4, 0x42b3, 0x8c, 0x3, 0x83ba, 0x7, 0x8001, 0x10000, 0xfffffeff, 0x8, 0x0, 0x4, 0x1, 0x6, 0x80000001, 0x400, 0x3, 0x9, 0xfffff001, 0x2, 0x8001, 0x4, 0x6, 0x11cf, 0xfffffff8, 0x7, 0x5, 0xb67, 0x1, 0x8, 0x6, 0x2, 0x3, 0x583, 0x7ff80, 0x7, 0x4, 0xded4, 0x0, 0xffffffff, 0x6, 0x1, 0x1000, 0x7, 0x6, 0x6, 0xd2, 0xc19c, 0x0, 0x6, 0x3ff, 0x3ff, 0x3ff, 0x1, 0x200, 0x4, 0x0, 0x8, 0x8, 0x1, 0x6, 0x456b, 0x477, 0x19d, 0x6, 0x1800, 0x5, 0x2, 0x3ba, 0x0, 0x8, 0x6, 0xfffffffc, 0x6d6, 0x9, 0x40, 0x1, 0x32, 0x5c, 0x8, 0x1, 0x4, 0x9, 0x40000000, 0x5, 0x101, 0x8, 0x1fffc00, 0x7ff, 0x0, 0x8, 0x7, 0x5, 0xffffffff, 0x2, 0xc15, 0x4, 0x72c5, 0x3, 0x28, 0x68e9, 0x8, 0x2, 0xc, 0xfeae, 0x1, 0x8, 0x4, 0x3c8, 0x5, 0xfff, 0x9, 0x8, 0x4, 0x2, 0x5, 0x9, 0xf4, 0xb2e, 0xfffffffb, 0x4, 0x7fff, 0x7f, 0x4, 0x8, 0x400, 0x97, 0x10, 0xa27, 0xb73, 0x1, 0x0, 0x10000, 0x2, 0x9, 0x9, 0x7, 0x6, 0x80, 0x6, 0x0, 0x56e, 0x0, 0x2, 0x80, 0x1, 0x9, 0x9, 0xb, 0x7, 0x8fdf, 0x10001, 0xf, 0x4, 0x6, 0xfffffff9]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xe45, 0x3, 0x80, 0x3, 0x8, 0x7, 0x2, 0x7, 0x3, 0x7fffffff, 0xfff, 0xeaf, 0x3, 0x7, 0x5, 0xe2e3, 0x9, 0xfff, 0x5, 0xffffffff, 0x7, 0x6d, 0x2, 0xfffffff0, 0x2, 0x400, 0x7ff, 0x5, 0x2, 0x8001, 0x6, 0x10000, 0xffff8a72, 0x6, 0x7, 0x9, 0x4, 0x8, 0x9, 0x2, 0x5, 0x5, 0x10000, 0x2, 0x70a6, 0x6, 0x0, 0xcda, 0xfffffe00, 0x100, 0x5, 0x10001, 0xdf, 0x5, 0x200, 0x8, 0x9, 0x9, 0x1, 0x800, 0x21, 0x1000000, 0x8, 0x8001, 0x777f, 0x5, 0x5, 0x1000, 0x81, 0xff, 0x4945, 0x7111, 0x0, 0xfffffffc, 0x1, 0x8, 0x0, 0x100, 0x3a6, 0xfffffffe, 0x12, 0x80, 0x3, 0x4, 0x5, 0xe, 0x7f, 0x5, 0x6, 0x9, 0x4, 0x77, 0x2, 0x8, 0x7, 0x1, 0x4, 0x5, 0x1, 0x8, 0x753, 0xd05, 0x3, 0x10, 0xb489, 0x0, 0x1, 0x3, 0x6, 0x1, 0x3, 0x1, 0x7, 0x5, 0x1, 0xc2d, 0xd4, 0x7ff, 0x51, 0x9, 0x407ba2f0, 0x1ff, 0x1, 0xc7, 0x4, 0x4, 0x9, 0x6, 0x3, 0x43f, 0x4, 0x2, 0x101, 0x1, 0x80000001, 0x7, 0x80000001, 0x0, 0x8da, 0x3, 0xfffffffa, 0x5, 0x2, 0x4, 0x1ff, 0x4, 0xfffff6e1, 0x0, 0xdd, 0x23d86c5e, 0x7fff, 0x10, 0x800, 0x40, 0x3, 0x1, 0x8, 0x7d, 0x0, 0x7, 0x3, 0xf, 0x1ff, 0xfff, 0x3, 0x1, 0xfb, 0x5, 0xf, 0x5, 0x400, 0x5, 0x4, 0x5, 0x9c, 0x5, 0x992, 0x401, 0x80000000, 0x7, 0x1000, 0x7fffffff, 0x7, 0x3, 0x7, 0x0, 0x7fff, 0x7, 0x7fff, 0x400, 0x5c, 0x1ff, 0x1, 0x6, 0x8f, 0x6, 0x764d, 0x4, 0x5, 0x6, 0x6, 0x7, 0x0, 0x6, 0x0, 0x7fff, 0x2008, 0x1, 0x40, 0x89, 0x8, 0x2a, 0x3, 0x4, 0x4, 0x12, 0x6, 0x9, 0x2, 0x8, 0x11e000, 0x8, 0x71, 0x724f, 0x8, 0x8, 0x4, 0x8, 0x0, 0x6, 0x5, 0xffff, 0x81, 0x2, 0x8001, 0xb3, 0x3, 0xffffffff, 0x7, 0x9, 0x3f2, 0xfffffffb, 0x5, 0x1c1, 0x0, 0xfffffffe, 0xfffffffa, 0x0, 0x7, 0x8, 0x7, 0x7ff, 0x76e, 0x3, 0x0, 0x1000]}]}]}}]}, 0x87c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 15m49.14510904s ago: executing program 38 (id=13027): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) openat$sndtimer(0xffffffffffffff9c, 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000002c0)={'erspan0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000000c0)=@newlink={0x40, 0x10, 0xc3b, 0x0, 0x0, {0x0, 0x0, 0x0, r4}, [@IFLA_LINKINFO={0x20, 0x12, 0x0, 0x1, @erspan={{0xb}, {0x10, 0x2, 0x0, 0x1, [@IFLA_GRE_ERSPAN_INDEX={0x8, 0x15, 0x55666}, @IFLA_GRE_COLLECT_METADATA={0x4}]}}}]}, 0x40}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='mnt\x00', 0x4, &(0x7f0000000000), 0x0, 0x236, &(0x7f0000000300)="$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") r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000002440), 0x0, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r6 = socket(0x400000000010, 0x3, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r8, {0x0, 0x1}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r6, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000002480)=@newtfilter={0x87c, 0x2c, 0xd3f, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r8, {0xffff, 0xfff3}, {}, {0x7, 0x300}}, [@filter_kind_options=@f_basic={{0xa}, {0x84c, 0x2, [@TCA_BASIC_POLICE={0x848, 0x4, [@TCA_POLICE_TBF={0x3c, 0x1, {0x80000001, 0x7, 0x9, 0x1, 0x80, {0x1, 0x2, 0x6, 0x4, 0x4, 0xff}, {0x1, 0x0, 0xfffa, 0xff, 0x8, 0xf}, 0x7fff, 0xfffffffa, 0xfffffff8}}, @TCA_POLICE_RATE={0x404, 0x2, [0xff, 0x2, 0x6, 0x0, 0x3, 0x4, 0x7, 0x0, 0x3a, 0x7, 0x3, 0x6, 0xae, 0x247, 0x499, 0x50000, 0x6, 0xc71, 0x0, 0x41f, 0x0, 0x800, 0x2, 0x6, 0xffff7fff, 0x5, 0x9, 0xff, 0x7f, 0xd, 0x5, 0x9c8, 0x5, 0x7, 0x5, 0xe087, 0x7, 0xffffff42, 0x3, 0x278, 0x6, 0x6b7, 0x6, 0xff, 0x0, 0x8, 0x4, 0xdf01, 0x8, 0x7fffffff, 0x2, 0x51, 0x9, 0x1ff, 0x6, 0x3, 0x2, 0x9, 0x2, 0x1, 0x8, 0xffffff1d, 0x9000, 0x839, 0x1, 0x3, 0x4, 0x5, 0xff, 0x9dc, 0x4, 0xf, 0x6, 0x0, 0x200, 0x7ff, 0x1f20, 0x5, 0x2, 0x9, 0x8, 0x5, 0x3, 0x40, 0x8, 0x4, 0xc, 0x789, 0x80, 0x9, 0x8, 0x4, 0x0, 0x1, 0x1, 0x16d000, 0x400, 0x7ff, 0x7, 0x3, 0x4, 0x42b3, 0x8c, 0x3, 0x83ba, 0x7, 0x8001, 0x10000, 0xfffffeff, 0x8, 0x0, 0x4, 0x1, 0x6, 0x80000001, 0x400, 0x3, 0x9, 0xfffff001, 0x2, 0x8001, 0x4, 0x6, 0x11cf, 0xfffffff8, 0x7, 0x5, 0xb67, 0x1, 0x8, 0x6, 0x2, 0x3, 0x583, 0x7ff80, 0x7, 0x4, 0xded4, 0x0, 0xffffffff, 0x6, 0x1, 0x1000, 0x7, 0x6, 0x6, 0xd2, 0xc19c, 0x0, 0x6, 0x3ff, 0x3ff, 0x3ff, 0x1, 0x200, 0x4, 0x0, 0x8, 0x8, 0x1, 0x6, 0x456b, 0x477, 0x19d, 0x6, 0x1800, 0x5, 0x2, 0x3ba, 0x0, 0x8, 0x6, 0xfffffffc, 0x6d6, 0x9, 0x40, 0x1, 0x32, 0x5c, 0x8, 0x1, 0x4, 0x9, 0x40000000, 0x5, 0x101, 0x8, 0x1fffc00, 0x7ff, 0x0, 0x8, 0x7, 0x5, 0xffffffff, 0x2, 0xc15, 0x4, 0x72c5, 0x3, 0x28, 0x68e9, 0x8, 0x2, 0xc, 0xfeae, 0x1, 0x8, 0x4, 0x3c8, 0x5, 0xfff, 0x9, 0x8, 0x4, 0x2, 0x5, 0x9, 0xf4, 0xb2e, 0xfffffffb, 0x4, 0x7fff, 0x7f, 0x4, 0x8, 0x400, 0x97, 0x10, 0xa27, 0xb73, 0x1, 0x0, 0x10000, 0x2, 0x9, 0x9, 0x7, 0x6, 0x80, 0x6, 0x0, 0x56e, 0x0, 0x2, 0x80, 0x1, 0x9, 0x9, 0xb, 0x7, 0x8fdf, 0x10001, 0xf, 0x4, 0x6, 0xfffffff9]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xe45, 0x3, 0x80, 0x3, 0x8, 0x7, 0x2, 0x7, 0x3, 0x7fffffff, 0xfff, 0xeaf, 0x3, 0x7, 0x5, 0xe2e3, 0x9, 0xfff, 0x5, 0xffffffff, 0x7, 0x6d, 0x2, 0xfffffff0, 0x2, 0x400, 0x7ff, 0x5, 0x2, 0x8001, 0x6, 0x10000, 0xffff8a72, 0x6, 0x7, 0x9, 0x4, 0x8, 0x9, 0x2, 0x5, 0x5, 0x10000, 0x2, 0x70a6, 0x6, 0x0, 0xcda, 0xfffffe00, 0x100, 0x5, 0x10001, 0xdf, 0x5, 0x200, 0x8, 0x9, 0x9, 0x1, 0x800, 0x21, 0x1000000, 0x8, 0x8001, 0x777f, 0x5, 0x5, 0x1000, 0x81, 0xff, 0x4945, 0x7111, 0x0, 0xfffffffc, 0x1, 0x8, 0x0, 0x100, 0x3a6, 0xfffffffe, 0x12, 0x80, 0x3, 0x4, 0x5, 0xe, 0x7f, 0x5, 0x6, 0x9, 0x4, 0x77, 0x2, 0x8, 0x7, 0x1, 0x4, 0x5, 0x1, 0x8, 0x753, 0xd05, 0x3, 0x10, 0xb489, 0x0, 0x1, 0x3, 0x6, 0x1, 0x3, 0x1, 0x7, 0x5, 0x1, 0xc2d, 0xd4, 0x7ff, 0x51, 0x9, 0x407ba2f0, 0x1ff, 0x1, 0xc7, 0x4, 0x4, 0x9, 0x6, 0x3, 0x43f, 0x4, 0x2, 0x101, 0x1, 0x80000001, 0x7, 0x80000001, 0x0, 0x8da, 0x3, 0xfffffffa, 0x5, 0x2, 0x4, 0x1ff, 0x4, 0xfffff6e1, 0x0, 0xdd, 0x23d86c5e, 0x7fff, 0x10, 0x800, 0x40, 0x3, 0x1, 0x8, 0x7d, 0x0, 0x7, 0x3, 0xf, 0x1ff, 0xfff, 0x3, 0x1, 0xfb, 0x5, 0xf, 0x5, 0x400, 0x5, 0x4, 0x5, 0x9c, 0x5, 0x992, 0x401, 0x80000000, 0x7, 0x1000, 0x7fffffff, 0x7, 0x3, 0x7, 0x0, 0x7fff, 0x7, 0x7fff, 0x400, 0x5c, 0x1ff, 0x1, 0x6, 0x8f, 0x6, 0x764d, 0x4, 0x5, 0x6, 0x6, 0x7, 0x0, 0x6, 0x0, 0x7fff, 0x2008, 0x1, 0x40, 0x89, 0x8, 0x2a, 0x3, 0x4, 0x4, 0x12, 0x6, 0x9, 0x2, 0x8, 0x11e000, 0x8, 0x71, 0x724f, 0x8, 0x8, 0x4, 0x8, 0x0, 0x6, 0x5, 0xffff, 0x81, 0x2, 0x8001, 0xb3, 0x3, 0xffffffff, 0x7, 0x9, 0x3f2, 0xfffffffb, 0x5, 0x1c1, 0x0, 0xfffffffe, 0xfffffffa, 0x0, 0x7, 0x8, 0x7, 0x7ff, 0x76e, 0x3, 0x0, 0x1000]}]}]}}]}, 0x87c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 13m33.140920542s ago: executing program 8 (id=17292): r0 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000000)="1400000010003507d25a806f8c6394", 0xf}], 0x1}, 0x40810) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x61, &(0x7f00000027c0)=[{&(0x7f0000000500)=""/4096, 0x1000}], 0x1}, 0x10100) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000009a40)={&(0x7f0000000500)=ANY=[], 0xc4}}, 0x0) 13m32.316327359s ago: executing program 8 (id=17301): r0 = io_uring_setup(0x4a86, &(0x7f0000000300)={0x0, 0x4178, 0x40, 0x8001002, 0x3d7}) r1 = socket(0x1e, 0x4, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = memfd_create(&(0x7f0000000300)='+\x8b\x8a\x16\x11O\xdd\xdfk(F\x99\xdf\x92\xd5>oJ\x02u\x9b\xafa\xac\x06\x9c&\xf5\xe3j\xfa\tcqM\xb8R\x86\xd9\xd2.\x9f\x12\xed\x10\f\xbd\x1a|\x8a\xbb\xda\xcfY\x98gU@\xf2M\xc0\xb5\xdf\x9a\x8d\xdb,n\xae\x0eT\x80\x8c\xfd\xd7\xb0\x94\x82t\x96\rKx\xc5\x9b\x8c\x87\x96\x8bc\xbc\xee\xcc\x9f\xe3F\x99V4\x8e;M\xa9\x823\xe3\xb3mG\x8f\xdb\xed\x1b\x05\xec\xfc\xd1\xb5\xfd\xec@\xdeU\xdd\xa4\xc1\xe4L)\x8e\xe5\x91\x8e\xd4\x89\xef\x95T\x05G\xac\xb8\xc1: )mh\xc7\xf1?\xbb\x13;\xad\x95\xd70\xb6\x0e\x7f\x84r\x0e\xbf\xc5\xf6\xd4\xdd\t\x14\x18\xf7\xefi\x93\x03\xd2\xf2\bK\"\xd2\xb5\xaa\xb8\xc8\xe0\xac\x99\xe8su\xcd\xc3E\x12\xd7\xdd\x96!\x16Tu\xe3\xf0\x84#R\xd9\xe3~Wj\xb0r\x87\'\xea\a\xcfOeK\x9daW\xf4\x87@\x9c\xf3\xf1K\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x91\xe6\xdb\xc2\xa5h\'\xdfIn\x97\x0263~\xeb\xbe(i\n\xc2k4\x7f\x12\xa9e`SOs\x8c\xb4\xe7FeQ\xc6$\x92j_U\xfa\b\xea\xb0bYkW\xc0\x05\aC{\xcc\x03T\x17\xa5Sk\x87P\xc2\x97D\xb2\xfa\x1b\x9fe\xf4\x10\x1a\xad\x92\xce\x88\x1b\xbc\xe14\x19\xaa\xd3\r\xf4\xa2\xc3\x9e=\xa0 \xe6j\xe5\x85\xf8\x97\x03\x15\xaa\x920\xdcrI\xd8\b\xfb\xc7\xe7xX\x00>d\xbb\xa71\xad\x9a\xfb\xe6\x13\x87\x93\\\xe5W-\xfc\xfd\xb8O\xb9j\xb8\xf2\x9dx\xb2\x86\xad\x92', 0x3) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r5}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r6, 0x80286722, &(0x7f0000000500)={&(0x7f00000004c0)=""/3, 0x3, 0x1, 0xcc3c}) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r7, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0xca02}) r8 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r8}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) preadv(r7, &(0x7f0000001300)=[{&(0x7f00000000c0)=""/124, 0x4}], 0x3e8, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r6}, 0x10) write$binfmt_elf64(r4, &(0x7f0000000180)=ANY=[], 0x78) sendfile(r3, r4, &(0x7f00000001c0), 0x8) fcntl$addseals(r4, 0x409, 0x8) ioctl$AUTOFS_IOC_READY(r4, 0x9360, 0x6) fallocate(r4, 0x3, 0x9100, 0x3) r9 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0006}]}) close_range(r9, r2, 0x0) sendmmsg(r1, &(0x7f0000003240), 0x4000000000000e4, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) 13m32.039769381s ago: executing program 8 (id=17306): bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={0xffffffffffffffff, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, &(0x7f0000000040)=[0x0, 0x0], ""/16, 0x0, 0x0, 0x0, 0x0, 0x9, 0x1, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0], 0x0, 0x29, &(0x7f0000000200)=[{}, {}, {}, {}, {}], 0x28, 0x10, &(0x7f0000000240), &(0x7f0000000300), 0x8, 0xc0, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="07000000090000000800000001000000000000000b9d2638ed41e6bf681c856dddb5aa6d7867855b36476556c2841c231c4db7274e1ed71864064e1f08fead9e654e9f6d575ec179a0c0d3dbaec3b9af5a06f5d7dccd1100bf12c2a2502bee57144cabfae647dec355b3efd1899fe75e88d93bc358f2dc26e9e9c72426e1774458d861aaf2bc71fa8a15c7a38af0a26f2a873f07127b5adccdb558b00e224aee99776076017927f8c40259dc77e5407885583f6c684b5dd224a8b3bf2200e456a2b817e6e975e5ab6316745e0e47eec74ce51020d48f595d5c378103d0260a7e3a5da398a39140d709e70ad2fad5d75a8458", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=r0, @ANYRES32, @ANYBLOB="00000000000000000400"/28], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000004c1700000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000030000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x1, 0x8, &(0x7f0000000400)=ANY=[@ANYBLOB="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"/296], &(0x7f0000000100)='GPL\x00'}, 0x48) socketpair$tipc(0x1e, 0x0, 0x0, 0x0) socketpair(0x8, 0x2, 0x1, &(0x7f0000000200)) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x1}, 0x800, 0x0, 0xfffffffe, 0x2, 0x0, 0x101}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000000000000000000000000851000000600000018020000", @ANYRES32, @ANYBLOB="00000000000000006600020000000000180000000000000000000000000000009500040000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a00000000000085000000060000009500000000000000"], &(0x7f0000000000)='GPL\x00', 0x2, 0xff5c, &(0x7f0000000340)=""/222}, 0x78) r4 = perf_event_open(&(0x7f0000000380)={0x2, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000095"], &(0x7f0000001080)='syzkaller\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x200, 0x2020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, @perf_bp={0x0, 0x3}, 0x4, 0x8, 0x10000, 0x0, 0x0, 0x0, 0x1000, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f0000000540)='(pu&00\t||') bpf$OBJ_GET_MAP(0x7, &(0x7f0000000580)=@o_path={&(0x7f0000000300)='./file0\x00', 0x0, 0x2a353f5e2f72c272, r5}, 0x18) bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000600), 0x4) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x1, 0xa202f80241fa14d3, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x4, @perf_bp={&(0x7f0000000640), 0xc}, 0x0, 0x9, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x80000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000400), 0x12) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000340)='memory.events.local\x00', 0x26e1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @cgroup_skb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) 13m31.489873426s ago: executing program 8 (id=17311): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000040)=0x8) sched_setaffinity(0x0, 0x8, &(0x7f0000000000)=0x5) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000001700)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './bus\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x3fffffffffffcb5, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x23, 0x0, 0x0) fcntl$getownex(r3, 0x10, &(0x7f0000000740)={0x0, 0x0}) sched_rr_get_interval(r5, &(0x7f0000000780)) ioctl$TCSETAW(r4, 0x5407, &(0x7f0000000080)={0x0, 0x0, 0x8, 0xfffd, 0x9, "000100"}) ioctl$TIOCSTI(r4, 0x5412, 0x0) socketpair(0x18, 0x0, 0x2, &(0x7f0000000000)) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000004c0)={r3, &(0x7f0000000340), 0x0}, 0x20) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) socket$inet_icmp(0x2, 0x2, 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r6}, 0x10) unshare(0x42000000) 13m29.970316138s ago: executing program 8 (id=17317): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f60000008500000043"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b000000000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000002"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x40, &(0x7f0000000100)={[{@grpquota}, {@min_batch_time={'min_batch_time', 0x3d, 0x8}}, {@dioread_nolock}]}, 0x1, 0x573, &(0x7f0000000ec0)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000d80)='./file1\x00', 0x143042, 0x0) pwritev2(r2, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0xe7b, 0x0, 0x0) 13m29.852993088s ago: executing program 8 (id=17319): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000002c0)={'erspan0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000002440), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = socket(0x400000000010, 0x3, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r7, {0x0, 0x1}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000002480)=@newtfilter={0x87c, 0x2c, 0xd3f, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, {0xffff, 0xfff3}, {}, {0x7, 0x300}}, [@filter_kind_options=@f_basic={{0xa}, {0x84c, 0x2, [@TCA_BASIC_POLICE={0x848, 0x4, [@TCA_POLICE_TBF={0x3c, 0x1, {0x80000001, 0x7, 0x9, 0x1, 0x80, {0x1, 0x2, 0x6, 0x4, 0x4, 0xff}, {0x1, 0x0, 0xfffa, 0xff, 0x8, 0xf}, 0x7fff, 0xfffffffa, 0xfffffff8}}, @TCA_POLICE_RATE={0x404, 0x2, [0xff, 0x2, 0x6, 0x0, 0x3, 0x4, 0x7, 0x0, 0x3a, 0x7, 0x3, 0x6, 0xae, 0x247, 0x499, 0x50000, 0x6, 0xc71, 0x0, 0x41f, 0x0, 0x800, 0x2, 0x6, 0xffff7fff, 0x5, 0x9, 0xff, 0x7f, 0xd, 0x5, 0x9c8, 0x5, 0x7, 0x5, 0xe087, 0x7, 0xffffff42, 0x3, 0x278, 0x6, 0x6b7, 0x6, 0xff, 0x0, 0x8, 0x4, 0xdf01, 0x8, 0x7fffffff, 0x2, 0x51, 0x9, 0x1ff, 0x6, 0x3, 0x2, 0x9, 0x2, 0x1, 0x8, 0xffffff1d, 0x9000, 0x839, 0x1, 0x3, 0x4, 0x5, 0xff, 0x9dc, 0x4, 0xf, 0x6, 0x0, 0x200, 0x7ff, 0x1f20, 0x5, 0x2, 0x9, 0x8, 0x5, 0x3, 0x40, 0x8, 0x4, 0xc, 0x789, 0x80, 0x9, 0x8, 0x4, 0x0, 0x1, 0x1, 0x16d000, 0x400, 0x7ff, 0x7, 0x3, 0x4, 0x42b3, 0x8c, 0x3, 0x83ba, 0x7, 0x8001, 0x10000, 0xfffffeff, 0x8, 0x0, 0x4, 0x1, 0x6, 0x80000001, 0x400, 0x3, 0x9, 0xfffff001, 0x2, 0x8001, 0x4, 0x6, 0x11cf, 0xfffffff8, 0x7, 0x5, 0xb67, 0x1, 0x8, 0x6, 0x2, 0x3, 0x583, 0x7ff80, 0x7, 0x4, 0xded4, 0x0, 0xffffffff, 0x6, 0x1, 0x1000, 0x7, 0x6, 0x6, 0xd2, 0xc19c, 0x0, 0x6, 0x3ff, 0x3ff, 0x3ff, 0x1, 0x200, 0x4, 0x0, 0x8, 0x8, 0x1, 0x6, 0x456b, 0x477, 0x19d, 0x6, 0x1800, 0x5, 0x2, 0x3ba, 0x0, 0x8, 0x6, 0xfffffffc, 0x6d6, 0x9, 0x40, 0x1, 0x32, 0x5c, 0x8, 0x1, 0x4, 0x9, 0x40000000, 0x5, 0x101, 0x8, 0x1fffc00, 0x7ff, 0x0, 0x8, 0x7, 0x5, 0xffffffff, 0x2, 0xc15, 0x4, 0x72c5, 0x3, 0x28, 0x68e9, 0x8, 0x2, 0xc, 0xfeae, 0x1, 0x8, 0x4, 0x3c8, 0x5, 0xfff, 0x9, 0x8, 0x4, 0x2, 0x5, 0x9, 0xf4, 0xb2e, 0xfffffffb, 0x4, 0x7fff, 0x7f, 0x4, 0x8, 0x400, 0x97, 0x10, 0xa27, 0xb73, 0x1, 0x0, 0x10000, 0x2, 0x9, 0x9, 0x7, 0x6, 0x80, 0x6, 0x0, 0x56e, 0x0, 0x2, 0x80, 0x1, 0x9, 0x9, 0xb, 0x7, 0x8fdf, 0x10001, 0xf, 0x4, 0x6, 0xfffffff9]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xe45, 0x3, 0x80, 0x3, 0x8, 0x7, 0x2, 0x7, 0x3, 0x7fffffff, 0xfff, 0xeaf, 0x3, 0x7, 0x5, 0xe2e3, 0x9, 0xfff, 0x5, 0xffffffff, 0x7, 0x6d, 0x2, 0xfffffff0, 0x2, 0x400, 0x7ff, 0x5, 0x2, 0x8001, 0x6, 0x10000, 0xffff8a72, 0x6, 0x7, 0x9, 0x4, 0x8, 0x9, 0x2, 0x5, 0x5, 0x10000, 0x2, 0x70a6, 0x6, 0x0, 0xcda, 0xfffffe00, 0x100, 0x5, 0x10001, 0xdf, 0x5, 0x200, 0x8, 0x9, 0x9, 0x1, 0x800, 0x21, 0x1000000, 0x8, 0x8001, 0x777f, 0x5, 0x5, 0x1000, 0x81, 0xff, 0x4945, 0x7111, 0x0, 0xfffffffc, 0x1, 0x8, 0x0, 0x100, 0x3a6, 0xfffffffe, 0x12, 0x80, 0x3, 0x4, 0x5, 0xe, 0x7f, 0x5, 0x6, 0x9, 0x4, 0x77, 0x2, 0x8, 0x7, 0x1, 0x4, 0x5, 0x1, 0x8, 0x753, 0xd05, 0x3, 0x10, 0xb489, 0x0, 0x1, 0x3, 0x6, 0x1, 0x3, 0x1, 0x7, 0x5, 0x1, 0xc2d, 0xd4, 0x7ff, 0x51, 0x9, 0x407ba2f0, 0x1ff, 0x1, 0xc7, 0x4, 0x4, 0x9, 0x6, 0x3, 0x43f, 0x4, 0x2, 0x101, 0x1, 0x80000001, 0x7, 0x80000001, 0x0, 0x8da, 0x3, 0xfffffffa, 0x5, 0x2, 0x4, 0x1ff, 0x4, 0xfffff6e1, 0x0, 0xdd, 0x23d86c5e, 0x7fff, 0x10, 0x800, 0x40, 0x3, 0x1, 0x8, 0x7d, 0x0, 0x7, 0x3, 0xf, 0x1ff, 0xfff, 0x3, 0x1, 0xfb, 0x5, 0xf, 0x5, 0x400, 0x5, 0x4, 0x5, 0x9c, 0x5, 0x992, 0x401, 0x80000000, 0x7, 0x1000, 0x7fffffff, 0x7, 0x3, 0x7, 0x0, 0x7fff, 0x7, 0x7fff, 0x400, 0x5c, 0x1ff, 0x1, 0x6, 0x8f, 0x6, 0x764d, 0x4, 0x5, 0x6, 0x6, 0x7, 0x0, 0x6, 0x0, 0x7fff, 0x2008, 0x1, 0x40, 0x89, 0x8, 0x2a, 0x3, 0x4, 0x4, 0x12, 0x6, 0x9, 0x2, 0x8, 0x11e000, 0x8, 0x71, 0x724f, 0x8, 0x8, 0x4, 0x8, 0x0, 0x6, 0x5, 0xffff, 0x81, 0x2, 0x8001, 0xb3, 0x3, 0xffffffff, 0x7, 0x9, 0x3f2, 0xfffffffb, 0x5, 0x1c1, 0x0, 0xfffffffe, 0xfffffffa, 0x0, 0x7, 0x8, 0x7, 0x7ff, 0x76e, 0x3, 0x0, 0x1000]}]}]}}]}, 0x87c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 13m14.24407729s ago: executing program 39 (id=17319): prlimit64(0x0, 0xe, &(0x7f0000000240)={0x8, 0x248}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) sched_setaffinity(0x0, 0x1, &(0x7f00000002c0)=0x2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r0, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(r1, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r0, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000e8ffffff850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f00000002c0)={'erspan0\x00'}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000002440), 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r5 = socket(0x400000000010, 0x3, 0x0) r6 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xfffffffd, {0x0, 0x0, 0x0, r7, {0x0, 0x1}, {0xffff, 0xffff}, {0xffe0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000002480)=@newtfilter={0x87c, 0x2c, 0xd3f, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r7, {0xffff, 0xfff3}, {}, {0x7, 0x300}}, [@filter_kind_options=@f_basic={{0xa}, {0x84c, 0x2, [@TCA_BASIC_POLICE={0x848, 0x4, [@TCA_POLICE_TBF={0x3c, 0x1, {0x80000001, 0x7, 0x9, 0x1, 0x80, {0x1, 0x2, 0x6, 0x4, 0x4, 0xff}, {0x1, 0x0, 0xfffa, 0xff, 0x8, 0xf}, 0x7fff, 0xfffffffa, 0xfffffff8}}, @TCA_POLICE_RATE={0x404, 0x2, [0xff, 0x2, 0x6, 0x0, 0x3, 0x4, 0x7, 0x0, 0x3a, 0x7, 0x3, 0x6, 0xae, 0x247, 0x499, 0x50000, 0x6, 0xc71, 0x0, 0x41f, 0x0, 0x800, 0x2, 0x6, 0xffff7fff, 0x5, 0x9, 0xff, 0x7f, 0xd, 0x5, 0x9c8, 0x5, 0x7, 0x5, 0xe087, 0x7, 0xffffff42, 0x3, 0x278, 0x6, 0x6b7, 0x6, 0xff, 0x0, 0x8, 0x4, 0xdf01, 0x8, 0x7fffffff, 0x2, 0x51, 0x9, 0x1ff, 0x6, 0x3, 0x2, 0x9, 0x2, 0x1, 0x8, 0xffffff1d, 0x9000, 0x839, 0x1, 0x3, 0x4, 0x5, 0xff, 0x9dc, 0x4, 0xf, 0x6, 0x0, 0x200, 0x7ff, 0x1f20, 0x5, 0x2, 0x9, 0x8, 0x5, 0x3, 0x40, 0x8, 0x4, 0xc, 0x789, 0x80, 0x9, 0x8, 0x4, 0x0, 0x1, 0x1, 0x16d000, 0x400, 0x7ff, 0x7, 0x3, 0x4, 0x42b3, 0x8c, 0x3, 0x83ba, 0x7, 0x8001, 0x10000, 0xfffffeff, 0x8, 0x0, 0x4, 0x1, 0x6, 0x80000001, 0x400, 0x3, 0x9, 0xfffff001, 0x2, 0x8001, 0x4, 0x6, 0x11cf, 0xfffffff8, 0x7, 0x5, 0xb67, 0x1, 0x8, 0x6, 0x2, 0x3, 0x583, 0x7ff80, 0x7, 0x4, 0xded4, 0x0, 0xffffffff, 0x6, 0x1, 0x1000, 0x7, 0x6, 0x6, 0xd2, 0xc19c, 0x0, 0x6, 0x3ff, 0x3ff, 0x3ff, 0x1, 0x200, 0x4, 0x0, 0x8, 0x8, 0x1, 0x6, 0x456b, 0x477, 0x19d, 0x6, 0x1800, 0x5, 0x2, 0x3ba, 0x0, 0x8, 0x6, 0xfffffffc, 0x6d6, 0x9, 0x40, 0x1, 0x32, 0x5c, 0x8, 0x1, 0x4, 0x9, 0x40000000, 0x5, 0x101, 0x8, 0x1fffc00, 0x7ff, 0x0, 0x8, 0x7, 0x5, 0xffffffff, 0x2, 0xc15, 0x4, 0x72c5, 0x3, 0x28, 0x68e9, 0x8, 0x2, 0xc, 0xfeae, 0x1, 0x8, 0x4, 0x3c8, 0x5, 0xfff, 0x9, 0x8, 0x4, 0x2, 0x5, 0x9, 0xf4, 0xb2e, 0xfffffffb, 0x4, 0x7fff, 0x7f, 0x4, 0x8, 0x400, 0x97, 0x10, 0xa27, 0xb73, 0x1, 0x0, 0x10000, 0x2, 0x9, 0x9, 0x7, 0x6, 0x80, 0x6, 0x0, 0x56e, 0x0, 0x2, 0x80, 0x1, 0x9, 0x9, 0xb, 0x7, 0x8fdf, 0x10001, 0xf, 0x4, 0x6, 0xfffffff9]}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0xe45, 0x3, 0x80, 0x3, 0x8, 0x7, 0x2, 0x7, 0x3, 0x7fffffff, 0xfff, 0xeaf, 0x3, 0x7, 0x5, 0xe2e3, 0x9, 0xfff, 0x5, 0xffffffff, 0x7, 0x6d, 0x2, 0xfffffff0, 0x2, 0x400, 0x7ff, 0x5, 0x2, 0x8001, 0x6, 0x10000, 