last executing test programs: 5m15.659096223s ago: executing program 32 (id=470): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100202, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc2d, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10) r4 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r4, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x2000) 5m8.520434462s ago: executing program 33 (id=587): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x8000000000}, 0x18) mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0) 1m47.953066747s ago: executing program 34 (id=4802): creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39ddd8) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x1) r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0) syz_clone(0x800200, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) write$qrtrtun(r1, &(0x7f0000000300)="ca0e808b", 0x4) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=[0x7], &(0x7f0000000240)=[0x2], 0x0, 0x1}}, 0x40) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1f, 0x12, r0, 0x80000000000000) 1m14.288887006s ago: executing program 35 (id=5340): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xc8, 0x5, [@float={0x8, 0x0, 0x0, 0x10, 0x2}, @ptr={0xa, 0x0, 0x0, 0x2, 0x4}, @enum={0x3, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x2}]}, @union={0xa, 0x3, 0x0, 0x5, 0x1, 0x838, [{0x5, 0x5, 0xf}, {0x10, 0x3, 0xfffffffa}, {0x5, 0x1, 0xfffffffc}]}, @const={0xc, 0x0, 0x0, 0xa, 0x1}, @struct={0xf, 0x6, 0x0, 0x4, 0x1, 0x3, [{0xf, 0x2, 0xcf7}, {0x10, 0x4, 0x7}, {0x6, 0x1, 0x4}, {0x8, 0x2, 0x7}, {0xe, 0x1, 0x7}, {0xb, 0x5, 0x8}]}, @float={0x5, 0x0, 0x0, 0x10, 0x4}]}, {0x0, [0x2e, 0x2e, 0x0]}}, &(0x7f00000003c0)=""/109, 0xe5, 0x6d, 0x0, 0x1, 0x0, @void, @value}, 0x28) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd63) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), r1) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{}, {0x0, 0x4}, {0x0, 0x4, 0x10009, 0x5}], 0x10, 0xfffffff7, @void, @value}, 0x94) r2 = socket$kcm(0x10, 0x3, 0x10) r3 = syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff) socket$netlink(0x10, 0x3, 0x0) r5 = socket$xdp(0x2c, 0x3, 0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f00000002c0)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00'}) mknodat$null(r3, &(0x7f0000000a40)='./file0\x00', 0x200, 0x103) syz_open_dev$evdev(&(0x7f00000000c0), 0xd, 0x10440) write$P9_RLERRORu(r4, &(0x7f0000000a80)={0x14, 0x7, 0x1, {{0x7, 'TIPCv2\x00'}, 0x1}}, 0x14) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803002d000b12d25a80648c2594f90124fc60100c022300040000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 1m13.732576483s ago: executing program 7 (id=5352): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) socket$inet6(0xa, 0x817, 0x80000001) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000240)="000000000000003299b8f276dc75584a8d87d907005858367d61f49e1639a48f614a54a8192c2876b7f843cd3a3c07288fa0f1e28983b5cdc2e29b6e", 0x3c, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r0}, 0x10) r1 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000400)={0x0, 0xa, 0x8001}) syz_emit_ethernet(0x1162, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$rds(0x15, 0x5, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xfffffffc, 0x6, 0x4, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000001001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2d4}}, 0x4048010) setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000180)=""/66, 0x42}], 0x1, 0xe1, 0x3) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f0000000100)=@in6={0xa, 0x4e20, 0xffff, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000cc0)=[{0x10, 0x1, 0x1}], 0x10}, 0x5004) r6 = syz_open_dev$usbfs(&(0x7f0000000080), 0x70, 0x101301) ioctl$USBDEVFS_IOCTL(r6, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 1m13.447752406s ago: executing program 7 (id=5355): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0, @ANYRES32=r0, @ANYRES32=r0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000001000030529bd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="09840000000000003c0012800b00010062726964676500002c000280060027000300000006"], 