last executing test programs: 4m52.072678495s ago: executing program 2 (id=2475): r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x8, 0x80510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10001, 0x2, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x0, 0x0, &(0x7f0000006680)) epoll_wait(0xffffffffffffffff, 0x0, 0x0, 0xfffffe00) r1 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)={{0x1, 0x1, 0x18, r0, {0x5f, 0x6}}, './file0\x00'}) connect$llc(r3, &(0x7f0000000140)={0x1a, 0x321, 0x5, 0xfc, 0x0, 0x40, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}}, 0x10) write$RDMA_USER_CM_CMD_LISTEN(r1, &(0x7f00000000c0)={0x7, 0x8, 0xfa00, {r2}}, 0x10) 4m51.958842924s ago: executing program 2 (id=2479): sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0xffffe000) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, &(0x7f00000004c0)=@abs={0x0, 0x0, 0x4e24}, 0x6e) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f00000000c0), 0x3fffffffffffeda, 0x2, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r0}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) syz_clone(0xe50c1700, 0x0, 0x0, 0x0, 0x0, 0x0) socket(0x10, 0x803, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_HOPOPTS(r1, 0x29, 0x36, &(0x7f0000000300)=ANY=[], 0x1b0) bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x11, 0xc, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) 4m51.51220603s ago: executing program 3 (id=2488): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70300001d000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='kfree\x00', r1, 0x0, 0x2}, 0x18) r2 = openat$selinux_enforce(0xffffffffffffff9c, 0x0, 0x1, 0x0) writev(r2, &(0x7f0000000040)=[{&(0x7f00000000c0)='\f', 0x1}], 0x1) 4m51.414759648s ago: executing program 3 (id=2494): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0xff}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r0}, &(0x7f0000000380), &(0x7f00000003c0)=r1}, 0x20) r2 = socket(0x2a, 0x2, 0x0) sendmsg$TIPC_NL_LINK_GET(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)={0x0, 0x24}}, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff, 0xffff}}}, 0x24}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000000)=@newtfilter={0x88, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {0xfffa}, {}, {0x1c, 0xfff9}}, [@filter_kind_options=@f_flower={{0xb}, {0x58, 0x2, [@TCA_FLOWER_ACT={0x54, 0x3, [@m_connmark={0x50, 0x1, 0x0, 0x0, {{0xd}, {0x20, 0x2, 0x0, 0x1, [@TCA_CONNMARK_PARMS={0x1c, 0x1, {{0xfffffff8, 0xfff, 0x0, 0x200, 0xa}, 0x3}}]}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3, 0x3}}}}]}]}}]}, 0x88}, 0x1, 0x0, 0x0, 0x20000004}, 0x24000000) r4 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r4, &(0x7f00000002c0), 0x40000000000009f, 0x0) 4m51.39371573s ago: executing program 3 (id=2495): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000a40)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a60000000060a0b0400000000000000000200000034000480200001800e000100636f6e6e6c696d69740000000c000280080001400000000010000180090001006c617374000000000900010073797a30000000000900020073797a320000000014000000110001"], 0x88}}, 0x0) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb702000008000000182300", @ANYRES32=r1, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x6, 0x0, 0x0, 0x0, 0x2c, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) close(r0) 4m51.369445141s ago: executing program 3 (id=2497): syz_usb_connect$lan78xx(0x1, 0x3f, &(0x7f0000000140)={{0x12, 0x1, 0x200, 0xff, 0xff, 0xff, 0x40, 0x424, 0x7850, 0x0, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x2d}}]}}, 0x0) socketpair$tipc(0x1e, 0x1, 0x0, 0x0) r0 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = creat(0x0, 0x0) r3 = openat$cgroup_ro(r2, &(0x7f0000000340)='blkio.bfq.dequeue\x00', 0x275a, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000540)={@map=r3, r3, 0x2f, 0x24}, 0x20) r4 = socket$packet(0x11, 0x2, 0x300) setsockopt$SO_TIMESTAMPING(r4, 0x1, 0x25, &(0x7f00000001c0)=0x9d2, 0x4) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendto$packet(r4, 0x0, 0x0, 0x0, &(0x7f0000000080)={0x11, 0x15, r5, 0x1, 0x0, 0x6, @multicast}, 0x14) ioctl$sock_kcm_SIOCKCMCLONE(r3, 0x89e2, &(0x7f00000001c0)={r4}) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000040), r1) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x2f}, 0x10}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x10) ioctl$IOCTL_GET_NCIDEV_IDX(r0, 0x0, &(0x7f00000000c0)=0x0) sendmsg$NFC_CMD_DEV_UP(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x1c, r6, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r8}]}, 0x1c}}, 0x0) write$nci(r0, &(0x7f0000000480)=@NCI_OP_CORE_CONN_CLOSE_RSP={0x0, 0x0, 0x2, 0x5, 0x1, 0x1}, 0x4) 4m51.363338582s ago: executing program 2 (id=2498): syz_clone3(&(0x7f0000001240)={0x1118200, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)=0x0, {0x1c}, &(0x7f0000000100)=""/4096, 0x1000, &(0x7f0000001100)=""/207, &(0x7f0000001200)=[0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0xffffffffffffffff], 0x4}, 0x58) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x381, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x5032}) io_setup(0xbf, &(0x7f0000000100)=0x0) io_submit(r2, 0x1, &(0x7f00000001c0)=[&(0x7f00000000c0)={0x20000000, 0x0, 0x7, 0x8, 0x0, r1, 0x0}]) r3 = syz_open_procfs$namespace(r0, &(0x7f0000000000)='ns/time_for_children\x00') r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$gtp(&(0x7f0000001300), 0xffffffffffffffff) r6 = syz_open_dev$loop(&(0x7f0000001400), 0x7, 0x40040) r7 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r7) sendmsg$GTP_CMD_GETPDP(r4, &(0x7f00000013c0)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000001380)={&(0x7f0000001440)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="00082bbd7000f6dbdf25028000000c000300030000000000000095ac2da41997000004000000000000005e00080002000000000000000000"], 0x38}, 0x1, 0x0, 0x0, 0x40}, 0x4004004) r8 = gettid() timer_create(0x0, &(0x7f0000000180)={0x0, 0x11, 0x4, @tid=r8}, &(0x7f0000000080)) timer_settime(0x0, 0x0, &(0x7f0000000300)={{0x0, 0x1}, {0x0, 0xe4c}}, 0x0) timer_delete(0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r9 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r10 = openat$cgroup_procs(r9, &(0x7f0000000040)='cgroup.procs\x00', 0x2, 0x0) preadv(r10, &(0x7f0000002880)=[{0x0}], 0x1, 0xa2e1, 0xc) preadv(r10, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/129, 0x81}], 0x1, 0xfffffffb, 0x4) ioctl$NS_GET_USERNS(r3, 0xb701, 0x0) 4m51.050350257s ago: executing program 2 (id=2499): syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3000046, &(0x7f0000000640)={[{@dioread_nolock}, {@data_err_abort}, {@inlinecrypt}, {@noauto_da_alloc}, {@data_err_ignore}, {@discard}, {@data_err_ignore}, {@grpquota}, {@noblock_validity}, {@user_xattr}, {@bh}, {@errors_remount}]}, 0x11, 0x56d, &(0x7f0000001600)="$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") r0 = openat(0xffffffffffffff9c, &(0x7f0000000400)='./file1\x00', 0x143142, 0x40) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a48000000060a010400000000000000000a0000040900010073797a31000000001c0004801800018008000100666962000c00028008000240000000030900020073797a3200000000140000001100010000000000000000000100000ad7506ed3da7494762224f82f0d51a1fd56a0eaa6f5e262bcf585a7452f337617f1bace1d8e8f2f6ae7f0ec419cff8e02a277b756dfeba5caec57f842e9a9d4fea7815c3c8ca4d3b7397be58ee9342ea0a96664f860906be0aaa1a89cbbde134792e4be91e94238f5a2e9b429c026d65a"], 0x70}, 0x1, 0x0, 0x0, 0x4000850}, 0x24044010) pwritev2(r0, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x5) r2 = syz_open_procfs(0x0, &(0x7f0000006300)='net/dev_mcast\x00') r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=@updpolicy={0xfc, 0x19, 0x1, 0x0, 0x0, {{@in6=@rand_addr=' \x01\x00', @in=@local, 0x0, 0x5, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa9, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {0x0, 0xa00, 0x40800000000000, 0x800000000000000}}, [@tmpl={0x44, 0x5, [{{@in=@local, 0x0, 0x3c}, 0x0, @in=@broadcast, 0x0, 0x0, 0x3}]}]}, 0xfc}}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000640)=@migrate={0xa0, 0x21, 0x1, 0x0, 0xfffffffe, {{@in6=@private2, @in6=@private2={0xfc, 0x2, '\x00', 0x1}, 0xfffc, 0x0, 0x0, 0x0, 0xa, 0xe0, 0x80}, 0x2}, [@migrate={0x50, 0x11, [{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in6=@ipv4={'\x00', '\xff\xff', @private=0xa010102}, @in=@rand_addr=0x64010102, @in6=@private2, 0x3c, 0x0, 0x0, 0x0, 0x8, 0x8}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x800}, 0x42000) utimensat(r2, 0x0, &(0x7f0000000880)={{0x77359400}}, 0x0) r5 = syz_clone(0x81248080, 0x0, 0x4c, 0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1) r6 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000080)={0x0, @in={{0x2, 0x4e22, @multicast1}}}, &(0x7f0000000000)=0x84) ptrace(0x10, r5) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x12000, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x64, 0x0, 0x0, 0x0, 0x0, 0x4, 0x400, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x104c094, 0x2, @perf_config_ext={0x1033, 0x6}, 0x0, 0xffffffffffffffff, 0x800000, 0x0, 0x2, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) bpf$PROG_LOAD(0x5, 0x0, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1803000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000014000800b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x5e38, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc(0x0, 0xffffffffffffffff) 4m51.01001563s ago: executing program 2 (id=2500): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000300)=ANY=[], 0xa0}}, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bc82000000000000a6"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp=0xedf0e51957efc755, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000000)={r3, 0x18000000000002a0, 0x5ee, 0x0, &(0x7f0000000580)="b9ff03076804268c989e14f088a8", 0x0, 0x500, 0x60000000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) close_range(r1, 0xffffffffffffffff, 0x0) 4m50.714994774s ago: executing program 3 (id=2503): r0 = socket(0xa, 0x3, 0x1) getsockopt(r0, 0xff, 0x24, 0x0, &(0x7f00000001c0)) fdatasync(0xffffffffffffffff) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000f80)=ANY=[@ANYBLOB="0500000004000000080000000b"], 0x48) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x3b, &(0x7f0000000000)='/proc/sys/net/ipv4\x00\x00s/sync_\x00le\xf44.\xab%\xf8\xff\xff\xff\xff\xff\xff\xff=\x11\xc8\xdd\x15\xcc\xd2\xf1d\'%\x11c\x91l,'}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000440)='./file0/../file0\x00', 0x0, 0x989046, 0x0) mount$bpf(0x0, &(0x7f00000000c0)='./file0/../file0\x00', 0x0, 0x100000, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, 0xffffffffffffffff, 0x0, 0x1c, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) mount$bpf(0x200000000000, &(0x7f0000000780)='./file0/../file0\x00', 0x0, 0xa06002, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000480)='kfree\x00', r2, 0x0, 0x7fffffffffffffff}, 0x18) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r3, 0x6, 0x10, &(0x7f00000003c0)=0x100000001, 0x4) connect$inet6(r3, &(0x7f0000000200)={0xa, 0xffff, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r3, 0x6, 0x1f, &(0x7f0000000040), 0x1e) setsockopt$inet6_tcp_TLS_TX(r3, 0x11a, 0x1, &(0x7f00000000c0)=@gcm_128={{0x303}, "2d432d74c04f228a", "d71d9a1e03558545115509e1c34caab9", "59f7766d", "5e33931677e0f2d7"}, 0x28) sendto$inet6(r3, &(0x7f0000000280)='S', 0x1, 0x8000, 0x0, 0x0) close(r3) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r4, 0xc0bc5351, &(0x7f00000017c0)={0x7fffffff, 0x2, 'client0\x00', 0x3, "6bc1444dfc6765c4", "e493cce62669f1e53411a5dd2175f2d8cbe40a7b470a9aa77184d0ed9f04957b", 0x8, 0x2}) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x11, 0x5, &(0x7f0000000780)=ANY=[@ANYBLOB="1805000000000000000000004b64ffec850000007d0000008500000007000000956e3b51a8fd354d1c28c348fdb57b82feb317deeab4fdb3b8f9783b14d658566b6a3539bf08c124dc2e94fabd3711a3cd5b6bc390ef5ee34f22c2273c3ba006bd624492ace10200c8ccdab7d1c429347a4d5da25e37c6db19580d19403bbe96be253f414c164616ae0e35b6bf8b2ec062eba45c05f3c2904a9313d0"], &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x10) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000000)={r6, 0x0, 0xfffffffffffffffe}, 0x10) r7 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r7, 0x6, 0x200000000000002d, &(0x7f0000000200)=0x7fff80, 0x4) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000400)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r8, 0x0, 0xa4}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x9}, 0x94) 4m50.687746506s ago: executing program 2 (id=2504): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffee8, &(0x7f00000044c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="480601080000000000000000050000000400078000000300856173683a6e65742c2e65740000000000000780000003000100000005000400000000000900020073797a31000000a98b0004000200000000000000"], 0x48}, 0x1, 0x0, 0x0, 0x200400c1}, 0x8000000) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = socket$inet(0x2, 0x4000000805, 0x0) listen(r1, 0x5) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) socket$nl_route(0x10, 0x3, 0x0) (async) pselect6(0x40, &(0x7f00000001c0)={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, &(0x7f00000010c0)={0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, &(0x7f0000000300)={0x0, 0x3938700}, 0x0) (async) syz_clone(0x43100000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r2], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x2000015f, &(0x7f0000000880)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r5, 0x0, 0xfffffffffffffffe}, 0x18) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) rseq(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x4}, 0x20, 0x0, 0x0) (async) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc5fffffd) 4m50.651159889s ago: executing program 32 (id=2504): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r0, &(0x7f0000000040)={0x0, 0xfffffffffffffee8, &(0x7f00000044c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="480601080000000000000000050000000400078000000300856173683a6e65742c2e65740000000000000780000003000100000005000400000000000900020073797a31000000a98b0004000200000000000000"], 0x48}, 0x1, 0x0, 0x0, 0x200400c1}, 0x8000000) socket$nl_generic(0x10, 0x3, 0x10) (async) r1 = socket$inet(0x2, 0x4000000805, 0x0) listen(r1, 0x5) (async) bpf$MAP_CREATE(0x0, 0x0, 0x48) (async) socket$nl_route(0x10, 0x3, 0x0) (async) pselect6(0x40, &(0x7f00000001c0)={0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, &(0x7f00000010c0)={0x2, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, &(0x7f0000000300)={0x0, 0x3938700}, 0x0) (async) syz_clone(0x43100000, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=r2], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x42, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x2000015f, &(0x7f0000000880)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x4, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r4, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r5, 0x0, 0xfffffffffffffffe}, 0x18) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) rseq(&(0x7f0000000000)={0x0, 0x0, 0x0, 0x4}, 0x20, 0x0, 0x0) (async) futex(0x0, 0x85, 0x0, 0x0, 0x0, 0xc5fffffd) 4m49.865103443s ago: executing program 3 (id=2512): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000013c0)=0xc) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4) pipe(&(0x7f0000000080)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f00000002c0)=0x8001, 0x4) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x24, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x9e}]}, 0x24}}, 0x80) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0xdc, 0x0, 0x0, 0x0, 0x3ff}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x28, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) unshare(0x64000680) 4m34.682545845s ago: executing program 33 (id=2512): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000280), &(0x7f00000013c0)=0xc) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x4) pipe(&(0x7f0000000080)) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x10, &(0x7f00000002c0)=0x8001, 0x4) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_LIST(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)={0x24, 0x7, 0x6, 0x201, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x9e}]}, 0x24}}, 0x80) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000000740)=@framed={{0x18, 0x0, 0x0, 0x0, 0xdc, 0x0, 0x0, 0x0, 0x3ff}}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x28, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000001dc0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r5}, 0x2d) unshare(0x64000680) 55.999549046s ago: executing program 6 (id=7147): creat(&(0x7f00000000c0)='./file0\x00', 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x16, &(0x7f00000001c0)=0x7f, 0x4) close(0xffffffffffffffff) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) unshare(0x22020600) r3 = memfd_create(&(0x7f0000000000)='+\x00', 0x6) cachestat(r3, &(0x7f00000005c0), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000100000000000000", @ANYRES32=0x1], 0x50) r4 = socket$kcm(0xa, 0x5, 0x0) r5 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r5, &(0x7f00000002c0)={&(0x7f0000000180)={0x2, 0x2, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000080)='_', 0x1}], 0x11}, 0x64) setsockopt$sock_attach_bpf(r5, 0x84, 0x1e, &(0x7f0000000240), 0x4) r6 = socket$kcm(0xa, 0x5, 0x0) r7 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=ANY=[@ANYBLOB="140100002800010004000000fcdbdf250401f2800c00180008ac0f0000000100140001"], 0x114}, {&(0x7f00000009c0)=ANY=[@ANYBLOB="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", @ANYRES32=r8, @ANYBLOB="040094807a026c57d2654d115e528c1459241cdf02597f14d35c3655073c5f407b4160b64e80e167c709d80d9da587820eeb0f3c363a773f519c2717597d2217f73d756a1e5262327a0d6705cffb6119d2df818584899aaf8d7b874dbb99330a6d2593829a3125c105c65840af5555000d003f0026e4b56b1866ada1d6000000ae69a5084963450371edc84dc99933e5f3798214db2bbd9046f0ccf707e29850c523bbf617b1d7ef1a551fb4d16bc02c3b80b31afd787c9d7b26e5ddbb196f76b5ae845fa547821e75e7ce9e57909e40c4879551d2f2238d4b261e66380a5ae73b551539b77a6588ca710abc8bcf5659e97a7c436980198477bba636c008a123467d4ebde947f09e3e18471413aacf4976b500"], 0x2cc}], 0x2, 0x0, 0x0, 0x20000001}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in=@remote, @in6=@dev={0xfe, 0x80, '\x00', 0x1a}, 0x4e23, 0x0, 0x4e24, 0x0, 0x2, 0x80, 0x0, 0x11, 0x0, r8}, {0xe61, 0x0, 0x0, 0x8, 0xb, 0x800, 0xffd, 0xffffffffffffffff}, {0x7, 0x4, 0x7fffffffffffffff, 0x7}, 0x8000, 0x6e6bb3, 0x0, 0x0, 0x2, 0x3}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x4d3, 0x3c}, 0x2, @in6=@remote, 0x3500, 0x0, 0x0, 0x4, 0xc, 0xd0, 0x1}}, 0xe8) quotactl_fd$Q_GETNEXTQUOTA(0xffffffffffffffff, 0xffffffff80000900, r8, &(0x7f0000000100)) getgid() lchown(&(0x7f0000000040)='./file0\x00', r8, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x8916, &(0x7f0000000000)={r6}) ioctl$sock_kcm_SIOCKCMCLONE(r4, 0x8936, &(0x7f0000000000)={r6}) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000010900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000025940000000c0a01030000000000000000070000080900020073797a31000000000900010073797a30000000006800038064000080080003400000000258000b802c0001800a0001006c696d69740000001c0002800c00014000000000000000030c0002400000000000000010140001800c0001"], 0x118}}, 0xc000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) socket(0x5, 0x5, 0x0) 55.897061454s ago: executing program 6 (id=7152): r0 = socket$inet6(0xa, 0x3, 0x1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[], 0xa0}, 0x4004881) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x21, 0x0) 55.82375445s ago: executing program 6 (id=7153): socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x8, 0x1, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$batadv(&(0x7f0000003000), r0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x2c0a01) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0x0, 0x1}, {0xffff, 0xffff}, {0xffff, 0x9}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0xe0000000, 0x5, 0xb7, 0x2, 0x1, 0x1, 0x4, 0x3, 0x1}}}}]}, 0x58}}, 0x4000) r5 = socket(0x10, 0x803, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000400)=@newtfilter={0x4c, 0x2c, 0xd2b, 0x70bd2a, 0x0, {0x0, 0x0, 0x0, r6, {0xb, 0x3}, {}, {0x1, 0x9}}, [@filter_kind_options=@f_u32={{0x8}, {0x20, 0x2, [@TCA_U32_SEL={0x14, 0x5, {0x0, 0x6, 0x0, 0x9, 0x401, 0x1000, 0x8a3, 0xd5}}, @TCA_U32_CLASSID={0x8, 0x1, {0xa, 0x5}}]}}]}, 0x4c}, 0x1, 0x0, 0x0, 0x81}, 0x800) 55.745639546s ago: executing program 6 (id=7154): syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$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") gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') syz_clone(0xb44040, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x11) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000005c0)) pwritev2(r0, &(0x7f0000000cc0)=[{&(0x7f0000000240)=';', 0xffffffbc}], 0x1, 0xfff, 0xc, 0x4) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b81000085"], &(0x7f0000000040)='syzkaller\x00', 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 55.477176868s ago: executing program 6 (id=7156): r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x67a, 0x1, 0xfffffffe, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000001c0)={{0x0, 0x0, 0x0, 0x3, 0x80003}}) 54.851231688s ago: executing program 6 (id=7170): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0xffa1, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000891}, 0x0) 54.815311681s ago: executing program 34 (id=7170): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000000c0)={'bridge0\x00', 0x0}) sendmsg$nl_route(r0, &(0x7f0000000240)={0x0, 0xffa1, &(0x7f0000000100)={&(0x7f0000000180)=@newlink={0x44, 0x10, 0x401, 0xfffffffc, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, 0x1503}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r1}, @IFLA_MASTER={0x8, 0xa, r1}]}, 0x44}, 0x1, 0x0, 0x0, 0x24000891}, 0x0) 44.360628894s ago: executing program 4 (id=7385): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000040)={r0}, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000800000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000280)={0x1, &(0x7f0000000780)=[{0x200000000006, 0xf, 0x6, 0x7ffc1ffb}]}) r2 = syz_init_net_socket$llc(0x1a, 0x802, 0x0) close(r2) (fail_nth: 6) 43.975343455s ago: executing program 4 (id=7391): r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={0x0, 0x3, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a31000000001400078005001500070000000800124000000000050005000200000005000400000000000d000300686173683a6e6574"], 0x5c}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYRES16, @ANYRESHEX=r0, @ANYRES16=r1, @ANYRES16=r0], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10) sendmmsg$inet(r3, &(0x7f00000039c0)=[{{&(0x7f0000000800)={0x2, 0x6e1a, @multicast1}, 0x10, 0x0}}], 0x1, 0x2000c044) sendto$inet(r3, &(0x7f0000000c80)="e8", 0x6200, 0x12000000, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000090601060000000000000000000000000900020073797a310000000005000100070000001c0007800c00018008000140ffffffff0c000280080001407f00"], 0x44}, 0x1, 0x0, 0x0, 