0xffff8a72, 0x6, 0x7, 0x9, 0x4, 0x8, 0x9, 0x2, 0x5, 0x5, 0x10000, 0x2, 0x70a6, 0x6, 0x0, 0xcda, 0xfffffe00, 0x100, 0x5, 0x10001, 0xdf, 0x5, 0x200, 0x8, 0x9, 0x9, 0x1, 0x800, 0x21, 0x1000000, 0x8, 0x8001, 0x777f, 0x5, 0x5, 0x1000, 0x81, 0xff, 0x4945, 0x7111, 0x0, 0xfffffffc, 0x1, 0x8, 0x0, 0x100, 0x3a6, 0xfffffffe, 0x12, 0x80, 0x3, 0x4, 0x5, 0xe, 0x7f, 0x5, 0x6, 0x9, 0x4, 0x77, 0x2, 0x8, 0x7, 0x1, 0x4, 0x5, 0x1, 0x8, 0x753, 0xd05, 0x3, 0x10, 0xb489, 0x0, 0x1, 0x3, 0x6, 0x1, 0x3, 0x1, 0x7, 0x5, 0x1, 0xc2d, 0xd4, 0x7ff, 0x51, 0x9, 0x407ba2f0, 0x1ff, 0x1, 0xc7, 0x4, 0x4, 0x9, 0x6, 0x3, 0x43f, 0x4, 0x2, 0x101, 0x1, 0x80000001, 0x7, 0x80000001, 0x0, 0x8da, 0x3, 0xfffffffa, 0x5, 0x2, 0x4, 0x1ff, 0x4, 0xfffff6e1, 0x0, 0xdd, 0x23d86c5e, 0x7fff, 0x10, 0x800, 0x40, 0x3, 0x1, 0x8, 0x7d, 0x0, 0x7, 0x3, 0xf, 0x1ff, 0xfff, 0x3, 0x1, 0xfb, 0x5, 0xf, 0x5, 0x400, 0x5, 0x4, 0x5, 0x9c, 0x5, 0x992, 0x401, 0x80000000, 0x7, 0x1000, 0x7fffffff, 0x7, 0x3, 0x7, 0x0, 0x7fff, 0x7, 0x7fff, 0x400, 0x5c, 0x1ff, 0x1, 0x6, 0x8f, 0x6, 0x764d, 0x4, 0x5, 0x6, 0x6, 0x7, 0x0, 0x6, 0x0, 0x7fff, 0x2008, 0x1, 0x40, 0x89, 0x8, 0x2a, 0x3, 0x4, 0x4, 0x12, 0x6, 0x9, 0x2, 0x8, 0x11e000, 0x8, 0x71, 0x724f, 0x8, 0x8, 0x4, 0x8, 0x0, 0x6, 0x5, 0xffff, 0x81, 0x2, 0x8001, 0xb3, 0x3, 0xffffffff, 0x7, 0x9, 0x3f2, 0xfffffffb, 0x5, 0x1c1, 0x0, 0xfffffffe, 0xfffffffa, 0x0, 0x7, 0x8, 0x7, 0x7ff, 0x76e, 0x3, 0x0, 0x1000]}]}]}}]}, 0x87c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 3.90763053s ago: executing program 7 (id=22203): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "ead43f1ebd755fcaa13bae2a229fb3bd16e4c459c1f46a6c", "391aa94c42fca7ead0e17e59f1bea955800221ccbbdacfc61a4a9a2dc4ed4c44"}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) r1 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x55}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r1, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0900000004000000060000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\b\x00'/28], 0x50) recvmmsg(r0, &(0x7f00000057c0)=[{{0x0, 0x0, 0x0}, 0x3}, {{0x0, 0x0, &(0x7f0000002cc0)=[{0x0, 0xea}, {&(0x7f00000017c0)=""/130, 0x94}], 0x2}, 0xa1}], 0x2, 0x0, 0x0) 3.387751643s ago: executing program 1 (id=22207): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000ec0)={'batadv0\x00', 0x0}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="030300000000fcffffff0c000000080003", @ANYRES32=r1], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 3.386736683s ago: executing program 7 (id=22208): bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x581, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x4f014}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_DOWNDELAY={0x8, 0x1f, 0x7fffffff}, @IFLA_BOND_ARP_VALIDATE={0x8, 0x9, 0xfffffffe}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x20004002}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socket$netlink(0x10, 0x3, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) connect$unix(0xffffffffffffffff, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x2000000}, 0x6e) sendmmsg$unix(0xffffffffffffffff, &(0x7f0000000000), 0x651, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x120) r5 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r5, r4, 0x0, 0x3a) 3.307588839s ago: executing program 1 (id=22210): sched_setattr(0x0, &(0x7f0000000100)={0x38, 0x5, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000400)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0, 0x0, 0xff}, 0x18) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000003640)='kfree\x00', r2, 0x0, 0x400}, 0x18) pipe2(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) vmsplice(r3, &(0x7f00000005c0)=[{&(0x7f0000001cc0)="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", 0x341}], 0x1, 0xa) fcntl$setpipe(r3, 0x407, 0x6) 3.191177499s ago: executing program 1 (id=22213): bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x581, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x4f014}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_DOWNDELAY={0x8, 0x1f, 0x7fffffff}, @IFLA_BOND_ARP_VALIDATE={0x8, 0x9, 0xfffffffe}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x20004002}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socket$netlink(0x10, 0x3, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r3 = getpid() sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x2000000}, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x120) r7 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r7, r6, 0x0, 0x3a) 3.146811722s ago: executing program 7 (id=22214): socket(0x1, 0x803, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000380)={'vcan0\x00', 0x0}) r2 = socket$can_j1939(0x1d, 0x2, 0x7) bind$can_j1939(r2, &(0x7f0000000080)={0x1d, r1}, 0x18) sendmsg$can_j1939(r2, &(0x7f00000001c0)={&(0x7f0000000040)={0x1d, 0x0, 0x0, {0x1, 0xff}}, 0x18, &(0x7f0000000180)={&(0x7f00000000c0)="92", 0x1}, 0x1, 0x0, 0x0, 0x40c1}, 0xee) setsockopt$SO_J1939_FILTER(r2, 0x6b, 0x1, &(0x7f00000003c0)=[{0x2, 0x2, {0x2, 0xf, 0x6}, {0x1, 0xf0, 0x1}, 0x0, 0xfe}, {0x0, 0x2, {0x0, 0xf0}, {0x0, 0x1, 0x2}, 0x0, 0xfe}], 0x40) sendmsg$nl_route_sched(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000007c0)=@newtfilter={0x24, 0x11, 0x101, 0x70bd25, 0x100000, {0x0, 0x0, 0x74, r1, {0xa, 0x8}, {0x5, 0xfff3}, {0xfff1, 0x6}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x40}, 0xc4) ioctl$sock_SIOCSIFVLAN_GET_VLAN_INGRESS_PRIORITY_CMD(r0, 0x8983, 0x0) r3 = socket$rds(0x15, 0x5, 0x0) bind$rds(r3, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) sendmsg$rds(r3, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0x8, &(0x7f0000002000)={0x0, 0x7}, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x1, &(0x7f0000000480)={{}, {0x77359400}}, 0x0) timer_gettime(0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x37, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0xd}, 0x4c58, 0x10000, 0x0, 0x1, 0x8, 0x8, 0xb, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_SENDMSG={0x9, 0x79, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0, 0x81, 0x1080a422012f758f}) syz_io_uring_setup(0x17dc, &(0x7f0000000100)={0x0, 0x59c4, 0x8, 0x1000, 0x5cc}, &(0x7f0000000300), &(0x7f0000000080)) 2.596394167s ago: executing program 9 (id=22225): r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1c1842, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x8914, &(0x7f0000000080)) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0xa0800, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x4, 0xff, 0x0, 0x1}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) close(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000007c0)) ioctl$SIOCSIFHWADDR(r2, 0x8943, &(0x7f0000000100)={'syzkaller0\x00'}) 2.466489378s ago: executing program 9 (id=22228): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "ead43f1ebd755fcaa13bae2a229fb3bd16e4c459c1f46a6c", "391aa94c42fca7ead0e17e59f1bea955800221ccbbdacfc61a4a9a2dc4ed4c44"}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x55}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0900000004000000060000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\b\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7030000db71f7768500000021000000b7000000000000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmmsg(r1, &(0x7f00000057c0)=[{{0x0, 0x0, 0x0}, 0x3}, {{0x0, 0x0, &(0x7f0000002cc0)=[{0x0, 0xea}, {&(0x7f00000017c0)=""/130, 0x94}], 0x2}, 0xa1}], 0x2, 0x0, 0x0) setrlimit(0x5, &(0x7f0000000280)={0x6, 0x7fffffffffffffff}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r4, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x104}, 0x20000050) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) creat(&(0x7f0000000080)='./file0\x00', 0xa) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@version_u}]}}) 2.295265892s ago: executing program 1 (id=22231): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "ead43f1ebd755fcaa13bae2a229fb3bd16e4c459c1f46a6c", "391aa94c42fca7ead0e17e59f1bea955800221ccbbdacfc61a4a9a2dc4ed4c44"}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x55}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r2, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0900000004000000060000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\b\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7030000db71f7768500000021000000b7000000000000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmmsg(r1, &(0x7f00000057c0)=[{{0x0, 0x0, 0x0}, 0x3}, {{0x0, 0x0, &(0x7f0000002cc0)=[{0x0, 0xea}, {&(0x7f00000017c0)=""/130, 0x94}], 0x2}, 0xa1}], 0x2, 0x0, 0x0) setrlimit(0x5, &(0x7f0000000280)={0x6, 0x7fffffffffffffff}) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_COALESCE_SET(r4, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x104}, 0x20000050) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r5}, 0x10) creat(&(0x7f0000000080)='./file0\x00', 0xa) pipe2$9p(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r6}, 0x2c, {'wfdno', 0x3d, r7}, 0x2c, {[{@version_u}]}}) 2.169244652s ago: executing program 7 (id=22232): socket$nl_netfilter(0x10, 0x3, 0xc) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) perf_event_open(&(0x7f0000000800)={0x2, 0x80, 0x82, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000006000000"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) recvmsg(0xffffffffffffffff, 0x0, 0x1f00) sendmsg$tipc(0xffffffffffffffff, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x10, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000510700140000000000000001b7080000000000007b8af8ff00000000b7080000fcffffff7b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7020000080000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000900)={'bridge0\x00', @remote}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r3, 0x89a1, &(0x7f0000000900)={'bridge0\x00', @broadcast}) (fail_nth: 1) 2.07486805s ago: executing program 6 (id=22233): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000ec0)={'batadv0\x00', 0x0}) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="1c000000", @ANYBLOB="030300000000fcffffff0c00000008000300", @ANYRES32=r1], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 2.008016846s ago: executing program 6 (id=22234): r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) statx(0xffffffffffffffff, &(0x7f0000002340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1000, 0x10, 0x0) open_tree(r0, &(0x7f0000000640)='./file0\x00', 0x80001) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wlan1\x00'}) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000200)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6e}}, {@user_xattr}, {@errors_remount}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f0000000300), &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYRESHEX], 0xfe37, 0x0) unlink(&(0x7f0000000180)='./file1\x00') 1.83496459s ago: executing program 6 (id=22235): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000003640)='kfree\x00', r1, 0x0, 0x400}, 0x18) pipe2(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) vmsplice(r2, &(0x7f00000005c0)=[{&(0x7f0000001cc0)="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", 0x341}], 0x1, 0xa) fcntl$setpipe(r2, 0x407, 0x6) 1.83462287s ago: executing program 6 (id=22236): r0 = socket$nl_route(0x10, 0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) socket$netlink(0x10, 0x3, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000e00000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x401}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x1, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) socket$inet(0x2, 0x8000c, 0x3) socketpair(0xf, 0x3, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x80082, 0x0) ppoll(&(0x7f00000000c0)=[{r4, 0x1040}], 0x1, 0x0, 0x0, 0x0) write$vga_arbiter(r4, &(0x7f00000005c0)=ANY=[@ANYBLOB='lock io'], 0xc) write$vga_arbiter(r4, &(0x7f0000000080)=@unlock_all, 0xb) dup(0xffffffffffffffff) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a90000000030a0300000000000000000002e000000c00020000000000000000010900010073797a30"], 0xb8}, 0x1, 0x0, 0x0, 0x20040810}, 0x8094) r6 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r6, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x3}}, [@NFT_MSG_NEWCHAIN={0x38, 0x3, 0xa, 0x5, 0x0, 0x0, {0x7, 0x0, 0x7}, [@NFTA_CHAIN_COUNTERS={0x10, 0x8, 0x0, 0x1, [@NFTA_COUNTER_PACKETS={0xc, 0x2, 0x1, 0x0, 0x400}]}, @NFTA_CHAIN_FLAGS={0x8, 0xa, 0x1, 0x0, 0x2}, @NFTA_CHAIN_TABLE={0x9, 0x1, 'syz1\x00'}]}, @NFT_MSG_NEWCHAIN={0xb0, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1, 0x0, 0x5}, [@NFTA_CHAIN_HOOK={0x40, 0x4, 0x0, 0x1, [@NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x67c27c35}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x15a3aed2}, @NFTA_HOOK_HOOKNUM={0x8, 0x1, 0x1, 0x0, 0x1}, @NFTA_HOOK_HOOKNUM={0x8}, @NFTA_HOOK_DEV={0x14, 0x3, 'veth1_to_team\x00'}, @NFTA_HOOK_PRIORITY={0x8, 0x2, 0x1, 0x0, 0x74d6e63}]}, @NFTA_CHAIN_USERDATA={0x4f, 0xc, "71e86d937fe776db2c54a8037c8312625c1ea7bcbf876fcfe973234ae495f358d5ad878a836ecae1041b7c0e12783124e89ece3c2b18221f747f1c61a560a948b0ec316de2e68454741891"}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz2\x00'}]}], {0x14}}, 0x110}, 0x1, 0x0, 0x0, 0x40002}, 0x44880) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)=@newlink={0x48, 0x10, 0x401, 0xfffffffc, 0x80, {0x0, 0x0, 0x0, 0x0, 0x24403}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @macsec={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r7}, @IFLA_BROADCAST={0xa, 0x2, @remote}]}, 0x48}, 0x1, 0x0, 0x0, 0x2004d808}, 0x0) 1.763971066s ago: executing program 9 (id=22238): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00'}, 0x10) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x82, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x400, 0x200000000000, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 1.715407869s ago: executing program 7 (id=22239): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000001000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) r0 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r0, &(0x7f0000f5dfe4)={0xa, 0x4e20}, 0x1c) syz_emit_ethernet(0x6a, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty}, {0x0, 0x4e20, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "ead43f1ebd755fcaa13bae2a229fb3bd16e4c459c1f46a6c", "391aa94c42fca7ead0e17e59f1bea955800221ccbbdacfc61a4a9a2dc4ed4c44"}}}}}}, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x3}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x55}, 0x94) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0900000004000000060000000800000000000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00\x00\x00\b\x00'/28], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x3, 0x8, &(0x7f0000000940)=ANY=[@ANYBLOB="1809000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7030000db71f7768500000021000000b7000000000000009500000000000000"], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) recvmmsg(r0, &(0x7f00000057c0)=[{{0x0, 0x0, 0x0}, 0x3}, {{0x0, 0x0, &(0x7f0000002cc0)=[{0x0, 0xea}, {&(0x7f00000017c0)=""/130, 0x94}], 0x2}, 0xa1}], 0x2, 0x0, 0x0) 1.715013779s ago: executing program 9 (id=22240): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = socket(0xa, 0x3, 0x87) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000"], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000"], 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) r5 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000002c0), 0x601, 0x0) ioctl$TCSETAW(r5, 0x5407, &(0x7f0000000100)={0xa, 0x7, 0x3, 0x6, 0x1b}) ioctl$TIOCMSET(r5, 0x5418, &(0x7f0000000000)=0x8001) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000040)) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x2000, 0x0) mkdir(&(0x7f0000000000)='./cgroup/../file0\x00', 0x12) r6 = socket$inet_tcp(0x2, 0x1, 0x0) sendto(r0, 0x0, 0x0, 0x800, &(0x7f0000000600)=@pppol2tpv3={0x18, 0x1, {0x0, r6, {0x2, 0x4e20, @broadcast}, 0x3, 0x4, 0x2, 0x2}}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) 1.5888278s ago: executing program 5 (id=22241): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x69, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000e40)=[{&(0x7f0000000380)=""/210, 0xd2}, {&(0x7f00000006c0)=""/188, 0xbc}, {&(0x7f0000000f40)=""/213, 0xd5}, {&(0x7f0000002100)=""/4077, 0xfed}, {&(0x7f00000007c0)=""/211, 0xd3}, {&(0x7f0000000480)=""/176, 0xb0}, {&(0x7f0000000c00)=""/208, 0xd0}], 0x7}, 0x40012100) 1.555130602s ago: executing program 1 (id=22242): bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_open_dev$tty20(0xc, 0x4, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001780)=ANY=[@ANYBLOB="020000000400000006000000050000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x581, 0x0, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x4f014}, [@IFLA_LINKINFO={0x24, 0x12, 0x0, 0x1, @bond={{0x9}, {0x14, 0x2, 0x0, 0x1, [@IFLA_BOND_DOWNDELAY={0x8, 0x1f, 0x7fffffff}, @IFLA_BOND_ARP_VALIDATE={0x8, 0x9, 0xfffffffe}]}}}]}, 0x44}, 0x1, 0x0, 0x0, 0x20004002}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='sched_switch\x00', r1}, 0x10) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socket$netlink(0x10, 0x3, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x2000000}, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x120) r6 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/tcp_wmem\x00', 0x1, 0x0) sendfile(r6, r5, 0x0, 0x3a) 1.306992683s ago: executing program 5 (id=22243): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000001c0)={{r0}, &(0x7f0000000080), &(0x7f0000000180)='%ps \x00'}, 0x20) r2 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r2, &(0x7f0000000200)={&(0x7f0000000000)={0x2, 0x3, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000002100)="0800a9fc0da6b30a", 0x8}], 0x1, &(0x7f0000001d00)=ANY=[@ANYBLOB="3000000000000000000000000700000089"], 0x30}, 0x0) 1.197022992s ago: executing program 5 (id=22244): r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000ec0)={'batadv0\x00', 0x0}) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$BATADV_CMD_GET_BLA_BACKBONE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000700)=ANY=[@ANYBLOB="1c000000", @ANYBLOB="030300000000fcffffff0c00000008000300", @ANYRES32=r1], 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x0) 1.146638746s ago: executing program 5 (id=22245): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x12, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0xfffe}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @xfrm={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_XFRM_DIR={0x5, 0x3, 0x1}, @NFTA_XFRM_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xcc}}, 0x4000040) 1.023719776s ago: executing program 5 (id=22246): r0 = bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000003640)='kfree\x00', r1, 0x0, 0x400}, 0x18) pipe2(&(0x7f0000000c40)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) vmsplice(r2, &(0x7f00000005c0)=[{&(0x7f0000001cc0)="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", 0x341}], 0x1, 0xa) fcntl$setpipe(r2, 0x407, 0x6) 964.882081ms ago: executing program 6 (id=22247): r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000edff0000000000000000850000000f00000018010000646c012500000000000000007b1a"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00'}, 0x10) statx(0xffffffffffffffff, &(0x7f0000002340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1000, 0x10, 0x0) open_tree(r0, &(0x7f0000000640)='./file0\x00', 0x80001) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000280)={'wlan1\x00'}) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000200)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6e}}, {@user_xattr}, {@errors_remount}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./file1\x00', &(0x7f0000000300), &(0x7f0000000000)=ANY=[@ANYRES32, @ANYRES32, @ANYRESHEX], 0xfe37, 0x0) unlink(&(0x7f0000000180)='./file1\x00') 962.362851ms ago: executing program 5 (id=22248): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x5) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f0000000480), 0x400034f, 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r3 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r3}, 0x10) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r4, 0x29, 0x20, &(0x7f0000000200)={@private0, 0x0, 0x0, 0x1, 0x1}, 0x20) sendto$inet6(r4, 0x0, 0x0, 0xa0f15a6d21a68a81, &(0x7f00000000c0)={0xa, 0x0, 0x4, @local}, 0x1c) openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file2\x00', 0x220c084, &(0x7f0000000880)=ANY=[], 0x9, 0x224, &(0x7f0000000380)="$eJzs3cFKG10UAOCTmMTk51+4KxQKt3TRrqTtE1iKhdJAwZJFuxPqyqx0E93oY/QV+l59gOLKTbklTsZEO2oanITK9208zjn3eu+MkwRCTnIUfjz6Ft1uI5pbsRXnjdiIZpROAwB4SM5zjp+58PejW3UsCQCo2RzP/7+WvCQAoGafPn/58Kbf395JqRtxdjoajAbFzyL/7n1/+2W6sDEddTYaDdYu86/S9dcO43w7/pvkX6eU2imly3cUOhEx6MSLZ0V+PPnbj/10dfx6fK178wAAAAAAAAAAAAAAAAAAAAAAsCJPIpUq+/tsbqaU2jGT703yxW8z/YGu9e9pxeOyPfC0PVA+WcamAAAAAAAAAAAAAAAAAAAA4B9zeHS8vzsc7h1Mg/WImD3Sqqi5OWhMJp6ruM6gOd7GncXNOWqqgt5kmwssrDE5RRWp2Lq3k9CrvrhXg5yLhgxXU9Fa6YW7hyDNHunFAvNcu00qanrRuGWenMdB9V1QtsW4cXgn4o41P99Z9Pyc59wZfn86/mfLtxZPN79e94MQAAAAAAAAAAAAAAAAAABwYeZT33/orq1iRQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwfIdHx+W3/B/v7w6HeweHR3MHJxHxf9xZXP6tdnRXt1EAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAetN8BAAD//8OPFRQ=") socket$packet(0x11, 0x2, 0x300) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) r6 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r6, 0x6, 0x0, 0x0, 0x0) r7 = fsmount(r6, 0x0, 0x0) r8 = openat$cgroup_subtree(r7, &(0x7f0000000100), 0x2, 0x0) write$cgroup_subtree(r8, &(0x7f0000000300)=ANY=[@ANYBLOB='-cpu'], 0x5) 944.577882ms ago: executing program 6 (id=22249): r0 = openat$nci(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x12, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r2}, 0x10) r3 = socket$packet(0x11, 0x3, 0x300) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000004c0)={{0x14}, [@NFT_MSG_NEWTABLE={0x20, 0x0, 0xa, 0x101, 0x0, 