0x64}}, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0, @ANYRES32=r0, @ANYRES32=r0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) (async) socket$netlink(0x10, 0x3, 0x0) (async) sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000001000030529bd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="09840000000000003c0012800b00010062726964676500002c000280060027000300000006"], 0x64}}, 0x0) (async) 1m13.1978146s ago: executing program 7 (id=5357): r0 = socket$key(0xf, 0x3, 0x2) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) sendmsg$key(r0, &(0x7f00000007c0)={0x400000000000000, 0x0, &(0x7f0000000700)={&(0x7f0000001900)=ANY=[@ANYBLOB="020f000015000000000000000000000005000500000000000a00000000000000000000000000000000432e0000000000000000000000000008001200000002000000f1edc4ea000006000000000000000000"], 0xa8}}, 0x40080) 1m12.965306813s ago: executing program 7 (id=5361): syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000018, &(0x7f00000006c0), 0x1, 0x513, &(0x7f0000000c40)="$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") creat(&(0x7f0000000000)='./bus\x00', 0x0) mount(&(0x7f0000000440)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x5, 0x0, "ef359f00fc0000000000f3ce5d29c3ee5e5ca9000f7ced549dc2aac63a01000000000000004faa2ad9c084a003ea0000000000000000000800002000", "036c47c67808200400000000000000335263bdbcef549ba197fce47ddfdd753abd950100002a00ffffffffffffffff00000000e8f20000000200", "b7326736181c208220000000b9000000000000000000f0fffffffff2ff00", [0x4]}) open(&(0x7f0000000300)='./bus\x00', 0x583281, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_usb_connect$hid(0x1, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x40, 0x56a, 0xb1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x5, 0xe0, 0xac, [{{0x9, 0x4, 0x0, 0x6, 0x1, 0x3, 0x1, 0x1, 0x2, {0x9, 0x21, 0x0, 0x5, 0x1, {0x22, 0x33f}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0xe3, 0x5, 0x2}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000280)={0xa, 0x6, 0x201, 0xa, 0x0, 0x2, 0xff, 0xae}, 0x8c, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x2, [{0xcd, &(0x7f0000000700)=@string={0xcd, 0x3, "4454d759fbb894b1563a77b6449c358ef62c0ea82dc43f8abf7ec9b4237463a1d22d1c0b031f2f9b07b7b6a6f4a36d49e1b3f9655ad347751734c5d10a2d76f3977ffb9aac5eea314b8e6114e586ed803f92ff94b72d9bf5e0cbcf501b4367a989b3c0a8ea4d0ed5aeeccfd04452ad8b768c5c65a6045663a0456a3824dc6b997024e9b3ae4690f86e7c7e43ec4f16e1ed1caee21c9a46d7fef666ecbb1067cf695927f32958a9fdd53c6532fc48ce290b3f401354c0a553eec7f546c1a90f02a704d4ee35933e98ffd50c"}}, {0x4, &(0x7f0000000400)=@lang_id={0x4, 0x3, 0xc09}}]}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x23) r2 = socket$phonet_pipe(0x23, 0x5, 0x2) fgetxattr(r1, &(0x7f00000002c0)=@known='user.incfs.metadata\x00', &(0x7f0000000340)=""/114, 0x72) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r3, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) shutdown(r3, 0x0) listen(r2, 0x80000001) bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000240)={0x1f}, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0xa0, 0x30, 0x9, 0x2, 0x0, {}, [{0x8c, 0x1, [@m_bpf={0x88, 0x1, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{}, {}, {0x3}, {0x0, 0x7}, {0x8}, {}, {0x6, 0xfe}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x0, 0x0, 0x0, 0xfffffff7}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x24000004}, 0x0) 1m9.93646083s ago: executing program 7 (id=5394): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000600)='sys_enter\x00', r0}, 0x10) link(0x0, 0x0) 1m9.487552806s ago: executing program 7 (id=5400): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', <r4=>0x0}) sendmsg$nl_route(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000880)=@newlinkprop={0x38, 0x6c, 0x1, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, 0x0, 0x9004}, [@IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'wlan0\x00'}]}]}, 0x38}}, 0x0) 1m9.462387376s ago: executing program 36 (id=5400): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', <r4=>0x0}) sendmsg$nl_route(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000880)=@newlinkprop={0x38, 