0x10040047}, 0x240008c4) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff}, 0x50) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x200000000000022e, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000004000000000000000100000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000ff090000000000005509010000000000950000000000e7ffbf91000000000000b702000001000000850000008500717486e5b56f7583520000b7000000000000009900"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdd}, 0x94) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r7 = syz_genetlink_get_family_id$nfc(&(0x7f0000000080), r6) sendmsg$NFC_CMD_LLC_SET_PARAMS(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="01002cbd7000fddbdf251000000005000f00060000000600110041030000080001"], 0x2c}, 0x1, 0x0, 0x0, 0x48854}, 0x24000040) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000001e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a54000000060a0b040000000000000000020000002800048024000180090001006861736800000000140002800800074000000001080002400000000e0900010073797a3000000000090002000000000000000000140000001100010000000000000000000000000a"], 0x7c}}, 0x0) r8 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r8, 0x1, 0x41, &(0x7f0000000040)=0x654a, 0x4) bind$inet(r8, &(0x7f0000000080)={0x2, 0x400, @loopback}, 0x10) connect$inet(r8, &(0x7f0000000000)={0x2, 0xfffe, @multicast2}, 0x10) sendmmsg(r8, &(0x7f0000007fc0), 0x800001d, 0x0) 43.947068027s ago: executing program 4 (id=7393): syz_io_uring_setup(0x10d0, &(0x7f0000000340)={0x0, 0x7734, 0x18030, 0x1, 0xe9}, 0x0, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{0x30, 0x5, 0x1, 0xd98}, {0x6, 0x8, 0x7f, 0x2000002}]}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000340)={0x11, 0x3, &(0x7f0000001680)=ANY=[@ANYBLOB="1800000000030000000000000000000095"], &(0x7f0000001700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000000c0)='kmem_cache_free\x00', r1}, 0x18) sendmsg$NFT_MSG_GETSET(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000180)={0x14, 0xa, 0xa, 0x101, 0x0, 0x0, {0x0, 0x0, 0x2}}, 0x14}, 0x1, 0x0, 0x0, 0x20044001}, 0x40010) bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r2 = gettid() sendmsg$unix(0xffffffffffffffff, 0x0, 0x84) recvmsg$unix(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0xa6c3, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TIOCMIWAIT(r3, 0x545c, 0x200000000000000) timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000005c0)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000f000000c5000000a000020095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000200)='kmem_cache_free\x00', r4}, 0x10) r5 = syz_genetlink_get_family_id$tipc(&(0x7f0000001600), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f00000016c0)={0x0, 0xffa6, &(0x7f0000001680)={&(0x7f0000001640)={0x1c, r5, 0x1}, 0x1c}}, 0x0) timer_settime(0x0, 0x1, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r6 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r6, 0x29, 0x2a, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet6_MCAST_MSFILTER(r6, 0x29, 0x30, 0x0, 0x310) 43.101963215s ago: executing program 4 (id=7401): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='blkio.bfq.io_service_bytes_recursive\x00', 0x275a, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000500000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000900)={{r1}, &(0x7f00000008c0), &(0x7f0000000880)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0xc2f00, 0x4d, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000980)='mm_page_free\x00', r3}, 0x18) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x6, 0x5, &(0x7f0000000700)=ANY=[@ANYBLOB="18020000fffdffff0000000000000000850000004100000085000000d000000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r4, 0x0, 0x2100, 0x0, &(0x7f0000000100), 0x0, 0x500, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) write$bt_hci(r0, &(0x7f0000000000)=ANY=[], 0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x3, 0x28012, r0, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000340)={'syztnl0\x00', &(0x7f0000000280)={'syztnl2\x00', 0x0, 0x4, 0x0, 0x9, 0x4, 0x4, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @private0, 0x8, 0x7800, 0x1, 0x6}}) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f00000004c0)={{{@in=@multicast1, @in=@multicast2, 0x4e20, 0x0, 0x4e23, 0x0, 0x2, 0x80, 0x1d0, 0x2b, r5, 0xffffffffffffffff}, {0x5, 0xff, 0x7, 0x6a, 0x80, 0x40, 0xea0d, 0x80}, {0x0, 0x84, 0x4, 0x2bc}, 0x7, 0x6e6bc0, 0x2, 0x1, 0x70d07b9a9518ea44, 0x3}, {{@in=@dev={0xac, 0x14, 0x14, 0x22}, 0x4d3, 0x6c}, 0x2, @in=@private=0xa010102, 0x0, 0x0, 0x1, 0xd, 0x2, 0xfffffff0, 0xfff}}, 0xe8) sendmsg$DCCPDIAG_GETSOCK(r0, &(0x7f0000000440)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000400)={&(0x7f0000000a00)=ANY=[@ANYBLOB="38020000130000002abd0000000000e0ff000f014e216e22ff0100000400000002000000060000000400fe00000000000000004e5fdc0009000000", @ANYRES32=r5, @ANYBLOB="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"], 0x238}, 0x1, 0x0, 0x0, 0x880}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(&(0x7f0000000100)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b100a, 0x0) mount$bind(&(0x7f0000000680)='./file0/../file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x206d0d1, 0x0) umount2(&(0x7f0000000080)='./file0/file0\x00', 0x1) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000c40)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030010e04a0404e4b5184b2f000000000085000000b000000095"], 0x0, 0x10000003, 0x0, 0x0, 0x40f00, 0x3f, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000480)='jbd2_handle_extend\x00', r6}, 0x18) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) mlock2(&(0x7f0000ff5000/0x9000)=nil, 0x9000, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) umount2(&(0x7f00000001c0)='./file0/../file0\x00', 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000000000000000000000000000000c3a4f8ff5000000095"], &(0x7f0000000040)='GPL\x00', 0x8, 0x93, &(0x7f00000015c0)=""/147}, 0x94) 42.811363519s ago: executing program 4 (id=7407): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000140), r0) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000180)={0x14, r1, 0x2586ad4018a3b31b}, 0x14}, 0x1, 0x0, 0x100000000000000, 0x8040}, 0x0) 42.442818679s ago: executing program 4 (id=7415): r0 = socket$inet6(0xa, 0x3, 0x1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000402000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="00000000140000000000000001000000", @ANYRES32], 0xa0}, 0x4004881) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x21, 0x0) 42.434698209s ago: executing program 35 (id=7415): r0 = socket$inet6(0xa, 0x3, 0x1) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001040)=ANY=[@ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="0000000030000000000000000100000001", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000402000000", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=0x0, @ANYBLOB="00000000140000000000000001000000", @ANYRES32], 0xa0}, 0x4004881) connect$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c) sendmmsg(r0, &(0x7f0000000480), 0x21, 0x0) 13.751115071s ago: executing program 7 (id=7898): bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_create1(0x80000) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r0}, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000003c0), 0xffffffffffffffff) 13.727657523s ago: executing program 7 (id=7899): socket$netlink(0x10, 0x3, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r0, 0x2284, &(0x7f0000000080)) 13.672735868s ago: executing program 7 (id=7902): bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)=ANY=[@ANYBLOB="e80000006c00010029bd7000fcdbdf2500000000", @ANYBLOB="001000008000000008000f002000000014003500726f7365300000000000000000000000a40034801400350070696d367265673000000020000000001400350076657468305f6d614176746170000000140035006d61637674617030020000000000000014003500677265300000000000000000000000001400350076657468305f746f5f626174616476001400350001657468315f6d6163767461700000001400350067726530000000000000000000000000140035006261746164765f736c6176655f31000008000f"], 0xe8}}, 0x0) close(r0) 13.493880172s ago: executing program 7 (id=7905): syz_mount_image$ext4(&(0x7f00000002c0)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x0, &(0x7f00000012c0), 0xfe, 0x244, &(0x7f0000000400)="$eJzs3T9oJFUcB/DvzO565m6RUxtB/AMiooFwdoJNbBQCEoKIoEJExEZJhJhgl1jZWGitksomiJ3RUtIEG0WwipoiNoIGC4OFFiu7k0hMVqNu3Dkynw9MZibz3vzesPN9u83sBmisq0mmk7SSTCbpJCmON7i7Wq4e7q5PbM8nvd4TPxWDdtV+5ajflSRrSR5KslUWeamdrGw+s/fLzmP3vbncuff9zacnxnqRh/b3dh8/eG/2jY9mHlz54qsfZotMp/un6zp/xZD/tYvklv+j2HWiaNc9Av6Judc+/Lqf+1uT3DPIfydlqhfvraUbtjp54N2/6vv2j1/ePs6xAuev1+v03wPXekDjlEm6KcqpJNV2WU5NVZ/hv2ldLl9eXHp18sXF5YUX6p6pgPPSTXYf/eTSx1dO5P/7VpV/4OLq5//JuY1v+9sHrbpHA4zFHdWqn//J51bvj/xD48g/NJf8Q3PJPzSX/ENzyT80l/zDBdb5+8PyD80l/9Bc8g/NdTz/AECz9C7V/QQyUJe65x8AAAAAAAAAAAAAAAAAAOC09Ynt+aNlXDU/eyfZfyRJe1j91uD3iJMbB38v/1z0m/2hqLqN5Nm7RjzBiD6o+enrm76rt/7nd9Zbf3UhWXs9ybV2+/T9Vxzef//dzWcc7zw/YoF/qTix//BT461/0m8b9daf2Uk+7c8/14bNP2VuG6yHzz/ds79i+Uyv/DriCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABib3wMAAP//+kBtTA==") gettid() bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000640)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_open_procfs(0x0, &(0x7f0000000000)='map_files\x00') syz_clone(0xb44040, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101842, 0x11) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f00000005c0)) pwritev2(r0, &(0x7f0000000cc0)=[{&(0x7f0000000240)=';', 0xffffffbc}], 0x1, 0xfff, 0xc, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000080)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000000dd0000000000003b810000850000006d000000a50000005000000095"], &(0x7f0000000040)='syzkaller\x00', 0x7fff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$EXT4_IOC_MIGRATE(r0, 0x6609) 13.059893307s ago: executing program 7 (id=7909): bpf$PROG_LOAD(0x5, 0x0, 0x0) epoll_create1(0x80000) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r0}, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000003c0), 0xffffffffffffffff) 11.667965359s ago: executing program 7 (id=7926): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)=ANY=[@ANYBLOB="4400000001010101"], 0x44}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sys_enter\x00', r3}, 0x65) alarm(0x5) syz_genetlink_get_family_id$ipvs(&(0x7f00000014c0), r2) sendmsg$nl_xfrm(r0, &(0x7f00000035c0)={0x0, 0x0, &(0x7f0000003580)={&(0x7f0000000000)=ANY=[@ANYBLOB="80010000100001000000000000000000008cc081b7c407dbd04d6e2e000000000000002f7201e0e4860000000000000000fe8000000000000000000000000000bb0000fff7200000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="64010102000000000000000000000000000000006c000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000004000000000000000000000000000000000000000080000004000000000000000000004000000000000000000000000000000000000000000000000025bd700000000000020000010000000000000000480003006465666c61746500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000480001006d64352d67656e6572696300"/312], 0x180}}, 0x4810) 11.598329315s ago: executing program 36 (id=7926): r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_NEW(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)=ANY=[@ANYBLOB="640000000001010400000000141a000002000000240001801400018008000100e000000108000200e00000010c00028005000100000000002400028014000180080001000000000008000200ac1e00010c00028005000100000000000800074000000001"], 0x64}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000340)=ANY=[@ANYBLOB="4400000001010101"], 0x44}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sys_enter\x00', r3}, 0x65) alarm(0x5) syz_genetlink_get_family_id$ipvs(&(0x7f00000014c0), r2) sendmsg$nl_xfrm(r0, &(0x7f00000035c0)={0x0, 0x0, &(0x7f0000003580)={&(0x7f0000000000)=ANY=[@ANYBLOB="80010000100001000000000000000000008cc081b7c407dbd04d6e2e000000000000002f7201e0e4860000000000000000fe8000000000000000000000000000bb0000fff7200000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="64010102000000000000000000000000000000006c000000ac1414bb00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000300000000000000000000000000000004000000000000000000000000000000000000000080000004000000000000000000004000000000000000000000000000000000000000000000000025bd700000000000020000010000000000000000480003006465666c61746500000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000480001006d64352d67656e6572696300"/312], 0x180}}, 0x4810) 1.919479965s ago: executing program 5 (id=8082): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000400000045"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000d00)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000260018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000300000207b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000780)={&(0x7f00000007c0)='skb_copy_datagram_iovec\x00', r1}, 0x10) syz_genetlink_get_family_id$gtp(&(0x7f00000003c0), 0xffffffffffffffff) 1.880533348s ago: executing program 5 (id=8085): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) r1 = epoll_create(0x3) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000a00)) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000100)=0x100000001) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x90}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a50000000060a0b040000000000000000020000002400048020000180070001006374000014000280080002400000001108000440000008090900010073797a30000000000900020073797a32"], 0x78}}, 0x4) 1.814106144s ago: executing program 5 (id=8087): gettid() timer_create(0x0, 0x0, &(0x7f0000000380)) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x1, 0x0, 0x7, 0x6}) fcntl$lock(r0, 0x26, &(0x7f0000000140)={0x1, 0x2, 0x6, 0x5}) socket$inet6(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = socket$inet6(0x10, 0x3, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r3}, 0x10) sendto$inet6(r2, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0a80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 1.334899362s ago: executing program 0 (id=8094): r0 = socket(0x10, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={0x0, 0x3, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a31000000001400078005001500070000000800124000000000050005000200000005000400000000000d000300686173683a6e6574"], 0x5c}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYRES16, @ANYRESHEX=r0, @ANYRES16=r1, @ANYRES16=r0], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10) sendmmsg$inet(r3, &(0x7f00000039c0)=[{{&(0x7f0000000800)={0x2, 0x6e1a, @multicast1}, 0x10, 0x0}}], 0x1, 0x2000c044) sendto$inet(r3, &(0x7f0000000c80)="e8", 0x6200, 0x12000000, 0x0, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000090601060000000000000000000000000900020073797a310000000005000100070000001c0007800c00018008000140ffffffff0c000280080001407f00"], 0x44}, 0x1, 0x0, 0x0, 0x10040047}, 0x240008c4) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff}, 0x50) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x200000000000022e, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000004000000000000000100000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000ff090000000000005509010000000000950000000000e7ffbf91000000000000b702000001000000850000008500717486e5b56f7583520000b70000000000000099000000000000009aa599ee26ad6139"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdd}, 0x9c) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$nfc(&(0x7f0000000080), r6) sendmsg$NFC_CMD_LLC_SET_PARAMS(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x2c}, 0x1, 0x0, 0x0, 0x48854}, 0x24000040) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000001e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a54000000060a0b040000000000000000020000002800048024000180090001006861736800000000140002800800074000000001080002400000000e0900010073797a3000000000090002000000000000000000140000001100010000000000000000000000000a"], 0x7c}}, 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r7, 0x1, 0x41, &(0x7f0000000040)=0x654a, 0x4) bind$inet(r7, &(0x7f0000000080)={0x2, 0x400, @loopback}, 0x10) connect$inet(r7, &(0x7f0000000000)={0x2, 0xfffe, @multicast2}, 0x10) sendmmsg(r7, &(0x7f0000007fc0), 0x800001d, 0x0) 1.171865266s ago: executing program 8 (id=8095): bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, 0x0, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(0xffffffffffffffff, 0x6, 0x14, &(0x7f0000000080)=0x1, 0x4) r1 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_VERSION_NUM(r1, 0x2284, &(0x7f0000000080)) 1.150000807s ago: executing program 8 (id=8096): creat(&(0x7f00000000c0)='./file0\x00', 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00'}, 0x10) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x16, &(0x7f00000001c0)=0x7f, 0x4) close(0xffffffffffffffff) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) unshare(0x22020600) r1 = memfd_create(&(0x7f0000000000)='+\x00', 0x6) cachestat(r1, &(0x7f00000005c0), 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1000000004000000040000000100000000000000", @ANYRES32=0x1], 0x50) r2 = socket$kcm(0xa, 0x5, 0x0) r3 = socket$kcm(0x2, 0x5, 0x84) sendmsg$inet(r3, &(0x7f00000002c0)={&(0x7f0000000180)={0x2, 0x2, @dev}, 0x10, &(0x7f0000001400)=[{&(0x7f0000000080)='_', 0x1}], 0x11}, 0x64) setsockopt$sock_attach_bpf(r3, 0x84, 0x1e, &(0x7f0000000240), 0x4) r4 = socket$kcm(0xa, 0x5, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r5 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) stat(&(0x7f00000004c0)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000200)=ANY=[@ANYBLOB="140100002800010004000000fcdbdf250401f2800c00180008ac0f0000000100140001"], 0x114}, {&(0x7f00000009c0)=ANY=[@ANYBLOB="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", @ANYRES32=r6, @ANYBLOB="040094807a026c57d2654d115e528c1459241cdf02597f14d35c3655073c5f407b4160b64e80e167c709d80d9da587820eeb0f3c363a773f519c2717597d2217f73d756a1e5262327a0d6705cffb6119d2df818584899aaf8d7b874dbb99330a6d2593829a3125c105c65840af5555000d003f0026e4b56b1866ada1d6000000ae69a5084963450371edc84dc99933e5f3798214db2bbd9046f0ccf707e29850c523bbf617b1d7ef1a551fb4d16bc02c3b80b31afd787c9d7b26e5ddbb196f76b5ae845fa547821e75e7ce9e57909e40c4879551d2f2238d4b261e66380a5ae73b551539b77a6588ca710abc8bcf5659e97a7c436980198477bba636c008a123467d4ebde947f09e3e18471413aacf4976b500"], 0x2cc}], 0x2, 0x0, 0x0, 0x20000001}, 0x0) setsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in=@remote, @in6=@dev={0xfe, 0x80, '\x00', 0x1a}, 0x4e23, 0x0, 0x4e24, 0x0, 0x2, 0x80, 0x0, 0x11, 0x0, r6}, {0xe61, 0x0, 0x0, 0x8, 0xb, 0x800, 0xffd, 0xffffffffffffffff}, {0x7, 0x4, 0x7fffffffffffffff, 0x7}, 0x8000, 0x6e6bb3, 0x0, 0x0, 0x2, 0x3}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x4d3, 0x3c}, 0x2, @in6=@remote, 0x3500, 0x0, 0x0, 0x4, 0xc, 0xd0, 0x1}}, 0xe8) quotactl_fd$Q_GETNEXTQUOTA(0xffffffffffffffff, 0xffffffff80000900, r6, &(0x7f0000000100)) getgid() lchown(&(0x7f0000000040)='./file0\x00', r6, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8916, &(0x7f0000000000)={r4}) ioctl$sock_kcm_SIOCKCMCLONE(r2, 0x8936, &(0x7f0000000000)={r4}) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000040000000000000000000000000a20000000000a05000000000000000000070000010900010073797a30000000003c000000090a010400000000000000000700000008000a40000000000900020073797a31000000000900010073797a30000000000800054000000025940000000c0a01030000000000000000070000080900020073797a31000000000900010073797a30000000006800038064000080080003400000000258000b802c0001800a0001006c696d69740000001c0002800c00014000000000000000030c0002400000000000000010140001800c0001"], 0x118}}, 0xc000) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) socket(0x5, 0x5, 0x0) 992.36953ms ago: executing program 5 (id=8098): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x8, 0x1, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {0xffff, 0xffff}, {0xffff, 0x9}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0xe0000000, 0x5, 0xb7, 0x2, 0x1, 0x1, 0x4, 0x3, 0x1}}}}]}, 0x58}}, 0x4000) r4 = socket(0x10, 0x803, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r4, &(0x7f0000006040)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x81}, 0x800) 944.191304ms ago: executing program 9 (id=8099): socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001480), 0x42002, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000023896) 841.530572ms ago: executing program 0 (id=8101): syz_clone(0x80200, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000900850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TIPC_NL_KEY_SET(r2, 0x0, 0x4804) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x48) syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) bpf$PROG_LOAD(0x5, &(0x7f0000000f80)={0x20, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r3, @ANYBLOB], 0x0, 0x4, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @netfilter, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r4}, 0x10) socket$nl_route(0x10, 0x3, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000001e80)=@newtaction={0x48, 0x31, 0x1, 0xfffffffd, 0x25dfdbfb, {0x0, 0x0, 0x11}, [{0x34, 0x1, [@m_police={0x30, 0x1, 0x0, 0x0, {{0xb}, {0x4}, {0x4}, {0xc, 0x3, {0x1}}, {0xc}}}]}]}, 0x48}, 0x1, 0x0, 0x0, 0x8800}, 0x0) 792.898696ms ago: executing program 8 (id=8102): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x11, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_RATE_NEW(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)={0x14, r3, 0x1, 0x0, 0x25dfdbfb, {0x25}}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x8000) sendmsg$DEVLINK_CMD_SB_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r3, 0x1, 0x2, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xb}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0xc000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x0) 767.684598ms ago: executing program 8 (id=8103): r0 = socket(0x10, 0x3, 0x0) r1 = io_uring_setup(0x31fa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000100)={0x0, 0x3, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a31000000001400078005001500070000000800124000000000050005000200000005000400000000000d000300686173683a6e6574"], 0x5c}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYRES16=r1, @ANYRESHEX=r0, @ANYRES16=r2, @ANYRES16=r0], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10) sendmmsg$inet(r4, &(0x7f00000039c0)=[{{&(0x7f0000000800)={0x2, 0x6e1a, @multicast1}, 0x10, 0x0}}], 0x1, 0x2000c044) sendto$inet(r4, &(0x7f0000000c80)="e8", 0x6200, 0x12000000, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000090601060000000000000000000000000900020073797a310000000005000100070000001c0007800c00018008000140ffffffff0c000280080001407f00"], 0x44}, 0x1, 0x0, 0x0, 0x10040047}, 0x240008c4) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff}, 0x50) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x200000000000022e, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000004000000000000000100000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000ff090000000000005509010000000000950000000000e7ffbf91000000000000b702000001000000850000008500717486e5b56f7583520000b70000000000000099000000000000009aa599ee26ad6139"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdd}, 