0x0, {0x1, 0x0, 0xfffe}, [@NFTA_TABLE_NAME={0x9, 0x1, 'syz0\x00'}]}, @NFT_MSG_NEWCHAIN={0x2c, 0x3, 0xa, 0x201, 0x0, 0x0, {0x1}, [@NFTA_CHAIN_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_CHAIN_NAME={0x9, 0x3, 'syz1\x00'}]}, @NFT_MSG_NEWRULE={0x58, 0x6, 0xa, 0x401, 0x0, 0x0, {0x1}, [@NFTA_RULE_CHAIN_ID={0x8}, @NFTA_RULE_EXPRESSIONS={0x30, 0x4, 0x0, 0x1, [{0x2c, 0x1, 0x0, 0x1, @xfrm={{0x9}, @val={0x1c, 0x2, 0x0, 0x1, [@NFTA_XFRM_DIR={0x5, 0x3, 0x1}, @NFTA_XFRM_DREG={0x8, 0x1, 0x1, 0x0, 0x15}, @NFTA_XFRM_KEY={0x8, 0x2, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14}}, 0xcc}}, 0x4000040) setsockopt$packet_tx_ring(r3, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x808000, 0x4, 0x20300, 0xfc}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x200000000000000) 784.679885ms ago: executing program 7 (id=22250): socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000380)) syz_mount_image$vfat(&(0x7f0000000440), &(0x7f00000004c0)='./bus\x00', 0xa04255, &(0x7f0000000ec0)=ANY=[@ANYRES16=0x0, @ANYRES32, @ANYRESHEX, @ANYRES32], 0xfd, 0x345, &(0x7f00000008c0)="$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") bpf$PROG_LOAD(0x5, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = request_key(&(0x7f00000000c0)='rxrpc\x00', &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000240)='vfat\x00', 0xfffffffffffffffc) (fail_nth: 1) keyctl$instantiate(0xc, r3, &(0x7f0000000280)=@encrypted_new={'new ', 'default', 0x20, 'user:', '&-+$', 0x20, 0x7807}, 0x2b, 0x0) fsopen(&(0x7f0000000000)='pipefs\x00', 0x1) 779.288926ms ago: executing program 9 (id=22251): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000100)={r0, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) perf_event_open(&(0x7f0000000000)={0x8, 0x80, 0x0, 0x0, 0x0, 0xfe, 0x82, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000080)}, 0x400, 0x200000000000, 0x0, 0x0, 0x0, 0x1fffffff, 0x0, 0x0, 0x40, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 153.871507ms ago: executing program 9 (id=22252): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0xa, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeea, 0x8031, 0xffffffffffffffff, 0x28f43000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) mknodat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x11c0, 0x0) timer_create(0x0, &(0x7f0000000200)={0x0, 0x21, 0x2, @thr={&(0x7f0000000340)="721281c85051b08b704f2a3c7955c1321c2d521da654a3fffaff142ac35a67c82a6d59bc7e4cada892af488694cf675349d974346f36fc5bfd746ea6c487ddc41637", &(0x7f00000003c0)="950da4a0b82ca4176b492e4ff58d24548f7846e0066acef7b182d60b148cb7375ad26288660c7785f0369a34c8b4fae29f2d104bafbe8b889d81f096801c809be58d201c059ede78175f019c4a80500e9e2d6db90e9585e582aadc1718666b8812099151aa0f2c438bd9d0b513c23e1a2fe67de64f3dedd9c37c9f4a6a81e4b65a9a56515485ff3630a9fc46ac2858ee7397e58d5033a862f918237cfb559dc386dfe887477e1644c54ddcc98c7f4728630d0d289f0c56d77bd30abb7278177a1590eb4fc52bea9e525f38563fd32e40e2f6b3c36129"}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x25, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x3}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r2, 0x1, &(0x7f0000000040), 0x0) mmap(&(0x7f0000000000/0xa000)=nil, 0xa000, 0xd3283d0368e269b3, 0x8031, 0xffffffffffffffff, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) open(&(0x7f0000000000)='./file0\x00', 0x148640, 0x78e22799f4a46f8e) r3 = openat(0xffffffffffffff9c, &(0x7f0000000580)='./file0\x00', 0x2c41, 0x0) connect$unix(r1, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000001ec0)=[{{&(0x7f00000007c0)=@file={0x0, './file1\x00'}, 0x6e, &(0x7f00000008c0)=[{&(0x7f0000000840)="932dba5978838c78bcdc5c3740536886fa0faed4754ac0231ac0d1a12bc32e235765b80e3f5d3e3e99719a933e284a60f97d0246495e8ffa5df5494a6521bf6a1d12fdba5ab050fa0cb69fd0989ef6f7fe31f38c78de6175971b5d026a24eed137bca4c702bb234d4d59306826e62223d7c66d248c5fef183cd51b", 0x7b}, {&(0x7f0000000a00)="a13e1f0cc27af7e5c33ef0fe3a565c4abc0228c98e005c2c2b19d1acbc2b5f3b1803e97f6316fc1927e82c99a33e746a7c1ff986b1f5f9fa607601cc9d5d42c3269b1027278046ed3889c6ac73126a8e74e151ac97cdcc738daa0f690ba2b956f7f03d75fd3ed4a3120633e1f5cbe7bdc3c99e06179cb8962b34e8d44997c0f830e283fbb81104c26be632e5448392769d5ae35c5728b23501d926656e0c7fc7e738ed4d598848aabaf61f75be4610d187b5001b7bf0e8d734d44b3d1253c0e23fb6aa27cdf7d46eb31f73a3d54fb5341970edf31d114712e7aacc6f3f06dc0f23e72e9865bb4173c001a3a8670cc1f5ac8b53285225e4835708db6d763507055e3982d963b8a4dd6e8d45a98e29f95c9f23e8fb23dbe1636ed5488150e466898d47dbf97fa1c29a465aff4f920b684d14db7f89c9cd98e0d0818283eaf8c373a1adc9f6cd5d1e52e9d40de759ed91ea261fb434a422d6e4b0be69ae33ba9180d3392f2d76244d149bf1b71c92abaf102d73c348306fb6eb1d27971e30bbf6d15c1629d65d566fe7d70e2b9b98aac00fbf8c359cd7de4f25023c781bdaaba8085412724bf424bf646ee3f971d668b3285807b8fae05451719f95c8fdcb52cd4c624c5b89524acbcc0e7dad93d3cd094da407528fd973bc66fd9869f6222129b5b0ad9da84d9694d38aa48729a67f5945951df7dc6cda050296dbc1744a92d0ef1904f10b36918223c1f07a7501b55d526657b78420ad1734d8cb838ef4f44bb9c7bc36e6b67d8b325e7a8be852e8835c808c79ce85f87f2310de765c51fd30571e4c972451cc89bb2e1ddbb2ec11dee6967873361a5abd0d6b25a9284b31a83228452b76ae9b089923a1bda30590054d82fb03bd2ed250782d6d9e7348f2e6c71416f3275e2d88ddd44ac13b5da42573f1559ddacc5751cf5dd8dac8f8da6ee7abd0b35c1d1ecb88afc8e9eb2e44391ceaa6bf0919c1974d0e7d4c051390beaa18957cb538b4f86377d376bdc8b2109016005372250ae0f701f751f62b94c5392f27030aa0dd36274c307dae79b598c60f930af5d000cc96acb009f5362546417d836b5165b585c0f8b65180bb5a6458a519206cfc1f68b7f70d2e8cc8c1979d08107f857cf41bca534b6e59dea9296529b5b054f7fd8f72dd2beacaee2ff8a643ae24de8ac76b4025b386dd6913f2dde37274ea49354fe1c4098b52e8f3163d1f1852d6efbe372b9bb0ce3852458d485611414f5190ff766e6b230d886b1992955ef4835ff06d97d32cbc307fb03ffba3949fbcf5f70e585f57cdac332017c620ba4b6a38eaaa3ba36ac034b689c594075f04577ff3027c4718771ca6bfc50d5619d4362d66d5333ec69adeb1c2a0eb1edcddad25efa0168b0ef1a778bf846ca73fd7b0c994f1b7052c92e9a0eca484c665c3dae8f0033864c54b585922bdedd981dffe1990643a79a621e05de94e9e48367d4ca5b6262456c1b31cd288a6c6a400a372b6c7eb7734a4a00159d20f3ca55a9f58f8385a1963bd41917a075ed913c75dfdea8cd11a166455904a48748ec43b8b91b990c9011ce628d1703a020ce1d47eaa7bcc5910d23e7f8d0745457c95d79d728407f30ff71e3ec32d9dfe55048cf7f7ccdcc25ef1f95375f60bc8991e0e2d7a7bde147d7549890e2eaf075e473ab8f0887fb33c763b09b9be1207ae3f94f165c4f5f815604d930b655ebcedd933d5b3f3878c251d04bc7cadab0d47085ad602087edf02a1dc39e2d1988ab50111033cdaaecc74604d4a4e4c9e3276c24519a3071b644e90e0f58bc40ed34f547ac1e1f8b478b2004db0799c933ea893998bf9bfb1dd73b7c6ac35701b946633c5ecb6019e199ef7cc7f7ccfe319bcc7f773c97c97beec6e869acc961e0c3e63a86540362e60a749e06cbb4613ce6e6d1dbd2efdb7237ecb205a8cb6908af212308cf1473e50c2b86d66e32bd492a82501407acae483501d00ca484f9fe34e8d155d19679fd2475a66781c6c5603280ab5e0eff55c4f9f89dcc442a4eeb20b4843edb742e61f3931fc27f221218dead0bb250126d8617746028df1add55027c7916be124fc2193c52f86e550f3a612ff1b822743f3fefa91401244e8c63ea3a5fcdd36f37615b22f5e0db99310932d49a1cef933e8072ccc2ef97e6f646453300eaf518eb15608b95014ab1489a3daae59d241d4fb30bfcb776a573961a094c167cfb86095e51c3951a55df81107b243117211a5a1b4a5ade974f83b5350c0fc9ea83c5e6d4fc41901703bb83aa3d2a327834e303966c46c9538c5dd0400a8f04d1bd7bf62f19d24ed00b776052fd328907c32a76d63a6846b8a396bd29b37a8c973f741b55cb8f4be02231a5edb88a92c6d5552c2b935049cf7f324cb3016ef68b3cb7bc7776604de6c0e8b197c7646d3d5a7470be83b2059cd972d242d6ebe4f66a1cd7fe833b6c6909437f252e5fe6404efe8170b18b204f2b3834f48ab9ef7124f030651f0f4e4b6084fb0605cb2d377581407f38bfcb86c3b699a6fda6802925779e7257e67d5e7b8907612a4e72273734786c6b7564d5c790ad1777c0e840cc5c961204dc387f4180346a9a9ef9869d8373f9786f9733476f583c609c4474d4dc0721614f2f738c0966ec912051541b058c2bce0a40e8c344a8b89f84c65087b02a9eb67121d0ed5591cac93417b46db889dd5a963d02270d30a6b639815467dd0c10c5a7303e7591c848f622f1c92f08f00a2cb3e8f8a9842279d3e310e6da484b269021671583d06f2399d33ac97b0829f4542875e6b239f150b8ea7d3c51ce698cea0a9873df96bbfcc5370ffc9308551d00634800edf331b41dffa5b7e6b8eba5e667e2a215f0a877753617fe608ac53a6daccb9275af601bca89f9f8ab93f3441258823ab8e5df68540958d03b92fda5f6c80f4c7958de09dda365203986f68198ce6dc33ac6db0e3769790ab4fb9c75cb18ed5cbdcde41e94fa6ccce5c4e4cf2c6e4062cc78788b110aa92408136c79ee242eb75a725fbc2fa20b567cf61aecb7631b9b9a1bded6638521ea6dd773268b7df7d754737fab16dfb1034a6706db90ffa082d1b82dabdae740b27ec1f8467b944e8fb23ad6d458b00d758f05edfc5bcccafcb42d3e6f94066b45c9eddeb77d6974e363541069b2aeb4f845613733c692f8716e128cee8341e23056c8a493f520c33c1a8cb07f7751ce4f70be6e209c5c537a4293d0fa3ea0c68b1d02d48ef6303761d452a3a9d66bb144a62d023b9aab939c8b2747378037c7547d2c52770627e56bad8b28a65448ffb2ed138180d15321189ff88dfc69c3f3b42ebb07b81cc90d990b6fcb55c826daadfaf550ab8509645de1b8c3e9e9b221d24e36442d8ef7f51429661f7621a123de9b9685b4506b82aa3061e389faa1c9429ae55286521c38d33c372346a74bc5ee4703e98802c3ed395788ee0a4a00665e86be608f4b2822f7f239e48e482f5c258e75e369959b07ca99192777f4ba04187b0b31abf6aca59e315ce5cdf46a66f305f47c9528af4a6249052ed9adca5312b0cf3e81da03a52f8e9ec9431814965a1d52e96a4b255f48cde2d5a692791afd4870b88ae48544fd0e750da4ed4f97a0d3683974a05d45bb3233864d8d01352c5cd0115664008255d67c77f021fd641912d6a93c819e9bb4f26987fddd644592cb423081e429540f0bd1ac9bfc1f8bda6d1a60fe200f7b2399a3d7308bd0154b38b02fbe5840abda0d41c48e63e3bacd66317a56760132adf9f8de737f8a816f61893c8c7c6fa80c031e7bc12d6fd202d99176fb54cfdf63aa07455ab020567ad9e379a4a0f020aaf74ba78304a6cd5c237b8d9ced8b9aff606ab4f598f1436438eaefd19dc452523ce8d54719f000811e95f7e91f02384faa102359531654d4ca791af80310869ee5b8b035b95ecd9d89b7aadf717a9686d7ac4aa43a68c7051c159954fe89a50173a4b72e669ffea9f3266d1447bf81f92a3cd4a1bb4895618ea21fb6ee2540b91f52ad38fc32097a9d8413e7f95c81e068536b0b42043dbae1c77a9e6d44caa641a2d8ff5faba3b6412972ccde4793a692dccbeb3cb2aaa8ed4199673e57614f864d5dbdac4d24cb783afbba69fbed2701448954b62b3837f9b8b8707e6b6cd03922af22cc7f4d7e82f30a1ddf9d784804811ad5951113f0cdd15993c46268dad3656d1d819ade41703a8f0ebe054e0253bb25814526891b8267991c84e29fb4658fd0e696bccfdf0aceaf404d106e92c42062dff8e342ab66612c59f547d56486cd66caa518f4abd8b3f12dcbf059de27d3c2fa362fad545bea46f607a47288b0bc3a82c3968e458b0f7f3ef006444e2aab1cabe86ab879b524d253b0fd4dc356100ad90c124b9b55fb474856289799ce3e3c4b034f54ba49dc15edeb9e7c108f21a6831fd86e5b0dcb21c5c3bc9d989917597b787a98ec3709b457522344921ba081a93ad4537e0116c639c47402a3831c8aeacee17971ab99815fbafc41b3a38934ab421a345b1ea2f54a1f1a206f49b1208c87020218b0b384fe4733ac7419a11d06f510fb810b2ecf79933f85f28eba95f8eda6d607019ff8e75f59ef4b5418499964fff3ef4d0cce1f1db78099bd33f35071182c3168374b2bbff52c61a13ff1803fcaf61c3cdd6c7129d4bb7f7bcc2816fafb93de8f5268a21dec9b4119cf56c791037bd0cfd987347192a3d2f375a1c374070ab7307ae11cf342688126fff236abe8ebd70fad1de165e93ce7d379795def60f7060460f35a68dcb78d527e63f599c0ecde71f4ab9768821543bcd9d5e0ebd6ed8a60a720204f78ce013d4045b01b67249c12941e0c06e42c6edef0423cf1c035e22010dda46f153d12062055772cc86c06f5bf718abc4cdcaa170e8476bf7fc516128941529ed9c0620222b070283ac8433233806335eada4f50e59c59c99fb9d8c294860dc1047f0c3fdc78423602725e41fd5a52d33c70f09fdd6cffc49d37eda8058d4c7a8a97b9bc5c66cfcfce86af2462552ac9283d20f2bc0586a143bbb3ed867120e382bf9ee4d8d9b9a1c94d04191e5116b76bfeef0c4f50abfe1a1f0e4858e60c1711570952d46c488043e60585dfbb2e3d61d52cb199cfeb29fe9452383c0703393b5db3b53a441e66e40ccfca058ebf4ab2baef511568aa15472538c8b8eaa33bdb0ad60ff76c99776a2c6889efe6103693b6f8bc49fc2e2ac3d0d9c0e4e7cef954a7728ed9c95e5f3d6b8bdd676923cd06aefb50327b58c67182a5d31bad6d19285d6bdbcd81a45f1ddad2e1445f051f2c6259896b9e28fac126ff4cf69ae2967a8ce5efd28ed72e2d1dbaff88de5a71d3a80228bab73723bf841de7d35d154f24f01479c488bf0a08e84680ad5f9c669ae9e17adcd8edc1d1d74752a960ac5e65ac46d20fb30aa79cc4b6d2bcf0045069753e598ac1c75087c05ea411f5a07096b7530745d8c59be2096c0b166803c3a7ab043d5624ed60bc754e4cd0fb6b1359d3765ca31a0fa6100ac13fa4bd20e7f4bad98fdd513f1a0ac29c1222a7acabd603d4bea7ed09ad9127e5125fed6c45efae0e5bb1cae0a072216ce36afcd9629f24ede8ae80a817169ae086ded64db8363c7afbf827b8bf46436fecc0b1c1f08483f179c4381529b35ff4aa8ea305ef3e7c1a35a1ae7d8b4c983b8a1174ae8ddd3dafa9df1ba9901f5d39936af2a1c6b2e95bd6221f80a7540f3ddbcd2d4d6fbee5ae327e31e40f8fc689dd595e09522bcf0722fe4b383edf2f0acfc1ffee76370cfc042b5d01289", 0x1000}, {&(0x7f0000001c80)="ad31c968728b50d2c6e598caa6165975b68bac10a2f75a50ac1cd07d9c2d6125bfe64d8ecf18747306435ad52d3dfb1619862e29e6b6157609415f4abe75b99b091fbc493407ac6326239bb5361c3f857a0c590a397839fa26986f2f8571edbaa73495f08aab500140f43db13bc9f604e085c047d9ce8f0d2b7fa5b248677b74c9e893a3b37cbd677b899aa96ab68d32c8de20f8915e9e", 0x97}, {&(0x7f0000001c00)="607c572ef4cb3cb2f721752bdbf740f6008cdf58fbdd0aee78c0aba60db01a1527900ab8d073998aa9b1d7001ba6cfc414263338556840caced0ed4e08ac34d1b918e99c4595d7a525187e391d356097787a84b02ab798c30e", 0x59}, {&(0x7f0000001a00)="60d757b8ffc84bb63d506d27e4d6c4eec28bd9531eee0fa047c01924b15e7a7b5222b6031ab3234c5e9f995fd467d60e91e2e7b39fbf66e2578259f706ece02efdca544e0fa440eba45e0adc70855823599958ab66731af97aac4b4a2aa5609b2004f2ed70f0ae8809657a25447c24f8961f015b5a311041e94efbb4587a9b82c652029b33c94b0e19e6fc1f8e0b76de0bde5a903b3fddd16011bb9234fa64b1a605eb134c97d884cdc343981d7c6733ebe43114e4a2a4f975cc5f56ce1582818a", 0xc1}, {&(0x7f0000001b00)="5260a18c5ed2a7420e78ac8a5b2eda023b9f5c00dbc55fcc4efcd2d28aa76b61c2fac18a11646f7955b0799d4b48838099c841ebe288981c83fca917ca887d9bec9f443ef79cf067f20996f5838302d283bd28880128cf3dc1bee84240e78ab0177ce9ef8502ddc72eb980914988d2849944a6712be987a3e145d1", 0x7b}], 0x6, &(0x7f0000001e40)=ANY=[@ANYBLOB="1c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000014000000000000000100000001000080", @ANYRES32=r3, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=r0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x58, 0x20040011}}], 0x1, 0x24044040) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000027"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000001f00)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000001000000018110000", @ANYRES32=r4, @ANYBLOB="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"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000640)=[{0xffff, 0xa7, 0x40, 0x5}]}) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) 0s ago: executing program 1 (id=22253): r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x69, &(0x7f0000000100)=[{&(0x7f00000001c0)="5c00000012006bab9a3fe3d86e17aa0a046b876c1d0048007ea60864160af36504001a0038001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d4938037e70e4509c5bb", 0x33fe0}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000e40)=[{0x0}, {&(0x7f0000000380)=""/210, 0xd2}, {&(0x7f00000006c0)=""/188, 0xbc}, {&(0x7f0000000f40)=""/213, 0xd5}, {&(0x7f0000002100)=""/4077, 0xfed}, {&(0x7f00000007c0)=""/211, 0xd3}, {&(0x7f0000000480)=""/176, 0xb0}, {&(0x7f0000000c00)=""/208, 0xd0}], 0x8}, 0x40012100) kernel console output (not intermixed with test programs): user_mode+0x7e/0xa0 [ 3062.607886][ T6264] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3062.607904][ T6264] RIP: 0033:0x7f991a0febe9 [ 3062.607919][ T6264] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3062.607934][ T6264] RSP: 002b:00007f9918b67038 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 3062.607951][ T6264] RAX: ffffffffffffffda RBX: 00007f991a325fa0 RCX: 00007f991a0febe9 [ 3062.608044][ T6264] RDX: 00002000000000c0 RSI: 0000000000000000 RDI: 0000000000000001 [ 3062.608058][ T6264] RBP: 00007f9918b67090 R08: 0000000000000000 R09: 0000000000000000 [ 3062.608070][ T6264] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3062.608159][ T6264] R13: 00007f991a326038 R14: 00007f991a325fa0 R15: 00007ffd94483328 [ 3062.608179][ T6264] [ 3063.583671][ T29] audit: type=1400 audit(1755037198.371:4804): avc: denied { accept } for pid=6289 comm="syz.7.21463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3063.685653][ T6295] netlink: 16 bytes leftover after parsing attributes in process `syz.6.21464'. [ 3063.723738][ T29] audit: type=1400 audit(1755037198.531:4805): avc: denied { bind } for pid=6289 comm="syz.7.21463" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3063.869780][ T29] audit: type=1326 audit(1755037198.561:4806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6294 comm="syz.1.21465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f305c85ebe9 code=0x7ffc0000 [ 3063.893539][ T29] audit: type=1326 audit(1755037198.571:4807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6294 comm="syz.1.21465" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f305c85ebe9 code=0x7ffc0000 [ 3063.983805][ T6300] netlink: 4 bytes leftover after parsing attributes in process `syz.1.21465'. [ 3064.068479][ T6308] team0: Port device vlan0 removed [ 3064.075547][ T6309] netlink: 152 bytes leftover after parsing attributes in process `syz.7.21468'. [ 3064.106961][T16066] tipc: Resetting bearer [ 3064.115665][ T6309] team0: Port device vlan0 added [ 3064.136438][ T6308] tipc: Enabling of bearer rejected, already enabled [ 3064.740204][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 3064.740295][ T29] audit: type=1400 audit(1755037199.561:4835): avc: denied { read } for pid=6332 comm="syz.5.21478" name="vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 3064.828263][ T29] audit: type=1400 audit(1755037199.561:4836): avc: denied { open } for pid=6332 comm="syz.5.21478" path="/dev/vga_arbiter" dev="devtmpfs" ino=3 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:xserver_misc_device_t tclass=chr_file permissive=1 [ 3064.957770][ T29] audit: type=1400 audit(1755037199.771:4837): avc: denied { bind } for pid=6337 comm="syz.6.21479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 3064.980830][ T29] audit: type=1400 audit(1755037199.801:4838): avc: denied { listen } for pid=6337 comm="syz.6.21479" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 3065.148695][ T6344] netlink: 16 bytes leftover after parsing attributes in process `syz.6.21481'. [ 3065.325600][ T29] audit: type=1400 audit(1755037200.141:4839): avc: denied { bind } for pid=6357 comm="syz.7.21487" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3065.615545][ T6373] netlink: 16 bytes leftover after parsing attributes in process `syz.7.21492'. [ 3065.795768][ T6395] FAULT_INJECTION: forcing a failure. [ 3065.795768][ T6395] name failslab, interval 1, probability 0, space 0, times 0 [ 3065.808597][ T6395] CPU: 1 UID: 0 PID: 6395 Comm: syz.5.21493 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3065.808713][ T6395] Tainted: [W]=WARN [ 3065.808721][ T6395] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3065.808734][ T6395] Call Trace: [ 3065.808742][ T6395] [ 3065.808751][ T6395] __dump_stack+0x1d/0x30 [ 3065.808825][ T6395] dump_stack_lvl+0xe8/0x140 [ 3065.808846][ T6395] dump_stack+0x15/0x1b [ 3065.808865][ T6395] should_fail_ex+0x265/0x280 [ 3065.808882][ T6395] should_failslab+0x8c/0xb0 [ 3065.808954][ T6395] kmem_cache_alloc_node_noprof+0x57/0x320 [ 3065.808984][ T6395] ? dup_task_struct+0x70/0x6a0 [ 3065.809013][ T6395] dup_task_struct+0x70/0x6a0 [ 3065.809055][ T6395] ? _parse_integer+0x27/0x40 [ 3065.809096][ T6395] copy_process+0x399/0x2000 [ 3065.809115][ T6395] ? kstrtouint+0x76/0xc0 [ 3065.809136][ T6395] ? kstrtouint_from_user+0x9f/0xf0 [ 3065.809159][ T6395] ? __rcu_read_unlock+0x4f/0x70 [ 3065.809184][ T6395] kernel_clone+0x16c/0x5c0 [ 3065.809271][ T6395] ? vfs_write+0x7e8/0x960 [ 3065.809367][ T6395] __x64_sys_clone+0xe6/0x120 [ 3065.809399][ T6395] x64_sys_call+0x119c/0x2ff0 [ 3065.809421][ T6395] do_syscall_64+0xd2/0x200 [ 3065.809448][ T6395] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3065.809496][ T6395] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3065.809516][ T6395] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3065.809614][ T6395] RIP: 0033:0x7ffbb2c3ebe9 [ 3065.809634][ T6395] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3065.809704][ T6395] RSP: 002b:00007ffbb165cfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 3065.809750][ T6395] RAX: ffffffffffffffda RBX: 00007ffbb2e66180 RCX: 00007ffbb2c3ebe9 [ 3065.809764][ T6395] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006a020000 [ 3065.809778][ T6395] RBP: 00007ffbb165d090 R08: 0000000000000000 R09: 0000000000000000 [ 3065.809791][ T6395] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 3065.809802][ T6395] R13: 00007ffbb2e66218 R14: 00007ffbb2e66180 R15: 00007ffc72b4b9e8 [ 3065.809854][ T6395] [ 3066.086230][ T29] audit: type=1400 audit(1755037200.901:4840): avc: denied { read write } for pid=6403 comm="syz.7.21503" name="autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 3066.110033][ T29] audit: type=1400 audit(1755037200.901:4841): avc: denied { open } for pid=6403 comm="syz.7.21503" path="/dev/autofs" dev="devtmpfs" ino=91 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 3066.133793][ T29] audit: type=1400 audit(1755037200.901:4842): avc: denied { ioctl } for pid=6403 comm="syz.7.21503" path="/dev/autofs" dev="devtmpfs" ino=91 ioctlcmd=0x937b scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:autofs_device_t tclass=chr_file permissive=1 [ 3066.176692][ T29] audit: type=1400 audit(1755037200.981:4843): avc: denied { rename } for pid=6408 comm="syz.7.21504" name="file0" dev="tmpfs" ino=667 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 3066.199502][ T29] audit: type=1400 audit(1755037200.981:4844): avc: denied { rename } for pid=6408 comm="syz.7.21504" name="file5" dev="tmpfs" ino=672 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=1 [ 3066.250260][ T6416] netlink: 16 bytes leftover after parsing attributes in process `syz.6.21507'. [ 3066.589703][ T6413] netlink: 4 bytes leftover after parsing attributes in process `syz.7.21506'. [ 3066.663567][ T6448] FAULT_INJECTION: forcing a failure. [ 3066.663567][ T6448] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3066.676889][ T6448] CPU: 0 UID: 0 PID: 6448 Comm: syz.6.21518 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3066.676979][ T6448] Tainted: [W]=WARN [ 3066.676983][ T6448] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3066.676991][ T6448] Call