0x6c, 0x1, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, 0x0, 0x9004}, [@IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'wlan0\x00'}]}]}, 0x38}}, 0x0) 1m5.997340479s ago: executing program 8 (id=5423): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) faccessat2(0xffffffffffffffff, 0x0, 0x81, 0x1000) creat(0x0, 0xd931d3864d39dcca) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, <r3=>0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000300)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kfree\x00', r4}, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r5) sendmsg$ETHTOOL_MSG_TSINFO_GET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)={0x2c, r6, 0x6a98047402e98331, 0x70bd21, 0x8000, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24004040}, 0x4008800) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x800009, 0x4) write$tun(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="001c86dd2000100000004000000060ec97000fc83c00fe8000000000000000000000000000aaff02000000000000000000000000000121"], 0xffe) r7 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={<r8=>0xffffffffffffffff}) getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r7, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000740)=@newtaction={0x98, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80d, 0x0, 0x10000000, 0x5, 0x4}, 0x1, r9}}]}, {0x0, 0xa}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x1}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4008001}, 0x0) r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xfffeffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r11}, 0x10) pipe2$9p(&(0x7f0000000000)={<r12=>0xffffffffffffffff, <r13=>0xffffffffffffffff}, 0x0) write$P9_RVERSION(r13, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15) r14 = dup(r13) write$P9_RLERRORu(r14, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53) write$RDMA_USER_CM_CMD_SET_OPTION(r14, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000880)=[{0x1, 0x0, [0xd, 0x1, 0x10, 0x6, 0x1ff, 0x8, 0xd4, 0x8, 0x7a196fa3, 0x8, 0x9, 0x7fffffff, 0x1, 0x2, 0xfffff0bb, 0x7d3]}, {0x0, 0x0, [0x0, 0xa8e, 0x3, 0xcb60, 0x81, 0xc, 0x9, 0x6, 0x6, 0x1, 0x401, 0x1, 0x80000001, 0x101, 0x4, 0x4]}, {0x4, 0x0, [0x5, 0x0, 0x2, 0x7, 0xb, 0x9, 0x6, 0x7, 0x8, 0xffffff81, 0x0, 0x4, 0xe4, 0xfffffff8, 0x101, 0x8]}, {0x4, 0x0, [0xffff24ed, 0xb05, 0x7, 0xfb97, 0x62, 0x5, 0x3, 0x2, 0x138, 0x6, 0x3, 0x9, 0x1, 0x1, 0x4, 0xe901]}, {0x3a, 0x0, [0x3dcd, 0xfff, 0x4, 0x9, 0x2, 0x2, 0xffff, 0x8001, 0x6, 0x4, 0x9, 0x4c, 0x9, 0x6d2, 0x7, 0x8]}], 0xffffffffffffffff, 0x1, 0x1, 0x168}}, 0x20) write$binfmt_elf64(r14, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r12, @ANYBLOB=',wfdno=', @ANYRESHEX=r14]) 1m5.90933825s ago: executing program 8 (id=5424): r0 = syz_io_uring_setup(0xddf, &(0x7f0000000300)={0x0, 0xbbd0, 0x10100, 0x0, 0x242}, &(0x7f0000000100)=<r1=>0x0, &(0x7f0000000140)=<r2=>0x0) syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x20, 0x3}) io_uring_enter(r0, 0x353, 0x0, 0x0, 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)=<r4=>0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r6}, 0x10) bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000280)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32=r6, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48) r7 = socket$nl_rdma(0x10, 0x3, 0x14) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x7, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES8=r8, @ANYRES32=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4e8acced, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r9}, 0x10) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r7, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f0000000240)={0x38, 0x1403, 0x1, 0x70bd2d, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bridge\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010) r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32], 0x48) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3a66505}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0xe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r11}, 