0x9c) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r8 = syz_genetlink_get_family_id$nfc(&(0x7f0000000080), r7) sendmsg$NFC_CMD_LLC_SET_PARAMS(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="01002cbd7000fddbdf251000000005000f00060000000600110041030000080001"], 0x2c}, 0x1, 0x0, 0x0, 0x48854}, 0x24000040) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000001e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a3200000000140000001100"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a54000000060a0b040000000000000000020000002800048024000180090001006861736800000000140002800800074000000001080002400000000e0900010073797a3000000000090002000000000000000000140000001100010000000000000000000000000a"], 0x7c}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000040)=0x654a, 0x4) bind$inet(r9, &(0x7f0000000080)={0x2, 0x400, @loopback}, 0x10) connect$inet(r9, &(0x7f0000000000)={0x2, 0xfffe, @multicast2}, 0x10) sendmmsg(r9, &(0x7f0000007fc0), 0x800001d, 0x0) 711.323273ms ago: executing program 5 (id=8104): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x109}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000240)='kfree\x00', r1}, 0x18) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) setsockopt$inet_MCAST_MSFILTER(r3, 0x0, 0x30, &(0x7f0000000940)=ANY=[@ANYBLOB="020000000000000002000000e0000002000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000500000002000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000064010102000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000e000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002"], 0x310) r4 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r4, 0x0, 0x2a, &(0x7f0000000180)={0x2, {{0x2, 0x0, @multicast2}}}, 0x88) close_range(r2, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x84aa5000) madvise(&(0x7f00000ec000/0x800000)=nil, 0x800000, 0x17) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x3) 707.116173ms ago: executing program 1 (id=8105): bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)=ANY=[@ANYBLOB="e80000006c00010029bd7000fcdbdf250000", @ANYRES32, @ANYBLOB="001000008000000008000f002000000014003500726f7365300000000000000000000000a40034801400350070696d367265673000000020000000001400350076657468305f6d614176746170000000140035006d61637674617030020000000000000014003500677265300000000000000000000000001400350076657468305f746f5f626174616476001400350001657468315f6d6163767461700000001400350067726530000000000000000000000000140035006261746164765f736c6176655f31000008000f"], 0xe8}}, 0x0) close(r0) 689.641624ms ago: executing program 0 (id=8106): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000080000000c"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002300000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) sendmsg$NFT_BATCH(r0, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f000000c280)={&(0x7f0000000380)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000050000000900010073797a300000000064000000030a017f7f00000000000000050000000900010073797a30000000000900030073797a300000000008000a400000000328000480080002400000001208000140000000000d0003"], 0xac}, 0x1, 0x0, 0x0, 0xc0c1}, 0x0) 629.564379ms ago: executing program 0 (id=8107): bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0xa, 0x4, &(0x7f0000000080)=@framed={{}, [@ldst={0x3, 0x0, 0x3, 0x1, 0x0, 0x73}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4a, '\x00', 0x0, @fallback=0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000660000000000"], 0x0, 0x7ff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x24}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x65, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_DESTROY(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000002c0)=ANY=[@ANYBLOB="28000000030605000000000000000000000000000500010007b2f5440a3354b4758f9e19882b05b346e73b3d8c49be6cde0de1cbaf04ada3824e6a4d79db245ead49a875a3786a09a44c7f1526d8bc872994f019ec14b6fb85e153f160d7d67219c321f3dd4dd7f624e4174979146303624f85c75e754f3249838604ddbfb78ad847282ae4d43192a78790e297eed9561a38e5daca6989ccac06"], 0x28}, 0x1, 0x0, 0x0, 0x4004041}, 0x20000010) 583.302343ms ago: executing program 5 (id=8108): gettid() timer_create(0x0, 0x0, &(0x7f0000000380)) r0 = socket$inet6_sctp(0xa, 0x5, 0x84) fcntl$lock(r0, 0x7, &(0x7f0000000080)={0x1, 0x0, 0x7, 0x6}) fcntl$lock(r0, 0x26, &(0x7f0000000140)={0x1, 0x2, 0x6, 0x5}) socket$inet6(0x10, 0x3, 0x0) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000080)={{r1}, &(0x7f0000000000), &(0x7f0000000040)}, 0x20) r2 = socket$inet6(0x10, 0x3, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000380)='neigh_update\x00', r3}, 0x10) sendto$inet6(r2, &(0x7f00000000c0)="900000001c001f4d154a817393278bff0a80a578020000000104740014000100ac1414bb0542d6401051a2d708f37ac8da1a297e0099c5ac0000c5b068d0bf46d323456536016466fcb78dcaaf6c3efed495a46215be0000760700c0c80cefd28581d158ba86c9d2896c6d3bca2d0000000b0015009e49a6560641263da4de1df32c1739d7fbee9aa241731ae9e0b390", 0x90, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) 430.705395ms ago: executing program 9 (id=8109): r0 = socket$inet_mptcp(0x2, 0x1, 0x106) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e24, @multicast2}, 0x10) r1 = epoll_create(0x3) ioctl$FS_IOC_GETVERSION(r1, 0x80087601, &(0x7f0000000a00)) r2 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$int_in(r2, 0x5421, &(0x7f0000000100)=0x100000001) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000010c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000001c0)={0x11, 0x10, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000800000085000000b600000095"], &(0x7f00000007c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r4, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x90}, 0x0) sendmsg$NFT_BATCH(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a50000000060a0b040000000000000000020000002400048020000180070001006374000014000280080002400000001108000440000008090900010073797a30000000000900020073797a32"], 0x78}}, 0x4) 410.249807ms ago: executing program 1 (id=8110): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000040)="dc", 0x1}], 0x8) 384.125629ms ago: executing program 1 (id=8111): r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = perf_event_open(&(0x7f0000000fc0)={0x2, 0x80, 0x82, 0x1, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x10041, 0x0, 0x3, 0x4, 0x1, 0xd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000180)='cpu>=0||!') 378.848009ms ago: executing program 9 (id=8112): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000100)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSET={0x3c, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0x2b}, @NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x64}, 0x1, 0x0, 0x0, 0x4000850}, 0x24000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="4800000010000d0428bd7000fcdbff2500008000", @ANYRES32=0x0, @ANYBLOB="1000000000000000280012800b00010062726964676500001800028005001900840000000c001e"], 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001000010425bbe5ad600027842cf52300", @ANYRES32=0x0, @ANYBLOB="0300000000000000280012800a00010076786c616e00"], 0x50}, 0x1, 0x0, 0x0, 0x13d33d22cca65c15}, 0x4008840) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000180)=@newqdisc={0x24, 0x24, 0x1, 0x70bd2a, 0x25dfdbfe, {0x0, 0x0, 0x0, 0x0, {}, {0xffff, 0xffff}, {0x5}}}, 0x24}, 0x1, 0x0, 0x0, 0x40}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 251.8677ms ago: executing program 1 (id=8113): prlimit64(0x0, 0xe, &(0x7f0000000040)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x8) r0 = getpid() sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) socketpair$unix(0x1, 0x2, 0x0, 0x0) connect$unix(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$netlink(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) process_madvise(0xffffffffffffffff, 0x0, 0x0, 0x11, 0x0) bind$unix(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_RATE_NEW(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000300)={0x14, r3, 0x1, 0x0, 0x25dfdbfb, {0x25}}, 0x14}, 0x1, 0x0, 0x0, 0x41}, 0x8000) sendmsg$DEVLINK_CMD_SB_GET(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r3, 0x1, 0x2, 0x25dfdbff, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0xb, 0xb}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x1}, 0xc000) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x0) 226.943072ms ago: executing program 1 (id=8114): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x25, 0x1, 0x0, 0x0, 0x0, 0x4, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x5, 0x8, 0x8, 0x1, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000300)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x0, 0x1}, {0xffff, 0xffff}, {0xffff, 0x9}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0xe0000000, 0x5, 0xb7, 0x2, 0x1, 0x1, 0x4, 0x3, 0x1}}}}]}, 0x58}}, 0x4000) r4 = socket(0x10, 0x803, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r4, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000000)={0x0}, 0x1, 0x0, 0x0, 0x81}, 0x800) 183.554025ms ago: executing program 0 (id=8115): chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='.\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="08000000010001009a"], 0x0) 174.935746ms ago: executing program 9 (id=8116): bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5}, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r0}, 0x18) openat$ppp(0xffffffffffffff9c, 0x0, 0xc0802, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r1) sendmsg$TIPC_CMD_ENABLE_BEARER(r1, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="010000000d0000000000010000000000000001410000001c0017"], 0x38}}, 0x0) 145.515049ms ago: executing program 9 (id=8117): r0 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x41341) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) r3 = syz_io_uring_setup(0x5f9e, &(0x7f0000000300)={0x0, 0xe5b6, 0x80, 0x3, 0x3d2}, &(0x7f0000000080), &(0x7f0000000280)) r4 = syz_open_dev$usbmon(&(0x7f0000000380), 0x0, 0x321800) io_uring_register$IORING_REGISTER_FILES_UPDATE(r3, 0x6, &(0x7f00000004c0)={0x2, 0x0, &(0x7f0000000400)=[r1, r0, r4]}, 0x3) r5 = socket$l2tp(0x2, 0x2, 0x73) ioctl$sock_SIOCDELRT(r5, 0x890c, &(0x7f0000000540)={0x0, @hci={0x1f, 0x2, 0x1}, @isdn={0x22, 0x0, 0x4, 0xa2, 0xfa}, @tipc=@id={0x1e, 0x3, 0x1, {0x4e23, 0x2}}, 0x7ff, 0x0, 0x0, 0x0, 0x8, &(0x7f0000000500)='bridge_slave_0\x00', 0x10, 0xfffffffffffffffd, 0x1}) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) bpf$TOKEN_CREATE(0x24, &(0x7f00000001c0), 0x8) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) syz_open_dev$loop(&(0x7f0000000040), 0xf000000000000000, 0x400880) r6 = socket$igmp(0x2, 0x3, 0x2) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000000080)=0x9, 0x4) setsockopt$inet_int(r6, 0x0, 0x5, &(0x7f0000000000)=0xf, 0x4) bpf$MAP_CREATE(0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="19000000040000000400000002"], 0x50) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x4800000009) 102.410402ms ago: executing program 8 (id=8118): r0 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x30, 0x30, 0x4, [@array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x4, 0x4}}, @const={0xc, 0x0, 0x0, 0xa, 0x4}, @type_tag={0xf, 0x0, 0x0, 0x12, 0x3}]}, {0x0, [0x5f, 0x61]}}, &(0x7f0000000140)=""/11, 0x4c, 0xb, 0x1, 0x2, 0x10000}, 0x28) bpf$MAP_CREATE(0x0, &(0x7f0000000300)=@base={0xb, 0x9, 0x2, 0x4, 0x605, 0xffffffffffffffff, 0x0, '\x00', 0x0, r0, 0x1, 0x2}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="18010000f1ffffff0000000000100000850000007b00000095"], &(0x7f0000000100)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000000)='kmem_cache_free\x00', r1}, 0x18) openat$ppp(0xffffffffffffff9c, 0x0, 0xc0802, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), r2) sendmsg$TIPC_CMD_ENABLE_BEARER(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000680)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000d0000000000010000000000000001410000001c0017"], 0x38}}, 0x0) 69.585325ms ago: executing program 0 (id=8119): r0 = socket(0x10, 0x3, 0x0) r1 = io_uring_setup(0x31fa, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000100)={0x0, 0x3, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="5c0000000206030000000000000000000000000005000100070000000900020073797a31000000001400078005001500070000000800124000000000050005000200000005000400000000000d000300686173683a6e6574"], 0x5c}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYRES16=r1, @ANYRESHEX=r0, @ANYRES16=r2, @ANYRES16=r0], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) r4 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r4, &(0x7f0000000240)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2d}}, 0x10) sendmmsg$inet(r4, &(0x7f00000039c0)=[{{&(0x7f0000000800)={0x2, 0x6e1a, @multicast1}, 0x10, 0x0}}], 0x1, 0x2000c044) sendto$inet(r4, &(0x7f0000000c80)="e8", 0x6200, 0x12000000, 0x0, 0x0) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000090601060000000000000000000000000900020073797a310000000005000100070000001c0007800c00018008000140ffffffff0c000280080001407f00"], 0x44}, 0x1, 0x0, 0x0, 0x10040047}, 0x240008c4) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000b80)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xffffffff}, 0x50) bpf$OBJ_PIN_PROG(0x6, &(0x7f0000000580)=@generic={&(0x7f0000000540)='./file0\x00'}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x200000000000022e, &(0x7f00000005c0)=ANY=[@ANYBLOB="1800000004000000000000000100000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000ff090000000000005509010000000000950000000000e7ffbf91000000000000b702000001000000850000008500717486e5b56f7583520000b70000000000000099000000000000009aa599ee26ad6139"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdd}, 0x9c) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000001000/0xc00000)=nil, 0xc00000, 0x0, 0x3032, 0xffffffffffffffff, 0x0) r8 = syz_genetlink_get_family_id$nfc(&(0x7f0000000080), r7) sendmsg$NFC_CMD_LLC_SET_PARAMS(r7, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000340)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="01002cbd7000fddbdf251000000005000f00060000000600110041030000080001"], 0x2c}, 0x1, 0x0, 0x0, 0x48854}, 0x24000040) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000001e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a3200000000140000001100"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a54000000060a0b040000000000000000020000002800048024000180090001006861736800000000140002800800074000000001080002400000000e0900010073797a3000000000090002000000000000000000140000001100010000000000000000000000000a"], 0x7c}}, 0x0) r9 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r9, 0x1, 0x41, &(0x7f0000000040)=0x654a, 0x4) bind$inet(r9, &(0x7f0000000080)={0x2, 0x400, @loopback}, 0x10) connect$inet(r9, &(0x7f0000000000)={0x2, 0xfffe, @multicast2}, 0x10) sendmmsg(r9, &(0x7f0000007fc0), 0x800001d, 0x0) 69.226465ms ago: executing program 1 (id=8120): socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7"], 0x0}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008"], 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000340)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001480), 0x42002, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x20000023896) 387.14µs ago: executing program 9 (id=8121): bpf$MAP_CREATE(0x0, 0x0, 0x48) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'rose0\x00', 0x112}) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000240)=ANY=[@ANYBLOB="e80000006c00010029bd7000fcdbdf25000000", @ANYRES32, @ANYBLOB="001000008000000008000f002000000014003500726f7365300000000000000000000000a40034801400350070696d367265673000000020000000001400350076657468305f6d614176746170000000140035006d61637674617030020000000000000014003500677265300000000000000000000000001400350076657468305f746f5f626174616476001400350001657468315f6d6163767461700000001400350067726530000000000000000000000000140035006261746164765f736c6176655f31000008000f"], 0xe8}}, 0x0) close(r0) 0s ago: executing program 8 (id=8122): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], &(0x7f0000000200)='GPL\x00', 0x6, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r0}, &(0x7f0000000000), &(0x7f00000005c0)=r1}, 0x20) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000200)='attr/fscreate\x00') writev(r2, &(0x7f00000000c0)=[{&(0x7f0000000040)="dc", 0x1}], 0x8) kernel console output (not intermixed with test programs): ] do_syscall_64+0xac/0x200 [ 408.215508][T22724] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 408.215575][T22724] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 408.215619][T22724] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 408.215648][T22724] RIP: 0033:0x7fc5dee4d5fc [ 408.215668][T22724] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 408.215767][T22724] RSP: 002b:00007fc5dd8af030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 408.215794][T22724] RAX: ffffffffffffffda RBX: 00007fc5df085fa0 RCX: 00007fc5dee4d5fc [ 408.215814][T22724] RDX: 000000000000000f RSI: 00007fc5dd8af0a0 RDI: 0000000000000006 [ 408.215831][T22724] RBP: 00007fc5dd8af090 R08: 0000000000000000 R09: 0000000000000000 [ 408.215850][T22724] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 408.215868][T22724] R13: 00007fc5df086038 R14: 00007fc5df085fa0 R15: 00007ffe053cf518 [ 408.215955][T22724] [ 408.439406][T22727] netlink: 12 bytes leftover after parsing attributes in process `syz.5.7384'. [ 409.056517][ T29] kauditd_printk_skb: 359 callbacks suppressed [ 409.056537][ T29] audit: type=1326 audit(1756556718.031:29698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22753 comm="syz.1.7394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f4c8334adb9 code=0x7ffc0000 [ 409.086369][ T29] audit: type=1326 audit(1756556718.031:29699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22753 comm="syz.1.7394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4c833aebe9 code=0x7ffc0000 [ 409.109984][ T29] audit: type=1326 audit(1756556718.042:29700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22753 comm="syz.1.7394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f4c833a5ba7 code=0x7ffc0000 [ 409.133610][ T29] audit: type=1326 audit(1756556718.042:29701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22753 comm="syz.1.7394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f4c8334adb9 code=0x7ffc0000 [ 409.157389][ T29] audit: type=1326 audit(1756556718.042:29702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22753 comm="syz.1.7394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4c833aebe9 code=0x7ffc0000 [ 409.181040][ T29] audit: type=1326 audit(1756556718.052:29703): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22753 comm="syz.1.7394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f4c833a5ba7 code=0x7ffc0000 [ 409.204628][ T29] audit: type=1326 audit(1756556718.052:29704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22753 comm="syz.1.7394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f4c8334adb9 code=0x7ffc0000 [ 409.228321][ T29] audit: type=1326 audit(1756556718.052:29705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22753 comm="syz.1.7394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4c833aebe9 code=0x7ffc0000 [ 409.251989][ T29] audit: type=1326 audit(1756556718.063:29706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22753 comm="syz.1.7394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f4c833a5ba7 code=0x7ffc0000 [ 409.275527][ T29] audit: type=1326 audit(1756556718.063:29707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22753 comm="syz.1.7394" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f4c8334adb9 code=0x7ffc0000 [ 409.403772][T22777] FAULT_INJECTION: forcing a failure. [ 409.403772][T22777] name failslab, interval 1, probability 0, space 0, times 0 [ 409.416520][T22777] CPU: 1 UID: 0 PID: 22777 Comm: syz.7.7398 Not tainted syzkaller #0 PREEMPT(voluntary) [ 409.416624][T22777] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 409.416637][T22777] Call Trace: [ 409.416644][T22777] [ 409.416652][T22777] __dump_stack+0x1d/0x30 [ 409.416675][T22777] dump_stack_lvl+0xe8/0x140 [ 409.416695][T22777] dump_stack+0x15/0x1b [ 409.416712][T22777] should_fail_ex+0x265/0x280 [ 409.416772][T22777] should_failslab+0x8c/0xb0 [ 409.416798][T22777] kmem_cache_alloc_noprof+0x50/0x310 [ 409.416903][T22777] ? security_inode_alloc+0x37/0x100 [ 409.416936][T22777] security_inode_alloc+0x37/0x100 [ 409.417015][T22777] inode_init_always_gfp+0x4b7/0x500 [ 409.417046][T22777] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 409.417066][T22777] alloc_inode+0x58/0x170 [ 409.417085][T22777] new_inode+0x1d/0xe0 [ 409.417132][T22777] shmem_get_inode+0x244/0x750 [ 409.417152][T22777] __shmem_file_setup+0x113/0x210 [ 409.417223][T22777] shmem_file_setup+0x3b/0x50 [ 409.417261][T22777] __se_sys_memfd_create+0x2c3/0x590 [ 409.417282][T22777] __x64_sys_memfd_create+0x31/0x40 [ 409.417360][T22777] x64_sys_call+0x2abe/0x2ff0 [ 409.417379][T22777] do_syscall_64+0xd2/0x200 [ 409.417411][T22777] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 409.417483][T22777] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 409.417508][T22777] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 409.417575][T22777] RIP: 0033:0x7f656bc4ebe9 [ 409.417666][T22777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 409.417681][T22777] RSP: 002b:00007f656a6aee18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 409.417698][T22777] RAX: ffffffffffffffda RBX: 0000000000000464 RCX: 00007f656bc4ebe9 [ 409.417709][T22777] RDX: 00007f656a6aeef0 RSI: 0000000000000000 RDI: 00007f656bcd27e8 [ 409.417719][T22777] RBP: 0000200000000f40 R08: 00007f656a6aebb7 R09: 00007f656a6aee40 [ 409.417742][T22777] R10: 000000000000000a R11: 0000000000000202 R12: 00002000000000c0 [ 409.417753][T22777] R13: 00007f656a6aeef0 R14: 00007f656a6aeeb0 R15: 0000200000000000 [ 409.417845][T22777] [ 409.781934][T22793] ipvlan2: entered promiscuous mode [ 409.788562][ T36] IPVS: starting estimator thread 0... [ 409.802944][T22793] serio: Serial port ptm0 [ 409.929491][T22795] IPVS: using max 2304 ests per chain, 115200 per kthread [ 410.070143][T22786] Set syz1 is full, maxelem 65536 reached [ 410.094573][T10269] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 410.160395][T10269] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 410.207741][T10269] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 410.291492][T10269] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 410.330029][T22842] sctp: [Deprecated]: syz.1.7426 (pid 22842) Use of struct sctp_assoc_value in delayed_ack socket option. [ 410.330029][T22842] Use struct sctp_sack_info instead [ 410.556686][T10269] bridge_slave_1: left allmulticast mode [ 410.562384][T10269] bridge_slave_1: left promiscuous mode [ 410.568268][T10269] bridge0: port 2(bridge_slave_1) entered disabled state [ 410.578600][T10269] bridge_slave_0: left allmulticast mode [ 410.584280][T10269] bridge_slave_0: left promiscuous mode [ 410.590328][T10269] bridge0: port 1(bridge_slave_0) entered disabled state [ 410.627645][T22852] FAULT_INJECTION: forcing a failure. [ 410.627645][T22852] name failslab, interval 1, probability 0, space 0, times 0 [ 410.640427][T22852] CPU: 1 UID: 0 PID: 22852 Comm: syz.7.7429 Not tainted