Trace: [ 3066.676995][ T6448] [ 3066.677001][ T6448] __dump_stack+0x1d/0x30 [ 3066.677065][ T6448] dump_stack_lvl+0xe8/0x140 [ 3066.677076][ T6448] dump_stack+0x15/0x1b [ 3066.677086][ T6448] should_fail_ex+0x265/0x280 [ 3066.677114][ T6448] should_fail+0xb/0x20 [ 3066.677124][ T6448] should_fail_usercopy+0x1a/0x20 [ 3066.677136][ T6448] _copy_to_user+0x20/0xa0 [ 3066.677152][ T6448] simple_read_from_buffer+0xb5/0x130 [ 3066.677212][ T6448] proc_fail_nth_read+0x10e/0x150 [ 3066.677240][ T6448] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 3066.677254][ T6448] vfs_read+0x1a8/0x770 [ 3066.677341][ T6448] ? __rcu_read_unlock+0x4f/0x70 [ 3066.677353][ T6448] ? __fget_files+0x184/0x1c0 [ 3066.677368][ T6448] ksys_read+0xda/0x1a0 [ 3066.677381][ T6448] __x64_sys_read+0x40/0x50 [ 3066.677402][ T6448] x64_sys_call+0x27bc/0x2ff0 [ 3066.677474][ T6448] do_syscall_64+0xd2/0x200 [ 3066.677489][ T6448] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3066.677557][ T6448] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3066.677571][ T6448] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3066.677583][ T6448] RIP: 0033:0x7f7271bed5fc [ 3066.677592][ T6448] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 3066.677622][ T6448] RSP: 002b:00007f727064f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3066.677634][ T6448] RAX: ffffffffffffffda RBX: 00007f7271e15fa0 RCX: 00007f7271bed5fc [ 3066.677642][ T6448] RDX: 000000000000000f RSI: 00007f727064f0a0 RDI: 0000000000000006 [ 3066.677699][ T6448] RBP: 00007f727064f090 R08: 0000000000000000 R09: 0000000000000000 [ 3066.677706][ T6448] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3066.677713][ T6448] R13: 00007f7271e16038 R14: 00007f7271e15fa0 R15: 00007ffde623a1b8 [ 3066.677772][ T6448] [ 3067.031143][ T6472] gretap0: entered promiscuous mode [ 3067.042023][ T6472] vlan2: entered promiscuous mode [ 3067.152085][ T6491] team0: Port device vlan0 removed [ 3067.166076][T17639] tipc: Resetting bearer [ 3067.226814][ T6491] netlink: 152 bytes leftover after parsing attributes in process `syz.6.21531'. [ 3067.244327][T15970] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3067.254785][T15970] netdevsim netdevsim9 netdevsim3 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 3067.280397][ T6491] team0: Port device vlan0 added [ 3067.300540][ T6491] tipc: Enabling of bearer rejected, already enabled [ 3067.308712][ T6474] chnl_net:caif_netlink_parms(): no params data found [ 3067.484560][T15970] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3067.495122][T15970] netdevsim netdevsim9 netdevsim2 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 3067.582181][ T6502] team0: Port device vlan0 removed [ 3067.589812][ T6506] netlink: 152 bytes leftover after parsing attributes in process `syz.6.21533'. [ 3067.612266][T15975] tipc: Resetting bearer [ 3067.632984][T15970] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3067.643409][T15970] netdevsim netdevsim9 netdevsim1 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 3067.662113][ T6474] bridge0: port 1(bridge_slave_0) entered blocking state [ 3067.669154][ T6474] bridge0: port 1(bridge_slave_0) entered disabled state [ 3067.676670][ T6474] bridge_slave_0: entered allmulticast mode [ 3067.683369][ T6474] bridge_slave_0: entered promiscuous mode [ 3067.691013][ T6502] team0: Port device vlan0 added [ 3067.698343][ T6502] tipc: Enabling of bearer rejected, already enabled [ 3067.708376][T15970] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3067.718775][T15970] netdevsim netdevsim9 netdevsim0 (unregistering): unset [1, 1] type 2 family 0 port 20000 - 0 [ 3067.733063][ T6474] bridge0: port 2(bridge_slave_1) entered blocking state [ 3067.740334][ T6474] bridge0: port 2(bridge_slave_1) entered disabled state [ 3067.747599][ T6474] bridge_slave_1: entered allmulticast mode [ 3067.754525][ T6474] bridge_slave_1: entered promiscuous mode [ 3067.787185][ T6474] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 3067.805314][ T6474] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 3067.809046][ T6513] FAULT_INJECTION: forcing a failure. [ 3067.809046][ T6513] name failslab, interval 1, probability 0, space 0, times 0 [ 3067.827078][ T6513] CPU: 0 UID: 0 PID: 6513 Comm: syz.6.21537 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3067.827110][ T6513] Tainted: [W]=WARN [ 3067.827185][ T6513] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3067.827195][ T6513] Call Trace: [ 3067.827201][ T6513] [ 3067.827208][ T6513] __dump_stack+0x1d/0x30 [ 3067.827228][ T6513] dump_stack_lvl+0xe8/0x140 [ 3067.827257][ T6513] dump_stack+0x15/0x1b [ 3067.827273][ T6513] should_fail_ex+0x265/0x280 [ 3067.827287][ T6513] should_failslab+0x8c/0xb0 [ 3067.827311][ T6513] kmem_cache_alloc_noprof+0x50/0x310 [ 3067.827337][ T6513] ? create_new_namespaces+0x3c/0x3d0 [ 3067.827355][ T6513] create_new_namespaces+0x3c/0x3d0 [ 3067.827427][ T6513] unshare_nsproxy_namespaces+0xe8/0x120 [ 3067.827474][ T6513] ksys_unshare+0x3d0/0x6d0 [ 3067.827525][ T6513] ? ksys_write+0x192/0x1a0 [ 3067.827538][ T6513] __x64_sys_unshare+0x1f/0x30 [ 3067.827613][ T6513] x64_sys_call+0x2911/0x2ff0 [ 3067.827625][ T6513] do_syscall_64+0xd2/0x200 [ 3067.827640][ T6513] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3067.827669][ T6513] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3067.827704][ T6513] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3067.827791][ T6513] RIP: 0033:0x7f7271beebe9 [ 3067.827801][ T6513] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3067.827817][ T6513] RSP: 002b:00007f727064f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000110 [ 3067.827829][ T6513] RAX: ffffffffffffffda RBX: 00007f7271e15fa0 RCX: 00007f7271beebe9 [ 3067.827901][ T6513] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 000000006a040000 [ 3067.827908][ T6513] RBP: 00007f727064f090 R08: 0000000000000000 R09: 0000000000000000 [ 3067.827915][ T6513] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3067.827922][ T6513] R13: 00007f7271e16038 R14: 00007f7271e15fa0 R15: 00007ffde623a1b8 [ 3067.827932][ T6513] [ 3068.039676][ T6474] team0: Port device team_slave_0 added [ 3068.048268][ T6474] team0: Port device team_slave_1 added [ 3068.079331][ T6474] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 3068.086447][ T6474] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3068.112515][ T6474] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 3068.195140][ T6474] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 3068.202224][ T6474] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 3068.227030][ T6522] netlink: 'syz.5.21541': attribute type 39 has an invalid length. [ 3068.228161][ T6474] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 3068.361864][T15970] bond0 (unregistering): Released all slaves [ 3068.387163][ T6474] hsr_slave_0: entered promiscuous mode [ 3068.393419][ T6474] hsr_slave_1: entered promiscuous mode [ 3068.399451][ T6474] debugfs: 'hsr0' already exists in 'hsr' [ 3068.405258][ T6474] Cannot create hsr debugfs directory [ 3068.433839][ T6536] netlink: 'syz.5.21546': attribute type 2 has an invalid length. [ 3068.545272][T15970] tipc: Disabling bearer [ 3068.551805][T15970] tipc: Left network mode [ 3068.571438][T15970] hsr_slave_0: left promiscuous mode [ 3068.577405][T15970] hsr_slave_1: left promiscuous mode [ 3068.613127][T15970] veth1_macvtap: left promiscuous mode [ 3068.628514][ T6542] FAULT_INJECTION: forcing a failure. [ 3068.628514][ T6542] name failslab, interval 1, probability 0, space 0, times 0 [ 3068.641572][ T6542] CPU: 0 UID: 0 PID: 6542 Comm: syz.6.21548 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3068.641645][ T6542] Tainted: [W]=WARN [ 3068.641652][ T6542] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3068.641666][ T6542] Call Trace: [ 3068.641672][ T6542] [ 3068.641679][ T6542] __dump_stack+0x1d/0x30 [ 3068.641698][ T6542] dump_stack_lvl+0xe8/0x140 [ 3068.641715][ T6542] dump_stack+0x15/0x1b [ 3068.641785][ T6542] should_fail_ex+0x265/0x280 [ 3068.641807][ T6542] should_failslab+0x8c/0xb0 [ 3068.641828][ T6542] __kmalloc_noprof+0xa5/0x3e0 [ 3068.641851][ T6542] ? kernfs_fop_write_iter+0xe1/0x2d0 [ 3068.641950][ T6542] ? selinux_file_permission+0x1e4/0x320 [ 3068.642049][ T6542] kernfs_fop_write_iter+0xe1/0x2d0 [ 3068.642074][ T6542] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 3068.642172][ T6542] vfs_write+0x52a/0x960 [ 3068.642198][ T6542] ksys_write+0xda/0x1a0 [ 3068.642345][ T6542] __x64_sys_write+0x40/0x50 [ 3068.642363][ T6542] x64_sys_call+0x27fe/0x2ff0 [ 3068.642381][ T6542] do_syscall_64+0xd2/0x200 [ 3068.642402][ T6542] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3068.642465][ T6542] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3068.642485][ T6542] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3068.642564][ T6542] RIP: 0033:0x7f7271beebe9 [ 3068.642578][ T6542] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3068.642672][ T6542] RSP: 002b:00007f727064f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 3068.642693][ T6542] RAX: ffffffffffffffda RBX: 00007f7271e15fa0 RCX: 00007f7271beebe9 [ 3068.642708][ T6542] RDX: 0000000000000005 RSI: 0000000000000000 RDI: 0000000000000005 [ 3068.642721][ T6542] RBP: 00007f727064f090 R08: 0000000000000000 R09: 0000000000000000 [ 3068.642732][ T6542] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3068.642744][ T6542] R13: 00007f7271e16038 R14: 00007f7271e15fa0 R15: 00007ffde623a1b8 [ 3068.642762][ T6542] [ 3068.644281][T15970] veth0_macvtap: left promiscuous mode [ 3068.953563][T15970] veth1_vlan: left promiscuous mode [ 3069.276448][ T6557] FAULT_INJECTION: forcing a failure. [ 3069.276448][ T6557] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3069.289756][ T6557] CPU: 1 UID: 0 PID: 6557 Comm: syz.5.21554 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3069.289791][ T6557] Tainted: [W]=WARN [ 3069.289796][ T6557] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3069.289806][ T6557] Call Trace: [ 3069.289813][ T6557] [ 3069.289821][ T6557] __dump_stack+0x1d/0x30 [ 3069.289983][ T6557] dump_stack_lvl+0xe8/0x140 [ 3069.289999][ T6557] dump_stack+0x15/0x1b [ 3069.290013][ T6557] should_fail_ex+0x265/0x280 [ 3069.290033][ T6557] should_fail+0xb/0x20 [ 3069.290054][ T6557] should_fail_usercopy+0x1a/0x20 [ 3069.290073][ T6557] _copy_from_user+0x1c/0xb0 [ 3069.290095][ T6557] __sys_bind+0x106/0x2a0 [ 3069.290140][ T6557] __x64_sys_bind+0x3f/0x50 [ 3069.290213][ T6557] x64_sys_call+0x2b6e/0x2ff0 [ 3069.290259][ T6557] do_syscall_64+0xd2/0x200 [ 3069.290331][ T6557] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3069.290356][ T6557] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3069.290381][ T6557] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3069.290402][ T6557] RIP: 0033:0x7ffbb2c3ebe9 [ 3069.290416][ T6557] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3069.290561][ T6557] RSP: 002b:00007ffbb169f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000031 [ 3069.290578][ T6557] RAX: ffffffffffffffda RBX: 00007ffbb2e65fa0 RCX: 00007ffbb2c3ebe9 [ 3069.290655][ T6557] RDX: 000000000000006e RSI: 0000200000000080 RDI: 0000000000000003 [ 3069.290666][ T6557] RBP: 00007ffbb169f090 R08: 0000000000000000 R09: 0000000000000000 [ 3069.290677][ T6557] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3069.290810][ T6557] R13: 00007ffbb2e66038 R14: 00007ffbb2e65fa0 R15: 00007ffc72b4b9e8 [ 3069.290829][ T6557] [ 3069.635075][ T6565] FAULT_INJECTION: forcing a failure. [ 3069.635075][ T6565] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3069.648288][ T6565] CPU: 1 UID: 0 PID: 6565 Comm: syz.6.21557 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3069.648392][ T6565] Tainted: [W]=WARN [ 3069.648399][ T6565] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3069.648412][ T6565] Call Trace: [ 3069.648420][ T6565] [ 3069.648428][ T6565] __dump_stack+0x1d/0x30 [ 3069.648534][ T6565] dump_stack_lvl+0xe8/0x140 [ 3069.648553][ T6565] dump_stack+0x15/0x1b [ 3069.648567][ T6565] should_fail_ex+0x265/0x280 [ 3069.648585][ T6565] should_fail+0xb/0x20 [ 3069.648609][ T6565] should_fail_usercopy+0x1a/0x20 [ 3069.648792][ T6565] _copy_from_user+0x1c/0xb0 [ 3069.648817][ T6565] __se_sys_io_uring_setup+0x11f/0x210 [ 3069.648862][ T6565] __x64_sys_io_uring_setup+0x31/0x40 [ 3069.648883][ T6565] x64_sys_call+0x2b21/0x2ff0 [ 3069.648961][ T6565] do_syscall_64+0xd2/0x200 [ 3069.648983][ T6565] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3069.649037][ T6565] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3069.649063][ T6565] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3069.649083][ T6565] RIP: 0033:0x7f7271beebe9 [ 3069.649102][ T6565] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3069.649120][ T6565] RSP: 002b:00007f727064f038 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 3069.649140][ T6565] RAX: ffffffffffffffda RBX: 00007f7271e15fa0 RCX: 00007f7271beebe9 [ 3069.649153][ T6565] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000005ff1 [ 3069.649174][ T6565] RBP: 00007f727064f090 R08: 0000000000000000 R09: 0000000000000000 [ 3069.649187][ T6565] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3069.649201][ T6565] R13: 00007f7271e16038 R14: 00007f7271e15fa0 R15: 00007ffde623a1b8 [ 3069.649220][ T6565] [ 3069.847440][ T29] kauditd_printk_skb: 109 callbacks suppressed [ 3069.847463][ T29] audit: type=1400 audit(1755037204.661:4954): avc: denied { execmem } for pid=6566 comm="syz.6.21558" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3069.877209][ T6570] netlink: 'syz.7.21559': attribute type 2 has an invalid length. [ 3069.893834][ T29] audit: type=1400 audit(1755037204.691:4955): avc: denied { create } for pid=6569 comm="syz.7.21559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3069.914942][ T29] audit: type=1400 audit(1755037204.691:4956): avc: denied { write } for pid=6569 comm="syz.7.21559" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3069.990035][ T29] audit: type=1400 audit(1755037204.791:4957): avc: denied { create } for pid=6575 comm="syz.1.21563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3070.010770][ T29] audit: type=1400 audit(1755037204.791:4958): avc: denied { write } for pid=6575 comm="syz.1.21563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3070.031347][ T29] audit: type=1400 audit(1755037204.791:4959): avc: denied { read } for pid=6575 comm="syz.1.21563" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3070.053734][ T6576] team0: Port device vlan0 removed [ 3070.061360][ T29] audit: type=1400 audit(1755037204.841:4960): avc: denied { execute } for pid=6577 comm="syz.7.21562" path=2F616E6F6E5F6875676570616765202864656C6574656429 dev="hugetlbfs" ino=285968 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:hugetlbfs_t tclass=file permissive=1 [ 3070.089516][ T6579] netlink: 152 bytes leftover after parsing attributes in process `syz.1.21563'. [ 3070.100794][ T6579] team0: Port device vlan0 added [ 3070.115964][ T6578] openvswitch: netlink: Message has 6 unknown bytes. [ 3070.166323][ T29] audit: type=1400 audit(1755037204.901:4961): avc: denied { ioctl } for pid=6575 comm="syz.1.21563" path="socket:[285075]" dev="sockfs" ino=285075 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3070.192537][ T29] audit: type=1400 audit(1755037204.931:4962): avc: denied { create } for pid=6577 comm="syz.7.21562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3070.212238][ T29] audit: type=1400 audit(1755037204.931:4963): avc: denied { getopt } for pid=6577 comm="syz.7.21562" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3070.242549][ T6585] netlink: 'syz.7.21565': attribute type 29 has an invalid length. [ 3070.250965][ T6586] netlink: 'syz.7.21565': attribute type 29 has an invalid length. [ 3070.259323][ T6576] tipc: Enabling of bearer rejected, already enabled [ 3070.275588][ T6474] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 3070.285288][ T6474] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 3070.311982][ T6595] netlink: 'syz.1.21569': attribute type 1 has an invalid length. [ 3070.324464][ T6474] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 3070.353741][ T6599] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3070.368155][ T6474] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 3070.390668][ T6609] netlink: 'syz.1.21571': attribute type 4 has an invalid length. [ 3070.447292][ T6614] netlink: 14568 bytes leftover after parsing attributes in process `syz.7.21574'. [ 3070.477711][ T6619] netlink: 15231 bytes leftover after parsing attributes in process `syz.7.21575'. [ 3070.503226][ T6599] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3070.525100][ T6474] 8021q: adding VLAN 0 to HW filter on device bond0 [ 3070.536962][ T6474] 8021q: adding VLAN 0 to HW filter on device team0 [ 3070.546363][T15975] bridge0: port 1(bridge_slave_0) entered blocking state [ 3070.553513][T15975] bridge0: port 1(bridge_slave_0) entered forwarding state [ 3070.574042][T15975] bridge0: port 2(bridge_slave_1) entered blocking state [ 3070.581193][T15975] bridge0: port 2(bridge_slave_1) entered forwarding state [ 3070.644427][ T6599] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3070.658685][ T6474] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 3070.670074][ T6606] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3070.678689][ T6606] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3070.687477][ T6606] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3070.696453][ T6606] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3070.714102][ T6599] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3070.767205][T16066] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3070.778503][T16066] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3070.795242][T16066] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3070.810344][ T6474] veth0_vlan: entered promiscuous mode [ 3070.817712][ T6474] veth1_vlan: entered promiscuous mode [ 3070.832188][ T6474] veth0_macvtap: entered promiscuous mode [ 3070.839477][ T6474] veth1_macvtap: entered promiscuous mode [ 3070.850065][ T6474] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 3070.860952][ T6474] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 3070.871545][T16066] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3070.880932][T16066] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3070.892017][T16066] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3070.901080][T16066] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3070.910424][ T6606] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3070.918913][ T6606] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3071.011557][ T6646] netlink: 'syz.9.21578': attribute type 29 has an invalid length. [ 3071.020414][ T6646] netlink: 'syz.9.21578': attribute type 29 has an invalid length. [ 3071.173079][ T6658] FAULT_INJECTION: forcing a failure. [ 3071.173079][ T6658] name failslab, interval 1, probability 0, space 0, times 0 [ 3071.185780][ T6658] CPU: 0 UID: 0 PID: 6658 Comm: syz.9.21582 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3071.185873][ T6658] Tainted: [W]=WARN [ 3071.185879][ T6658] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3071.185892][ T6658] Call Trace: [ 3071.185898][ T6658] [ 3071.185906][ T6658] __dump_stack+0x1d/0x30 [ 3071.185924][ T6658] dump_stack_lvl+0xe8/0x140 [ 3071.185934][ T6658] dump_stack+0x15/0x1b [ 3071.186072][ T6658] should_fail_ex+0x265/0x280 [ 3071.186084][ T6658] should_failslab+0x8c/0xb0 [ 3071.186098][ T6658] kmem_cache_alloc_noprof+0x50/0x310 [ 3071.186115][ T6658] ? audit_log_start+0x365/0x6c0 [ 3071.186173][ T6658] audit_log_start+0x365/0x6c0 [ 3071.186190][ T6658] audit_seccomp+0x48/0x100 [ 3071.186205][ T6658] ? __seccomp_filter+0x68c/0x10d0 [ 3071.186345][ T6658] __seccomp_filter+0x69d/0x10d0 [ 3071.186358][ T6658] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 3071.186373][ T6658] ? vfs_write+0x7e8/0x960 [ 3071.186385][ T6658] ? __rcu_read_unlock+0x4f/0x70 [ 3071.186470][ T6658] ? __fget_files+0x184/0x1c0 [ 3071.186485][ T6658] __secure_computing+0x82/0x150 [ 3071.186497][ T6658] syscall_trace_enter+0xcf/0x1e0 [ 3071.186511][ T6658] do_syscall_64+0xac/0x200 [ 3071.186605][ T6658] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3071.186619][ T6658] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3071.186632][ T6658] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3071.186650][ T6658] RIP: 0033:0x7f23b3b8ebe9 [ 3071.186659][ T6658] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3071.186669][ T6658] RSP: 002b:00007f23b25ef038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3071.186758][ T6658] RAX: ffffffffffffffda RBX: 00007f23b3db5fa0 RCX: 00007f23b3b8ebe9 [ 3071.186770][ T6658] RDX: 0000000000000000 RSI: 000020000000c2c0 RDI: 0000000000000003 [ 3071.186783][ T6658] RBP: 00007f23b25ef090 R08: 0000000000000000 R09: 0000000000000000 [ 3071.186795][ T6658] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3071.186808][ T6658] R13: 00007f23b3db6038 R14: 00007f23b3db5fa0 R15: 00007fff9360c658 [ 3071.186820][ T6658] [ 3071.523685][ T6669] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 3071.668615][ T6679] netlink: 'syz.7.21591': attribute type 29 has an invalid length. [ 3071.939703][ T6696] FAULT_INJECTION: forcing a failure. [ 3071.939703][ T6696] name failslab, interval 1, probability 0, space 0, times 0 [ 3071.952714][ T6696] CPU: 0 UID: 0 PID: 6696 Comm: syz.7.21597 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3071.952772][ T6696] Tainted: [W]=WARN [ 3071.952778][ T6696] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3071.952788][ T6696] Call Trace: [ 3071.952795][ T6696] [ 3071.952802][ T6696] __dump_stack+0x1d/0x30 [ 3071.952823][ T6696] dump_stack_lvl+0xe8/0x140 [ 3071.952844][ T6696] dump_stack+0x15/0x1b [ 3071.952862][ T6696] should_fail_ex+0x265/0x280 [ 3071.952953][ T6696] ? __se_sys_memfd_create+0x1cc/0x590 [ 3071.952973][ T6696] should_failslab+0x8c/0xb0 [ 3071.952992][ T6696] __kmalloc_cache_noprof+0x4c/0x320 [ 3071.953017][ T6696] ? fput+0x8f/0xc0 [ 3071.953073][ T6696] __se_sys_memfd_create+0x1cc/0x590 [ 3071.953093][ T6696] __x64_sys_memfd_create+0x31/0x40 [ 3071.953132][ T6696] x64_sys_call+0x2abe/0x2ff0 [ 3071.953150][ T6696] do_syscall_64+0xd2/0x200 [ 3071.953245][ T6696] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3071.953265][ T6696] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3071.953284][ T6696] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3071.953348][ T6696] RIP: 0033:0x7f6f70d7ebe9 [ 3071.953364][ T6696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3071.953382][ T6696] RSP: 002b:00007f6f6f7dee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 3071.953403][ T6696] RAX: ffffffffffffffda RBX: 0000000000000775 RCX: 00007f6f70d7ebe9 [ 3071.953416][ T6696] RDX: 00007f6f6f7deef0 RSI: 0000000000000000 RDI: 00007f6f70e027e8 [ 3071.953427][ T6696] RBP: 0000200000001bc0 R08: 00007f6f6f7debb7 R09: 00007f6f6f7dee40 [ 3071.953438][ T6696] R10: 000000000000000a R11: 0000000000000202 R12: 00002000000007c0 [ 3071.953449][ T6696] R13: 00007f6f6f7deef0 R14: 00007f6f6f7deeb0 R15: 00002000000001c0 [ 3071.953532][ T6696] [ 3072.507779][ T6703] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3072.516580][ T6703] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3072.557806][ T6703] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3072.566555][ T6703] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3072.577803][ T6601] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3072.622547][ T6601] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3072.704188][ T6601] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 3072.757808][ T6728] FAULT_INJECTION: forcing a failure. [ 3072.757808][ T6728] name failslab, interval 1, probability 0, space 0, times 0 [ 3072.770571][ T6728] CPU: 0 UID: 0 PID: 6728 Comm: syz.5.21610 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3072.770593][ T6728] Tainted: [W]=WARN [ 3072.770653][ T6728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3072.770661][ T6728] Call Trace: [ 3072.770665][ T6728] [ 3072.770670][ T6728] __dump_stack+0x1d/0x30 [ 3072.770685][ T6728] dump_stack_lvl+0xe8/0x140 [ 3072.770696][ T6728] dump_stack+0x15/0x1b [ 3072.770776][ T6728] should_fail_ex+0x265/0x280 [ 3072.770788][ T6728] should_failslab+0x8c/0xb0 [ 3072.770811][ T6728] kmem_cache_alloc_noprof+0x50/0x310 [ 3072.770835][ T6728] ? getname_flags+0x80/0x3b0 [ 3072.770919][ T6728] ? fput+0x8f/0xc0 [ 3072.770934][ T6728] getname_flags+0x80/0x3b0 [ 3072.770949][ T6728] __x64_sys_symlinkat+0x40/0x70 [ 3072.770996][ T6728] x64_sys_call+0x293d/0x2ff0 [ 3072.771009][ T6728] do_syscall_64+0xd2/0x200 [ 3072.771025][ T6728] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3072.771038][ T6728] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3072.771116][ T6728] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3072.771174][ T6728] RIP: 0033:0x7ffbb2c3ebe9 [ 3072.771184][ T6728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3072.771194][ T6728] RSP: 002b:00007ffbb169f038 EFLAGS: 00000246 ORIG_RAX: 000000000000010a [ 3072.771205][ T6728] RAX: ffffffffffffffda RBX: 00007ffbb2e65fa0 RCX: 00007ffbb2c3ebe9 [ 3072.771212][ T6728] RDX: 0000200000000200 RSI: ffffffffffffff9c RDI: 0000000000000000 [ 3072.771288][ T6728] RBP: 00007ffbb169f090 R08: 0000000000000000 R09: 0000000000000000 [ 3072.771295][ T6728] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3072.771302][ T6728] R13: 00007ffbb2e66038 R14: 00007ffbb2e65fa0 R15: 00007ffc72b4b9e8 [ 3072.771312][ T6728] [ 3072.775438][ T6703] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3072.967266][ T6703] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3074.029778][ T6743] validate_nla: 7 callbacks suppressed [ 3074.029794][ T6743] netlink: 'syz.6.21616': attribute type 29 has an invalid length. [ 3074.044941][ T6743] netlink: 'syz.6.21616': attribute type 29 has an invalid length. [ 3074.134599][ T6749] team0: Port device vlan0 removed [ 3074.153358][T16855] tipc: Resetting bearer [ 3074.185566][ T6749] netlink: 152 bytes leftover after parsing attributes in process `syz.6.21619'. [ 3074.196901][ T6749] team0: Port device vlan0 added [ 3074.206605][ T6749] tipc: Enabling of bearer rejected, already enabled [ 3074.232820][ T6751] netlink: 'syz.6.21620': attribute type 29 has an invalid length. [ 3074.242262][ T6751] netlink: 'syz.6.21620': attribute type 29 has an invalid length. [ 3074.503802][ T6762] netlink: 4 bytes leftover after parsing attributes in process `syz.6.21624'. [ 3074.973368][ T29] kauditd_printk_skb: 120 callbacks suppressed [ 3074.973387][ T29] audit: type=1400 audit(1755037209.691:5082): avc: denied { execmem } for pid=6768 comm="syz.6.21626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 3075.013310][ T6772] netlink: 'syz.7.21627': attribute type 29 has an invalid length. [ 3075.024288][ T29] audit: type=1400 audit(1755037209.841:5083): avc: denied { map_create } for pid=6768 comm="syz.6.21626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3075.024886][ T6772] netlink: 'syz.7.21627': attribute type 29 has an invalid length. [ 3075.043987][ T29] audit: type=1400 audit(1755037209.841:5084): avc: denied { map_read map_write } for pid=6768 comm="syz.6.21626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 3075.076415][ T29] audit: type=1400 audit(1755037209.901:5085): avc: denied { create } for pid=6768 comm="syz.6.21626" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3075.101140][ T29] audit: type=1400 audit(1755037209.921:5086): avc: denied { write } for pid=6768 comm="syz.6.21626" lport=135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3075.306801][ T29] audit: type=1400 audit(1755037210.081:5087): avc: denied { create } for pid=6773 comm="syz.7.21628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3075.327578][ T29] audit: type=1400 audit(1755037210.081:5088): avc: denied { write } for pid=6773 comm="syz.7.21628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 3075.347162][ T29] audit: type=1400 audit(1755037210.081:5089): avc: denied { allowed } for pid=6773 comm="syz.7.21628" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 3075.366954][ T29] audit: type=1400 audit(1755037210.081:5090): avc: denied { create } for pid=6773 comm="syz.7.21628" anonclass=[io_uring] scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3075.388447][ T29] audit: type=1400 audit(1755037210.081:5091): avc: denied { map } for pid=6773 comm="syz.7.21628" path="anon_inode:[io_uring]" dev="anon_inodefs" ino=286528 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:sysadm_t tclass=anon_inode permissive=1 [ 3075.504985][ T6781] netlink: 'syz.9.21631': attribute type 2 has an invalid length. [ 3075.513115][ T6781] netlink: 'syz.9.21631': attribute type 1 has an invalid length. [ 3075.521090][ T6781] netlink: 'syz.9.21631': attribute type 1 has an invalid length. [ 3076.018954][ T6793] program syz.5.21636 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 3076.174438][ T6804] netlink: 'syz.7.21640': attribute type 39 has an invalid length. [ 3076.572050][ T6816] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 3077.755405][ T6810] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3077.763838][ T6810] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3077.772635][ T6810] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3077.781201][ T6810] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3077.990202][ T6810] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3077.998878][ T6810] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3078.118601][T17647] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 3078.174322][ T6842] team0: Port device vlan0 removed [ 3078.180040][ T6843] netlink: 152 bytes leftover after parsing attributes in process `syz.6.21654'. [ 3078.199527][T29656] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 3078.208386][T17647] tipc: Resetting bearer [ 3078.228872][T29656] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 3078.241921][ T6842] team0: Port device vlan0 added [ 3078.253816][ T6842] tipc: Enabling of bearer rejected, already enabled [ 3078.261941][T29656] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 3078.349561][ T6851] capability: warning: `syz.6.21658' uses deprecated v2 capabilities in a way that may be insecure [ 3078.421299][ T6856] netlink: 14568 bytes leftover after parsing attributes in process `syz.6.21660'. [ 3079.127656][ T6888] netlink: 14568 bytes leftover after parsing attributes in process `syz.1.21673'. [ 3079.150917][ T6890] validate_nla: 6 callbacks suppressed [ 3079.150928][ T6890] netlink: 'syz.1.21674': attribute type 2 has an invalid length. [ 3079.457744][ T6893] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3079.466480][ T6893] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3079.475170][ T6893] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3079.483654][ T6893] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3079.492163][ T6875] FAULT_INJECTION: forcing a failure. [ 3079.492163][ T6875] name fail_futex, interval 1, probability 0, space 0, times 1 [ 3079.504994][ T6875] CPU: 0 UID: 0 PID: 6875 Comm: syz.7.21668 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3079.505080][ T6875] Tainted: [W]=WARN [ 3079.505087][ T6875] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3079.505099][ T6875] Call Trace: [ 3079.505106][ T6875] [ 3079.505113][ T6875] __dump_stack+0x1d/0x30 [ 3079.505133][ T6875] dump_stack_lvl+0xe8/0x140 [ 3079.505154][ T6875] dump_stack+0x15/0x1b [ 3079.505172][ T6875] should_fail_ex+0x265/0x280 [ 3079.505224][ T6875] should_fail+0xb/0x20 [ 3079.505248][ T6875] get_futex_key+0x130/0xbd0 [ 3079.505319][ T6875] futex_wake+0x7d/0x360 [ 3079.505341][ T6875] ? __rcu_read_unlock+0x4f/0x70 [ 3079.505377][ T6875] do_futex+0x323/0x380 [ 3079.505403][ T6875] mm_release+0xb2/0x1e0 [ 3079.505425][ T6875] exit_mm_release+0x25/0x30 [ 3079.505450][ T6875] exit_mm+0x38/0x190 [ 3079.505536][ T6875] do_exit+0x417/0x15c0 [ 3079.505560][ T6875] do_group_exit+0xff/0x140 [ 3079.505627][ T6875] ? get_signal+0xe51/0xf70 [ 3079.505657][ T6875] get_signal+0xe59/0xf70 [ 3079.505724][ T6875] arch_do_signal_or_restart+0x96/0x480 [ 3079.505751][ T6875] exit_to_user_mode_loop+0x7a/0x100 [ 3079.505773][ T6875] do_syscall_64+0x1d6/0x200 [ 3079.505799][ T6875] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3079.505821][ T6875] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3079.505841][ T6875] RIP: 0033:0x7f6f70d7ebe9 [ 3079.505856][ T6875] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3079.505873][ T6875] RSP: 002b:00007f6f6f7be038 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3079.505890][ T6875] RAX: fffffffffffffe00 RBX: 00007f6f70fa6090 RCX: 00007f6f70d7ebe9 [ 3079.505902][ T6875] RDX: 00000000000000d1 RSI: 0000200000000200 RDI: 0000000000000007 [ 3079.505913][ T6875] RBP: 00007f6f6f7be090 R08: 0000000000000000 R09: 0000000000000000 [ 3079.505956][ T6875] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3079.505966][ T6875] R13: 00007f6f70fa6128 R14: 00007f6f70fa6090 R15: 00007ffc563c2b68 [ 3079.505983][ T6875] [ 3079.718535][ T6893] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3079.727043][ T6893] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3079.873597][ T6903] netlink: 'syz.7.21679': attribute type 2 has an invalid length. [ 3079.881474][ T6903] netlink: 'syz.7.21679': attribute type 1 has an invalid length. [ 3079.889283][ T6903] netlink: 'syz.7.21679': attribute type 1 has an invalid length. [ 3080.024025][ T29] kauditd_printk_skb: 182 callbacks suppressed [ 3080.024039][ T29] audit: type=1400 audit(1755037214.841:5274): avc: denied { create } for pid=6909 comm="syz.6.21682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3080.092279][ T29] audit: type=1400 audit(1755037214.871:5275): avc: denied { write } for pid=6900 comm="syz.5.21680" lport=135 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3080.112800][ T29] audit: type=1400 audit(1755037214.881:5276): avc: denied { write } for pid=6909 comm="syz.6.21682" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=smc_socket permissive=1 [ 3080.132548][ T29] audit: type=1400 audit(1755037214.901:5277): avc: denied { open } for pid=6911 comm="syz.6.21683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 3080.151858][ T29] audit: type=1400 audit(1755037214.901:5278): avc: denied { kernel } for pid=6911 comm="syz.6.21683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 3080.171540][ T29] audit: type=1400 audit(1755037214.901:5279): avc: denied { create } for pid=6911 comm="syz.6.21683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3080.191181][ T29] audit: type=1400 audit(1755037214.901:5280): avc: denied { setopt } for pid=6911 comm="syz.6.21683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3080.210916][ T29] audit: type=1400 audit(1755037214.901:5281): avc: denied { write } for pid=6911 comm="syz.6.21683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 3080.458869][ T29] audit: type=1400 audit(1755037215.141:5282): avc: denied { getopt } for pid=6911 comm="syz.6.21683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3080.478868][ T29] audit: type=1400 audit(1755037215.151:5283): avc: denied { create } for pid=6911 comm="syz.6.21683" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3080.504052][ T6918] netlink: 'syz.6.21685': attribute type 2 has an invalid length. [ 3080.569123][ T6923] netlink: 12 bytes leftover after parsing attributes in process `syz.9.21686'. [ 3080.582356][ T6923] vlan2: entered promiscuous mode [ 3080.587446][ T6923] team0: entered promiscuous mode [ 3080.592628][ T6923] team_slave_0: entered promiscuous mode [ 3080.598461][ T6923] team_slave_1: entered promiscuous mode [ 3080.882732][ T6935] netlink: 4 bytes leftover after parsing attributes in process `syz.5.21692'. [ 3080.935119][ T6936] RDS: rds_bind could not find a transport for ::ffff:172.30.1.6, load rds_tcp or rds_rdma? [ 3080.946120][ T6924] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3080.954900][ T6924] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3080.964247][ T6924] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3080.972822][ T6924] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3080.981385][ T6926] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3080.989838][ T6926] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3080.998855][ T6926] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3081.007453][ T6926] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3081.250849][ T6953] FAULT_INJECTION: forcing a failure. [ 3081.250849][ T6953] name failslab, interval 1, probability 0, space 0, times 0 [ 3081.263766][ T6953] CPU: 1 UID: 0 PID: 6953 Comm: syz.1.21696 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3081.263802][ T6953] Tainted: [W]=WARN [ 3081.263807][ T6953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3081.263866][ T6953] Call Trace: [ 3081.263878][ T6953] [ 3081.263887][ T6953] __dump_stack+0x1d/0x30 [ 3081.263935][ T6953] dump_stack_lvl+0xe8/0x140 [ 3081.263954][ T6953] dump_stack+0x15/0x1b [ 3081.263972][ T6953] should_fail_ex+0x265/0x280 [ 3081.263994][ T6953] should_failslab+0x8c/0xb0 [ 3081.264017][ T6953] kmem_cache_alloc_node_noprof+0x57/0x320 [ 3081.264075][ T6953] ? dup_task_struct+0x70/0x6a0 [ 3081.264098][ T6953] dup_task_struct+0x70/0x6a0 [ 3081.264173][ T6953] ? _parse_integer+0x27/0x40 [ 3081.264191][ T6953] copy_process+0x399/0x2000 [ 3081.264210][ T6953] ? kstrtouint+0x76/0xc0 [ 3081.264303][ T6953] ? kstrtouint_from_user+0x9f/0xf0 [ 3081.264322][ T6953] ? __rcu_read_unlock+0x4f/0x70 [ 3081.264360][ T6953] kernel_clone+0x16c/0x5c0 [ 3081.264382][ T6953] ? vfs_write+0x7e8/0x960 [ 3081.264400][ T6953] __x64_sys_clone+0xe6/0x120 [ 3081.264468][ T6953] x64_sys_call+0x119c/0x2ff0 [ 3081.264486][ T6953] do_syscall_64+0xd2/0x200 [ 3081.264507][ T6953] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3081.264590][ T6953] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3081.264679][ T6953] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3081.264697][ T6953] RIP: 0033:0x7f305c85ebe9 [ 3081.264709][ T6953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3081.264751][ T6953] RSP: 002b:00007f305b284fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 3081.264768][ T6953] RAX: ffffffffffffffda RBX: 00007f305ca86180 RCX: 00007f305c85ebe9 [ 3081.264779][ T6953] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000041200000 [ 3081.264790][ T6953] RBP: 00007f305b285090 R08: 0000000000000000 R09: 0000000000000000 [ 3081.264800][ T6953] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 3081.264811][ T6953] R13: 00007f305ca86218 R14: 00007f305ca86180 R15: 00007ffe80c6f718 [ 3081.264832][ T6953] [ 3081.266283][ T6924] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3081.487570][ T6924] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3081.495803][ T6926] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3081.504263][ T6926] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3081.816329][ T6958] tipc: Resetting bearer [ 3081.824728][ T6958] tipc: Disabling bearer [ 3082.057226][ T6970] netlink: 12 bytes leftover after parsing attributes in process `syz.7.21706'. [ 3082.071293][ T6970] vlan2: entered promiscuous mode [ 3082.076340][ T6970] team0: entered promiscuous mode [ 3082.110154][ T6972] netlink: 12 bytes leftover after parsing attributes in process `syz.7.21707'. [ 3082.210284][ T6982] netlink: 'syz.1.21712': attribute type 29 has an invalid length. [ 3082.303798][ T6968] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3082.312607][ T6968] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3082.322576][ T6968] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3082.331415][ T6968] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3082.355416][ T6990] netlink: 152 bytes leftover after parsing attributes in process `syz.6.21714'. [ 3082.382823][ T6991] netlink: 'syz.9.21715': attribute type 39 has an invalid length. [ 3082.442082][ T6987] team0: Port device vlan0 removed [ 3082.469085][ T6993] team0: Port device vlan0 added [ 3082.485554][ T6995] tipc: Enabling of bearer rejected, already enabled [ 3082.540103][ T6968] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3082.548666][ T6968] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3082.582625][ T6997] netlink: 'syz.9.21716': attribute type 1 has an invalid length. [ 3082.652232][ T7001] netlink: 'syz.6.21718': attribute type 29 has an invalid length. [ 3082.695070][ T7001] netlink: 'syz.6.21718': attribute type 29 has an invalid length. [ 3083.718567][ T7029] FAULT_INJECTION: forcing a failure. [ 3083.718567][ T7029] name failslab, interval 1, probability 0, space 0, times 0 [ 3083.731472][ T7029] CPU: 0 UID: 0 PID: 7029 Comm: syz.7.21728 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3083.731523][ T7029] Tainted: [W]=WARN [ 3083.731530][ T7029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3083.731541][ T7029] Call Trace: [ 3083.731562][ T7029] [ 3083.731570][ T7029] __dump_stack+0x1d/0x30 [ 3083.731649][ T7029] dump_stack_lvl+0xe8/0x140 [ 3083.731669][ T7029] dump_stack+0x15/0x1b [ 3083.731685][ T7029] should_fail_ex+0x265/0x280 [ 3083.731707][ T7029] should_failslab+0x8c/0xb0 [ 3083.731729][ T7029] kmem_cache_alloc_node_noprof+0x57/0x320 [ 3083.731838][ T7029] ? dup_task_struct+0x70/0x6a0 [ 3083.731864][ T7029] dup_task_struct+0x70/0x6a0 [ 3083.731884][ T7029] ? _parse_integer+0x27/0x40 [ 3083.731964][ T7029] copy_process+0x399/0x2000 [ 3083.731988][ T7029] ? kstrtouint+0x76/0xc0 [ 3083.732006][ T7029] ? kstrtouint_from_user+0x9f/0xf0 [ 3083.732039][ T7029] ? __rcu_read_unlock+0x4f/0x70 [ 3083.732061][ T7029] kernel_clone+0x16c/0x5c0 [ 3083.732141][ T7029] ? vfs_write+0x7e8/0x960 [ 3083.732163][ T7029] __x64_sys_clone+0xe6/0x120 [ 3083.732235][ T7029] x64_sys_call+0x119c/0x2ff0 [ 3083.732256][ T7029] do_syscall_64+0xd2/0x200 [ 3083.732331][ T7029] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3083.732351][ T7029] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3083.732371][ T7029] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3083.732393][ T7029] RIP: 0033:0x7f6f70d7ebe9 [ 3083.732409][ T7029] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3083.732426][ T7029] RSP: 002b:00007f6f6f7bdfe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 3083.732446][ T7029] RAX: ffffffffffffffda RBX: 00007f6f70fa6090 RCX: 00007f6f70d7ebe9 [ 3083.732460][ T7029] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000041200000 [ 3083.732472][ T7029] RBP: 00007f6f6f7be090 R08: 0000000000000000 R09: 0000000000000000 [ 3083.732532][ T7029] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 3083.732543][ T7029] R13: 00007f6f70fa6128 R14: 00007f6f70fa6090 R15: 00007ffc563c2b68 [ 3083.732560][ T7029] [ 3084.013883][ T7032] team0: Port device vlan0 removed [ 3084.024742][ T7037] netlink: 152 bytes leftover after parsing attributes in process `syz.1.21729'. [ 3084.025923][ T7036] netlink: 16 bytes leftover after parsing attributes in process `syz.6.21731'. [ 3084.044675][ T7034] netlink: 16 bytes leftover after parsing attributes in process `syz.7.21730'. [ 3084.056963][T29656] tipc: Resetting bearer [ 3084.075061][ T7032] team0: Port device vlan0 added [ 3084.081910][ T7032] tipc: Enabling of bearer rejected, already enabled [ 3084.272071][ T7055] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 3084.360027][ T7057] netlink: 4 bytes leftover after parsing attributes in process `syz.1.21740'. [ 3084.423564][ T7059] validate_nla: 5 callbacks suppressed [ 3084.423580][ T7059] netlink: 'syz.1.21740': attribute type 4 has