0x10) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8001c00180081064e81f782db44b9b545c7910006007c09e8fe55a10a0017", 0x1f}], 0x1}, 0x0) r12 = socket$kcm(0x10, 0x2, 0x0) write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0x33fe0) r13 = socket$nl_generic(0x10, 0x3, 0x10) r14 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r13, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002740)={&(0x7f0000002400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r14, @ANYBLOB="015768b4f2b01b74c900170000000e0001006ec204657464657673696d0000000f0002006e657464537673696d30"], 0x34}, 0x1, 0x0, 0x0, 0x34000804}, 0x0) timer_settime(r4, 0x0, 0x0, 0x0) r15 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) read(r15, &(0x7f00000013c0)=""/4089, 0xff9) 1m5.050801101s ago: executing program 8 (id=5433): r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) write$qrtrtun(r0, &(0x7f0000000740)="b17de66ba8a5f519d5838eeccd69331d7d51ac5d2e419f40034ea5f8b641e36737ed5f26e73108c831759bf59326d06566281c2669331a50fb3a133595734cd74e276b1c7c1725d42342911f7862788c54ff67bd27d36630c29251508d9a7b8eed8e3b6f9f988b2a2309f454b9310916ad754caac3bc0710d100f3b5b2d44c3f", 0x80) r1 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0) preadv2(r1, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0) 1m5.026906501s ago: executing program 8 (id=5434): perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x1000040, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x2804, 0x0, 0x0, 0x0, 0x400, 0x10001, 0x625a, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x1, 0x5, 0x5, 0x0, 0x0, {0x0, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4008040) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000200)={[{@quota}, {@oldalloc}, {@barrier_val={'barrier', 0x3d, 0x3}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@block_validity}, {@jqfmt_vfsv1}]}, 0x3, 0x434, &(0x7f0000000940)="$eJzs289vFFUcAPDvzLZFKNiK+IOCWkVj44+WFlQOXjSaeNDERA94rG0hlYUaWhMhjVZj8GhIvBuPJv4FnvRi1JOJV70bEmJ6AT2tmd2ZdrvdLW3ZdtH9fJKB92be5n2/O/N238zrBtC1hrN/koj9EfF7RAzUqmsbDNf+u7m8OPX38uJUEpXKW38l1XY3lheniqbF6/rzykgakX6WxJEm/c5funxuslyeuZjXxxbOvz82f+nys7PnJ8/OnJ25MHHq1MkT4y88P/FcW/LMYrox9NHc0cOvvXP1janTV9/9+dukyL8hjzYZ3ujgE5VKm7vrrAN15aSng4GwJaWIyE5Xb3X8D0QpVk/eQLz6aUeDA3ZUpVKp9Lc+vFQB/seS6HQEQGcUX/TZ/W+x7dLU445w/aXaDVCW9818qx3piTRv09twf9tOwxFxeumfr7ItduY5BADAGt9n859nms3/0ri/rt3d+drQYETcExEHI+LeiDgUEfdFVNs+EBEPbrH/xkWS9fOf9Nq2EtukbP73Yr62tXb+V8z+YrCU1w5U8+9NzsyWZ47n78lI9O7J6uMb9PHDK7990epY/fwv27L+i7lgHse1nj1rXzM9uTB5OznXu/5JxFBPs/yTlZWAJCIOR8TQNvuYfeqbo62O3Tr/DbRhnanydcSTtfO/FA35F5KN1yfH7oryzPGx4qpY75dfr7zZqv/byr8NsvO/r+n1v5L/YFK/Xju/9T6u/PF5y3ua7V7/fcnb1XJfvu/DyYWFi+MRfcnrtaDr90+svraoF+2z/EeONR//B2P1nTgSEdlF/FBEPBwRj+SxPxoRj0XEsQ3y/+nlx9/bfv47K8t/ekvnf7XQF417mhdK5378bk2ng1vJPzv/J6ulkXzPZj7/NhPX9q5mAAAA+O9JI2J/JOnoSjlNR0drfy9/KPal5bn5hafPzH1wYbr2G4HB6E2LJ10Ddc9Dx/Pb+qI+0VA/kT83/rK0t1ofnZorT3c6eehy/S3Gf+bPUqejA3ac32tB9zL+oXsZ/9C9jH/oXk3G/95OxAHsvmbf/x93IA5g9zWMf8t+0EXc/0P3Mv6hexn/0JXm98atfySvoLCuEOkdEYbCDhU6/ckEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADQHv8GAAD//5LX5s8=") creat(&(0x7f0000000340)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r1 = open(&(0x7f0000000500)='./bus\x00', 0x0, 0x42) ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x13, 0x0, "ef359f41a4ae6dddfbd1ce5d29c2ee5e5c9d000ff8ee09e737ff0edf110ff4eb4b78c66ee677df701905b9aafab4ffffffff00", "cba3d625780820d1cbf7db71038259ca171ce1a311ef97e4298d1e14ef01060000e9009600fdff00000000000000000000000000000000000400", "d300e6d6ae9ef30bea2a004000", [0x2]}) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f00000001c0), &(0x7f0000000200)=ANY=[], 0x841, 0x0) r2 = gettid() r3 = socket$inet_smc(0x2b, 0x1, 0x0) listen(r3, 0x0) listen(r3, 0x5) timer_create(0x3, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) pause() timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) 1m4.116089263s ago: executing program 8 (id=5437): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000540)='inet_sock_set_state\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r3}, 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0) fcntl$lock(r5, 0x24, &(0x7f00000000c0)={0x2, 0x2, 0x9, 0x2}) ioctl$PTP_PIN_GETFUNC2(r5, 