syzkaller #0 PREEMPT(voluntary) [ 410.640454][T22852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 410.640592][T22852] Call Trace: [ 410.640601][T22852] [ 410.640609][T22852] __dump_stack+0x1d/0x30 [ 410.640630][T22852] dump_stack_lvl+0xe8/0x140 [ 410.640648][T22852] dump_stack+0x15/0x1b [ 410.640726][T22852] should_fail_ex+0x265/0x280 [ 410.640747][T22852] should_failslab+0x8c/0xb0 [ 410.640781][T22852] kmem_cache_alloc_noprof+0x50/0x310 [ 410.640892][T22852] ? skb_clone+0x151/0x1f0 [ 410.640976][T22852] skb_clone+0x151/0x1f0 [ 410.641007][T22852] __netlink_deliver_tap+0x2c9/0x500 [ 410.641042][T22852] netlink_unicast+0x66b/0x690 [ 410.641069][T22852] netlink_sendmsg+0x58b/0x6b0 [ 410.641114][T22852] ? __pfx_netlink_sendmsg+0x10/0x10 [ 410.641139][T22852] __sock_sendmsg+0x145/0x180 [ 410.641170][T22852] ____sys_sendmsg+0x31e/0x4e0 [ 410.641230][T22852] ___sys_sendmsg+0x17b/0x1d0 [ 410.641276][T22852] __x64_sys_sendmsg+0xd4/0x160 [ 410.641334][T22852] x64_sys_call+0x191e/0x2ff0 [ 410.641356][T22852] do_syscall_64+0xd2/0x200 [ 410.641394][T22852] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 410.641433][T22852] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 410.641469][T22852] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 410.641497][T22852] RIP: 0033:0x7f656bc4ebe9 [ 410.641515][T22852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 410.641560][T22852] RSP: 002b:00007f656a6af038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 410.641587][T22852] RAX: ffffffffffffffda RBX: 00007f656be85fa0 RCX: 00007f656bc4ebe9 [ 410.641601][T22852] RDX: 0000000000000000 RSI: 0000200000001200 RDI: 0000000000000008 [ 410.641613][T22852] RBP: 00007f656a6af090 R08: 0000000000000000 R09: 0000000000000000 [ 410.641625][T22852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 410.641638][T22852] R13: 00007f656be86038 R14: 00007f656be85fa0 R15: 00007ffd331a5dd8 [ 410.641750][T22852] [ 410.941594][T22855] __nla_validate_parse: 7 callbacks suppressed [ 410.941612][T22855] netlink: 16 bytes leftover after parsing attributes in process `syz.5.7431'. [ 410.983804][T22852] netlink: 28 bytes leftover after parsing attributes in process `syz.7.7429'. [ 410.992943][T22852] netem: change failed [ 411.017868][T22820] chnl_net:caif_netlink_parms(): no params data found [ 411.028429][T10269] hsr_slave_0: left promiscuous mode [ 411.035102][T10269] hsr_slave_1: left promiscuous mode [ 411.071788][T10269] team_slave_0: left promiscuous mode [ 411.077494][T10269] team_slave_1: left promiscuous mode [ 411.097058][T10269] veth1_macvtap: left promiscuous mode [ 411.104560][T10269] veth0_macvtap: left promiscuous mode [ 411.114039][T10269] veth1_vlan: left promiscuous mode [ 411.119586][T10269] veth0_vlan: left promiscuous mode [ 411.227356][T10269] team0 (unregistering): Port device team_slave_1 removed [ 411.242647][T10269] team0 (unregistering): Port device team_slave_0 removed [ 411.365149][T22820] bridge0: port 1(bridge_slave_0) entered blocking state [ 411.372303][T22820] bridge0: port 1(bridge_slave_0) entered disabled state [ 411.389814][T22820] bridge_slave_0: entered allmulticast mode [ 411.400416][T22820] bridge_slave_0: entered promiscuous mode [ 411.414891][T22820] bridge0: port 2(bridge_slave_1) entered blocking state [ 411.422196][T22820] bridge0: port 2(bridge_slave_1) entered disabled state [ 411.430069][T22820] bridge_slave_1: entered allmulticast mode [ 411.436941][T22820] bridge_slave_1: entered promiscuous mode [ 411.461836][T22820] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 411.478112][T22820] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 411.522765][T22820] team0: Port device team_slave_0 added [ 411.528972][T22878] netlink: 28 bytes leftover after parsing attributes in process `syz.1.7438'. [ 411.539509][T22820] team0: Port device team_slave_1 added [ 411.589911][T22820] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 411.596902][T22820] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 411.622873][T22820] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 411.640048][T22881] sd 0:0:1:0: device reset [ 411.646430][T22820] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 411.653456][T22820] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 411.679409][T22820] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 411.736271][T22820] hsr_slave_0: entered promiscuous mode [ 411.743519][T22820] hsr_slave_1: entered promiscuous mode [ 411.751698][T22820] debugfs: 'hsr0' already exists in 'hsr' [ 411.757500][T22820] Cannot create hsr debugfs directory [ 411.765123][T22883] netlink: 'syz.5.7440': attribute type 30 has an invalid length. [ 411.851607][T22886] netlink: 16 bytes leftover after parsing attributes in process `syz.7.7441'. [ 411.874505][T22820] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 411.895974][T22820] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 411.919981][T22820] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 411.931280][T22820] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 412.084038][T22820] 8021q: adding VLAN 0 to HW filter on device bond0 [ 412.112698][T22820] 8021q: adding VLAN 0 to HW filter on device team0 [ 412.132968][ T4122] bridge0: port 1(bridge_slave_0) entered blocking state [ 412.140105][ T4122] bridge0: port 1(bridge_slave_0) entered forwarding state [ 412.177807][ T4122] bridge0: port 2(bridge_slave_1) entered blocking state [ 412.184921][ T4122] bridge0: port 2(bridge_slave_1) entered forwarding state [ 412.337406][T22820] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 412.386505][T22924] netlink: 16 bytes leftover after parsing attributes in process `syz.1.7451'. [ 412.442655][T22928] netlink: 'syz.1.7452': attribute type 30 has an invalid length. [ 412.650847][T22820] veth0_vlan: entered promiscuous mode [ 412.675717][T22820] veth1_vlan: entered promiscuous mode [ 412.714122][T22820] veth0_macvtap: entered promiscuous mode [ 412.722522][T22820] veth1_macvtap: entered promiscuous mode [ 412.744026][T22820] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 412.777705][T22820] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 412.796670][T22943] FAULT_INJECTION: forcing a failure. [ 412.796670][T22943] name failslab, interval 1, probability 0, space 0, times 0 [ 412.809487][T22943] CPU: 1 UID: 0 PID: 22943 Comm: syz.5.7454 Not tainted syzkaller #0 PREEMPT(voluntary) [ 412.809531][T22943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 412.809548][T22943] Call Trace: [ 412.809557][T22943] [ 412.809567][T22943] __dump_stack+0x1d/0x30 [ 412.809594][T22943] dump_stack_lvl+0xe8/0x140 [ 412.809619][T22943] dump_stack+0x15/0x1b [ 412.809640][T22943] should_fail_ex+0x265/0x280 [ 412.809728][T22943] ? audit_log_d_path+0x8d/0x150 [ 412.809767][T22943] should_failslab+0x8c/0xb0 [ 412.809796][T22943] __kmalloc_cache_noprof+0x4c/0x320 [ 412.809827][T22943] audit_log_d_path+0x8d/0x150 [ 412.809863][T22943] audit_log_d_path_exe+0x42/0x70 [ 412.809975][T22943] audit_log_task+0x1e9/0x250 [ 412.810006][T22943] audit_seccomp+0x61/0x100 [ 412.810036][T22943] ? __seccomp_filter+0x68c/0x10d0 [ 412.810082][T22943] __seccomp_filter+0x69d/0x10d0 [ 412.810104][T22943] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 412.810209][T22943] ? vfs_write+0x7e8/0x960 [ 412.810308][T22943] ? __rcu_read_unlock+0x4f/0x70 [ 412.810331][T22943] ? __fget_files+0x184/0x1c0 [ 412.810364][T22943] __secure_computing+0x82/0x150 [ 412.810388][T22943] syscall_trace_enter+0xcf/0x1e0 [ 412.810437][T22943] do_syscall_64+0xac/0x200 [ 412.810469][T22943] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 412.810545][T22943] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 412.810575][T22943] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 412.810601][T22943] RIP: 0033:0x7f86e2b5d5fc [ 412.810619][T22943] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 412.810655][T22943] RSP: 002b:00007f86e15c7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 412.810679][T22943] RAX: ffffffffffffffda RBX: 00007f86e2d95fa0 RCX: 00007f86e2b5d5fc [ 412.810695][T22943] RDX: 000000000000000f RSI: 00007f86e15c70a0 RDI: 0000000000000006 [ 412.810711][T22943] RBP: 00007f86e15c7090 R08: 0000000000000000 R09: 0000000000000000 [ 412.810727][T22943] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 412.810740][T22943] R13: 00007f86e2d96038 R14: 00007f86e2d95fa0 R15: 00007ffc276b0228 [ 412.810759][T22943] [ 413.043143][ T51] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 413.068241][ T51] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 413.101974][ T51] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 413.124335][ T51] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 413.183410][T22954] FAULT_INJECTION: forcing a failure. [ 413.183410][T22954] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 413.196790][T22954] CPU: 0 UID: 0 PID: 22954 Comm: syz.7.7458 Not tainted syzkaller #0 PREEMPT(voluntary) [ 413.196821][T22954] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 413.196835][T22954] Call Trace: [ 413.196841][T22954] [ 413.196849][T22954] __dump_stack+0x1d/0x30 [ 413.196872][T22954] dump_stack_lvl+0xe8/0x140 [ 413.196926][T22954] dump_stack+0x15/0x1b [ 413.196946][T22954] should_fail_ex+0x265/0x280 [ 413.196972][T22954] should_fail_alloc_page+0xf2/0x100 [ 413.197005][T22954] __alloc_frozen_pages_noprof+0xff/0x360 [ 413.197065][T22954] alloc_pages_mpol+0xb3/0x250 [ 413.197106][T22954] vma_alloc_folio_noprof+0x1aa/0x300 [ 413.197161][T22954] handle_mm_fault+0xec2/0x2c20 [ 413.197209][T22954] do_user_addr_fault+0x636/0x1090 [ 413.197247][T22954] ? fpregs_assert_state_consistent+0xb4/0xe0 [ 413.197340][T22954] exc_page_fault+0x62/0xa0 [ 413.197437][T22954] asm_exc_page_fault+0x26/0x30 [ 413.197459][T22954] RIP: 0033:0x7f656bb10c50 [ 413.197475][T22954] Code: 39 4f 08 72 4c 8d 4d ff 85 ed 74 33 66 0f 1f 44 00 00 48 39 f0 72 1b 4d 8b 07 49 89 c1 49 29 f1 47 0f b6 0c 08 45 84 c9 74 08 <45> 88 0c 00 49 8b 47 10 48 83 c0 01 49 89 47 10 83 e9 01 73 d3 41 [ 413.197500][T22954] RSP: 002b:00007f656a6ae4a0 EFLAGS: 00010202 [ 413.197517][T22954] RAX: 0000000000011000 RBX: 00007f656a6ae540 RCX: 0000000000000011 [ 413.197530][T22954] RDX: 00000000000003a5 RSI: 00000000000007a6 RDI: 00007f656a6ae5e0 [ 413.197543][T22954] RBP: 0000000000000012 R08: 00007f656228f000 R09: 0000000000000073 [ 413.197556][T22954] R10: 00002000000007c2 R11: 0000000000000659 R12: 0000000000000601 [ 413.197569][T22954] R13: 00007f656bceda20 R14: 0000000000000015 R15: 00007f656a6ae5e0 [ 413.197588][T22954] [ 413.197603][T22954] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 413.371779][T22954] loop7: detected capacity change from 0 to 164 [ 413.380212][T22954] rock: directory entry would overflow storage [ 413.386536][T22954] rock: sig=0x66, size=4, remaining=3 [ 413.401770][T22965] FAULT_INJECTION: forcing a failure. [ 413.401770][T22965] name failslab, interval 1, probability 0, space 0, times 0 [ 413.414531][T22965] CPU: 1 UID: 0 PID: 22965 Comm: syz.0.7460 Not tainted syzkaller #0 PREEMPT(voluntary) [ 413.414605][T22965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 413.414622][T22965] Call Trace: [ 413.414629][T22965] [ 413.414638][T22965] __dump_stack+0x1d/0x30 [ 413.414659][T22965] dump_stack_lvl+0xe8/0x140 [ 413.414713][T22965] dump_stack+0x15/0x1b [ 413.414734][T22965] should_fail_ex+0x265/0x280 [ 413.414761][T22965] should_failslab+0x8c/0xb0 [ 413.414791][T22965] kmem_cache_alloc_noprof+0x50/0x310 [ 413.414863][T22965] ? getname_flags+0x80/0x3b0 [ 413.414895][T22965] ? __rcu_read_unlock+0x4f/0x70 [ 413.414985][T22965] getname_flags+0x80/0x3b0 [ 413.415051][T22965] io_symlinkat_prep+0x127/0x1d0 [ 413.415083][T22965] io_submit_sqes+0x5ec/0x1060 [ 413.415110][T22965] __se_sys_io_uring_enter+0x1c1/0x1b70 [ 413.415131][T22965] ? 0xffffffff81000000 [ 413.415150][T22965] ? __rcu_read_unlock+0x4f/0x70 [ 413.415172][T22965] ? get_pid_task+0x96/0xd0 [ 413.415198][T22965] ? proc_fail_nth_write+0x13b/0x160 [ 413.415224][T22965] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 413.415318][T22965] ? vfs_write+0x7e8/0x960 [ 413.415342][T22965] ? __rcu_read_unlock+0x4f/0x70 [ 413.415362][T22965] ? __fget_files+0x184/0x1c0 [ 413.415460][T22965] ? fput+0x8f/0xc0 [ 413.415562][T22965] __x64_sys_io_uring_enter+0x78/0x90 [ 413.415620][T22965] x64_sys_call+0x2de1/0x2ff0 [ 413.415647][T22965] do_syscall_64+0xd2/0x200 [ 413.415720][T22965] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 413.415748][T22965] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 413.415779][T22965] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 413.415907][T22965] RIP: 0033:0x7f5dc7a7ebe9 [ 413.415926][T22965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 413.415948][T22965] RSP: 002b:00007f5dc64df038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 413.415972][T22965] RAX: ffffffffffffffda RBX: 00007f5dc7cb5fa0 RCX: 00007f5dc7a7ebe9 [ 413.416105][T22965] RDX: 0000000000000000 RSI: 00000000000047ba RDI: 0000000000000003 [ 413.416121][T22965] RBP: 00007f5dc64df090 R08: 0000000000000000 R09: 0000000000000000 [ 413.416136][T22965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 413.416151][T22965] R13: 00007f5dc7cb6038 R14: 00007f5dc7cb5fa0 R15: 00007ffeeadfcef8 [ 413.416173][T22965] [ 413.844054][ T29] kauditd_printk_skb: 19723 callbacks suppressed [ 413.844073][ T29] audit: type=1326 audit(1756556723.459:49431): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22968 comm="syz.1.7462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4c833aebe9 code=0x7ffc0000 [ 413.907381][ T29] audit: type=1326 audit(1756556723.459:49432): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22968 comm="syz.1.7462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4c833aebe9 code=0x7ffc0000 [ 413.931056][ T29] audit: type=1326 audit(1756556723.459:49433): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22968 comm="syz.1.7462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=151 compat=0 ip=0x7f4c833aebe9 code=0x7ffc0000 [ 413.954793][ T29] audit: type=1326 audit(1756556723.459:49434): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22968 comm="syz.1.7462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4c833aebe9 code=0x7ffc0000 [ 413.961991][T22982] loop8: detected capacity change from 0 to 512 [ 413.978501][ T29] audit: type=1326 audit(1756556723.459:49435): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22968 comm="syz.1.7462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4c833aebe9 code=0x7ffc0000 [ 413.978537][ T29] audit: type=1326 audit(1756556723.459:49436): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22968 comm="syz.1.7462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4c833aebe9 code=0x7ffc0000 [ 413.978569][ T29] audit: type=1326 audit(1756556723.459:49437): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22968 comm="syz.1.7462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=460 compat=0 ip=0x7f4c833aebe9 code=0x7ffc0000 [ 414.055887][ T29] audit: type=1326 audit(1756556723.459:49438): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22968 comm="syz.1.7462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4c833aebe9 code=0x7ffc0000 [ 414.079618][ T29] audit: type=1326 audit(1756556723.459:49439): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22968 comm="syz.1.7462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f4c833aebe9 code=0x7ffc0000 [ 414.103336][ T29] audit: type=1326 audit(1756556723.459:49440): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22968 comm="syz.1.7462" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f4c833aebe9 code=0x7ffc0000 [ 414.150123][T22982] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 414.182439][T22982] ext4 filesystem being mounted at /1/file2 supports timestamps until 2038-01-19 (0x7fffffff) [ 414.199863][T22990] netlink: 16 bytes leftover after parsing attributes in process `syz.7.7466'. [ 414.253652][T22982] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 414.262209][T22982] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 414.495528][T23004] netlink: 'syz.0.7471': attribute type 30 has an invalid length. [ 414.695956][T23018] netlink: 'syz.5.7475': attribute type 10 has an invalid length. [ 414.707402][T23018] team0: Port device dummy0 added [ 414.785338][T23022] netlink: 'syz.5.7475': attribute type 10 has an invalid length. [ 414.797113][T23022] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 414.808013][T22820] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 414.817112][T23022] team0: Failed to send options change via netlink (err -105) [ 414.824806][T23022] team0: Failed to send port change of device dummy0 via netlink (err -105) [ 414.835244][T23022] team0: Port device dummy0 removed [ 414.847107][T23022] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 414.998345][T23030] netlink: 96 bytes leftover after parsing attributes in process `syz.0.7478'. [ 415.185641][T23026] Set syz1 is full, maxelem 65536 reached [ 415.238185][T23041] netlink: 'syz.7.7480': attribute type 3 has an invalid length. [ 415.538899][T23048] netlink: 16 bytes leftover after parsing attributes in process `syz.5.7484'. [ 415.651861][T23050] netlink: 'syz.5.7485': attribute type 30 has an invalid length. [ 415.812215][T23052] netlink: 8 bytes leftover after parsing attributes in process `syz.5.7486'. [ 415.821181][T23052] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7486'. [ 415.898825][T23064] netlink: 16 bytes leftover after parsing attributes in process `syz.5.7489'. [ 416.087961][T23083] netlink: 16 bytes leftover after parsing attributes in process `syz.0.7495'. [ 416.163736][T23089] netlink: 'syz.5.7499': attribute type 1 has an invalid length. [ 416.171751][T23089] netlink: 224 bytes leftover after parsing attributes in process `syz.5.7499'. [ 416.184828][T23090] netlink: 96 bytes leftover after parsing attributes in process `syz.8.7497'. [ 416.208649][T23089] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7499'. [ 416.217823][T23089] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7499'. [ 416.229447][T23089] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7499'. [ 416.253169][T23089] netlink: 4 bytes leftover after parsing attributes in process `syz.5.7499'. [ 416.704593][T23138] netlink: 'syz.1.7516': attribute type 30 has an invalid length. [ 416.775641][T23142] netlink: 'syz.7.7514': attribute type 3 has an invalid length. [ 416.797710][T23144] netlink: 'syz.0.7518': attribute type 30 has an invalid length. [ 416.862996][T23148] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 416.929229][T23148] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 417.743582][T23180] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 417.752229][T23180] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 418.080125][T23201] sd 0:0:1:0: device reset [ 418.224661][T23203] tipc: Can't bind to reserved service type 2 [ 418.332181][T23212] ALSA: seq fatal error: cannot create timer (-22) [ 418.345950][T23212] sctp: [Deprecated]: syz.0.7547 (pid 23212) Use of int in max_burst socket option. [ 418.345950][T23212] Use struct sctp_assoc_value instead [ 418.607346][T23228] FAULT_INJECTION: forcing a failure. [ 418.607346][T23228] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 418.620531][T23228] CPU: 0 UID: 0 PID: 23228 Comm: syz.5.7553 Not tainted syzkaller #0 PREEMPT(voluntary) [ 418.620565][T23228] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 418.620582][T23228] Call Trace: [ 418.620590][T23228] [ 418.620600][T23228] __dump_stack+0x1d/0x30 [ 418.620692][T23228] dump_stack_lvl+0xe8/0x140 [ 418.620711][T23228] dump_stack+0x15/0x1b [ 418.620865][T23228] should_fail_ex+0x265/0x280 [ 418.620891][T23228] should_fail+0xb/0x20 [ 418.620959][T23228] should_fail_usercopy+0x1a/0x20 [ 418.620981][T23228] _copy_from_user+0x1c/0xb0 [ 418.621008][T23228] ___sys_sendmsg+0xc1/0x1d0 [ 418.621054][T23228] __x64_sys_sendmsg+0xd4/0x160 [ 418.621089][T23228] x64_sys_call+0x191e/0x2ff0 [ 418.621188][T23228] do_syscall_64+0xd2/0x200 [ 418.621224][T23228] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 418.621254][T23228] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 418.621318][T23228] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 418.621345][T23228] RIP: 0033:0x7f86e2b5ebe9 [ 418.621360][T23228] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 418.621377][T23228] RSP: 002b:00007f86e15c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 418.621396][T23228] RAX: ffffffffffffffda RBX: 00007f86e2d95fa0 RCX: 00007f86e2b5ebe9 [ 418.621438][T23228] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000004 [ 418.621453][T23228] RBP: 00007f86e15c7090 R08: 0000000000000000 R09: 0000000000000000 [ 418.621464][T23228] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 418.621476][T23228] R13: 00007f86e2d96038 R14: 00007f86e2d95fa0 R15: 00007ffc276b0228 [ 418.621494][T23228] [ 418.792613][ T29] kauditd_printk_skb: 394 callbacks suppressed [ 418.792632][ T29] audit: type=1400 audit(1756556728.657:49833): avc: denied { connect } for pid=23222 comm="syz.1.7552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 418.878190][ T29] audit: type=1400 audit(1756556728.688:49834): avc: denied { append } for pid=23222 comm="syz.1.7552" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 418.901334][ T29] audit: type=1400 audit(1756556728.688:49835): avc: denied { create } for pid=23222 comm="syz.1.7552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 418.921395][ T29] audit: type=1400 audit(1756556728.688:49836): avc: denied { create } for pid=23222 comm="syz.1.7552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 418.941096][ T29] audit: type=1400 audit(1756556728.699:49837): avc: denied { bind } for pid=23222 comm="syz.1.7552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 418.960667][ T29] audit: type=1400 audit(1756556728.699:49838): avc: denied { name_bind } for pid=23222 comm="syz.1.7552" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 418.982755][ T29] audit: type=1400 audit(1756556728.699:49839): avc: denied { node_bind } for pid=23222 comm="syz.1.7552" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 419.004599][ T29] audit: type=1400 audit(1756556728.699:49840): avc: denied { listen } for pid=23222 comm="syz.1.7552" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 419.024338][ T29] audit: type=1400 audit(1756556728.699:49841): avc: denied { setopt } for pid=23222 comm="syz.1.7552" lport=33374 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 419.099772][T23235] netlink: 'syz.1.7556': attribute type 30 has an invalid length. [ 419.123004][ T29] audit: type=1400 audit(1756556728.992:49842): avc: denied { read write } for pid=22820 comm="syz-executor" name="loop8" dev="devtmpfs" ino=108 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=1 [ 419.311275][T23256] netlink: 'syz.0.7562': attribute type 4 has an invalid length. [ 419.449365][T23263] netlink: 'syz.8.7565': attribute type 30 has an invalid length. [ 419.675435][T23273] pimreg: entered allmulticast mode [ 419.721320][T23279] pimreg: left allmulticast mode [ 419.808531][T23284] loop8: detected capacity change from 0 to 128 [ 419.824990][T23284] EXT4-fs (loop8): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 419.843835][T23284] ext4 filesystem being mounted at /24/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 420.004234][T23301] loop7: detected capacity change from 0 to 128 [ 420.024939][T22820] EXT4-fs (loop8): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 420.055559][T23301] EXT4-fs (loop7): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 420.089845][T23301] ext4 filesystem being mounted at /49/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 420.194690][T23315] netlink: 'syz.0.7585': attribute type 3 has an invalid length. [ 420.203442][T22145] EXT4-fs (loop7): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 420.286752][T23319] loop7: detected capacity change from 0 to 512 [ 420.318259][T23319] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 420.341492][T23319] ext4 filesystem being mounted at /50/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 420.367683][T23319] EXT4-fs error (device loop7): ext4_do_update_inode:5653: inode #2: comm syz.7.7587: corrupted inode contents [ 420.381255][T23319] EXT4-fs error (device loop7): ext4_dirty_inode:6538: inode #2: comm syz.7.7587: mark_inode_dirty error [ 420.393196][T23319] EXT4-fs error (device loop7): ext4_do_update_inode:5653: inode #2: comm syz.7.7587: corrupted inode contents [ 420.410271][T23319] EXT4-fs error (device loop7): __ext4_ext_dirty:206: inode #2: comm syz.7.7587: mark_inode_dirty error [ 420.640773][T22145] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 420.916080][T23340] loop7: detected capacity change from 0 to 128 [ 420.950334][T23340] EXT4-fs (loop7): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 421.044494][T23340] ext4 filesystem being mounted at /51/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 421.127136][T23353] __nla_validate_parse: 24 callbacks suppressed [ 421.127157][T23353] netlink: 12 bytes leftover after parsing attributes in process `syz.8.7599'. [ 421.392685][T22145] EXT4-fs (loop7): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 421.712872][T23364] netlink: 8 bytes leftover after parsing attributes in process `syz.7.7604'. [ 421.791335][T23371] netlink: 8 bytes leftover after parsing attributes in process `syz.8.7607'. [ 421.877577][T23373] netlink: 8 bytes leftover after parsing attributes in process `syz.7.7608'. [ 421.886532][T23373] netlink: 4 bytes leftover after parsing attributes in process `syz.7.7608'. [ 422.084457][T23397] netlink: 'syz.8.7620': attribute type 13 has an invalid length. [ 422.092620][T23398] netlink: 'syz.8.7620': attribute type 13 has an invalid length. [ 422.139243][T23398] gretap0: refused to change device tx_queue_len [ 422.178254][T23398] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 422.194539][T23404] FAULT_INJECTION: forcing a failure. [ 422.194539][T23404] name failslab, interval 1, probability 0, space 0, times 0 [ 422.207425][T23404] CPU: 0 UID: 0 PID: 23404 Comm: syz.1.7623 Not tainted syzkaller #0 PREEMPT(voluntary) [ 422.207465][T23404] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 422.207482][T23404] Call Trace: [ 422.207491][T23404] [ 422.207501][T23404] __dump_stack+0x1d/0x30 [ 422.207600][T23404] dump_stack_lvl+0xe8/0x140 [ 422.207620][T23404] dump_stack+0x15/0x1b [ 422.207642][T23404] should_fail_ex+0x265/0x280 [ 422.207665][T23404] should_failslab+0x8c/0xb0 [ 422.207742][T23404] __kmalloc_noprof+0xa5/0x3e0 [ 422.207777][T23404] ? multiq_tune+0xf7/0x840 [ 422.207878][T23404] ? up_write+0x18/0x60 [ 422.207906][T23404] multiq_tune+0xf7/0x840 [ 422.207930][T23404] ? __kmalloc_noprof+0x1dd/0x3e0 [ 422.207957][T23404] ? multiq_init+0xd7/0x1a0 [ 422.207986][T23404] multiq_init+0x17c/0x1a0 [ 422.208056][T23404] ? __pfx_multiq_init+0x10/0x10 [ 422.208079][T23404] qdisc_create+0x58e/0x9e0 [ 422.208111][T23404] tc_modify_qdisc+0xf2e/0x1420 [ 422.208209][T23404] ? __pfx_tc_modify_qdisc+0x10/0x10 [ 422.208268][T23404] rtnetlink_rcv_msg+0x65a/0x6d0 [ 422.208357][T23404] netlink_rcv_skb+0x123/0x220 [ 422.208384][T23404] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 422.208425][T23404] rtnetlink_rcv+0x1c/0x30 [ 422.208459][T23404] netlink_unicast+0x5bd/0x690 [ 422.208519][T23404] netlink_sendmsg+0x58b/0x6b0 [ 422.208543][T23404] ? __pfx_netlink_sendmsg+0x10/0x10 [ 422.208571][T23404] __sock_sendmsg+0x145/0x180 [ 422.208661][T23404] ____sys_sendmsg+0x31e/0x4e0 [ 422.208691][T23404] ___sys_sendmsg+0x17b/0x1d0 [ 422.208736][T23404] __x64_sys_sendmsg+0xd4/0x160 [ 422.208804][T23404] x64_sys_call+0x191e/0x2ff0 [ 422.208830][T23404] do_syscall_64+0xd2/0x200 [ 422.208862][T23404] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 422.208885][T23404] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 422.208957][T23404] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 422.208984][T23404] RIP: 0033:0x7f4c833aebe9 [ 422.209004][T23404] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 422.209027][T23404] RSP: 002b:00007f4c81e0f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 422.209050][T23404] RAX: ffffffffffffffda RBX: 00007f4c835e5fa0 RCX: 00007f4c833aebe9 [ 422.209063][T23404] RDX: 0000000000000000 RSI: 00002000000012c0 RDI: 0000000000000003 [ 422.209157][T23404] RBP: 00007f4c81e0f090 R08: 0000000000000000 R09: 0000000000000000 [ 422.209172][T23404] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 422.209185][T23404] R13: 00007f4c835e6038 R14: 00007f4c835e5fa0 R15: 00007fffcd2fe358 [ 422.209209][T23404] [ 422.524334][T23397] gretap0: refused to change device tx_queue_len [ 422.539442][T23397] A link change request failed with some changes committed already. Interface gretap0 may have been left with an inconsistent configuration, please check. [ 422.577250][T23394] netlink: 8 bytes leftover after parsing attributes in process `syz.7.7618'. [ 422.637467][T23416] vhci_hcd: invalid port number 96 [ 422.642642][T23416] vhci_hcd: default hub control req: 0000 vfffc i0060 l0 [ 422.678144][T23427] netlink: 'syz.8.7630': attribute type 3 has an invalid length. [ 422.726396][T23433] FAULT_INJECTION: forcing a failure. [ 422.726396][T23433] name failslab, interval 1, probability 0, space 0, times 0 [ 422.739191][T23433] CPU: 0 UID: 0 PID: 23433 Comm: syz.0.7632 Not tainted syzkaller #0 PREEMPT(voluntary) [ 422.739251][T23433] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 422.739267][T23433] Call Trace: [ 422.739275][T23433] [ 422.739283][T23433] __dump_stack+0x1d/0x30 [ 422.739311][T23433] dump_stack_lvl+0xe8/0x140 [ 422.739336][T23433] dump_stack+0x15/0x1b [ 422.739355][T23433] should_fail_ex+0x265/0x280 [ 422.739408][T23433] should_failslab+0x8c/0xb0 [ 422.739476][T23433] kmem_cache_alloc_noprof+0x50/0x310 [ 422.739511][T23433] ? audit_log_start+0x365/0x6c0 [ 422.739548][T23433] audit_log_start+0x365/0x6c0 [ 422.739661][T23433] audit_seccomp+0x48/0x100 [ 422.739714][T23433] ? __seccomp_filter+0x68c/0x10d0 [ 422.739741][T23433] __seccomp_filter+0x69d/0x10d0 [ 422.739769][T23433] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 422.739888][T23433] ? vfs_write+0x7e8/0x960 [ 422.739910][T23433] ? __rcu_read_unlock+0x4f/0x70 [ 422.739936][T23433] ? __fget_files+0x184/0x1c0 [ 422.740039][T23433] __secure_computing+0x82/0x150 [ 422.740139][T23433] syscall_trace_enter+0xcf/0x1e0 [ 422.740241][T23433] do_syscall_64+0xac/0x200 [ 422.740329][T23433] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 422.740353][T23433] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 422.740420][T23433] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 422.740512][T23433] RIP: 0033:0x7f5dc7a7ebe9 [ 422.740532][T23433] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 422.740550][T23433] RSP: 002b:00007f5dc64df038 EFLAGS: 00000246 ORIG_RAX: 000000000000006a [ 422.740569][T23433] RAX: ffffffffffffffda RBX: 00007f5dc7cb5fa0 RCX: 00007f5dc7a7ebe9 [ 422.740649][T23433] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 422.740741][T23433] RBP: 00007f5dc64df090 R08: 0000000000000000 R09: 0000000000000000 [ 422.740754][T23433] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 422.740768][T23433] R13: 00007f5dc7cb6038 R14: 00007f5dc7cb5fa0 R15: 00007ffeeadfcef8 [ 422.740789][T23433] [ 422.796592][T23435] netlink: 16 bytes leftover after parsing attributes in process `syz.1.7631'. [ 423.006402][T23445] netlink: 8 bytes leftover after parsing attributes in process `syz.1.7638'. [ 423.053409][T23448] hub 9-0:1.0: USB hub found [ 423.059727][T23448] hub 9-0:1.0: 8 ports detected [ 423.094276][T23455] FAULT_INJECTION: forcing a failure. [ 423.094276][T23455] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 423.107431][T23455] CPU: 1 UID: 0 PID: 23455 Comm: syz.7.7641 Not tainted syzkaller #0 PREEMPT(voluntary) [ 423.107552][T23455] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 423.107568][T23455] Call Trace: [ 423.107576][T23455] [ 423.107585][T23455] __dump_stack+0x1d/0x30 [ 423.107638][T23455] dump_stack_lvl+0xe8/0x140 [ 423.107662][T23455] dump_stack+0x15/0x1b [ 423.107679][T23455] should_fail_ex+0x265/0x280 [ 423.107702][T23455] should_fail+0xb/0x20 [ 423.107723][T23455] should_fail_usercopy+0x1a/0x20 [ 423.107759][T23455] _copy_to_user+0x20/0xa0 [ 423.107794][T23455] simple_read_from_buffer+0xb5/0x130 [ 423.107825][T23455] proc_fail_nth_read+0x10e/0x150 [ 423.107851][T23455] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 423.107882][T23455] vfs_read+0x1a8/0x770 [ 423.107911][T23455] ? __rcu_read_unlock+0x4f/0x70 [ 423.107967][T23455] ? __fget_files+0x184/0x1c0 [ 423.107998][T23455] ksys_read+0xda/0x1a0 [ 423.108050][T23455] __x64_sys_read+0x40/0x50 [ 423.108078][T23455] x64_sys_call+0x27bc/0x2ff0 [ 423.108105][T23455] do_syscall_64+0xd2/0x200 [ 423.108246][T23455] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 423.108273][T23455] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 423.108306][T23455] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 423.108332][T23455] RIP: 0033:0x7f656bc4d5fc [ 423.108351][T23455] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 423.108399][T23455] RSP: 002b:00007f656a6af030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 423.108418][T23455] RAX: ffffffffffffffda RBX: 00007f656be85fa0 RCX: 00007f656bc4d5fc [ 423.108430][T23455] RDX: 000000000000000f RSI: 00007f656a6af0a0 RDI: 0000000000000006 [ 423.108442][T23455] RBP: 00007f656a6af090 R08: 0000000000000000 R09: 0000000000000000 [ 423.108458][T23455] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 423.108473][T23455] R13: 00007f656be86038 R14: 00007f656be85fa0 R15: 00007ffd331a5dd8 [ 423.108521][T23455] [ 423.393851][T23461] loop7: detected capacity change from 0 to 512 [ 423.596034][T23461] EXT4-fs (loop7): encrypted files will use data=ordered instead of data journaling mode [ 423.931400][T23461] EXT4-fs (loop7): 1 truncate cleaned up [ 423.938136][T23461] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 423.967691][ T29] kauditd_printk_skb: 241 callbacks suppressed [ 423.967710][ T29] audit: type=1400 audit(1756556734.085:50082): avc: denied { getattr } for pid=23475 comm="syz.1.7648" name="/" dev="secretmem" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=filesystem permissive=1 [ 423.997044][ T29] audit: type=1400 audit(1756556734.085:50083): avc: denied { execute } for pid=23475 comm="syz.1.7648" path="/338/cpuset.memory_pressure_enabled" dev="tmpfs" ino=1801 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=file permissive=1 [ 424.009055][T23461] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 424.055851][T23480] FAULT_INJECTION: forcing a failure. [ 424.055851][T23480] name failslab, interval 1, probability 0, space 0, times 0 [ 424.068681][T23480] CPU: 0 UID: 0 PID: 23480 Comm: syz.8.7650 Not tainted syzkaller #0 PREEMPT(voluntary) [ 424.068716][T23480] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 424.068733][T23480] Call Trace: [ 424.068741][T23480] [ 424.068752][T23480] __dump_stack+0x1d/0x30 [ 424.068780][T23480] dump_stack_lvl+0xe8/0x140 [ 424.068882][T23480] dump_stack+0x15/0x1b [ 424.068904][T23480] should_fail_ex+0x265/0x280 [ 424.068936][T23480] should_failslab+0x8c/0xb0 [ 424.068960][T23480] __kvmalloc_node_noprof+0x123/0x4e0 [ 424.068996][T23480] ? io_alloc_cache_init+0x31/0xa0 [ 424.069031][T23480] io_alloc_cache_init+0x31/0xa0 [ 424.069058][T23480] io_ring_ctx_alloc+0x32d/0x6a0 [ 424.069085][T23480] io_uring_create+0x10f/0x610 [ 424.069185][T23480] __se_sys_io_uring_setup+0x1f7/0x210 [ 424.069221][T23480] __x64_sys_io_uring_setup+0x31/0x40 [ 424.069243][T23480] x64_sys_call+0x2b21/0x2ff0 [ 424.069264][T23480] do_syscall_64+0xd2/0x200 [ 424.069328][T23480] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 424.069353][T23480] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 424.069383][T23480] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 424.069411][T23480] RIP: 0033:0x7f30db40ebe9 [ 424.069427][T23480] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 424.069524][T23480] RSP: 002b:00007f30d9e76fc8 EFLAGS: 00000246 ORIG_RAX: 00000000000001a9 [ 424.069559][T23480] RAX: ffffffffffffffda RBX: 00007f30db645fa0 RCX: 00007f30db40ebe9 [ 424.069575][T23480] RDX: 0000200000000400 RSI: 0000200000000440 RDI: 000000000000371d [ 424.069590][T23480] RBP: 0000200000000440 R08: 0000000000000000 R09: 0000200000000400 [ 424.069601][T23480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 424.069613][T23480] R13: 0000200000000380 R14: 000000000000371d R15: 0000200000000400 [ 424.069677][T23480] [ 424.261706][ T29] audit: type=1400 audit(1756556734.389:50084): avc: denied { name_connect } for pid=23460 comm="syz.7.7643" dest=20001 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 424.312431][T23482] netlink: 12 bytes leftover after parsing attributes in process `syz.1.7651'. [ 424.327618][ T29] audit: type=1400 audit(1756556734.452:50085): avc: denied { ioctl } for pid=23460 comm="syz.7.7643" path="socket:[93027]" dev="sockfs" ino=93027 ioctlcmd=0x89fd scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=1 [ 424.404775][T23489] tipc: Started in network mode [ 424.409812][T23489] tipc: Node identity 322a851962b8, cluster identity 4711 [ 424.417068][T23489] tipc: Enabled bearer , priority 0 [ 424.434359][T23492] netlink: 8 bytes leftover after parsing attributes in process `syz.0.7654'. [ 424.450439][T23489] syzkaller0: entered promiscuous mode [ 424.455990][T23489] syzkaller0: entered allmulticast mode [ 424.461734][ T29] audit: type=1400 audit(1756556734.589:50086): avc: denied { ioctl } for pid=23488 comm="syz.5.7655" path="socket:[93294]" dev="sockfs" ino=93294 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 424.519598][ T29] audit: type=1326 audit(1756556734.641:50087): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23498 comm="syz.7.7658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f656bc4ebe9 code=0x7ffc0000 [ 424.543344][ T29] audit: type=1326 audit(1756556734.641:50088): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23498 comm="syz.7.7658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f656bc4ebe9 code=0x7ffc0000 [ 424.566945][ T29] audit: type=1326 audit(1756556734.641:50089): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23498 comm="syz.7.7658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f656bc4ebe9 code=0x7ffc0000 [ 424.590677][ T29] audit: type=1326 audit(1756556734.641:50090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23498 comm="syz.7.7658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=313 compat=0 ip=0x7f656bc4ebe9 code=0x7ffc0000 [ 424.614379][ T29] audit: type=1326 audit(1756556734.641:50091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23498 comm="syz.7.7658" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f656bc4ebe9 code=0x7ffc0000 [ 424.647011][T23488] tipc: Resetting bearer [ 424.666271][T23488] tipc: Disabling bearer [ 424.795941][T10273] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 424.804615][T10273] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 424.832856][T10273] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 424.841215][T10273] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 424.954426][T23520] loop8: detected capacity change from 0 to 1024 [ 424.962390][T23520] ext4: Unknown parameter 'nouser_xattr' [ 425.292934][T23541] netlink: 'syz.7.7673': attribute type 3 has an invalid length. [ 425.614398][T23548] loop7: detected capacity change from 0 to 164 [ 425.654395][T23548] rock: directory entry would overflow storage [ 425.660678][T23548] rock: sig=0x66, size=4, remaining=3 [ 425.960822][T23569] netlink: 'syz.5.7685': attribute type 3 has an invalid length. [ 425.984640][T23572] loop7: detected capacity change from 0 to 2048 [ 426.016259][T23577] netlink: 'syz.0.7690': attribute type 30 has an invalid length. [ 426.039017][T23578] loop8: detected capacity change from 0 to 1024 [ 426.052327][T23580] __nla_validate_parse: 4 callbacks suppressed [ 426.052342][T23580] netlink: 8 bytes leftover after parsing attributes in process `syz.5.7691'. [ 426.101214][T23572] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000700 r/w without journal. Quota mode: none. [ 426.113912][T23578] EXT4-fs: Ignoring removed nobh option [ 426.119551][T23578] EXT4-fs: Ignoring removed bh option [ 426.153391][T23578] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=a816c018, mo2=0003] [ 426.167651][T23578] System zones: 1-12 [ 426.172247][T23578] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 426.234435][T22820] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 426.342132][T23590] netlink: 8 bytes leftover after parsing attributes in process `syz.0.7692'. [ 426.351114][T23590] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7692'. [ 426.578216][T23602] usb usb1: usbfs: process 23602 (syz.5.7697) did not claim interface 0 before use [ 426.692391][T23611] netlink: 96 bytes leftover after parsing attributes in process `syz.8.7700'. [ 426.737258][T23613] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.785068][T23613] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.835273][T23613] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.892618][T23613] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 426.893544][T22145] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000700. [ 426.961739][T23625] loop7: detected capacity change from 0 to 512 [ 426.988431][T23625] EXT4-fs: Invalid want_extra_isize 7 [ 427.090810][T23626] netlink: zone id is out of range [ 427.097531][T23626] netlink: zone id is out of range [ 427.102775][T23626] netlink: zone id is out of range [ 427.110200][T23626] netlink: zone id is out of range [ 427.118566][T23626] netlink: zone id is out of range [ 427.118869][T23628] netlink: 'syz.0.7706': attribute type 1 has an invalid length. [ 427.132731][T23628] netlink: 224 bytes leftover after parsing attributes in process `syz.0.7706'. [ 427.139229][T23626] netlink: zone id is out of range [ 427.150211][T23628] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7706'. [ 427.159553][T23628] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7706'. [ 427.169926][T23628] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7706'. [ 427.188170][T23626] netlink: zone id is out of range [ 427.193411][T23626] netlink: zone id is out of range [ 427.200985][T23626] netlink: zone id is out of range [ 427.215554][T23628] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7706'. [ 427.224536][T23628] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7706'. [ 427.228030][T23626] netlink: zone id is out of range [ 427.383045][T23637] netlink: 'syz.0.7708': attribute type 10 has an invalid length. [ 427.403272][T23637] team0: Device hsr_slave_0 failed to register rx_handler [ 427.542916][T23647] tipc: Started in network mode [ 427.547872][T23647] tipc: Node identity 9eedb77e3ff3, cluster identity 4711 [ 427.555097][T23647] tipc: Enabled bearer , priority 0 [ 427.596586][T23648] syzkaller0: entered promiscuous mode [ 427.602096][T23648] syzkaller0: entered allmulticast mode [ 427.628726][T23647] FAULT_INJECTION: forcing a failure. [ 427.628726][T23647] name failslab, interval 1, probability 0, space 0, times 0 [ 427.641423][T23647] CPU: 0 UID: 0 PID: 23647 Comm: syz.1.7713 Not tainted syzkaller #0 PREEMPT(voluntary) [ 427.641459][T23647] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 427.641541][T23647] Call Trace: [ 427.641549][T23647] [ 427.641557][T23647] __dump_stack+0x1d/0x30 [ 427.641578][T23647] dump_stack_lvl+0xe8/0x140 [ 427.641600][T23647] dump_stack+0x15/0x1b [ 427.641693][T23647] should_fail_ex+0x265/0x280 [ 427.641720][T23647] should_failslab+0x8c/0xb0 [ 427.641750][T23647] kmem_cache_alloc_node_noprof+0x57/0x320 [ 427.641825][T23647] ? __alloc_skb+0x101/0x320 [ 427.641857][T23647] __alloc_skb+0x101/0x320 [ 427.641884][T23647] inet6_rt_notify+0x8b/0x1d0 [ 427.641999][T23647] ? call_fib_notifiers+0x7e/0xa0 [ 427.642037][T23647] fib6_del+0x783/0x8b0 [ 427.642118][T23647] ? fib6_del+0x311/0x8b0 [ 427.642161][T23647] fib6_clean_node+0x167/0x280 [ 427.642185][T23647] fib6_walk_continue+0x39f/0x440 [ 427.642205][T23647] fib6_walk+0xc5/0x180 [ 427.642303][T23647] ? __pfx_fib6_ifdown+0x10/0x10 [ 427.642410][T23647] fib6_clean_all+0xca/0x140 [ 427.642452][T23647] ? __pfx_fib6_clean_node+0x10/0x10 [ 427.642625][T23647] ? __pfx_fib6_ifdown+0x10/0x10 [ 427.642649][T23647] rt6_disable_ip+0xa6/0x580 [ 427.642669][T23647] ? _raw_spin_unlock+0x26/0x50 [ 427.642686][T23647] ? finish_task_switch+0xad/0x2b0 [ 427.642754][T23647] addrconf_ifdown+0xa6/0xf30 [ 427.642791][T23647] ? tls_dev_event+0x3d7/0x910 [ 427.642858][T23647] addrconf_notify+0x222/0x930 [ 427.642939][T23647] ? __pfx_addrconf_notify+0x10/0x10 [ 427.642999][T23647] raw_notifier_call_chain+0x6c/0x1b0 [ 427.643024][T23647] ? call_netdevice_notifiers_info+0x9c/0x100 [ 427.643057][T23647] call_netdevice_notifiers_info+0xae/0x100 [ 427.643094][T23647] netif_set_mtu_ext+0x356/0x470 [ 427.643181][T23647] netif_set_mtu+0x4a/0xf0 [ 427.643203][T23647] dev_set_mtu+0xc1/0x170 [ 427.643236][T23647] dev_ifsioc+0x474/0xaa0 [ 427.643265][T23647] ? __rcu_read_unlock+0x4f/0x70 [ 427.643293][T23647] dev_ioctl+0x70a/0x960 [ 427.643323][T23647] sock_do_ioctl+0x197/0x220 [ 427.643352][T23647] sock_ioctl+0x41b/0x610 [ 427.643437][T23647] ? __pfx_sock_ioctl+0x10/0x10 [ 427.643462][T23647] __se_sys_ioctl+0xce/0x140 [ 427.643481][T23647] __x64_sys_ioctl+0x43/0x50 [ 427.643522][T23647] x64_sys_call+0x1816/0x2ff0 [ 427.643598][T23647] do_syscall_64+0xd2/0x200 [ 427.643686][T23647] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 427.643715][T23647] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 427.643744][T23647] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 427.643765][T23647] RIP: 0033:0x7f4c833aebe9 [ 427.643810][T23647] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 427.643832][T23647] RSP: 002b:00007f4c81e0f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 427.643863][T23647] RAX: ffffffffffffffda RBX: 00007f4c835e5fa0 RCX: 00007f4c833aebe9 [ 427.643879][T23647] RDX: 0000200000002280 RSI: 0000000000008922 RDI: 0000000000000005 [ 427.643895][T23647] RBP: 00007f4c81e0f090 R08: 0000000000000000 R09: 0000000000000000 [ 427.643926][T23647] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 