an invalid length. [ 3084.437478][ T7063] netlink: 156 bytes leftover after parsing attributes in process `syz.5.21741'. [ 3084.450122][ T7057] hsr_slave_0: left promiscuous mode [ 3084.529327][ T7063] netlink: 24 bytes leftover after parsing attributes in process `syz.5.21741'. [ 3084.651003][ T7057] hsr_slave_1: left promiscuous mode [ 3084.879344][ T7075] syzkaller1: entered promiscuous mode [ 3084.885075][ T7075] syzkaller1: entered allmulticast mode [ 3084.913485][ T7076] tipc: Resetting bearer [ 3084.931478][ T7076] tipc: Disabling bearer [ 3084.945314][ T7076] team0 (unregistering): Port device vlan0 removed [ 3085.120537][ T7080] netlink: 'syz.9.21745': attribute type 39 has an invalid length. [ 3085.167569][ T7084] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 3085.261313][ T7086] netlink: 'syz.9.21748': attribute type 2 has an invalid length. [ 3085.301037][ T29] kauditd_printk_skb: 243 callbacks suppressed [ 3085.301131][ T29] audit: type=1326 audit(1755037220.121:5527): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7088 comm="syz.5.21749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3085.330916][ T29] audit: type=1326 audit(1755037220.121:5528): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7088 comm="syz.5.21749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3085.478856][ T7089] FAULT_INJECTION: forcing a failure. [ 3085.478856][ T7089] name failslab, interval 1, probability 0, space 0, times 0 [ 3085.491534][ T7089] CPU: 1 UID: 0 PID: 7089 Comm: syz.5.21749 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3085.491582][ T7089] Tainted: [W]=WARN [ 3085.491607][ T7089] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3085.491693][ T7089] Call Trace: [ 3085.491700][ T7089] [ 3085.491707][ T7089] __dump_stack+0x1d/0x30 [ 3085.491727][ T7089] dump_stack_lvl+0xe8/0x140 [ 3085.491745][ T7089] dump_stack+0x15/0x1b [ 3085.491763][ T7089] should_fail_ex+0x265/0x280 [ 3085.491785][ T7089] should_failslab+0x8c/0xb0 [ 3085.491808][ T7089] kmem_cache_alloc_noprof+0x50/0x310 [ 3085.491889][ T7089] ? audit_log_start+0x365/0x6c0 [ 3085.491919][ T7089] audit_log_start+0x365/0x6c0 [ 3085.491956][ T7089] audit_seccomp+0x48/0x100 [ 3085.492044][ T7089] ? __seccomp_filter+0x68c/0x10d0 [ 3085.492065][ T7089] __seccomp_filter+0x69d/0x10d0 [ 3085.492144][ T7089] ? _raw_spin_unlock+0x26/0x50 [ 3085.492255][ T7089] __secure_computing+0x82/0x150 [ 3085.492277][ T7089] syscall_trace_enter+0xcf/0x1e0 [ 3085.492300][ T7089] do_syscall_64+0xac/0x200 [ 3085.492326][ T7089] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3085.492399][ T7089] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3085.492427][ T7089] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3085.492445][ T7089] RIP: 0033:0x7ffbb2c3ebe9 [ 3085.492506][ T7089] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3085.492523][ T7089] RSP: 002b:00007ffbb169f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3085.492579][ T7089] RAX: ffffffffffffffda RBX: 00007ffbb2e65fa0 RCX: 00007ffbb2c3ebe9 [ 3085.492652][ T7089] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 3085.492665][ T7089] RBP: 00007ffbb169f090 R08: 0000000000000000 R09: 0000000000000000 [ 3085.492679][ T7089] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3085.492692][ T7089] R13: 00007ffbb2e66038 R14: 00007ffbb2e65fa0 R15: 00007ffc72b4b9e8 [ 3085.492712][ T7089] [ 3085.492721][ T7089] audit: audit_lost=2 audit_rate_limit=0 audit_backlog_limit=64 [ 3085.677709][ T29] audit: type=1326 audit(1755037220.151:5529): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7088 comm="syz.5.21749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3085.682333][ T7089] audit: out of memory in audit_log_start [ 3085.690342][ T29] audit: type=1326 audit(1755037220.151:5530): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7088 comm="syz.5.21749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3085.754361][ T29] audit: type=1326 audit(1755037220.151:5531): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7088 comm="syz.5.21749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3085.778113][ T29] audit: type=1326 audit(1755037220.281:5532): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7088 comm="syz.5.21749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3085.801718][ T29] audit: type=1326 audit(1755037220.281:5533): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7088 comm="syz.5.21749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3085.804955][ T7089] netlink: 'syz.5.21749': attribute type 4 has an invalid length. [ 3085.825554][ T29] audit: type=1326 audit(1755037220.281:5534): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7088 comm="syz.5.21749" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3085.981850][ T7108] netlink: 'syz.9.21758': attribute type 39 has an invalid length. [ 3086.043397][ T7110] netlink: 14568 bytes leftover after parsing attributes in process `syz.5.21757'. [ 3086.087487][ T7115] netlink: 'syz.1.21761': attribute type 2 has an invalid length. [ 3086.095597][ T7115] netlink: 'syz.1.21761': attribute type 1 has an invalid length. [ 3086.103996][ T7115] netlink: 'syz.1.21761': attribute type 1 has an invalid length. [ 3086.194445][ T7125] netlink: 'syz.1.21765': attribute type 2 has an invalid length. [ 3086.202440][ T7125] netlink: 'syz.1.21765': attribute type 1 has an invalid length. [ 3086.878092][ T7138] syzkaller1: entered promiscuous mode [ 3086.883655][ T7138] syzkaller1: entered allmulticast mode [ 3087.077108][ T7141] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 3088.095086][ T7151] bridge_slave_0: left allmulticast mode [ 3088.100913][ T7151] bridge_slave_0: left promiscuous mode [ 3088.106572][ T7151] bridge0: port 1(bridge_slave_0) entered disabled state [ 3088.135137][ T7154] netlink: 152 bytes leftover after parsing attributes in process `syz.9.21772'. [ 3088.156384][ T7151] bridge_slave_1: left allmulticast mode [ 3088.162146][ T7151] bridge_slave_1: left promiscuous mode [ 3088.167930][ T7151] bridge0: port 2(bridge_slave_1) entered disabled state [ 3088.231605][ T7151] bond0: (slave bond_slave_0): Releasing backup interface [ 3088.270335][ T7151] bond0: (slave bond_slave_1): Releasing backup interface [ 3088.305422][ T7151] team_slave_0: left promiscuous mode [ 3088.320832][ T7151] team0: Port device team_slave_0 removed [ 3088.341310][ T7151] team_slave_1: left promiscuous mode [ 3088.373901][ T7151] team0: Port device team_slave_1 removed [ 3088.401763][ T7151] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 3088.409165][ T7151] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 3088.445861][ T7151] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 3088.453413][ T7151] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 3088.525098][ T7157] vlan0: entered promiscuous mode [ 3088.533730][ T7157] team0: Port device vlan0 added [ 3088.540974][ T7161] tipc: Started in network mode [ 3088.546004][ T7161] tipc: Node identity aaaaaaaaaa1a, cluster identity 4711 [ 3088.553515][ T7161] tipc: Enabled bearer , priority 0 [ 3088.630187][ T7170] syzkaller1: entered promiscuous mode [ 3088.635683][ T7170] syzkaller1: entered allmulticast mode [ 3088.682410][ T7173] bond1: entered promiscuous mode [ 3088.760727][ T7187] netlink: 16 bytes leftover after parsing attributes in process `syz.5.21785'. [ 3088.795067][ T7180] netlink: 4 bytes leftover after parsing attributes in process `syz.1.21784'. [ 3089.106635][ T7223] FAULT_INJECTION: forcing a failure. [ 3089.106635][ T7223] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3089.120021][ T7223] CPU: 0 UID: 0 PID: 7223 Comm: syz.9.21796 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3089.120058][ T7223] Tainted: [W]=WARN [ 3089.120134][ T7223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3089.120145][ T7223] Call Trace: [ 3089.120159][ T7223] [ 3089.120167][ T7223] __dump_stack+0x1d/0x30 [ 3089.120189][ T7223] dump_stack_lvl+0xe8/0x140 [ 3089.120210][ T7223] dump_stack+0x15/0x1b [ 3089.120226][ T7223] should_fail_ex+0x265/0x280 [ 3089.120335][ T7223] should_fail+0xb/0x20 [ 3089.120353][ T7223] should_fail_usercopy+0x1a/0x20 [ 3089.120373][ T7223] _copy_from_user+0x1c/0xb0 [ 3089.120395][ T7223] __se_sys_io_uring_setup+0x11f/0x210 [ 3089.120469][ T7223] __x64_sys_io_uring_setup+0x31/0x40 [ 3089.120517][ T7223] x64_sys_call+0x2b21/0x2ff0 [ 3089.120536][ T7223] do_syscall_64+0xd2/0x200 [ 3089.120588][ T7223] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3089.120613][ T7223] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3089.120633][ T7223] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3089.120709][ T7223] RIP: 0033:0x7f23b3b8ebe9 [ 3089.120725][ T7223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3089.120740][ T7223] RSP: 002b:00007f23b25ef038 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 3089.120757][ T7223] RAX: ffffffffffffffda RBX: 00007f23b3db5fa0 RCX: 00007f23b3b8ebe9 [ 3089.120768][ T7223] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000005ff1 [ 3089.120778][ T7223] RBP: 00007f23b25ef090 R08: 0000000000000000 R09: 0000000000000000 [ 3089.120790][ T7223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3089.120874][ T7223] R13: 00007f23b3db6038 R14: 00007f23b3db5fa0 R15: 00007fff9360c658 [ 3089.120893][ T7223] [ 3089.463700][ T7230] syzkaller1: entered promiscuous mode [ 3089.469501][ T7230] syzkaller1: entered allmulticast mode [ 3089.589938][ T3456] tipc: Node number set to 11578026 [ 3089.635015][ T7234] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3089.643567][ T7234] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3089.652229][ T7234] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3089.660990][ T7234] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3089.906300][ T7234] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3089.915144][ T7234] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3090.119034][ T7252] validate_nla: 12 callbacks suppressed [ 3090.119050][ T7252] netlink: 'syz.7.21806': attribute type 39 has an invalid length. [ 3090.294299][ T7254] bridge0: entered promiscuous mode [ 3090.299711][ T7254] macsec1: entered promiscuous mode [ 3090.305406][ T7254] bridge0: port 1(macsec1) entered blocking state [ 3090.311957][ T7254] bridge0: port 1(macsec1) entered disabled state [ 3090.318725][ T7254] macsec1: entered allmulticast mode [ 3090.324062][ T7254] bridge0: entered allmulticast mode [ 3090.330133][ T7254] macsec1: left allmulticast mode [ 3090.335274][ T7254] bridge0: left allmulticast mode [ 3090.341167][ T7254] bridge0: left promiscuous mode [ 3090.555845][ T7259] netlink: 'syz.6.21809': attribute type 29 has an invalid length. [ 3090.574636][ T7259] netlink: 'syz.6.21809': attribute type 29 has an invalid length. [ 3090.693064][ T7265] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 3090.846218][ T29] kauditd_printk_skb: 160 callbacks suppressed [ 3090.846235][ T29] audit: type=1400 audit(1755037225.661:5695): avc: denied { map } for pid=7270 comm="syz.1.21813" path="socket:[287395]" dev="sockfs" ino=287395 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3090.876845][ T29] audit: type=1400 audit(1755037225.661:5696): avc: denied { read write } for pid=7270 comm="syz.1.21813" path="socket:[287395]" dev="sockfs" ino=287395 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3091.130191][ T29] audit: type=1400 audit(1755037225.941:5697): avc: denied { create } for pid=7276 comm="syz.1.21815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 3091.149931][ T29] audit: type=1400 audit(1755037225.941:5698): avc: denied { write } for pid=7276 comm="syz.1.21815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tipc_socket permissive=1 [ 3091.169516][ T29] audit: type=1400 audit(1755037225.941:5699): avc: denied { open } for pid=7276 comm="syz.1.21815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 3091.188838][ T29] audit: type=1400 audit(1755037225.941:5700): avc: denied { perfmon } for pid=7276 comm="syz.1.21815" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 3091.209825][ T29] audit: type=1400 audit(1755037225.941:5701): avc: denied { kernel } for pid=7276 comm="syz.1.21815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 3091.229373][ T29] audit: type=1400 audit(1755037225.941:5702): avc: denied { create } for pid=7276 comm="syz.1.21815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3091.262228][ T29] audit: type=1400 audit(1755037225.971:5703): avc: denied { recv } for pid=15970 comm="kworker/u8:16" saddr=10.128.0.163 src=30036 daddr=10.128.0.234 dest=59856 netif=eth0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3091.288149][ T29] audit: type=1400 audit(1755037226.071:5704): avc: denied { write } for pid=7276 comm="syz.1.21815" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 3091.715972][ T7284] netlink: 'syz.6.21817': attribute type 39 has an invalid length. [ 3091.752651][ T7287] pim6reg: entered allmulticast mode [ 3091.802626][ T7294] 9pnet_fd: Insufficient options for proto=fd [ 3091.805505][ T7291] __nla_validate_parse: 1 callbacks suppressed [ 3091.805554][ T7291] netlink: 14568 bytes leftover after parsing attributes in process `syz.1.21820'. [ 3091.809448][ T7295] pim6reg: left allmulticast mode [ 3091.871767][ T7297] netlink: 'syz.6.21822': attribute type 29 has an invalid length. [ 3091.908803][ T7299] netlink: 4 bytes leftover after parsing attributes in process `syz.1.21823'. [ 3091.922072][ T7300] netlink: 'syz.6.21822': attribute type 29 has an invalid length. [ 3092.067319][ T7307] syzkaller1: entered promiscuous mode [ 3092.072859][ T7307] syzkaller1: entered allmulticast mode [ 3092.228135][ T7309] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 3093.085920][ T7337] netlink: 'syz.5.21836': attribute type 29 has an invalid length. [ 3093.094587][ T7337] netlink: 'syz.5.21836': attribute type 29 has an invalid length. [ 3093.189375][ T7335] FAULT_INJECTION: forcing a failure. [ 3093.189375][ T7335] name failslab, interval 1, probability 0, space 0, times 0 [ 3093.202078][ T7335] CPU: 1 UID: 0 PID: 7335 Comm: syz.6.21835 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3093.202106][ T7335] Tainted: [W]=WARN [ 3093.202112][ T7335] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3093.202127][ T7335] Call Trace: [ 3093.202134][ T7335] [ 3093.202140][ T7335] __dump_stack+0x1d/0x30 [ 3093.202159][ T7335] dump_stack_lvl+0xe8/0x140 [ 3093.202174][ T7335] dump_stack+0x15/0x1b [ 3093.202187][ T7335] should_fail_ex+0x265/0x280 [ 3093.202204][ T7335] should_failslab+0x8c/0xb0 [ 3093.202223][ T7335] kmem_cache_alloc_noprof+0x50/0x310 [ 3093.202245][ T7335] ? vm_area_dup+0x33/0x2c0 [ 3093.202269][ T7335] vm_area_dup+0x33/0x2c0 [ 3093.202291][ T7335] __split_vma+0xe9/0x650 [ 3093.202314][ T7335] vms_gather_munmap_vmas+0x17a/0x7b0 [ 3093.202335][ T7335] ? mas_find+0x608/0x700 [ 3093.202355][ T7335] mmap_region+0x53f/0x1630 [ 3093.202375][ T7335] ? __rcu_read_unlock+0x4f/0x70 [ 3093.202391][ T7335] ? css_rstat_updated+0xb7/0x240 [ 3093.202413][ T7335] ? read_tsc+0x9/0x20 [ 3093.202426][ T7335] ? ktime_get+0x1eb/0x210 [ 3093.202444][ T7335] ? __rcu_read_unlock+0x4f/0x70 [ 3093.202473][ T7335] do_mmap+0x9b3/0xbe0 [ 3093.202499][ T7335] __se_sys_remap_file_pages+0x55e/0x600 [ 3093.202519][ T7335] ? fput+0x8f/0xc0 [ 3093.202547][ T7335] __x64_sys_remap_file_pages+0x67/0x80 [ 3093.202568][ T7335] x64_sys_call+0x23af/0x2ff0 [ 3093.202585][ T7335] do_syscall_64+0xd2/0x200 [ 3093.202605][ T7335] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3093.202624][ T7335] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3093.202643][ T7335] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3093.202660][ T7335] RIP: 0033:0x7f7271beebe9 [ 3093.202672][ T7335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3093.202686][ T7335] RSP: 002b:00007f72705c9038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d8 [ 3093.202702][ T7335] RAX: ffffffffffffffda RBX: 00007f7271e16090 RCX: 00007f7271beebe9 [ 3093.202713][ T7335] RDX: 0000000000000000 RSI: 0000000000400d00 RDI: 000020000051c000 [ 3093.202723][ T7335] RBP: 00007f72705c9090 R08: 0000000000000000 R09: 0000000000000000 [ 3093.202733][ T7335] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3093.202743][ T7335] R13: 00007f7271e16128 R14: 00007f7271e16090 R15: 00007ffde623a1b8 [ 3093.202758][ T7335] [ 3093.478432][ T7341] netlink: 152 bytes leftover after parsing attributes in process `syz.5.21838'. [ 3093.534786][ T7341] tipc: Enabling of bearer rejected, failed to enable media [ 3093.757809][ T7369] pim6reg: entered allmulticast mode [ 3094.003194][ T7384] bond1: entered promiscuous mode [ 3094.008440][ T7396] netlink: 'syz.9.21856': attribute type 29 has an invalid length. [ 3094.017136][ T7396] netlink: 'syz.9.21856': attribute type 29 has an invalid length. [ 3094.134674][ T7405] 9pnet_fd: Insufficient options for proto=fd [ 3094.407061][ T7414] netlink: 28 bytes leftover after parsing attributes in process `syz.5.21861'. [ 3094.416289][ T7414] netlink: 8 bytes leftover after parsing attributes in process `syz.5.21861'. [ 3095.126873][ T7431] pim6reg: entered allmulticast mode [ 3095.132880][ T7432] netlink: 14568 bytes leftover after parsing attributes in process `syz.7.21876'. [ 3095.145221][ T7431] pim6reg: left allmulticast mode [ 3095.244282][ T7438] netlink: 'syz.6.21870': attribute type 29 has an invalid length. [ 3095.281957][ T7444] netlink: 'syz.6.21870': attribute type 29 has an invalid length. [ 3095.333571][ T7443] GUP no longer grows the stack in syz.5.21871 (7443): 200000002000-200000006000 (200000001000) [ 3095.344387][ T7443] CPU: 0 UID: 0 PID: 7443 Comm: syz.5.21871 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3095.344437][ T7443] Tainted: [W]=WARN [ 3095.344445][ T7443] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3095.344456][ T7443] Call Trace: [ 3095.344462][ T7443] [ 3095.344469][ T7443] __dump_stack+0x1d/0x30 [ 3095.344488][ T7443] dump_stack_lvl+0xe8/0x140 [ 3095.344504][ T7443] dump_stack+0x15/0x1b [ 3095.344518][ T7443] __get_user_pages+0x198d/0x1fa0 [ 3095.344616][ T7443] ? __d_alloc+0x2bb/0x340 [ 3095.344645][ T7443] ? __rcu_read_unlock+0x4f/0x70 [ 3095.344670][ T7443] ? __rcu_read_unlock+0x4f/0x70 [ 3095.344785][ T7443] ? avc_has_perm_noaudit+0x1b1/0x200 [ 3095.344809][ T7443] __gup_longterm_locked+0x8f4/0xe60 [ 3095.344839][ T7443] ? security_ptrace_access_check+0x69/0x80 [ 3095.344864][ T7443] ? __ptrace_may_access+0x2c3/0x340 [ 3095.344926][ T7443] pin_user_pages_remote+0x7e/0xb0 [ 3095.344955][ T7443] process_vm_rw+0x484/0x960 [ 3095.344984][ T7443] ? __pfx_futex_wake_mark+0x10/0x10 [ 3095.345099][ T7443] ? restore_fpregs_from_fpstate+0x61/0x120 [ 3095.345133][ T7443] __x64_sys_process_vm_writev+0x78/0x90 [ 3095.345166][ T7443] x64_sys_call+0x2a7c/0x2ff0 [ 3095.345188][ T7443] do_syscall_64+0xd2/0x200 [ 3095.345214][ T7443] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3095.345239][ T7443] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3095.345331][ T7443] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3095.345352][ T7443] RIP: 0033:0x7ffbb2c3ebe9 [ 3095.345365][ T7443] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3095.345580][ T7443] RSP: 002b:00007ffbb169f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 3095.345602][ T7443] RAX: ffffffffffffffda RBX: 00007ffbb2e65fa0 RCX: 00007ffbb2c3ebe9 [ 3095.345616][ T7443] RDX: 0000000000000001 RSI: 0000200000001c80 RDI: 000000000000043d [ 3095.345631][ T7443] RBP: 00007ffbb2cc1e19 R08: 0000000000000001 R09: 0000000000000000 [ 3095.345645][ T7443] R10: 0000200000001d80 R11: 0000000000000246 R12: 0000000000000000 [ 3095.345660][ T7443] R13: 00007ffbb2e66038 R14: 00007ffbb2e65fa0 R15: 00007ffc72b4b9e8 [ 3095.345678][ T7443] [ 3095.611147][ T7447] netlink: 'syz.5.21873': attribute type 29 has an invalid length. [ 3095.621186][ T7447] netlink: 'syz.5.21873': attribute type 29 has an invalid length. [ 3095.796733][ T7455] netlink: 4 bytes leftover after parsing attributes in process `syz.9.21879'. [ 3095.853013][ T29] kauditd_printk_skb: 209 callbacks suppressed [ 3095.853026][ T29] audit: type=1400 audit(1755037230.671:5914): avc: denied { create } for pid=7454 comm="syz.9.21879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3095.880189][ T7467] RDS: rds_bind could not find a transport for ::ffff:172.30.1.10, load rds_tcp or rds_rdma? [ 3095.945654][ T29] audit: type=1400 audit(1755037230.671:5915): avc: denied { recv } for pid=7463 comm="syz.7.21883" saddr=::1 daddr=::1 netif=lo scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 3095.968183][ T29] audit: type=1400 audit(1755037230.701:5916): avc: denied { bind } for pid=7454 comm="syz.9.21879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 3095.988782][ T29] audit: type=1400 audit(1755037230.711:5917): avc: denied { sys_module } for pid=7459 comm="syz.6.21880" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3096.010389][ T29] audit: type=1400 audit(1755037230.761:5918): avc: denied { create } for pid=7454 comm="syz.9.21879" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3096.031941][ T29] audit: type=1326 audit(1755037230.761:5919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7454 comm="syz.9.21879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23b3b8ebe9 code=0x7ffc0000 [ 3096.055630][ T29] audit: type=1326 audit(1755037230.761:5920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7454 comm="syz.9.21879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23b3b8ebe9 code=0x7ffc0000 [ 3096.079258][ T29] audit: type=1326 audit(1755037230.761:5921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7454 comm="syz.9.21879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f23b3b8ebe9 code=0x7ffc0000 [ 3096.102955][ T29] audit: type=1326 audit(1755037230.761:5922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7454 