427.643938][T23647] R13: 00007f4c835e6038 R14: 00007f4c835e5fa0 R15: 00007fffcd2fe358 [ 427.644012][T23647] [ 427.975330][T23647] tipc: Resetting bearer [ 428.007050][T23646] tipc: Resetting bearer [ 428.036257][T23646] tipc: Disabling bearer [ 428.047009][T23657] netlink: 'syz.7.7716': attribute type 1 has an invalid length. [ 428.057258][T23661] netlink: 'syz.8.7718': attribute type 1 has an invalid length. [ 428.118266][T10273] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 428.136048][ T4122] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 428.159230][ T4122] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 428.368896][T23687] IPv6: NLM_F_CREATE should be specified when creating new route [ 428.369544][ T4122] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 428.441414][T23693] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 428.450182][T23693] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 428.550829][T23705] netlink: 'syz.0.7731': attribute type 1 has an invalid length. [ 428.587338][T23708] xt_limit: Overflow, try lower: 271964/0 [ 428.643830][T23712] hub 9-0:1.0: USB hub found [ 428.671095][T23712] hub 9-0:1.0: 8 ports detected [ 428.738573][T23716] hub 9-0:1.0: USB hub found [ 428.749854][T23716] hub 9-0:1.0: 8 ports detected [ 428.938218][ T29] kauditd_printk_skb: 350 callbacks suppressed [ 428.938271][ T29] audit: type=1400 audit(1756556739.292:50442): avc: denied { write } for pid=23727 comm="syz.7.7738" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 428.967973][ T29] audit: type=1400 audit(1756556739.292:50443): avc: denied { open } for pid=23727 comm="syz.7.7738" path="/dev/snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 428.992161][T23728] random: crng reseeded on system resumption [ 429.020070][T23728] SELinux: Context system_u:object_r:scanner_device_t:s0 is not valid (left unmapped). [ 429.030159][ T29] audit: type=1400 audit(1756556739.397:50444): avc: denied { relabelto } for pid=23727 comm="syz.7.7738" name="file1" dev="tmpfs" ino=450 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="system_u:object_r:scanner_device_t:s0" [ 429.062905][ T29] audit: type=1400 audit(1756556739.397:50445): avc: denied { associate } for pid=23727 comm="syz.7.7738" name="file1" dev="tmpfs" ino=450 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon="system_u:object_r:scanner_device_t:s0" [ 429.141912][ T29] audit: type=1400 audit(1756556739.471:50446): avc: denied { validate_trans } for pid=23727 comm="syz.7.7738" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 429.158999][T23740] loop7: detected capacity change from 0 to 1024 [ 429.181714][T23740] EXT4-fs: Ignoring removed nobh option [ 429.187405][T23740] EXT4-fs: Ignoring removed bh option [ 429.220343][T23740] [EXT4 FS bs=1024, gc=1, bpg=131072, ipg=32, mo=a816c018, mo2=0003] [ 429.229093][T23740] System zones: 1-12 [ 429.233720][T23740] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 429.364459][T22145] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 429.395725][T23749] netlink: 'syz.5.7743': attribute type 1 has an invalid length. [ 429.438784][T23750] team0: Device gtp0 is of different type [ 429.446211][ T29] audit: type=1400 audit(1756556739.817:50447): avc: denied { write } for pid=23746 comm="syz.8.7742" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 429.650748][T23759] FAULT_INJECTION: forcing a failure. [ 429.650748][T23759] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 429.663952][T23759] CPU: 0 UID: 0 PID: 23759 Comm: syz.0.7745 Not tainted syzkaller #0 PREEMPT(voluntary) [ 429.663981][T23759] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 429.663993][T23759] Call Trace: [ 429.664000][T23759] [ 429.664011][T23759] __dump_stack+0x1d/0x30 [ 429.664096][T23759] dump_stack_lvl+0xe8/0x140 [ 429.664115][T23759] dump_stack+0x15/0x1b [ 429.664131][T23759] should_fail_ex+0x265/0x280 [ 429.664151][T23759] should_fail+0xb/0x20 [ 429.664171][T23759] should_fail_usercopy+0x1a/0x20 [ 429.664230][T23759] _copy_from_iter+0xd2/0xe80 [ 429.664359][T23759] ? __build_skb_around+0x1a0/0x200 [ 429.664433][T23759] ? __alloc_skb+0x223/0x320 [ 429.664461][T23759] netlink_sendmsg+0x471/0x6b0 [ 429.664495][T23759] ? __pfx_netlink_sendmsg+0x10/0x10 [ 429.664522][T23759] __sock_sendmsg+0x145/0x180 [ 429.664585][T23759] ____sys_sendmsg+0x31e/0x4e0 [ 429.664612][T23759] ___sys_sendmsg+0x17b/0x1d0 [ 429.664650][T23759] __x64_sys_sendmsg+0xd4/0x160 [ 429.664683][T23759] x64_sys_call+0x191e/0x2ff0 [ 429.664703][T23759] do_syscall_64+0xd2/0x200 [ 429.664776][T23759] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 429.664806][T23759] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 429.664839][T23759] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 429.664938][T23759] RIP: 0033:0x7f5dc7a7ebe9 [ 429.664955][T23759] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 429.664972][T23759] RSP: 002b:00007f5dc64df038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 429.664990][T23759] RAX: ffffffffffffffda RBX: 00007f5dc7cb5fa0 RCX: 00007f5dc7a7ebe9 [ 429.665020][T23759] RDX: 0000000000000000 RSI: 0000200000000240 RDI: 0000000000000005 [ 429.665034][T23759] RBP: 00007f5dc64df090 R08: 0000000000000000 R09: 0000000000000000 [ 429.665073][T23759] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 429.665089][T23759] R13: 00007f5dc7cb6038 R14: 00007f5dc7cb5fa0 R15: 00007ffeeadfcef8 [ 429.665113][T23759] [ 429.963119][ T29] audit: type=1326 audit(1756556740.374:50448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23761 comm="syz.7.7746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f656bc4ebe9 code=0x7ffc0000 [ 429.986870][ T29] audit: type=1326 audit(1756556740.374:50449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23761 comm="syz.7.7746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f656bc4ebe9 code=0x7ffc0000 [ 430.010672][ T29] audit: type=1326 audit(1756556740.374:50450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23761 comm="syz.7.7746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f656bc4ebe9 code=0x7ffc0000 [ 430.034443][ T29] audit: type=1326 audit(1756556740.374:50451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23761 comm="syz.7.7746" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f656bc4ebe9 code=0x7ffc0000 [ 430.076302][T23765] 9p: Unknown access argument cliŽýÅrµûent: -22 [ 430.118501][T23766] 9pnet_fd: Insufficient options for proto=fd [ 430.152815][T23774] FAULT_INJECTION: forcing a failure. [ 430.152815][T23774] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 430.166672][T23774] CPU: 1 UID: 0 PID: 23774 Comm: syz.1.7750 Not tainted syzkaller #0 PREEMPT(voluntary) [ 430.166782][T23774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 430.166799][T23774] Call Trace: [ 430.166807][T23774] [ 430.166816][T23774] __dump_stack+0x1d/0x30 [ 430.166979][T23774] dump_stack_lvl+0xe8/0x140 [ 430.167004][T23774] dump_stack+0x15/0x1b [ 430.167020][T23774] should_fail_ex+0x265/0x280 [ 430.167041][T23774] should_fail+0xb/0x20 [ 430.167062][T23774] should_fail_usercopy+0x1a/0x20 [ 430.167147][T23774] _copy_to_user+0x20/0xa0 [ 430.167175][T23774] simple_read_from_buffer+0xb5/0x130 [ 430.167197][T23774] proc_fail_nth_read+0x10e/0x150 [ 430.167253][T23774] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 430.167283][T23774] vfs_read+0x1a8/0x770 [ 430.167307][T23774] ? __rcu_read_unlock+0x4f/0x70 [ 430.167366][T23774] ? __fget_files+0x184/0x1c0 [ 430.167437][T23774] ksys_read+0xda/0x1a0 [ 430.167461][T23774] __x64_sys_read+0x40/0x50 [ 430.167482][T23774] x64_sys_call+0x27bc/0x2ff0 [ 430.167552][T23774] do_syscall_64+0xd2/0x200 [ 430.167580][T23774] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 430.167610][T23774] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 430.167721][T23774] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 430.167793][T23774] RIP: 0033:0x7f4c833ad5fc [ 430.167812][T23774] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 430.167835][T23774] RSP: 002b:00007f4c81e0f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 430.167903][T23774] RAX: ffffffffffffffda RBX: 00007f4c835e5fa0 RCX: 00007f4c833ad5fc [ 430.167920][T23774] RDX: 000000000000000f RSI: 00007f4c81e0f0a0 RDI: 0000000000000006 [ 430.167936][T23774] RBP: 00007f4c81e0f090 R08: 0000000000000000 R09: 0000000000000000 [ 430.167951][T23774] R10: 0000000000000072 R11: 0000000000000246 R12: 0000000000000001 [ 430.167963][T23774] R13: 00007f4c835e6038 R14: 00007f4c835e5fa0 R15: 00007fffcd2fe358 [ 430.167982][T23774] [ 430.546212][T23779] sd 0:0:1:0: device reset [ 430.631951][T23791] loop8: detected capacity change from 0 to 128 [ 430.660902][T23791] EXT4-fs (loop8): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 430.700610][T23799] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 430.701267][T23800] ªªªªªª: renamed from vlan0 [ 430.709124][T23799] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 430.716818][T23791] ext4 filesystem being mounted at /63/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 430.773457][T23803] bridge_slave_1: left allmulticast mode [ 430.779265][T23803] bridge_slave_1: left promiscuous mode [ 430.784990][T23803] bridge0: port 2(bridge_slave_1) entered disabled state [ 430.816181][T23806] netlink: 'syz.1.7759': attribute type 1 has an invalid length. [ 430.824129][T23806] __nla_validate_parse: 54 callbacks suppressed [ 430.824222][T23806] netlink: 224 bytes leftover after parsing attributes in process `syz.1.7759'. [ 430.840903][T23803] bridge_slave_0: left allmulticast mode [ 430.846615][T23803] bridge_slave_0: left promiscuous mode [ 430.852621][T23803] bridge0: port 1(bridge_slave_0) entered disabled state [ 430.860825][T23806] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7759'. [ 430.869844][T23806] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7759'. [ 430.882703][T23806] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7759'. [ 430.918661][T22820] EXT4-fs (loop8): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 430.941090][T23806] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7759'. [ 430.950026][T23806] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7759'. [ 430.959628][T23806] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7759'. [ 430.969355][T23812] loop7: detected capacity change from 0 to 1024 [ 430.992587][T23812] EXT4-fs error (device loop7): ext4_acquire_dquot:6937: comm syz.7.7758: Failed to acquire dquot type 0 [ 431.020372][T23812] EXT4-fs error (device loop7): mb_free_blocks:2017: group 0, inode 13: block 144:freeing already freed block (bit 9); block bitmap corrupt. [ 431.038076][T23806] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7759'. [ 431.047109][T23806] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7759'. [ 431.056416][T23806] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7759'. [ 431.065960][T23812] EXT4-fs error (device loop7): ext4_do_update_inode:5653: inode #13: comm syz.7.7758: corrupted inode contents [ 431.088429][T23812] EXT4-fs error (device loop7): ext4_dirty_inode:6538: inode #13: comm syz.7.7758: mark_inode_dirty error [ 431.108029][T23812] EXT4-fs error (device loop7): ext4_do_update_inode:5653: inode #13: comm syz.7.7758: corrupted inode contents [ 431.127031][T23812] EXT4-fs error (device loop7): __ext4_ext_dirty:206: inode #13: comm syz.7.7758: mark_inode_dirty error [ 431.142766][T23812] EXT4-fs error (device loop7): ext4_do_update_inode:5653: inode #13: comm syz.7.7758: corrupted inode contents [ 431.157324][T23812] EXT4-fs error (device loop7) in ext4_orphan_del:305: Corrupt filesystem [ 431.168251][T23812] EXT4-fs error (device loop7): ext4_do_update_inode:5653: inode #13: comm syz.7.7758: corrupted inode contents [ 431.169411][T23832] sd 0:0:1:0: device reset [ 431.184817][T23812] EXT4-fs error (device loop7): ext4_truncate:4666: inode #13: comm syz.7.7758: mark_inode_dirty error [ 431.203653][T23812] EXT4-fs error (device loop7) in ext4_process_orphan:347: Corrupt filesystem [ 431.218451][T23812] EXT4-fs (loop7): 1 truncate cleaned up [ 431.226586][T23812] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 431.248749][T23834] loop8: detected capacity change from 0 to 512 [ 431.258174][T23834] EXT4-fs (loop8): encrypted files will use data=ordered instead of data journaling mode [ 431.269539][T23803] EXT4-fs (loop7): re-mounted 00000000-0000-0000-0000-000000000000 ro. [ 431.281518][T23803] SELinux: Context #! ./cgroup/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa [ 431.284695][T23834] EXT4-fs error (device loop8): ext4_free_branches:1023: inode #16: comm syz.8.7767: invalid indirect mapped block 4294967295 (level 0) [ 431.399422][T23834] EXT4-fs error (device loop8): ext4_free_branches:1023: inode #16: comm syz.8.7767: invalid indirect mapped block 4294967295 (level 1) [ 431.421233][T22145] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 431.431961][T23834] EXT4-fs (loop8): 1 orphan inode deleted [ 431.438000][T23834] EXT4-fs (loop8): 1 truncate cleaned up [ 431.445951][T23834] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 431.494857][T23834] EXT4-fs error (device loop8): ext4_lookup:1787: inode #15: comm syz.8.7767: iget: bad extra_isize 46 (inode size 256) [ 431.498900][T23846] loop7: detected capacity change from 0 to 128 [ 431.522242][T23846] EXT4-fs (loop7): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 431.536078][T23846] ext4 filesystem being mounted at /86/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 431.577197][T22820] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 431.694012][T23853] hub 9-0:1.0: USB hub found [ 431.699004][T23853] hub 9-0:1.0: 8 ports detected [ 431.736509][T22145] EXT4-fs (loop7): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 431.795945][T23856] netlink: 'syz.8.7775': attribute type 1 has an invalid length. [ 431.878728][T23869] sd 0:0:1:0: device reset [ 431.879560][T23866] loop7: detected capacity change from 0 to 512 [ 431.929446][T23866] EXT4-fs (loop7): failed to open journal device unknown-block(0,0) -6 [ 431.972582][T23881] loop8: detected capacity change from 0 to 128 [ 431.980262][T23881] /dev/loop8: Can't open blockdev [ 432.139948][T23896] loop7: detected capacity change from 0 to 2048 [ 432.243148][T23901] hub 9-0:1.0: USB hub found [ 432.253094][T23901] hub 9-0:1.0: 8 ports detected [ 432.287365][T23896] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000900 r/w without journal. Quota mode: writeback. [ 432.345227][T23904] sd 0:0:1:0: device reset [ 432.427139][T22145] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000900. [ 432.436473][T23908] FAULT_INJECTION: forcing a failure. [ 432.436473][T23908] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 432.449652][T23908] CPU: 0 UID: 0 PID: 23908 Comm: syz.8.7792 Not tainted syzkaller #0 PREEMPT(voluntary) [ 432.449686][T23908] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 432.449703][T23908] Call Trace: [ 432.449745][T23908] [ 432.449794][T23908] __dump_stack+0x1d/0x30 [ 432.449816][T23908] dump_stack_lvl+0xe8/0x140 [ 432.449912][T23908] dump_stack+0x15/0x1b [ 432.449933][T23908] should_fail_ex+0x265/0x280 [ 432.449954][T23908] should_fail+0xb/0x20 [ 432.449975][T23908] should_fail_usercopy+0x1a/0x20 [ 432.450003][T23908] _copy_from_user+0x1c/0xb0 [ 432.450055][T23908] __ia32_sys_rt_sigreturn+0x128/0x350 [ 432.450086][T23908] x64_sys_call+0x2d3c/0x2ff0 [ 432.450110][T23908] do_syscall_64+0xd2/0x200 [ 432.450184][T23908] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 432.450208][T23908] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 432.450239][T23908] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 432.450312][T23908] RIP: 0033:0x7f30db3aadb9 [ 432.450329][T23908] Code: 64 c7 00 16 00 00 00 b8 ff ff ff ff c3 0f 1f 40 00 90 66 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 c7 c0 0f 00 00 00 0f 05 <0f> 1f 80 00 00 00 00 48 81 ec 48 01 00 00 49 89 d0 64 48 8b 04 25 [ 432.450347][T23908] RSP: 002b:00007f30d9e76a80 EFLAGS: 00000202 ORIG_RAX: 000000000000000f [ 432.450367][T23908] RAX: ffffffffffffffda RBX: 00007f30db645fa0 RCX: 00007f30db3aadb9 [ 432.450380][T23908] RDX: 00007f30d9e76a80 RSI: 00007f30d9e76bb0 RDI: 0000000000000021 [ 432.450425][T23908] RBP: 00007f30d9e77090 R08: 0000000000000000 R09: 0000000000000000 [ 432.450438][T23908] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000000000001 [ 432.450450][T23908] R13: 00007f30db646038 R14: 00007f30db645fa0 R15: 00007fff6d89d948 [ 432.450470][T23908] [ 432.633993][T23914] netlink: 'syz.5.7791': attribute type 1 has an invalid length. [ 432.668446][T23919] loop7: detected capacity change from 0 to 2048 [ 432.709218][T23928] loop8: detected capacity change from 0 to 128 [ 432.717402][T23919] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000900 r/w without journal. Quota mode: writeback. [ 432.732341][T23928] EXT4-fs (loop8): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 432.744668][T23928] ext4 filesystem being mounted at /76/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 432.761200][T23932] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 432.781911][T22820] EXT4-fs (loop8): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 432.807967][T23932] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 432.848780][T23933] EXT4-fs error (device loop7): ext4_mb_generate_buddy:1289: group 0, block bitmap and bg descriptor inconsistent: 25 vs 150994969 free clusters [ 432.865480][T23933] EXT4-fs (loop7): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 1434 with error 28 [ 432.877995][T23933] EXT4-fs (loop7): This should not happen!! Data will be lost [ 432.877995][T23933] [ 432.884720][T23938] loop8: detected capacity change from 0 to 512 [ 432.887757][T23933] EXT4-fs (loop7): Total free blocks count 0 [ 432.900096][T23933] EXT4-fs (loop7): Free/Dirty block details [ 432.906207][T23933] EXT4-fs (loop7): free_blocks=2415919104 [ 432.912032][T23933] EXT4-fs (loop7): dirty_blocks=1440 [ 432.917346][T23933] EXT4-fs (loop7): Block reservation details [ 432.923369][T23933] EXT4-fs (loop7): i_reserved_data_blocks=90 [ 432.923831][T23938] EXT4-fs: test_dummy_encryption option not supported [ 432.937114][T23932] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 432.963518][T23938] loop8: detected capacity change from 0 to 512 [ 432.976518][T23938] EXT4-fs: Ignoring removed orlov option [ 432.986411][T23932] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 432.994802][T23938] EXT4-fs (loop8): mounting ext3 file system using the ext4 subsystem [ 433.005274][T23938] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=8042c119, mo2=0002] [ 433.013539][T23938] EXT4-fs error (device loop8): ext4_iget_extra_inode:5104: inode #15: comm syz.8.7798: corrupted in-inode xattr: e_value size too large [ 433.029273][T23938] EXT4-fs error (device loop8): ext4_orphan_get:1397: comm syz.8.7798: couldn't read orphan inode 15 (err -117) [ 433.042536][T23938] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 433.080519][T10269] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 433.090583][T10269] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 433.103879][T23938] EXT4-fs error (device loop8): ext4_iget_extra_inode:5104: inode #15: comm syz.8.7798: corrupted in-inode xattr: e_value size too large [ 433.120452][T10269] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 433.140442][T23947] hub 9-0:1.0: USB hub found [ 433.145221][T10269] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 433.155016][T23947] hub 9-0:1.0: 8 ports detected [ 433.179900][T22820] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 433.367083][T23959] netlink: 'syz.8.7806': attribute type 3 has an invalid length. [ 433.384527][T23967] netlink: 'syz.5.7807': attribute type 1 has an invalid length. [ 433.484062][T23982] hub 9-0:1.0: USB hub found [ 433.509665][ T4122] EXT4-fs (loop7): Delayed block allocation failed for inode 18 at logical offset 0 with max blocks 2 with error 28 [ 433.512616][T23982] hub 9-0:1.0: 8 ports detected [ 433.527635][T23985] netlink: 'syz.0.7814': attribute type 30 has an invalid length. [ 433.627263][T23990] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(3) [ 433.633826][T23990] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 433.641548][T23990] vhci_hcd vhci_hcd.0: Device attached [ 433.765307][T24007] loop8: detected capacity change from 0 to 128 [ 433.817337][ T3379] vhci_hcd: vhci_device speed not set [ 433.827182][T23991] vhci_hcd: connection closed [ 433.859650][T10273] vhci_hcd: stop threads [ 433.868751][T10273] vhci_hcd: release socket [ 433.873250][T10273] vhci_hcd: disconnect device [ 433.883542][ T3379] usb 15-1: new full-speed USB device number 2 using vhci_hcd [ 433.922526][ T3379] usb 15-1: enqueue for inactive port 0 [ 433.928944][T24009] netlink: 'syz.5.7819': attribute type 3 has an invalid length. [ 433.951584][ T3379] usb 15-1: enqueue for inactive port 0 [ 433.957205][ T3379] usb 15-1: enqueue for inactive port 0 [ 434.082159][ T3379] vhci_hcd: vhci_device speed not set [ 434.122103][T24007] EXT4-fs (loop8): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 434.131938][T24014] FAULT_INJECTION: forcing a failure. [ 434.131938][T24014] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 434.147266][T24014] CPU: 1 UID: 0 PID: 24014 Comm: syz.0.7823 Not tainted syzkaller #0 PREEMPT(voluntary) [ 434.147301][T24014] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 434.147328][T24014] Call Trace: [ 434.147337][T24014] [ 434.147347][T24014] __dump_stack+0x1d/0x30 [ 434.147369][T24014] dump_stack_lvl+0xe8/0x140 [ 434.147388][T24014] dump_stack+0x15/0x1b [ 434.147403][T24014] should_fail_ex+0x265/0x280 [ 434.147424][T24014] should_fail+0xb/0x20 [ 434.147453][T24014] should_fail_usercopy+0x1a/0x20 [ 434.147475][T24014] _copy_from_user+0x1c/0xb0 [ 434.147505][T24014] kstrtouint_from_user+0x69/0xf0 [ 434.147535][T24014] ? 0xffffffff81000000 [ 434.147558][T24014] ? selinux_file_permission+0x1e4/0x320 [ 434.147588][T24014] proc_fail_nth_write+0x50/0x160 [ 434.147622][T24014] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 434.147702][T24014] vfs_write+0x269/0x960 [ 434.147795][T24014] ? vfs_read+0x4e6/0x770 [ 434.147820][T24014] ? __rcu_read_unlock+0x4f/0x70 [ 434.147847][T24014] ? __fget_files+0x184/0x1c0 [ 434.147881][T24014] ksys_write+0xda/0x1a0 [ 434.147908][T24014] __x64_sys_write+0x40/0x50 [ 434.148011][T24014] x64_sys_call+0x27fe/0x2ff0 [ 434.148043][T24014] do_syscall_64+0xd2/0x200 [ 434.148071][T24014] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 434.148112][T24014] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 434.148145][T24014] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 434.148171][T24014] RIP: 0033:0x7f5dc7a7d69f [ 434.148190][T24014] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 434.148255][T24014] RSP: 002b:00007f5dc64df030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 434.148277][T24014] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f5dc7a7d69f [ 434.148294][T24014] RDX: 0000000000000001 RSI: 00007f5dc64df0a0 RDI: 0000000000000007 [ 434.148309][T24014] RBP: 00007f5dc64df090 R08: 0000000000000000 R09: 0000000000000000 [ 434.148325][T24014] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 434.148339][T24014] R13: 00007f5dc7cb6038 R14: 00007f5dc7cb5fa0 R15: 00007ffeeadfcef8 [ 434.148358][T24014] [ 434.379170][T24007] ext4 filesystem being mounted at /84/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 434.502518][T24015] netlink: 'syz.5.7822': attribute type 1 has an invalid length. [ 434.534427][ T29] kauditd_printk_skb: 104 callbacks suppressed [ 434.534447][ T29] audit: type=1326 audit(1756556745.172:50554): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24019 comm="syz.0.7825" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dc7a7ebe9 code=0x7ffc0000 [ 434.564298][ T29] audit: type=1326 audit(1756556745.172:50555): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24019 comm="syz.0.7825" exe="/root/syz-executor" sig=0 arch=c000003e syscall=199 compat=0 ip=0x7f5dc7a7ebe9 code=0x7ffc0000 [ 434.588069][ T29] audit: type=1326 audit(1756556745.172:50556): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24019 comm="syz.0.7825" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dc7a7ebe9 code=0x7ffc0000 [ 434.612242][ T29] audit: type=1326 audit(1756556745.172:50557): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24019 comm="syz.0.7825" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5dc7a7ebe9 code=0x7ffc0000 [ 434.635858][ T29] audit: type=1326 audit(1756556745.172:50558): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24019 comm="syz.0.7825" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dc7a7ebe9 code=0x7ffc0000 [ 434.659537][ T29] audit: type=1326 audit(1756556745.172:50559): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24019 comm="syz.0.7825" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5dc7a7ebe9 code=0x7ffc0000 [ 434.683268][ T29] audit: type=1326 audit(1756556745.172:50560): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24019 comm="syz.0.7825" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dc7a7ebe9 code=0x7ffc0000 [ 434.706876][ T29] audit: type=1326 audit(1756556745.172:50561): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24019 comm="syz.0.7825" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5dc7a7ebe9 code=0x7ffc0000 [ 434.730502][ T29] audit: type=1326 audit(1756556745.172:50562): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24019 comm="syz.0.7825" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dc7a7ebe9 code=0x7ffc0000 [ 434.754293][ T29] audit: type=1326 audit(1756556745.172:50563): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24019 comm="syz.0.7825" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f5dc7a7ebe9 code=0x7ffc0000 [ 434.795005][T22820] EXT4-fs (loop8): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 434.889554][T24029] syzkaller0: entered promiscuous mode [ 434.895242][T24029] syzkaller0: entered allmulticast mode [ 434.924088][T24033] hub 9-0:1.0: USB hub found [ 434.928784][T24033] hub 9-0:1.0: 8 ports detected [ 434.933957][T24031] netlink: 'syz.5.7828': attribute type 30 has an invalid length. [ 434.994466][T24035] netlink: 'syz.7.7829': attribute type 30 has an invalid length. [ 435.206810][T24040] netlink: 'syz.8.7832': attribute type 3 has an invalid length. [ 435.749983][T24066] 9p: Unknown access argument cliŽýÅrµûent: -22 [ 435.758887][T24071] sd 0:0:1:0: device reset [ 435.827987][T24077] __nla_validate_parse: 50 callbacks suppressed [ 435.828003][T24077] netlink: 16 bytes leftover after parsing attributes in process `syz.0.7844'. [ 435.859934][T24074] hub 9-0:1.0: USB hub found [ 435.927853][T24074] hub 9-0:1.0: 8 ports detected [ 435.956177][T24084] netlink: 12 bytes leftover after parsing attributes in process `syz.0.7846'. [ 436.128844][T24087] netlink: 'syz.1.7849': attribute type 3 has an invalid length. [ 436.264963][T24046] net_ratelimit: 74 callbacks suppressed [ 436.264982][T24046] Set syz1 is full, maxelem 65536 reached [ 436.343612][T24092] loop7: detected capacity change from 0 to 128 [ 436.379940][T24092] EXT4-fs (loop7): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 436.399371][T24096] 9pnet_fd: Insufficient options for proto=fd [ 436.427392][T24092] ext4 filesystem being mounted at /98/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 436.504989][T24105] sd 0:0:1:0: device reset [ 436.521275][T22145] EXT4-fs (loop7): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 436.555313][T24107] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 436.609055][T24113] netlink: 16 bytes leftover after parsing attributes in process `syz.7.7857'. [ 436.661492][T24117] sd 0:0:1:0: device reset [ 436.745240][T24118] netlink: 48 bytes leftover after parsing attributes in process `syz.1.7859'. [ 436.849720][T24126] 9pnet_fd: Insufficient options for proto=fd [ 437.026671][T24133] netlink: 16 bytes leftover after parsing attributes in process `syz.0.7867'. [ 437.182203][T24143] sd 0:0:1:0: device reset [ 437.191239][T24145] netlink: 16 bytes leftover after parsing attributes in process `syz.5.7873'. [ 437.288080][T24153] 9pnet_fd: Insufficient options for proto=fd [ 437.581287][T24166] validate_nla: 2 callbacks suppressed [ 437.581306][T24166] netlink: 'syz.5.7880': attribute type 4 has an invalid length. [ 437.608692][T24170] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7877'. [ 437.643968][T24159] netlink: 4 bytes leftover after parsing attributes in process `syz.0.7877'. [ 437.657855][T24171] 9pnet_fd: Insufficient options for proto=fd [ 437.790406][T24183] sd 0:0:1:0: device reset [ 437.826639][T24182] netlink: 16 bytes leftover after parsing attributes in process `syz.8.7885'. [ 437.846401][T24186] netlink: 'syz.5.7888': attribute type 3 has an invalid length. [ 437.958583][T24191] netlink: 48 bytes leftover after parsing attributes in process `syz.0.7889'. [ 438.144900][T24199] FAULT_INJECTION: forcing a failure. [ 438.144900][T24199] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 438.158038][T24199] CPU: 1 UID: 0 PID: 24199 Comm: syz.7.7892 Not tainted syzkaller #0 PREEMPT(voluntary) [ 438.158079][T24199] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 438.158096][T24199] Call Trace: [ 438.158104][T24199] [ 438.158169][T24199] __dump_stack+0x1d/0x30 [ 438.158197][T24199] dump_stack_lvl+0xe8/0x140 [ 438.158222][T24199] dump_stack+0x15/0x1b [ 438.158243][T24199] should_fail_ex+0x265/0x280 [ 438.158264][T24199] should_fail+0xb/0x20 [ 438.158281][T24199] should_fail_usercopy+0x1a/0x20 [ 438.158311][T24199] _copy_to_user+0x20/0xa0 [ 438.158350][T24199] simple_read_from_buffer+0xb5/0x130 [ 438.158379][T24199] proc_fail_nth_read+0x10e/0x150 [ 438.158406][T24199] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 438.158433][T24199] vfs_read+0x1a8/0x770 [ 438.158552][T24199] ? __rcu_read_unlock+0x4f/0x70 [ 438.158650][T24199] ? __fget_files+0x184/0x1c0 [ 438.158679][T24199] ksys_read+0xda/0x1a0 [ 438.158746][T24199] __x64_sys_read+0x40/0x50 [ 438.158767][T24199] x64_sys_call+0x27bc/0x2ff0 [ 438.158794][T24199] do_syscall_64+0xd2/0x200 [ 438.158837][T24199] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 438.158863][T24199] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 438.158892][T24199] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 438.158922][T24199] RIP: 0033:0x7f656bc4d5fc [ 438.158946][T24199] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 438.158967][T24199] RSP: 002b:00007f656a6af030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 438.158989][T24199] RAX: ffffffffffffffda RBX: 00007f656be85fa0 RCX: 00007f656bc4d5fc [ 438.159003][T24199] RDX: 000000000000000f RSI: 00007f656a6af0a0 RDI: 0000000000000005 [ 438.159037][T24199] RBP: 00007f656a6af090 R08: 0000000000000000 R09: 0000000000000000 [ 438.159051][T24199] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 438.159064][T24199] R13: 00007f656be86038 R14: 00007f656be85fa0 R15: 00007ffd331a5dd8 [ 438.159085][T24199] [ 438.619858][T24197] ip_tunnel: non-ECT from 0.0.0.0 with TOS=0x3 [ 438.668374][T24207] blktrace: Concurrent blktraces are not allowed on sg0 [ 438.827091][T24221] sd 0:0:1:0: device reset [ 439.063042][T24233] loop7: detected capacity change from 0 to 128 [ 439.131158][T24233] EXT4-fs (loop7): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 439.131668][T24231] netlink: 'syz.5.7901': attribute type 3 has an invalid length. [ 439.144987][T24233] ext4 filesystem being mounted at /110/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 439.364644][T24239] netlink: 'syz.5.7906': attribute type 30 has an invalid length. [ 439.487226][T22145] EXT4-fs error (device loop7): ext4_readdir:224: inode #11: comm syz-executor: path /110/file1/lost+found: directory fails checksum at offset 1024 [ 439.517188][T22145] EXT4-fs error (device loop7): ext4_readdir:224: inode #11: comm syz-executor: path /110/file1/lost+found: directory fails checksum at offset 8192 [ 439.584927][T22145] EXT4-fs error (device loop7): ext4_empty_dir:3109: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 439.597986][ T29] kauditd_printk_skb: 129 callbacks suppressed [ 439.598005][ T29] audit: type=1400 audit(1756556750.474:50693): avc: denied { remove_name } for pid=22145 comm="syz-executor" name="lost+found" dev="loop7" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 439.627678][ T29] audit: type=1400 audit(1756556750.474:50694): avc: denied { rmdir } for pid=22145 comm="syz-executor" name="lost+found" dev="loop7" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=dir permissive=1 [ 439.682242][T22145] EXT4-fs error (device loop7): ext4_readdir:224: inode #11: comm syz-executor: path /110/file1/lost+found: directory fails checksum at offset 1024 [ 439.703651][T22145] EXT4-fs error (device loop7): ext4_readdir:224: inode #11: comm syz-executor: path /110/file1/lost+found: directory fails checksum at offset 8192 [ 439.721192][T24244] loop8: detected capacity change from 0 to 128 [ 439.771168][T24244] EXT4-fs (loop8): mounted filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09 r/w without journal. Quota mode: none. [ 439.783644][T22145] EXT4-fs error (device loop7): ext4_empty_dir:3109: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 439.851087][T24244] ext4 filesystem being mounted at /99/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 439.890193][T22145] EXT4-fs error (device loop7): ext4_readdir:224: inode #11: comm syz-executor: path /110/file1/lost+found: directory fails checksum at offset 1024 [ 439.948069][ T29] audit: type=1326 audit(1756556750.831:50695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24247 comm="syz.5.7911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 439.971767][ T29] audit: type=1326 audit(1756556750.831:50696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24247 comm="syz.5.7911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 439.995428][ T29] audit: type=1326 audit(1756556750.831:50697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24247 comm="syz.5.7911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=125 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 440.019108][ T29] audit: type=1326 audit(1756556750.831:50698): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24247 comm="syz.5.7911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 440.042794][ T29] audit: type=1326 audit(1756556750.831:50699): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24247 comm="syz.5.7911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 440.043298][T22145] EXT4-fs error (device loop7): ext4_readdir:224: inode #11: comm syz-executor: path /110/file1/lost+found: directory fails checksum at offset 8192 [ 440.066540][ T29] audit: type=1326 audit(1756556750.831:50700): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24247 comm="syz.5.7911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=425 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 440.105132][ T29] audit: type=1326 audit(1756556750.831:50701): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24247 comm="syz.5.7911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f86e2b5ec23 code=0x7ffc0000 [ 440.128553][ T29] audit: type=1326 audit(1756556750.831:50702): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24247 comm="syz.5.7911" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f86e2b5ec23 code=0x7ffc0000 [ 440.227473][T22145] EXT4-fs error (device loop7): ext4_empty_dir:3109: inode #11: block 1: comm syz-executor: Directory block failed checksum [ 440.244427][T22145] EXT4-fs error (device loop7): ext4_readdir:224: inode #11: comm syz-executor: path /110/file1/lost+found: directory fails checksum at offset 1024 [ 440.390580][T22820] EXT4-fs (loop8): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 440.442810][T24267] netlink: 'syz.0.7916': attribute type 3 has an invalid length. [ 440.679182][T24285] hub 9-0:1.0: USB hub found [ 440.688206][T24285] hub 9-0:1.0: 8 ports detected [ 440.802381][T24292] __nla_validate_parse: 4 callbacks suppressed [ 440.802397][T24292] netlink: 96 bytes leftover after parsing attributes in process `syz.8.7924'. [ 440.855861][T22145] EXT4-fs (loop7): unmounting filesystem 76b65be2-f6da-4727-8c75-0525a5b65a09. [ 440.880640][ T31] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 440.926416][T24293] netlink: 48 bytes leftover after parsing attributes in process `syz.0.7923'. [ 440.938392][ T31] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 440.993724][T24299] netlink: 'syz.1.7927': attribute type 1 has an invalid length. [ 441.001630][T24299] netlink: 224 bytes leftover after parsing attributes in process `syz.1.7927'. [ 441.018348][ T31] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 441.038376][T24299] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7927'. [ 441.047411][T24299] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7927'. [ 441.077704][T24299] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7927'. [ 441.089928][ T31] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 441.123888][T24299] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7927'. [ 441.133013][T24299] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7927'. [ 441.180926][T24299] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7927'. [ 441.272517][T24299] netlink: 4 bytes leftover after parsing attributes in process `syz.1.7927'. [ 441.290698][ T31] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 441.301799][ T31] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 441.313358][ T31] bond0 (unregistering): Released all slaves [ 441.354579][ T31] hsr_slave_0: left promiscuous mode [ 441.371589][ T31] hsr_slave_1: left promiscuous mode [ 441.377234][ T31] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 441.384920][ T31] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 441.407650][ T31] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 441.415125][ T31] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 441.448536][ T31] veth1_macvtap: left promiscuous mode [ 441.454065][ T31] veth0_macvtap: left promiscuous mode [ 441.459739][ T31] veth1_vlan: left promiscuous mode [ 441.474014][ T31] veth0_vlan: left promiscuous mode [ 441.600821][ T31] team0 (unregistering): Port device team_slave_1 removed [ 441.645419][ T31] team0 (unregistering): Port device team_slave_0 removed [ 441.709102][T24323] netlink: 'syz.8.7934': attribute type 30 has an invalid length. [ 441.719437][T24333] hub 9-0:1.0: USB hub found [ 441.727970][T24333] hub 9-0:1.0: 8 ports detected [ 441.841296][T24340] 9pnet_fd: Insufficient options for proto=fd [ 441.876512][T24301] chnl_net:caif_netlink_parms(): no params data found [ 441.906778][T24345] sd 0:0:1:0: device reset [ 441.970598][T24301] bridge0: port 1(bridge_slave_0) entered blocking state [ 441.977706][T24301] bridge0: port 1(bridge_slave_0) entered disabled state [ 442.016598][T24301] bridge_slave_0: entered allmulticast mode [ 442.086926][T24301] bridge_slave_0: entered promiscuous mode [ 442.122044][T24301] bridge0: port 2(bridge_slave_1) entered blocking state [ 442.129180][T24301] bridge0: port 2(bridge_slave_1) entered disabled state [ 442.170767][T24301] bridge_slave_1: entered allmulticast mode [ 442.177344][T24301] bridge_slave_1: entered promiscuous mode [ 442.223721][ T31] IPVS: stop unused estimator thread 0... [ 442.303636][T24301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 442.351806][T24301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 442.372252][T24364] loop8: detected capacity change from 0 to 2048 [ 442.455708][T24301] team0: Port device team_slave_0 added [ 442.472580][T24364] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000700 r/w without journal. Quota mode: none. [ 442.487341][T24301] team0: Port device team_slave_1 added [ 442.648947][T24301] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 442.655967][T24301] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.681922][T24301] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 442.715118][T24301] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 442.722130][T24301] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 442.748206][T24301] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 442.788972][T24356] Set syz1 is full, maxelem 65536 reached [ 442.924255][T24301] hsr_slave_0: entered promiscuous mode [ 442.940915][T24301] hsr_slave_1: entered promiscuous mode [ 442.949796][T24301] debugfs: 'hsr0' already exists in 'hsr' [ 442.955547][T24301] Cannot create hsr debugfs directory [ 443.175889][T22820] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000700. [ 443.216596][T24301] netdevsim netdevsim9 netdevsim0: renamed from eth0 [ 443.226129][T24301] netdevsim netdevsim9 netdevsim1: renamed from eth1 [ 443.238889][T24301] netdevsim netdevsim9 netdevsim2: renamed from eth2 [ 443.256445][T24301] netdevsim netdevsim9 netdevsim3: renamed from eth3 [ 443.315336][T24400] hub 9-0:1.0: USB hub found [ 443.318404][T24301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 443.320121][T24400] hub 9-0:1.0: 8 ports detected [ 443.345349][T24301] 8021q: adding VLAN 0 to HW filter on device team0 [ 443.355363][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 443.362552][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 443.432018][ T51] bridge0: port 2(bridge_slave_1) entered blocking state [ 443.439154][ T51] bridge0: port 2(bridge_slave_1) entered forwarding state [ 443.439450][T24409] sd 0:0:1:0: device reset [ 443.459660][T24301] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 443.470137][T24301] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 443.543330][T24414] hub 9-0:1.0: USB hub found [ 443.544808][T24301] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 443.557591][T24414] hub 9-0:1.0: 8 ports detected [ 443.574883][T24418] loop8: detected capacity change from 0 to 2048 [ 443.590088][T24418] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000700 r/w without journal. Quota mode: none. [ 443.856237][T24301] veth0_vlan: entered promiscuous mode [ 443.872851][T24301] veth1_vlan: entered promiscuous mode [ 443.890435][T22820] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000700. [ 443.906817][T24301] veth0_macvtap: entered promiscuous mode [ 443.928644][T24301] veth1_macvtap: entered promiscuous mode [ 443.949090][T24301] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 443.964514][T24448] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 443.981592][T24301] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 443.999214][T10273] netdevsim netdevsim9 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 444.011298][T24448] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.025151][T10269] netdevsim netdevsim9 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 444.039596][T10269] netdevsim netdevsim9 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 444.050369][T10269] netdevsim netdevsim9 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 444.066286][T24448] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.114783][T24448] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 444.140557][T24453] netlink: 'syz.9.7928': attribute type 3 has an invalid length. [ 444.174768][T10273] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 444.204573][T10273] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 444.254341][T10273] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 444.275375][T10273] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 444.282736][T24460] 9p: Unknown access argument cliŽýÅrµûent: -22 [ 444.336082][T24456] bridge0: port 2(bridge_slave_1) entered disabled state [ 444.343604][T24456] bridge0: port 1(bridge_slave_0) entered disabled state [ 444.379095][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 444.379110][ T29] audit: type=1326 audit(1756556755.503:50726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24455 comm="syz.9.7969" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa80ae8ebe9 code=0x7ffc0000 [ 444.408958][ T29] audit: type=1326 audit(1756556755.514:50727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24455 comm="syz.9.7969" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa80ae8ebe9 code=0x7ffc0000 [ 444.432649][ T29] audit: type=1326 audit(1756556755.514:50728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24455 comm="syz.9.7969" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa80ae8ebe9 code=0x7ffc0000 [ 444.456332][ T29] audit: type=1326 audit(1756556755.514:50729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24455 comm="syz.9.7969" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa80ae8ebe9 code=0x7ffc0000 [ 444.565674][T24456] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 444.575306][T24456] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 444.744114][ T29] audit: type=1326 audit(1756556755.891:50730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24478 comm="syz.0.7977" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dc7a7ebe9 code=0x7ffc0000 [ 444.744392][T24473] random: crng reseeded on system resumption [ 444.784661][ T29] audit: type=1400 audit(1756556755.891:50731): avc: denied { read append } for pid=24472 comm="syz.8.7975" name="snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 444.809107][ T29] audit: type=1400 audit(1756556755.891:50732): avc: denied { ioctl } for pid=24472 comm="syz.8.7975" path="/dev/snapshot" dev="devtmpfs" ino=90 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:acpi_bios_t tclass=chr_file permissive=1 [ 444.833141][ T29] audit: type=1326 audit(1756556755.923:50733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24478 comm="syz.0.7977" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dc7a7ebe9 code=0x7ffc0000 [ 444.856763][ T29] audit: type=1326 audit(1756556755.923:50734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24478 comm="syz.0.7977" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f5dc7a7ebe9 code=0x7ffc0000 [ 444.880430][ T29] audit: type=1326 audit(1756556755.923:50735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24478 comm="syz.0.7977" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f5dc7a7ebe9 code=0x7ffc0000 [ 445.247282][T10269] netdevsim netdevsim9 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.260441][T10269] netdevsim netdevsim9 