comm="syz.9.21879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23b3b8ebe9 code=0x7ffc0000 [ 3096.126816][ T29] audit: type=1326 audit(1755037230.761:5923): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7454 comm="syz.9.21879" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23b3b8ebe9 code=0x7ffc0000 [ 3096.158527][ T7478] netlink: 4 bytes leftover after parsing attributes in process `syz.6.21884'. [ 3096.192494][ T7480] netlink: 'syz.6.21886': attribute type 29 has an invalid length. [ 3096.196225][ T7482] netlink: 'syz.7.21887': attribute type 1 has an invalid length. [ 3096.201092][ T7480] netlink: 'syz.6.21886': attribute type 29 has an invalid length. [ 3096.382798][ T7486] netlink: 4 bytes leftover after parsing attributes in process `syz.5.21888'. [ 3096.393514][ T7486] RDS: rds_bind could not find a transport for ::ffff:172.30.1.6, load rds_tcp or rds_rdma? [ 3097.064080][ T7490] netlink: 'syz.9.21891': attribute type 29 has an invalid length. [ 3097.167175][ T7490] netlink: 'syz.9.21891': attribute type 29 has an invalid length. [ 3097.775064][ T3456] Process accounting resumed [ 3098.028048][ T7515] netlink: 'syz.9.21900': attribute type 29 has an invalid length. [ 3098.089533][ T7512] netlink: 152 bytes leftover after parsing attributes in process `syz.1.21898'. [ 3098.160580][ T7525] tipc: Enabling of bearer rejected, failed to enable media [ 3098.326231][ T7534] netlink: 4 bytes leftover after parsing attributes in process `syz.9.21904'. [ 3098.388951][ T7534] hsr_slave_0: left promiscuous mode [ 3098.403809][ T7526] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3098.428755][ T7534] hsr_slave_1: left promiscuous mode [ 3098.450796][ T7526] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3098.473292][ T7526] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3098.493258][ T7526] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3098.722145][ T7526] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3098.788825][ T7526] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3098.802275][ T7545] bond1: entered promiscuous mode [ 3099.368139][ T7569] netlink: 152 bytes leftover after parsing attributes in process `syz.9.21914'. [ 3099.412955][ T7567] team0: Port device vlan0 removed [ 3099.443493][T17647] tipc: Resetting bearer [ 3099.454698][ T7570] team0: Port device vlan0 added [ 3099.517901][ T7567] tipc: Enabling of bearer rejected, already enabled [ 3100.270706][ T7586] pim6reg: entered allmulticast mode [ 3100.377418][ T7590] syzkaller1: entered promiscuous mode [ 3100.383064][ T7590] syzkaller1: entered allmulticast mode [ 3100.474245][ T7595] syzkaller1: entered promiscuous mode [ 3100.480181][ T7595] syzkaller1: entered allmulticast mode [ 3100.972510][ T7607] bond2: entered promiscuous mode [ 3101.029245][ T29] kauditd_printk_skb: 161 callbacks suppressed [ 3101.029257][ T29] audit: type=1400 audit(1755037235.841:6085): avc: denied { tracepoint } for pid=7615 comm="syz.6.21932" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 3101.271225][ T7616] netlink: 4 bytes leftover after parsing attributes in process `syz.6.21932'. [ 3101.472956][ T7627] netlink: 152 bytes leftover after parsing attributes in process `syz.1.21933'. [ 3101.516375][ T7631] pim6reg: entered allmulticast mode [ 3101.606583][ T7627] tipc: Enabling of bearer rejected, failed to enable media [ 3101.878885][ T29] audit: type=1400 audit(1755037235.921:6086): avc: denied { create } for pid=7611 comm="syz.5.21930" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 [ 3101.898673][ T29] audit: type=1400 audit(1755037236.051:6087): avc: denied { read } for pid=7615 comm="syz.6.21932" dev="nsfs" ino=4026532418 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3101.920085][ T29] audit: type=1400 audit(1755037236.051:6088): avc: denied { open } for pid=7615 comm="syz.6.21932" path="net:[4026532418]" dev="nsfs" ino=4026532418 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:nsfs_t tclass=file permissive=1 [ 3101.943392][ T29] audit: type=1400 audit(1755037236.171:6089): avc: denied { module_request } for pid=7626 comm="syz.1.21933" kmod="netdev-team0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=system permissive=1 [ 3101.965347][ T29] audit: type=1400 audit(1755037236.311:6090): avc: denied { sys_module } for pid=7626 comm="syz.1.21933" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 3102.107565][ T7647] netlink: 14568 bytes leftover after parsing attributes in process `syz.9.21939'. [ 3102.237948][ T7652] netlink: 4 bytes leftover after parsing attributes in process `syz.9.21941'. [ 3102.247051][ T29] audit: type=1400 audit(1755037237.051:6091): avc: denied { bind } for pid=7650 comm="syz.9.21941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3102.266398][ T29] audit: type=1400 audit(1755037237.051:6092): avc: denied { write } for pid=7650 comm="syz.9.21941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3102.285888][ T29] audit: type=1400 audit(1755037237.051:6093): avc: denied { setopt } for pid=7650 comm="syz.9.21941" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 3102.328623][ T7652] RDS: rds_bind could not find a transport for ::ffff:172.30.1.10, load rds_tcp or rds_rdma? [ 3102.383557][ T29] audit: type=1326 audit(1755037237.161:6094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7650 comm="syz.9.21941" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23b3b8ebe9 code=0x7ffc0000 [ 3102.673576][ T7656] bond1: entered promiscuous mode [ 3102.747794][ T7668] netlink: 16 bytes leftover after parsing attributes in process `syz.5.21946'. [ 3102.796793][ T7673] netlink: 388 bytes leftover after parsing attributes in process `syz.1.21947'. [ 3102.835801][ T7679] validate_nla: 4 callbacks suppressed [ 3102.835815][ T7679] netlink: 'syz.1.21949': attribute type 29 has an invalid length. [ 3102.911990][ T7686] netlink: 4 bytes leftover after parsing attributes in process `syz.6.21952'. [ 3102.938023][ T7680] team0: Port device vlan0 removed [ 3102.963575][ T7689] RDS: rds_bind could not find a transport for ::ffff:172.30.1.7, load rds_tcp or rds_rdma? [ 3102.982692][ T7684] netlink: 'syz.1.21949': attribute type 29 has an invalid length. [ 3103.000643][T15970] tipc: Resetting bearer [ 3103.073386][ T7680] team0: Port device vlan0 added [ 3103.103216][ T7680] tipc: Enabling of bearer rejected, already enabled [ 3103.414722][ T7709] tipc: Resetting bearer [ 3103.491107][ T7709] tipc: Disabling bearer [ 3103.536126][ T7709] team0 (unregistering): Port device vlan0 removed [ 3103.846581][ T7725] __nla_validate_parse: 1 callbacks suppressed [ 3103.846600][ T7725] netlink: 152 bytes leftover after parsing attributes in process `syz.7.21962'. [ 3103.941101][ T7724] syzkaller1: entered promiscuous mode [ 3103.946611][ T7724] syzkaller1: entered allmulticast mode [ 3103.984067][ T7720] tipc: Enabling of bearer rejected, failed to enable media [ 3104.084181][ T7740] FAULT_INJECTION: forcing a failure. [ 3104.084181][ T7740] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3104.097324][ T7740] CPU: 0 UID: 0 PID: 7740 Comm: syz.7.21966 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3104.097357][ T7740] Tainted: [W]=WARN [ 3104.097363][ T7740] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3104.097414][ T7740] Call Trace: [ 3104.097422][ T7740] [ 3104.097430][ T7740] __dump_stack+0x1d/0x30 [ 3104.097449][ T7740] dump_stack_lvl+0xe8/0x140 [ 3104.097466][ T7740] dump_stack+0x15/0x1b [ 3104.097480][ T7740] should_fail_ex+0x265/0x280 [ 3104.097498][ T7740] should_fail+0xb/0x20 [ 3104.097560][ T7740] should_fail_usercopy+0x1a/0x20 [ 3104.097598][ T7740] _copy_to_user+0x20/0xa0 [ 3104.097624][ T7740] simple_read_from_buffer+0xb5/0x130 [ 3104.097657][ T7740] proc_fail_nth_read+0x10e/0x150 [ 3104.097684][ T7740] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 3104.097710][ T7740] vfs_read+0x1a8/0x770 [ 3104.097728][ T7740] ? __rcu_read_unlock+0x4f/0x70 [ 3104.097778][ T7740] ? __fget_files+0x184/0x1c0 [ 3104.097811][ T7740] ksys_read+0xda/0x1a0 [ 3104.097835][ T7740] __x64_sys_read+0x40/0x50 [ 3104.097856][ T7740] x64_sys_call+0x27bc/0x2ff0 [ 3104.097873][ T7740] do_syscall_64+0xd2/0x200 [ 3104.097922][ T7740] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3104.097949][ T7740] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3104.098021][ T7740] RIP: 0033:0x7f6f70d7d5fc [ 3104.098037][ T7740] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 3104.098056][ T7740] RSP: 002b:00007f6f6f7df030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 3104.098075][ T7740] RAX: ffffffffffffffda RBX: 00007f6f70fa5fa0 RCX: 00007f6f70d7d5fc [ 3104.098086][ T7740] RDX: 000000000000000f RSI: 00007f6f6f7df0a0 RDI: 0000000000000007 [ 3104.098168][ T7740] RBP: 00007f6f6f7df090 R08: 0000000000000000 R09: 0000000000000000 [ 3104.098182][ T7740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3104.098273][ T7740] R13: 00007f6f70fa6038 R14: 00007f6f70fa5fa0 R15: 00007ffc563c2b68 [ 3104.098295][ T7740] [ 3104.620616][ T7771] netlink: 152 bytes leftover after parsing attributes in process `syz.9.21977'. [ 3104.703204][ T7765] team0: Port device vlan0 removed [ 3104.742825][ T7772] team0: Port device vlan0 added [ 3104.751543][ T7773] tipc: Enabling of bearer rejected, already enabled [ 3104.791868][ T7775] netlink: 'syz.9.21979': attribute type 39 has an invalid length. [ 3104.900898][ T7790] syzkaller1: entered promiscuous mode [ 3104.906406][ T7790] syzkaller1: entered allmulticast mode [ 3105.230976][ T7806] netlink: 4 bytes leftover after parsing attributes in process `syz.7.21992'. [ 3105.313783][ T7814] netlink: 'syz.7.21992': attribute type 4 has an invalid length. [ 3105.346037][ T7806] hsr_slave_0: left promiscuous mode [ 3105.362888][ T7806] hsr_slave_1: left promiscuous mode [ 3105.574331][ T7819] netlink: 20 bytes leftover after parsing attributes in process `syz.9.21995'. [ 3105.801134][ T7827] netlink: 4 bytes leftover after parsing attributes in process `syz.9.21997'. [ 3105.848511][ T7827] RDS: rds_bind could not find a transport for ::ffff:172.30.1.10, load rds_tcp or rds_rdma? [ 3105.967727][ T7843] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 3106.096815][ T7848] pim6reg: left allmulticast mode [ 3106.118670][ T7850] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(6) [ 3106.125357][ T7850] vhci_hcd vhci_hcd.0: devid(0) speed(5) speed_str(super-speed) [ 3106.133619][ T7850] vhci_hcd vhci_hcd.0: Device attached [ 3106.140330][ T29] kauditd_printk_skb: 243 callbacks suppressed [ 3106.140345][ T29] audit: type=1400 audit(1755037240.961:6338): avc: denied { read write } for pid=7851 comm="syz.5.22007" name="virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3106.145490][ T7852] vhci_hcd: connection closed [ 3106.170205][ T29] audit: type=1400 audit(1755037240.961:6339): avc: denied { open } for pid=7851 comm="syz.5.22007" path="/dev/virtual_nci" dev="devtmpfs" ino=132 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 3106.194552][T16066] vhci_hcd: stop threads [ 3106.202952][T16066] vhci_hcd: release socket [ 3106.207367][T16066] vhci_hcd: disconnect device [ 3106.237231][ T7861] netlink: 20 bytes leftover after parsing attributes in process `syz.5.22008'. [ 3106.250554][ T7863] netlink: 'syz.9.22009': attribute type 29 has an invalid length. [ 3106.259080][ T7863] netlink: 'syz.9.22009': attribute type 29 has an invalid length. [ 3106.305810][ T29] audit: type=1400 audit(1755037241.121:6340): avc: denied { write } for pid=7864 comm="syz.5.22010" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3106.349752][ T29] audit: type=1326 audit(1755037241.161:6341): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7873 comm="syz.7.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6f70d7ebe9 code=0x7ffc0000 [ 3106.373462][ T29] audit: type=1326 audit(1755037241.161:6342): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7873 comm="syz.7.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6f70d7ebe9 code=0x7ffc0000 [ 3106.412753][ T29] audit: type=1326 audit(1755037241.211:6343): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7873 comm="syz.7.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6f70d7ebe9 code=0x7ffc0000 [ 3106.420991][ T7879] netlink: 'syz.7.22015': attribute type 29 has an invalid length. [ 3106.436413][ T29] audit: type=1326 audit(1755037241.211:6344): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7873 comm="syz.7.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6f70d7ebe9 code=0x7ffc0000 [ 3106.450054][ T7879] netlink: 'syz.7.22015': attribute type 29 has an invalid length. [ 3106.467791][ T29] audit: type=1326 audit(1755037241.211:6345): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7873 comm="syz.7.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6f70d7ebe9 code=0x7ffc0000 [ 3106.499646][ T29] audit: type=1326 audit(1755037241.211:6346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7873 comm="syz.7.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f6f70d7ebe9 code=0x7ffc0000 [ 3106.523536][ T29] audit: type=1326 audit(1755037241.211:6347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=7873 comm="syz.7.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6f70d7ebe9 code=0x7ffc0000 [ 3106.529726][ T7883] tipc: Resetting bearer [ 3106.570813][ T7883] tipc: Disabling bearer [ 3106.578806][ T7883] team0 (unregistering): Port device vlan0 removed [ 3106.722308][ T7895] netlink: 'syz.1.22022': attribute type 29 has an invalid length. [ 3106.732107][ T7895] netlink: 'syz.1.22022': attribute type 29 has an invalid length. [ 3106.778704][ T7897] netlink: 16 bytes leftover after parsing attributes in process `syz.9.22020'. [ 3107.202476][ T7928] netlink: 12 bytes leftover after parsing attributes in process `syz.1.22034'. [ 3107.212099][ T7928] 8021q: VLANs not supported on vcan0 [ 3107.243689][ T7930] netlink: 4 bytes leftover after parsing attributes in process `syz.9.22030'. [ 3107.288498][ T7944] netlink: 16 bytes leftover after parsing attributes in process `syz.1.22040'. [ 3107.444050][ T7956] syzkaller0: entered promiscuous mode [ 3107.449558][ T7956] syzkaller0: entered allmulticast mode [ 3107.576214][ T7969] syzkaller0: entered promiscuous mode [ 3107.581817][ T7969] syzkaller0: entered allmulticast mode [ 3107.649002][ T7980] SELinux: security_context_str_to_sid (=S|1rWiM!Oj4~1c3FfX50X2kcm?'wC) failed with errno=-22 [ 3107.678880][ T7980] FAULT_INJECTION: forcing a failure. [ 3107.678880][ T7980] name failslab, interval 1, probability 0, space 0, times 0 [ 3107.691907][ T7980] CPU: 0 UID: 0 PID: 7980 Comm: syz.1.22055 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3107.691965][ T7980] Tainted: [W]=WARN [ 3107.691972][ T7980] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3107.691984][ T7980] Call Trace: [ 3107.691992][ T7980] [ 3107.692001][ T7980] __dump_stack+0x1d/0x30 [ 3107.692029][ T7980] dump_stack_lvl+0xe8/0x140 [ 3107.692062][ T7980] dump_stack+0x15/0x1b [ 3107.692203][ T7980] should_fail_ex+0x265/0x280 [ 3107.692222][ T7980] should_failslab+0x8c/0xb0 [ 3107.692241][ T7980] kmem_cache_alloc_noprof+0x50/0x310 [ 3107.692283][ T7980] ? audit_log_start+0x365/0x6c0 [ 3107.692380][ T7980] audit_log_start+0x365/0x6c0 [ 3107.692413][ T7980] audit_seccomp+0x48/0x100 [ 3107.692438][ T7980] ? __seccomp_filter+0x68c/0x10d0 [ 3107.692459][ T7980] __seccomp_filter+0x69d/0x10d0 [ 3107.692489][ T7980] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 3107.692514][ T7980] ? vfs_write+0x7e8/0x960 [ 3107.692536][ T7980] ? __rcu_read_unlock+0x4f/0x70 [ 3107.692559][ T7980] ? __fget_files+0x184/0x1c0 [ 3107.692602][ T7980] __secure_computing+0x82/0x150 [ 3107.692620][ T7980] syscall_trace_enter+0xcf/0x1e0 [ 3107.692640][ T7980] do_syscall_64+0xac/0x200 [ 3107.692705][ T7980] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3107.692730][ T7980] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3107.692753][ T7980] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3107.692772][ T7980] RIP: 0033:0x7f305c85ebe9 [ 3107.692785][ T7980] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3107.692815][ T7980] RSP: 002b:00007f305b2c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002d [ 3107.692836][ T7980] RAX: ffffffffffffffda RBX: 00007f305ca85fa0 RCX: 00007f305c85ebe9 [ 3107.692850][ T7980] RDX: 0000000000040000 RSI: 0000200000000140 RDI: 0000000000000009 [ 3107.692864][ T7980] RBP: 00007f305b2c7090 R08: 0000000000000000 R09: 0000000000000000 [ 3107.692878][ T7980] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3107.692892][ T7980] R13: 00007f305ca86038 R14: 00007f305ca85fa0 R15: 00007ffe80c6f718 [ 3107.692971][ T7980] [ 3108.372806][ T7999] syzkaller0: entered promiscuous mode [ 3108.378304][ T7999] syzkaller0: entered allmulticast mode [ 3108.608390][ T8006] validate_nla: 4 callbacks suppressed [ 3108.608450][ T8006] netlink: 'syz.6.22064': attribute type 29 has an invalid length. [ 3108.627400][ T8006] netlink: 'syz.6.22064': attribute type 29 has an invalid length. [ 3108.660419][ T7985] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3108.881397][ T7985] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3108.996182][ T7985] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3109.008685][ T7985] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3109.225819][ T7985] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3109.241646][ T7985] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3109.247218][ T8018] __nla_validate_parse: 1 callbacks suppressed [ 3109.247235][ T8018] netlink: 4 bytes leftover after parsing attributes in process `syz.1.22068'. [ 3110.549259][ T8026] netlink: 4 bytes leftover after parsing attributes in process `syz.5.22069'. [ 3110.579402][ T8026] RDS: rds_bind could not find a transport for ::ffff:172.30.1.6, load rds_tcp or rds_rdma? [ 3111.228612][ T29] kauditd_printk_skb: 205 callbacks suppressed [ 3111.228625][ T29] audit: type=1400 audit(1755037246.041:6551): avc: denied { setopt } for pid=8042 comm="syz.5.22075" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3111.321473][ T8055] syzkaller1: entered promiscuous mode [ 3111.327084][ T8055] syzkaller1: entered allmulticast mode [ 3111.337866][ T29] audit: type=1400 audit(1755037246.141:6552): avc: denied { ioctl } for pid=8054 comm="syz.5.22079" path="socket:[291222]" dev="sockfs" ino=291222 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3111.444021][ T29] audit: type=1400 audit(1755037246.261:6553): avc: denied { ioctl } for pid=8047 comm="syz.7.22076" path="socket:[291233]" dev="sockfs" ino=291233 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 3111.547848][ T29] audit: type=1400 audit(1755037246.361:6554): avc: denied { name_bind } for pid=8067 comm="syz.1.22082" src=20000 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=udp_socket permissive=1 [ 3111.641595][ T8078] netlink: 'syz.9.22085': attribute type 39 has an invalid length. [ 3111.650642][ T8070] SELinux: security_context_str_to_sid (=S|1rWiM!Oj4~1c3FfX50X2kcm?'wC) failed with errno=-22 [ 3111.680484][ T29] audit: type=1326 audit(1755037246.491:6555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8079 comm="syz.9.22086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23b3b8ebe9 code=0x7ffc0000 [ 3111.704015][ T29] audit: type=1326 audit(1755037246.501:6556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8079 comm="syz.9.22086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f23b3b8ebe9 code=0x7ffc0000 [ 3111.727641][ T29] audit: type=1326 audit(1755037246.501:6557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8079 comm="syz.9.22086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23b3b8ebe9 code=0x7ffc0000 [ 3111.751229][ T29] audit: type=1326 audit(1755037246.501:6558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8079 comm="syz.9.22086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f23b3b8ebe9 code=0x7ffc0000 [ 3111.774816][ T29] audit: type=1326 audit(1755037246.501:6559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8079 comm="syz.9.22086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f23b3b8ebe9 code=0x7ffc0000 [ 3111.799206][ T29] audit: type=1326 audit(1755037246.571:6560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8079 comm="syz.9.22086" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f23b3b8ebe9 code=0x7ffc0000 [ 3111.895288][ T8089] syzkaller1: entered promiscuous mode [ 3111.901224][ T8089] syzkaller1: entered allmulticast mode [ 3111.904967][ T8091] netlink: 4 bytes leftover after parsing attributes in process `syz.1.22091'. [ 3112.012171][ T8097] RDS: rds_bind could not find a transport for ::ffff:172.30.1.2, load rds_tcp or rds_rdma? [ 3113.231696][ T8108] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3113.240351][ T8108] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3113.249668][ T8108] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3113.258252][ T8108] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3113.329380][ T8109] netlink: 4 bytes leftover after parsing attributes in process `syz.6.22094'. [ 3113.467635][ T8108] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 3113.476211][ T8108] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 3114.369295][ T8109] hsr_slave_0: left promiscuous mode [ 3114.376060][ T8109] hsr_slave_1: left promiscuous mode [ 3114.417113][ T8103] netlink: 'syz.6.22094': attribute type 4 has an invalid length. [ 3114.563954][ T8114] netlink: 4 bytes leftover after parsing attributes in process `syz.6.22097'. [ 3114.617647][ T8119] netlink: 68 bytes leftover after parsing attributes in process `syz.1.22098'. [ 3114.688576][ T8131] netlink: 'syz.1.22104': attribute type 29 has an invalid length. [ 3114.713948][ T8131] netlink: 'syz.1.22104': attribute type 29 has an invalid length. [ 3114.837310][ T8144] syzkaller0: entered promiscuous mode [ 3114.842854][ T8144] syzkaller0: entered allmulticast mode [ 3114.906230][ T8148] netlink: 'syz.9.22110': attribute type 39 has an invalid length. [ 3114.940307][ T8150] netlink: 68 bytes leftover after parsing attributes in process `syz.1.22111'. [ 3114.954145][ T8152] syzkaller0: entered promiscuous mode [ 3114.959642][ T8152] syzkaller0: entered allmulticast mode [ 3114.983721][ T8154] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 3115.095953][ T8159] syzkaller1: entered promiscuous mode [ 3115.101508][ T8159] syzkaller1: entered allmulticast mode [ 3115.405267][ T8164] netlink: 'syz.9.22117': attribute type 29 has an invalid length. [ 3115.413866][ T8164] netlink: 'syz.9.22117': attribute type 29 has an invalid length. [ 3115.631664][ T8171] netlink: 4 bytes leftover after parsing attributes in process `syz.6.22120'. [ 3115.654298][ T8171] RDS: rds_bind could not find a transport for ::ffff:172.30.1.7, load rds_tcp or rds_rdma? [ 3115.679900][ T8183] netlink: 68 bytes leftover after parsing attributes in process `syz.7.22123'. [ 3115.770957][ T8196] syzkaller1: entered promiscuous mode [ 3115.776501][ T8196] syzkaller1: entered allmulticast mode [ 3115.790877][ T8199] netlink: 'syz.6.22129': attribute type 29 has an invalid length. [ 3115.805931][ T8199] netlink: 'syz.6.22129': attribute type 29 has an invalid length. [ 3116.052646][ T8205] netlink: 'syz.1.22131': attribute type 4 has an invalid length. [ 3116.073697][ T8226] netlink: 'syz.5.22134': attribute type 4 has an invalid length. [ 3116.145261][ T8238] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 3116.173117][ T8240] netlink: 4 bytes leftover after parsing attributes in process `syz.1.22140'. [ 3116.183382][ T8240] RDS: rds_bind could not find a transport for ::ffff:172.30.1.2, load rds_tcp or rds_rdma? [ 3116.259124][ T8244] syzkaller1: entered promiscuous mode [ 3116.264822][ T8244] syzkaller1: entered allmulticast mode [ 3116.273968][ T29] kauditd_printk_skb: 151 callbacks suppressed [ 3116.274036][ T29] audit: type=1400 audit(1755037251.071:6712): avc: denied { create } for pid=8243 comm="syz.6.22143" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3116.300182][ T29] audit: type=1400 audit(1755037251.071:6713): avc: denied { ioctl } for pid=8243 comm="syz.6.22143" path="socket:[291980]" dev="sockfs" ino=291980 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 3116.325639][ T29] audit: type=1400 audit(1755037251.131:6714): avc: denied { write } for pid=8246 comm="syz.5.22144" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 3116.363254][ T29] audit: type=1326 audit(1755037251.181:6715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8251 comm="syz.5.22145" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3116.387137][ T29] audit: type=1326 audit(1755037251.181:6716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8251 comm="syz.5.22145" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3116.393360][ T8254] SELinux: security_context_str_to_sid (=S|1rWiM!Oj4~1c3FfX50X2kcm?'wC) failed with errno=-22 [ 3116.412061][ T29] audit: type=1400 audit(1755037251.181:6717): avc: denied { create } for pid=8253 comm="syz.1.22146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3116.444975][ T29] audit: type=1400 audit(1755037251.181:6718): avc: denied { bind } for pid=8253 comm="syz.1.22146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3116.464614][ T29] audit: type=1400 audit(1755037251.181:6719): avc: denied { listen } for pid=8253 comm="syz.1.22146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3116.484540][ T29] audit: type=1400 audit(1755037251.211:6720): avc: denied { connect } for pid=8253 comm="syz.1.22146" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=vsock_socket permissive=1 [ 3116.504582][ T29] audit: type=1326 audit(1755037251.211:6721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8253 comm="syz.1.22146" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f305c85ebe9 code=0x7ffc0000 [ 3116.695801][ T8276] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 3116.795969][ T8281] netlink: 4 bytes leftover after parsing attributes in process `syz.1.22156'. [ 3116.805992][ T8281] RDS: rds_bind could not find a transport for ::ffff:172.30.1.2, load rds_tcp or rds_rdma? [ 3116.863708][ T8288] syzkaller1: entered promiscuous mode [ 3116.869300][ T8288] syzkaller1: entered allmulticast mode [ 3116.875181][ T8290] FAULT_INJECTION: forcing a failure. [ 3116.875181][ T8290] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3116.888445][ T8290] CPU: 0 UID: 0 PID: 8290 Comm: syz.1.22159 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3116.888477][ T8290] Tainted: [W]=WARN [ 3116.888484][ T8290] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3116.888497][ T8290] Call Trace: [ 3116.888559][ T8290] [ 3116.888569][ T8290] __dump_stack+0x1d/0x30 [ 3116.888592][ T8290] dump_stack_lvl+0xe8/0x140 [ 3116.888611][ T8290] dump_stack+0x15/0x1b [ 3116.888626][ T8290] should_fail_ex+0x265/0x280 [ 3116.888709][ T8290] should_fail+0xb/0x20 [ 3116.888746][ T8290] should_fail_usercopy+0x1a/0x20 [ 3116.888766][ T8290] _copy_from_user+0x1c/0xb0 [ 3116.888789][ T8290] ___sys_sendmsg+0xc1/0x1d0 [ 3116.888880][ T8290] __x64_sys_sendmsg+0xd4/0x160 [ 3116.888935][ T8290] x64_sys_call+0x191e/0x2ff0 [ 3116.888957][ T8290] do_syscall_64+0xd2/0x200 [ 3116.888979][ T8290] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3116.889000][ T8290] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3116.889061][ T8290] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3116.889084][ T8290] RIP: 0033:0x7f305c85ebe9 [ 3116.889101][ T8290] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3116.889143][ T8290] RSP: 002b:00007f305b2c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 3116.889196][ T8290] RAX: ffffffffffffffda RBX: 00007f305ca85fa0 RCX: 00007f305c85ebe9 [ 3116.889210][ T8290] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000005 [ 3116.889223][ T8290] RBP: 00007f305b2c7090 R08: 0000000000000000 R09: 0000000000000000 [ 3116.889237][ T8290] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3116.889248][ T8290] R13: 00007f305ca86038 R14: 00007f305ca85fa0 R15: 00007ffe80c6f718 [ 3116.889312][ T8290] [ 3117.105315][ T8297] vlan2: entered allmulticast mode [ 3117.110564][ T8297] bridge_slave_0: entered allmulticast mode [ 3117.469249][ T8338] netlink: 44 bytes leftover after parsing attributes in process `syz.9.22178'. [ 3117.509930][ T8340] syzkaller0: entered promiscuous mode [ 3117.515792][ T8340] syzkaller0: entered allmulticast mode [ 3117.638654][ T8355] 9pnet_fd: Insufficient options for proto=fd [ 3118.236908][ T8379] FAULT_INJECTION: forcing a failure. [ 3118.236908][ T8379] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3118.250387][ T8379] CPU: 1 UID: 0 PID: 8379 Comm: syz.5.22188 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3118.250420][ T8379] Tainted: [W]=WARN [ 3118.250426][ T8379] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3118.250491][ T8379] Call Trace: [ 3118.250497][ T8379] [ 3118.250505][ T8379] __dump_stack+0x1d/0x30 [ 3118.250525][ T8379] dump_stack_lvl+0xe8/0x140 [ 3118.250545][ T8379] dump_stack+0x15/0x1b [ 3118.250576][ T8379] should_fail_ex+0x265/0x280 [ 3118.250594][ T8379] should_fail+0xb/0x20 [ 3118.250609][ T8379] should_fail_usercopy+0x1a/0x20 [ 3118.250679][ T8379] strncpy_from_user+0x25/0x230 [ 3118.250703][ T8379] ? _raw_spin_unlock+0x26/0x50 [ 3118.250729][ T8379] strncpy_from_user_nofault+0x68/0xf0 [ 3118.250752][ T8379] bpf_probe_read_user_str+0x2a/0x70 [ 3118.250856][ T8379] bpf_prog_bc7c5c6b9645592f+0x3e/0x44 [ 3118.250872][ T8379] bpf_trace_run2+0x104/0x1c0 [ 3118.250891][ T8379] ? security_compute_sid+0x11da/0x1290 [ 3118.250911][ T8379] ? security_compute_sid+0x11da/0x1290 [ 3118.250977][ T8379] kfree+0x27b/0x320 [ 3118.251037][ T8379] security_compute_sid+0x11da/0x1290 [ 3118.251075][ T8379] ? kstrtouint+0x76/0xc0 [ 3118.251132][ T8379] security_transition_sid+0x5a/0x70 [ 3118.251150][ T8379] selinux_socket_create+0x121/0x180 [ 3118.251176][ T8379] security_socket_create+0x50/0x90 [ 3118.251205][ T8379] __sock_create+0xe0/0x5b0 [ 3118.251256][ T8379] ? __schedule+0x6b9/0xb30 [ 3118.251287][ T8379] __sys_socket+0xb0/0x180 [ 3118.251312][ T8379] __x64_sys_socket+0x3f/0x50 [ 3118.251381][ T8379] x64_sys_call+0x1147/0x2ff0 [ 3118.251403][ T8379] do_syscall_64+0xd2/0x200 [ 3118.251493][ T8379] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3118.251514][ T8379] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3118.251539][ T8379] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3118.251614][ T8379] RIP: 0033:0x7ffbb2c3ebe9 [ 3118.251628][ T8379] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3118.251665][ T8379] RSP: 002b:00007ffbb165d038 EFLAGS: 00000246 ORIG_RAX: 0000000000000029 [ 3118.251686][ T8379] RAX: ffffffffffffffda RBX: 00007ffbb2e66180 RCX: 00007ffbb2c3ebe9 [ 3118.251759][ T8379] RDX: 0000000000000000 RSI: 0000000000000003 RDI: 000000000000002c [ 3118.251773][ T8379] RBP: 00007ffbb165d090 R08: 0000000000000000 R09: 0000000000000000 [ 3118.251804][ T8379] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3118.251818][ T8379] R13: 00007ffbb2e66218 R14: 00007ffbb2e66180 R15: 00007ffc72b4b9e8 [ 3118.251835][ T8379] [ 3119.646550][ T8392] netlink: 4 bytes leftover after parsing attributes in process `syz.1.22197'. [ 3119.675207][ T8393] syzkaller0: entered promiscuous mode [ 3119.680825][ T8393] syzkaller0: entered allmulticast mode [ 3120.243793][ T8410] FAULT_INJECTION: forcing a failure. [ 3120.243793][ T8410] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3120.257002][ T8410] CPU: 1 UID: 0 PID: 8410 Comm: syz.1.22199 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3120.257107][ T8410] Tainted: [W]=WARN [ 3120.257114][ T8410] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3120.257127][ T8410] Call Trace: [ 3120.257135][ T8410] [ 3120.257149][ T8410] __dump_stack+0x1d/0x30 [ 3120.257210][ T8410] dump_stack_lvl+0xe8/0x140 [ 3120.257294][ T8410] dump_stack+0x15/0x1b [ 3120.257309][ T8410] should_fail_ex+0x265/0x280 [ 3120.257335][ T8410] should_fail+0xb/0x20 [ 3120.257349][ T8410] should_fail_usercopy+0x1a/0x20 [ 3120.257367][ T8410] _copy_from_user+0x1c/0xb0 [ 3120.257389][ T8410] __sys_bpf+0x178/0x7b0 [ 3120.257483][ T8410] __x64_sys_bpf+0x41/0x50 [ 3120.257502][ T8410] x64_sys_call+0x2aea/0x2ff0 [ 3120.257520][ T8410] do_syscall_64+0xd2/0x200 [ 3120.257544][ T8410] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3120.257584][ T8410] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3120.257604][ T8410] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3120.257700][ T8410] RIP: 0033:0x7f305c85ebe9 [ 3120.257717][ T8410] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3120.257735][ T8410] RSP: 002b:00007f305b285038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 3120.257755][ T8410] RAX: ffffffffffffffda RBX: 00007f305ca86180 RCX: 00007f305c85ebe9 [ 3120.257769][ T8410] RDX: 0000000000000070 RSI: 0000200000000440 RDI: 0000000000000005 [ 3120.257782][ T8410] RBP: 00007f305b285090 R08: 0000000000000000 R09: 0000000000000000 [ 3120.257796][ T8410] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3120.257844][ T8410] R13: 00007f305ca86218 R14: 00007f305ca86180 R15: 00007ffe80c6f718 [ 3120.257865][ T8410] [ 3120.507407][ T8408] tipc: Resetting bearer [ 3120.522924][ T8408] tipc: Disabling bearer [ 3120.544986][ T8408] team0 (unregistering): Port device vlan0 removed [ 3120.786982][ T8422] lo speed is unknown, defaulting to 1000 [ 3120.812632][ T8422] lo speed is unknown, defaulting to 1000 [ 3120.837672][ T8422] lo speed is unknown, defaulting to 1000 [ 3120.873248][ T8422] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 3120.925404][ T8422] lo speed is unknown, defaulting to 1000 [ 3120.957612][ T8422] lo speed is unknown, defaulting to 1000 [ 3120.990304][ T8422] lo speed is unknown, defaulting to 1000 [ 3120.998494][ T8431] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 3121.015360][ T8422] lo speed is unknown, defaulting to 1000 [ 3121.031029][ T8422] lo speed is unknown, defaulting to 1000 [ 3121.208704][ T8447] netlink: 4 bytes leftover after parsing attributes in process `syz.7.22214'. [ 3121.245139][ T8448] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 3121.273913][ T8453] RDS: rds_bind could not find a transport for ::ffff:172.30.1.8, load rds_tcp or rds_rdma? [ 3121.284874][ T8456] validate_nla: 2 callbacks suppressed [ 3121.284921][ T8456] netlink: 'syz.5.22216': attribute type 29 has an invalid length. [ 3121.330067][ T8456] netlink: 'syz.5.22216': attribute type 29 has an invalid length. [ 3121.390017][ T29] kauditd_printk_skb: 183 callbacks suppressed [ 3121.390030][ T29] audit: type=1326 audit(1755037256.211:6905): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8459 comm="syz.5.22218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3121.446039][ T29] audit: type=1326 audit(1755037256.241:6906): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8459 comm="syz.5.22218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=65 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3121.469897][ T29] audit: type=1326 audit(1755037256.241:6907): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8459 comm="syz.5.22218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3121.493417][ T29] audit: type=1326 audit(1755037256.241:6908): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8459 comm="syz.5.22218" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3121.516918][ T29] audit: type=1326 audit(1755037256.261:6909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8462 comm="syz.5.22219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3121.540597][ T29] audit: type=1326 audit(1755037256.261:6910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8462 comm="syz.5.22219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3121.564326][ T29] audit: type=1326 audit(1755037256.261:6911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8462 comm="syz.5.22219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3121.588103][ T29] audit: type=1326 audit(1755037256.261:6912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8462 comm="syz.5.22219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3121.611980][ T29] audit: type=1326 audit(1755037256.261:6913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8462 comm="syz.5.22219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3121.635852][ T29] audit: type=1326 audit(1755037256.261:6914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=8462 comm="syz.5.22219" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ffbb2c3ebe9 code=0x7ffc0000 [ 3121.768668][ T8474] syzkaller0: entered promiscuous mode [ 3121.774268][ T8474] syzkaller0: entered allmulticast mode [ 3121.787374][ T8479] capability: warning: `syz.6.22226' uses 32-bit capabilities (legacy support in use) [ 3121.812871][ T8479] bridge0: entered allmulticast mode [ 3121.886387][ T8484] siw: device registration error -23 [ 3121.941146][ T8488] netlink: 'syz.6.22229': attribute type 29 has an invalid length. [ 3121.975182][ T8488] netlink: 'syz.6.22229': attribute type 29 has an invalid length. [ 3122.263881][ T8496] bridge0: entered allmulticast mode [ 3122.289811][ T8496] FAULT_INJECTION: forcing a failure. [ 3122.289811][ T8496] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3122.303246][ T8496] CPU: 1 UID: 0 PID: 8496 Comm: syz.7.22232 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3122.303281][ T8496] Tainted: [W]=WARN [ 3122.303288][ T8496] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3122.303317][ T8496] Call Trace: [ 3122.303323][ T8496] [ 3122.303331][ T8496] __dump_stack+0x1d/0x30 [ 3122.303415][ T8496] dump_stack_lvl+0xe8/0x140 [ 3122.303436][ T8496] dump_stack+0x15/0x1b [ 3122.303453][ T8496] should_fail_ex+0x265/0x280 [ 3122.303475][ T8496] should_fail+0xb/0x20 [ 3122.303493][ T8496] should_fail_usercopy+0x1a/0x20 [ 3122.303542][ T8496] _copy_from_user+0x1c/0xb0 [ 3122.303612][ T8496] br_ioctl_stub+0x1f0/0x860 [ 3122.303744][ T8496] ? ioctl_has_perm+0x257/0x2a0 [ 3122.303767][ T8496] ? __pfx_br_ioctl_stub+0x10/0x10 [ 3122.303845][ T8496] sock_ioctl+0x399/0x610 [ 3122.303872][ T8496] ? __pfx_sock_ioctl+0x10/0x10 [ 3122.303896][ T8496] __se_sys_ioctl+0xcb/0x140 [ 3122.303976][ T8496] __x64_sys_ioctl+0x43/0x50 [ 3122.304003][ T8496] x64_sys_call+0x1816/0x2ff0 [ 3122.304022][ T8496] do_syscall_64+0xd2/0x200 [ 3122.304132][ T8496] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3122.304157][ T8496] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3122.304182][ T8496] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3122.304257][ T8496] RIP: 0033:0x7f6f70d7ebe9 [ 3122.304273][ T8496] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3122.304291][ T8496] RSP: 002b:00007f6f6f7df038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 3122.304317][ T8496] RAX: ffffffffffffffda RBX: 00007f6f70fa5fa0 RCX: 00007f6f70d7ebe9 [ 3122.304330][ T8496] RDX: 0000200000000900 RSI: 00000000000089a1 RDI: 000000000000000a [ 3122.304343][ T8496] RBP: 00007f6f6f7df090 R08: 0000000000000000 R09: 0000000000000000 [ 3122.304354][ T8496] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 3122.304365][ T8496] R13: 00007f6f70fa6038 R14: 00007f6f70fa5fa0 R15: 00007ffc563c2b68 [ 3122.304381][ T8496] [ 3122.679917][ T8514] netlink: 100 bytes leftover after parsing attributes in process `syz.6.22236'. [ 3122.772803][ T8519] netlink: 'syz.5.22241': attribute type 29 has an invalid length. [ 3122.796666][ T8519] netlink: 'syz.5.22241': attribute type 29 has an invalid length. [ 3122.817633][ T8522] (unnamed net_device) (uninitialized): option arp_validate: invalid value (18446744073709551614) [ 3123.759726][ T8548] FAULT_INJECTION: forcing a failure. [ 3123.759726][ T8548] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 3123.772827][ T8548] CPU: 1 UID: 0 PID: 8548 Comm: syz.7.22250 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3123.772863][ T8548] Tainted: [W]=WARN [ 3123.772871][ T8548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3123.772961][ T8548] Call Trace: [ 3123.772970][ T8548] [ 3123.772978][ T8548] __dump_stack+0x1d/0x30 [ 3123.772996][ T8548] dump_stack_lvl+0xe8/0x140 [ 3123.773012][ T8548] dump_stack+0x15/0x1b [ 3123.773028][ T8548] should_fail_ex+0x265/0x280 [ 3123.773135][ T8548] should_fail+0xb/0x20 [ 3123.773149][ T8548] should_fail_usercopy+0x1a/0x20 [ 3123.773226][ T8548] strncpy_from_user+0x25/0x230 [ 3123.773251][ T8548] ? _raw_spin_unlock+0x26/0x50 [ 3123.773282][ T8548] ? finish_task_switch+0xad/0x2b0 [ 3123.773343][ T8548] __se_sys_request_key+0x57/0x290 [ 3123.773365][ T8548] ? __schedule+0x6b9/0xb30 [ 3123.773427][ T8548] __x64_sys_request_key+0x55/0x70 [ 3123.773445][ T8548] x64_sys_call+0x1d98/0x2ff0 [ 3123.773466][ T8548] do_syscall_64+0xd2/0x200 [ 3123.773497][ T8548] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 3123.773568][ T8548] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 3123.773593][ T8548] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3123.773616][ T8548] RIP: 0033:0x7f6f70d7ebe9 [ 3123.773660][ T8548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 3123.773675][ T8548] RSP: 002b:00007f6f6f79d038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f9 [ 3123.773696][ T8548] RAX: ffffffffffffffda RBX: 00007f6f70fa6180 RCX: 00007f6f70d7ebe9 [ 3123.773710][ T8548] RDX: 0000200000000240 RSI: 0000200000000100 RDI: 00002000000000c0 [ 3123.773724][ T8548] RBP: 00007f6f6f79d090 R08: 0000000000000000 R09: 0000000000000000 [ 3123.773795][ T8548] R10: fffffffffffffffc R11: 0000000000000246 R12: 0000000000000001 [ 3123.773806][ T8548] R13: 00007f6f70fa6218 R14: 00007f6f70fa6180 R15: 00007ffc563c2b68 [ 3123.773852][ T8548] [ 3124.387061][ T8551] ================================================================== [ 3124.395163][ T8551] BUG: KCSAN: data-race in fifo_open / wait_for_partner [ 3124.402103][ T8551] [ 3124.404421][ T8551] read-write to 0xffff88810e7b68ac of 4 bytes by task 8552 on cpu 0: [ 3124.412476][ T8551] fifo_open+0x86/0x5d0 [ 3124.416624][ T8551] do_dentry_open+0x646/0xa20 [ 3124.421311][ T8551] vfs_open+0x37/0x1e0 [ 3124.425375][ T8551] path_openat+0x1c5e/0x2170 [ 3124.429957][ T8551] do_filp_open+0x109/0x230 [ 3124.434448][ T8551] do_sys_openat2+0xa6/0x110 [ 3124.439037][ T8551] __x64_sys_open+0xe6/0x110 [ 3124.443623][ T8551] x64_sys_call+0x1457/0x2ff0 [ 3124.448291][ T8551] do_syscall_64+0xd2/0x200 [ 3124.452795][ T8551] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3124.458688][ T8551] [ 3124.461012][ T8551] read to 0xffff88810e7b68ac of 4 bytes by task 8551 on cpu 1: [ 3124.468554][ T8551] wait_for_partner+0xb5/0x1c0 [ 3124.473330][ T8551] fifo_open+0x462/0x5d0 [ 3124.477567][ T8551] do_dentry_open+0x646/0xa20 [ 3124.482329][ T8551] vfs_open+0x37/0x1e0 [ 3124.486398][ T8551] path_openat+0x1c5e/0x2170 [ 3124.490977][ T8551] do_filp_open+0x109/0x230 [ 3124.495467][ T8551] do_sys_openat2+0xa6/0x110 [ 3124.500051][ T8551] __x64_sys_openat+0xf2/0x120 [ 3124.504905][ T8551] x64_sys_call+0x2e9c/0x2ff0 [ 3124.509612][ T8551] do_syscall_64+0xd2/0x200 [ 3124.514112][ T8551] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 3124.519995][ T8551] [ 3124.522302][ T8551] value changed: 0x00000001 -> 0x00000002 [ 3124.528526][ T8551] [ 3124.530843][ T8551] Reported by Kernel Concurrency Sanitizer on: [ 3124.537107][ T8551] CPU: 1 UID: 0 PID: 8551 Comm: syz.9.22252 Tainted: G W 6.17.0-rc1-syzkaller-00014-g0e39a731820a #0 PREEMPT(voluntary) [ 3124.551640][ T8551] Tainted: [W]=WARN [ 3124.555533][ T8551] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 3124.565943][ T8551] ================================================================== [ 3125.247793][ T8557] netlink: 'syz.1.22253': attribute type 29 has an invalid length. [ 3125.256862][ T8557] netlink: 'syz.1.22253': attribute type 29 has an invalid length.