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.279807][T24487] netlink: 'syz.8.7980': attribute type 3 has an invalid length. [ 445.312004][T10269] netdevsim netdevsim9 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.334961][T24491] netlink: 'syz.5.7981': attribute type 1 has an invalid length. [ 445.354076][T10269] netdevsim netdevsim9 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 445.455268][T24499] 9p: Unknown access argument cliŽýÅrµûent: -22 [ 446.052318][T24526] __nla_validate_parse: 29 callbacks suppressed [ 446.052336][T24526] netlink: 12 bytes leftover after parsing attributes in process `syz.8.7992'. [ 446.182762][T24531] 9p: Unknown access argument cliŽýÅrµûent: -22 [ 446.333867][T24542] sd 0:0:1:0: device reset [ 446.423521][T24548] netlink: 200 bytes leftover after parsing attributes in process `syz.8.8003'. [ 446.775607][T24546] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8002'. [ 446.824144][T24546] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 446.845519][T24546] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 446.866844][T24560] 9p: Unknown access argument cliŽýÅrµûent: -22 [ 446.957912][T24569] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8012'. [ 446.966854][T24569] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8012'. [ 447.051008][T24571] loop8: detected capacity change from 0 to 512 [ 447.061722][T24575] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8014'. [ 447.070789][T24575] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8014'. [ 447.093931][T24577] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 447.110444][T24577] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 447.169172][T24571] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 447.251187][T24587] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8018'. [ 447.266399][T24571] ext4 filesystem being mounted at /127/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 447.294729][T24571] EXT4-fs error (device loop8): ext4_lookup:1787: inode #12: comm syz.8.8010: iget: bad i_size value: 2533274857506816 [ 447.342769][T24589] FAULT_INJECTION: forcing a failure. [ 447.342769][T24589] name failslab, interval 1, probability 0, space 0, times 0 [ 447.355553][T24589] CPU: 0 UID: 0 PID: 24589 Comm: syz.8.8010 Not tainted syzkaller #0 PREEMPT(voluntary) [ 447.355629][T24589] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 447.355642][T24589] Call Trace: [ 447.355648][T24589] [ 447.355656][T24589] __dump_stack+0x1d/0x30 [ 447.355745][T24589] dump_stack_lvl+0xe8/0x140 [ 447.355774][T24589] dump_stack+0x15/0x1b [ 447.355795][T24589] should_fail_ex+0x265/0x280 [ 447.355821][T24589] should_failslab+0x8c/0xb0 [ 447.355847][T24589] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 447.355875][T24589] ? __d_alloc+0x3d/0x340 [ 447.355952][T24589] ? __rcu_read_unlock+0x4f/0x70 [ 447.356033][T24589] __d_alloc+0x3d/0x340 [ 447.356095][T24589] d_alloc_parallel+0x53/0xc60 [ 447.356125][T24589] ? avc_has_perm_noaudit+0x1b1/0x200 [ 447.356219][T24589] ? lockref_get_not_dead+0x120/0x1c0 [ 447.356252][T24589] ? __rcu_read_unlock+0x4f/0x70 [ 447.356273][T24589] __lookup_slow+0x8c/0x250 [ 447.356305][T24589] lookup_slow+0x3c/0x60 [ 447.356426][T24589] link_path_walk+0x753/0x900 [ 447.356494][T24589] path_lookupat+0x63/0x2a0 [ 447.356523][T24589] filename_lookup+0x147/0x340 [ 447.356577][T24589] user_path_at+0x3e/0x130 [ 447.356696][T24589] __se_sys_mount+0x25b/0x2e0 [ 447.356722][T24589] ? fput+0x8f/0xc0 [ 447.356835][T24589] __x64_sys_mount+0x67/0x80 [ 447.356864][T24589] x64_sys_call+0x2b4d/0x2ff0 [ 447.356891][T24589] do_syscall_64+0xd2/0x200 [ 447.356930][T24589] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 447.356953][T24589] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 447.357024][T24589] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 447.357050][T24589] RIP: 0033:0x7f30db40ebe9 [ 447.357068][T24589] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 447.357091][T24589] RSP: 002b:00007f30d9e35038 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 447.357111][T24589] RAX: ffffffffffffffda RBX: 00007f30db646180 RCX: 00007f30db40ebe9 [ 447.357143][T24589] RDX: 00002000000001c0 RSI: 0000200000000400 RDI: 0000000000000000 [ 447.357155][T24589] RBP: 00007f30d9e35090 R08: 0000000000000000 R09: 0000000000000000 [ 447.357167][T24589] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 447.357179][T24589] R13: 00007f30db646218 R14: 00007f30db646180 R15: 00007fff6d89d948 [ 447.357197][T24589] [ 447.657733][T24556] Set syz1 is full, maxelem 65536 reached [ 447.668837][T24591] netlink: 8 bytes leftover after parsing attributes in process `syz.0.8019'. [ 447.677859][T24591] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8019'. [ 447.731219][T22820] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 447.773493][T24598] 9p: Unknown access argument cliŽýÅrµûent: -22 [ 447.791612][T24604] netlink: 'syz.0.8024': attribute type 6 has an invalid length. [ 447.809981][T24604] FAULT_INJECTION: forcing a failure. [ 447.809981][T24604] name failslab, interval 1, probability 0, space 0, times 0 [ 447.822891][T24604] CPU: 0 UID: 0 PID: 24604 Comm: syz.0.8024 Not tainted syzkaller #0 PREEMPT(voluntary) [ 447.822922][T24604] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 447.822935][T24604] Call Trace: [ 447.822942][T24604] [ 447.823017][T24604] __dump_stack+0x1d/0x30 [ 447.823041][T24604] dump_stack_lvl+0xe8/0x140 [ 447.823119][T24604] dump_stack+0x15/0x1b [ 447.823140][T24604] should_fail_ex+0x265/0x280 [ 447.823161][T24604] should_failslab+0x8c/0xb0 [ 447.823188][T24604] kmem_cache_alloc_noprof+0x50/0x310 [ 447.823270][T24604] ? fib_table_insert+0x1ab/0xeb0 [ 447.823308][T24604] fib_table_insert+0x1ab/0xeb0 [ 447.823344][T24604] ? __schedule+0x670/0xb30 [ 447.823392][T24604] ? fib_new_table+0xad/0x1c0 [ 447.823433][T24604] inet_rtm_newroute+0xab/0x140 [ 447.823464][T24604] ? __pfx_inet_rtm_newroute+0x10/0x10 [ 447.823492][T24604] rtnetlink_rcv_msg+0x5fb/0x6d0 [ 447.823528][T24604] ? avc_has_perm_noaudit+0x1b1/0x200 [ 447.823667][T24604] netlink_rcv_skb+0x123/0x220 [ 447.823693][T24604] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 447.823735][T24604] rtnetlink_rcv+0x1c/0x30 [ 447.823763][T24604] netlink_unicast+0x5bd/0x690 [ 447.823813][T24604] netlink_sendmsg+0x58b/0x6b0 [ 447.823843][T24604] ? __pfx_netlink_sendmsg+0x10/0x10 [ 447.823980][T24604] __sock_sendmsg+0x145/0x180 [ 447.824133][T24604] ____sys_sendmsg+0x31e/0x4e0 [ 447.824165][T24604] ___sys_sendmsg+0x17b/0x1d0 [ 447.824278][T24604] __x64_sys_sendmsg+0xd4/0x160 [ 447.824344][T24604] x64_sys_call+0x191e/0x2ff0 [ 447.824367][T24604] do_syscall_64+0xd2/0x200 [ 447.824394][T24604] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 447.824424][T24604] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 447.824457][T24604] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 447.824485][T24604] RIP: 0033:0x7f5dc7a7ebe9 [ 447.824503][T24604] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 447.824649][T24604] RSP: 002b:00007f5dc64df038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 447.824670][T24604] RAX: ffffffffffffffda RBX: 00007f5dc7cb5fa0 RCX: 00007f5dc7a7ebe9 [ 447.824682][T24604] RDX: 0000000000000894 RSI: 0000200000000000 RDI: 0000000000000006 [ 447.824694][T24604] RBP: 00007f5dc64df090 R08: 0000000000000000 R09: 0000000000000000 [ 447.824707][T24604] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 447.824760][T24604] R13: 00007f5dc7cb6038 R14: 00007f5dc7cb5fa0 R15: 00007ffeeadfcef8 [ 447.824778][T24604] [ 448.139093][T24614] IPVS: Error connecting to the multicast addr [ 448.165498][T24616] sd 0:0:1:0: device reset [ 448.309398][T24635] netlink: 'syz.9.8039': attribute type 30 has an invalid length. [ 448.468559][T24641] netlink: 'syz.9.8042': attribute type 30 has an invalid length. [ 448.576430][T24645] sd 0:0:1:0: device reset [ 448.592392][T24647] 9p: Unknown access argument cliŽýÅrµûent: -22 [ 448.626310][T24652] loop8: detected capacity change from 0 to 512 [ 448.633095][T24652] EXT4-fs: Ignoring removed nobh option [ 448.636090][T24653] netlink: 'syz.9.8048': attribute type 3 has an invalid length. [ 448.667582][T24652] EXT4-fs error (device loop8): ext4_do_update_inode:5653: inode #3: comm syz.8.8047: corrupted inode contents [ 448.680411][T24652] EXT4-fs error (device loop8): ext4_dirty_inode:6538: inode #3: comm syz.8.8047: mark_inode_dirty error [ 448.694712][T24652] EXT4-fs error (device loop8): ext4_do_update_inode:5653: inode #3: comm syz.8.8047: corrupted inode contents [ 448.748916][T24652] EXT4-fs error (device loop8): __ext4_ext_dirty:206: inode #3: comm syz.8.8047: mark_inode_dirty error [ 448.768611][T24652] EXT4-fs error (device loop8): ext4_acquire_dquot:6937: comm syz.8.8047: Failed to acquire dquot type 0 [ 448.787889][T24652] EXT4-fs error (device loop8): ext4_do_update_inode:5653: inode #16: comm syz.8.8047: corrupted inode contents [ 448.828611][T24652] EXT4-fs error (device loop8): ext4_dirty_inode:6538: inode #16: comm syz.8.8047: mark_inode_dirty error [ 449.017433][T24652] EXT4-fs error (device loop8): ext4_do_update_inode:5653: inode #16: comm syz.8.8047: corrupted inode contents [ 449.030389][T24652] EXT4-fs error (device loop8): __ext4_ext_dirty:206: inode #16: comm syz.8.8047: mark_inode_dirty error [ 449.075516][T24652] EXT4-fs error (device loop8): ext4_do_update_inode:5653: inode #16: comm syz.8.8047: corrupted inode contents [ 449.167128][T24677] sd 0:0:1:0: device reset [ 449.224022][T24652] EXT4-fs error (device loop8) in ext4_orphan_del:305: Corrupt filesystem [ 449.244087][T24652] EXT4-fs error (device loop8): ext4_do_update_inode:5653: inode #16: comm syz.8.8047: corrupted inode contents [ 449.273913][T24652] EXT4-fs error (device loop8): ext4_truncate:4666: inode #16: comm syz.8.8047: mark_inode_dirty error [ 449.381031][T24652] EXT4-fs error (device loop8) in ext4_process_orphan:347: Corrupt filesystem [ 449.386295][T24685] netlink: 'syz.5.8060': attribute type 3 has an invalid length. [ 449.402175][T24652] EXT4-fs (loop8): 1 truncate cleaned up [ 449.415543][T24652] EXT4-fs (loop8): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 449.449790][T24652] ext4 filesystem being mounted at /135/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 449.503442][T22820] EXT4-fs (loop8): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 449.512695][ T29] kauditd_printk_skb: 103 callbacks suppressed [ 449.512713][ T29] audit: type=1326 audit(1756556760.900:50837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24691 comm="syz.5.8063" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 449.542604][ T29] audit: type=1326 audit(1756556760.900:50838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24691 comm="syz.5.8063" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 449.680849][ T29] audit: type=1326 audit(1756556760.910:50839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24691 comm="syz.5.8063" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 449.704632][ T29] audit: type=1326 audit(1756556760.910:50840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24691 comm="syz.5.8063" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 449.728319][ T29] audit: type=1326 audit(1756556760.910:50841): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24691 comm="syz.5.8063" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 449.751940][ T29] audit: type=1326 audit(1756556760.910:50842): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24691 comm="syz.5.8063" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 449.775685][ T29] audit: type=1326 audit(1756556760.910:50843): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24691 comm="syz.5.8063" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 449.799315][ T29] audit: type=1326 audit(1756556760.910:50844): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24691 comm="syz.5.8063" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 449.823036][ T29] audit: type=1326 audit(1756556760.910:50845): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24691 comm="syz.5.8063" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 449.846681][ T29] audit: type=1326 audit(1756556760.910:50846): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=24691 comm="syz.5.8063" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f86e2b5ebe9 code=0x7ffc0000 [ 449.992088][T24702] loop8: detected capacity change from 0 to 512 [ 450.029132][T24702] EXT4-fs warning (device loop8): ext4_enable_quotas:7172: Failed to enable quota tracking (type=1, err=-117, ino=4). Please run e2fsck to fix. [ 450.113320][T24702] EXT4-fs (loop8): mount failed [ 450.238343][T24720] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 450.281245][T24720] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 450.358106][T24722] netlink: 'syz.1.8074': attribute type 3 has an invalid length. [ 450.466814][T24732] netlink: 'syz.8.8075': attribute type 32 has an invalid length. [ 450.506155][T24736] ALSA: seq fatal error: cannot create timer (-22) [ 450.544785][T24743] sd 0:0:1:0: device reset [ 451.022742][T24767] __nla_validate_parse: 20 callbacks suppressed [ 451.022764][T24767] netlink: 24 bytes leftover after parsing attributes in process `syz.9.8090'. [ 451.115917][T24771] loop9: detected capacity change from 0 to 2048 [ 451.172473][T24771] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000700 r/w without journal. Quota mode: none. [ 451.273257][T24779] netlink: 48 bytes leftover after parsing attributes in process `syz.9.8092'. [ 451.381407][T24783] sd 0:0:1:0: device reset [ 451.424125][T24785] netlink: 'syz.8.8096': attribute type 1 has an invalid length. [ 451.431925][T24785] netlink: 224 bytes leftover after parsing attributes in process `syz.8.8096'. [ 451.443308][T24785] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8096'. [ 451.452405][T24785] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8096'. [ 451.480193][T24301] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000700. [ 451.490799][T24785] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8096'. [ 451.573179][T24785] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8096'. [ 451.582138][T24785] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8096'. [ 451.612351][T24785] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8096'. [ 451.677694][T24778] Set syz1 is full, maxelem 65536 reached [ 451.709631][T24785] netlink: 4 bytes leftover after parsing attributes in process `syz.8.8096'. [ 451.740229][T24800] netlink: 'syz.0.8101': attribute type 3 has an invalid length. [ 451.899520][T24809] netlink: 'syz.1.8105': attribute type 32 has an invalid length. [ 452.190518][T24827] netlink: 'syz.9.8112': attribute type 30 has an invalid length. [ 452.331282][T24805] Set syz1 is full, maxelem 65536 reached [ 452.432395][T24838] hub 9-0:1.0: USB hub found [ 452.444214][T24838] hub 9-0:1.0: 8 ports detected [ 452.495455][T24842] ================================================================== [ 452.503582][T24842] BUG: KCSAN: data-race in hrtimer_interrupt / print_cpu [ 452.510638][T24842] [ 452.512984][T24842] read-write to 0xffff888237d1b254 of 4 bytes by interrupt on cpu 1: [ 452.521071][T24842] hrtimer_interrupt+0x70/0x460 [ 452.525956][T24842] __sysvec_apic_timer_interrupt+0x5c/0x1d0 [ 452.531974][T24842] sysvec_apic_timer_interrupt+0x6f/0x80 [ 452.537649][T24842] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 452.543658][T24842] __sanitizer_cov_trace_const_cmp2+0x37/0x90 [ 452.549761][T24842] ext4_fill_raw_inode+0xb23/0xdc0 [ 452.554909][T24842] ext4_mark_iloc_dirty+0x31f/0xda0 [ 452.560143][T24842] __ext4_mark_inode_dirty+0x2e2/0x3f0 [ 452.565644][T24842] ext4_dirty_inode+0x92/0xc0 [ 452.570361][T24842] __mark_inode_dirty+0x162/0x750 [ 452.575438][T24842] file_update_time+0x288/0x2b0 [ 452.580338][T24842] ext4_page_mkwrite+0x18c/0xb90 [ 452.585303][T24842] handle_mm_fault+0x15ce/0x2c20 [ 452.590258][T24842] do_user_addr_fault+0x636/0x1090 [ 452.595395][T24842] exc_page_fault+0x62/0xa0 [ 452.599917][T24842] asm_exc_page_fault+0x26/0x30 [ 452.604779][T24842] [ 452.607107][T24842] read to 0xffff888237d1b254 of 4 bytes by task 24842 on cpu 0: [ 452.614738][T24842] print_cpu+0x359/0x680 [ 452.618990][T24842] timer_list_show+0x107/0x170 [ 452.623764][T24842] seq_read_iter+0x319/0x940 [ 452.628375][T24842] proc_reg_read_iter+0x10d/0x180 [ 452.633429][T24842] copy_splice_read+0x442/0x660 [ 452.638301][T24842] splice_direct_to_actor+0x26f/0x680 [ 452.643688][T24842] do_splice_direct+0xda/0x150 [ 452.648465][T24842] do_sendfile+0x380/0x650 [ 452.652899][T24842] __x64_sys_sendfile64+0x105/0x150 [ 452.658286][T24842] x64_sys_call+0x2bb0/0x2ff0 [ 452.662974][T24842] do_syscall_64+0xd2/0x200 [ 452.667507][T24842] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 452.673412][T24842] [ 452.675747][T24842] value changed: 0x000a0fdb -> 0x000a0fdc [ 452.681478][T24842] [ 452.683818][T24842] Reported by Kernel Concurrency Sanitizer on: SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 452.689974][T24842] CPU: 0 UID: 0 PID: 24842 Comm: syz.1.8120 Not tainted syzkaller #0 PREEMPT(voluntary) [ 452.700486][T24842] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 452.710573][T24842] ================================================================== [ 452.983249][T10273] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 453.101689][T10273] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 453.180310][T10273] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 453.308853][T10273] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 453.363222][T24845] Set syz1 is full, maxelem 65536 reached [ 453.396981][T10273] bridge_slave_1: left allmulticast mode [ 453.402670][T10273] bridge_slave_1: left promiscuous mode [ 453.408409][T10273] bridge0: port 2(bridge_slave_1) entered disabled state [ 453.416216][T10273] bridge_slave_0: left allmulticast mode [ 453.421926][T10273] bridge_slave_0: left promiscuous mode [ 453.427718][T10273] bridge0: port 1(bridge_slave_0) entered disabled state [ 453.496022][T10273] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 453.506854][T10273] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 453.516703][T10273] bond0 (unregistering): Released all slaves [ 453.563907][T10273] hsr_slave_0: left promiscuous mode [ 453.569623][T10273] hsr_slave_1: left promiscuous mode [ 453.575301][T10273] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 453.582721][T10273] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 453.590364][T10273] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 453.597778][T10273] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 453.609205][T10273] veth1_macvtap: left promiscuous mode [ 453.614686][T10273] veth0_macvtap: left promiscuous mode [ 453.620213][T10273] veth1_vlan: left promiscuous mode [ 453.625508][T10273] veth0_vlan: left promiscuous mode [ 453.686215][T10273] team0 (unregistering): Port device team_slave_1 removed [ 453.696136][T10273] team0 (unregistering): Port device team_slave_0 removed [ 454.451251][T10273] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 454.475989][T10273] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 454.542943][T10273] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 454.609274][T10273] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 454.661319][T10273] bridge_slave_1: left allmulticast mode [ 454.667018][T10273] bridge_slave_1: left promiscuous mode [ 454.672769][T10273] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.680428][T10273] bridge_slave_0: left allmulticast mode [ 454.686102][T10273] bridge_slave_0: left promiscuous mode [ 454.691753][T10273] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.700839][T10273] veth0_to_team: left allmulticast mode [ 454.706456][T10273] veth0_to_team: left promiscuous mode [ 454.712050][T10273] bridge0: port 1(veth0_to_team) entered disabled state [ 454.720262][T10273] bridge_slave_1: left allmulticast mode [ 454.726012][T10273] bridge_slave_1: left promiscuous mode [ 454.731740][T10273] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.739266][T10273] bridge_slave_0: left allmulticast mode [ 454.745013][T10273] bridge_slave_0: left promiscuous mode [ 454.750776][T10273] bridge0: port 1(bridge_slave_0) entered disabled state [ 454.758871][T10273] bridge_slave_1: left allmulticast mode [ 454.764539][T10273] bridge_slave_1: left promiscuous mode [ 454.770242][T10273] bridge0: port 2(bridge_slave_1) entered disabled state [ 454.777993][T10273] bridge_slave_0: left allmulticast mode [ 454.783678][T10273] bridge_slave_0: left promiscuous mode [ 454.789434][T10273] bridge0: port 1(bridge_slave_0) entered disabled state [ 455.000257][T10273] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 455.009601][T10273] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 455.018679][T10273] bond0 (unregistering): Released all slaves [ 455.114389][T10273] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 455.123666][T10273] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 455.132964][T10273] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 455.141869][T10273] bond0 (unregistering): Released all slaves [ 455.210322][T10273] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 455.219645][T10273] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 455.228721][T10273] bond0 (unregistering): Released all slaves [ 455.277162][T10273] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 455.287112][T10273] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 455.296736][T10273] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 455.305783][T10273] bond0 (unregistering): Released all slaves [ 455.355899][T10273] tipc: Left network mode [ 455.360605][T10273] tipc: Left network mode [ 455.368593][T10273] hsr_slave_0: left promiscuous mode [ 455.374227][T10273] hsr_slave_1: left promiscuous mode [ 455.382276][T10273] hsr_slave_0: left promiscuous mode [ 455.387950][T10273] hsr_slave_1: left promiscuous mode [ 455.393787][T10273] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 455.401319][T10273] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 455.410571][T10273] hsr_slave_0: left promiscuous mode [ 455.416178][T10273] hsr_slave_1: left promiscuous mode [ 455.422472][T10273] hsr_slave_0: left promiscuous mode [ 455.428142][T10273] hsr_slave_1: left promiscuous mode [ 455.435237][T10273] veth1_to_batadv: left promiscuous mode [ 455.440934][T10273] veth1_macvtap: left promiscuous mode [ 455.446500][T10273] veth0_macvtap: left promiscuous mode [ 455.500271][T10273] team0 (unregistering): Port device team_slave_1 removed [ 455.509612][T10273] team0 (unregistering): Port device team_slave_0 removed [ 455.560804][T10273] team0 (unregistering): Port device team_slave_1 removed [ 455.570586][T10273] team0 (unregistering): Port device team_slave_0 removed [ 455.622586][T10273] team0 (unregistering): Port device team_slave_1 removed [ 455.632557][T10273] team0 (unregistering): Port device team_slave_0 removed [ 455.680270][T10273] team0 (unregistering): Port device team_slave_1 removed [ 455.689982][T10273] team0 (unregistering): Port device team_slave_0 removed