0xc0603d0f, &(0x7f00000002c0)={'\x00', 0x2, 0x3, 0x8000}) listen(r4, 0x200809) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x42, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syslog(0x2, &(0x7f0000001940)=""/94, 0x5e) syz_pidfd_open(0x0, 0x0) 1m3.50336063s ago: executing program 8 (id=5439): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000ff0f00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500), 0x404200, 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000001300)=""/241, 0xf1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000180)={0xc, 0x8b}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r7}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=@newlink={0xc0, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x90646}, [@IFLA_LINKINFO={0x90, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x80, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1f}}, @IFLA_VLAN_ID={0x6, 0x1, 0x1}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_ID={0x6, 0x1, 0x2}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x78}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3e}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x13, 0x2}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0xc0}, 0x1, 0x0, 0x0, 0x600}, 0x0) 1m3.50287974s ago: executing program 37 (id=5439): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000ff0f00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500), 0x404200, 0x0) readv(r2, &(0x7f0000000000)=[{&(0x7f0000001300)=""/241, 0xf1}], 0x1) prlimit64(0x0, 0xe, &(0x7f0000000180)={0xc, 0x8b}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x1, 0x803, 0x0) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r7}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=@newlink={0xc0, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x90646}, [@IFLA_LINKINFO={0x90, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x80, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1f}}, @IFLA_VLAN_ID={0x6, 0x1, 0x1}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_ID={0x6, 0x1, 0x2}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x78}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3e}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x13, 0x2}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0xc0}, 0x1, 0x0, 0x0, 0x600}, 0x0) 25.235757546s ago: executing program 9 (id=6128): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={<r0=>0xffffffffffffffff}) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000700)='kmem_cache_free\x00', r1, 0x0, 0x8000}, 0x18) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3, 0x0, 0x220}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0a000000040000000800000006"], 0x48) r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x3, [@struct={0xd, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x6, 0x3, 0x401}, {0x0, 0x3, 0x7}]}, @type_tag={0x4, 0x0, 0x0, 0x12, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x1000}}, @union={0xe, 0x2, 0x0, 0x5, 0x0, 0x7, [{0xd, 0x1, 0x800}, {0x4, 0x4, 0x81}]}, @fwd={0xc}, @struct={0xf, 0x2, 0x0, 0x4, 0x0, 0xdf81, [{0x4, 0x3, 0xa}, {0x4, 0x0, 0x2}]}, @float={0x3, 0x0, 0x0, 0x10, 0x10}, @decl_tag={0xc, 0x0, 0x0, 0x11, 0x2}]}, {0x0, [0x61]}}, &(0x7f00000008c0)=""/234, 0xd3, 0xea, 0x0, 0x0, 0x10000, @value}, 0x28) bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x7, <r5=>0x0}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xc, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, @fallback=0x17, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SIOCPNENABLEPIPE(r6, 0x89ed, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000140)) ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000180)={0x2, &(0x7f00000000c0)=[{0x60, 0x1, 0x0, 0x1}, {0x6, 0x0, 0x1}]}) r7 = socket$inet6_sctp(0xa, 0x801, 0x84) setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x3}, 0x8) sendto$inet6(r7, &(0x7f0000000040)="aa", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x3}, 0x3}, 0x1c) r8 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0xe1002) ioctl$SCSI_IOCTL_SEND_COMMAND(r8, 0x1, &(0x7f0000000040)=ANY=[@ANYRES64=r0]) 25.100200018s ago: executing program 9 (id=6137): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'syzkaller1\x00', 0xc201}) socket$kcm(0x2, 0xa, 0x2) faccessat2(0xffffffffffffffff, 0x0, 0x81, 0x1000) creat(0x0, 0xd931d3864d39dcca) bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={<r3=>0xffffffffffffffff}) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r2, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000740)=@newtaction={0x98, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80d, 0x0, 0x10000000, 0x5, 0x4}, 0x1, r4}}]}, {0x0, 0xa}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x1}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4008001}, 0x0) 24.990092049s ago: executing program 9 (id=6142): bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xc8, 0x4, [@float={0x8, 0x0, 0x0, 0x10, 0x2}, @ptr={0xa, 0x0, 0x0, 0x2, 0x4}, @enum={0x3, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x2}]}, @union={0xa, 0x3, 0x0, 0x5, 0x1, 0x838, [{0x5, 0x5, 0xf}, {0x10, 0x3, 0xfffffffa}, {0x5, 0x1, 0xfffffffc}]}, @const={0xc, 0x0, 0x0, 0xa, 0x1}, @struct={0xf, 0x6, 0x0, 0x4, 0x1, 0x3, [{0xf, 0x2, 0xcf7}, {0x10, 0x4, 0x7}, {0x6, 0x1, 0x4}, {0x8, 0x2, 0x7}, {0xe, 0x1, 0x7}, {0xb, 0x5, 0x8}]}, @float={0x5, 0x0, 0x0, 0x10, 0x4}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000003c0)=""/109, 0xe4, 0x6d, 0x0, 0x1, 0x0, @void, @value}, 0x28) r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d) r2 = bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd63) r3 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), r3) bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{}, {0x0, 0x4}, {0x0, 0x4, 0x10009, 0x5}], 0x10, 0xfffffff7, @void, @value}, 0x94) r4 = socket$kcm(0x10, 0x3, 0x10) r5 = syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r8 = socket$netlink(0x10, 0x3, 0x0) r9 = socket$xdp(0x2c, 0x3, 0x0) r10 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$XDP_RX_RING(r9, 0x11b, 0x2, &(0x7f00000002c0)=0x100, 0x4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', <r11=>0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x16, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @ldst={0x3, 0x3, 0x0, 0xa, 0x9, 0x18, 0xffffffffffffffff}, @generic={0x7, 0x4, 0x1, 0x3, 0xa3}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x20, '\x00', r11, 0x0, r7, 0x8, &(0x7f0000000600)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x1, 0x1, 0x7}, 0x10, 0x0, 0x0, 0x8, &(0x7f00000008c0)=[r7, r2, r0, r7, r7, r0], &(0x7f0000000900)=[{0x0, 0x2, 0x7, 0xb}, {0x2, 0x2, 0xa, 0xc}, {0x0, 0x5, 0x8, 0x2}, {0x3, 0x2, 0x2, 0x3}, {0x5, 0x3, 0xb, 0x9}, {0x1, 0x2, 0x3, 0xb}, {0x2, 0x5, 0x4, 0x9}, {0x3, 0x2, 0xf, 0x8}], 0x10, 0xff, @void, @value}, 0x94) mknodat$null(r5, &(0x7f0000000a40)='./file0\x00', 0x200, 0x103) syz_open_dev$evdev(&(0x7f00000000c0), 0xd, 0x10440) write$P9_RLERRORu(r7, &(0x7f0000000a80)={0x14, 0x7, 0x1, {{0x7, 'TIPCv2\x00'}, 0x1}}, 0x14) sendmsg$nl_route_sched(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x4000c00) sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803002d000b12d25a80648c2594f90124fc60100c022300040000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0) 24.644731053s ago: executing program 9 (id=6144): r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x88882, 0x0) ftruncate(0xffffffffffffffff, 0x2007ffc) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000009) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, r0, 0x2) r1 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x400, 0x17e7b0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x7dd6576e}, 0x10020, 0x3fd, 0x200, 0x8, 0x40004, 0x7ff, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2800004, 0x28011, r1, 0x0) syz_clone(0x40200, 0x0, 0x49, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x474, &(0x7f00000004c0)="$eJzs3EtsG0UfAPD/rvNo+viSr5RHSwuBgqh4JE36oAcuIJA4gIQEhyJOIUmrUrdBTZBoVUHhUI6oEnfEEYk7Eie4IOCAkLjCHVWqql5aOBmtvZs6jp06tRu3+PeT1p7ZXWfm79mxxzN2Auhb49lNErE1Iv6IiNFaduUJ47W7G9fOz/597fxsEpXKm1eT6nnXr52fLU4tHrellqlUIoaz5HCTci++EzFTLs+fyfOTS6fen1w8e+65E6dmjs8fnz89feTIwQN7hg5PH+oovjS/z+K6vuujhd07X3370uuzRy+9+/M3WX235sfr47gtWbQNxmvPbqNHs5snOyrsrvJrdrOtbkcy0PrkiQ2oEO0rRUTWXIPV/j8apRhZPjYar3za08oBd1SlUqk0e3/OXagA/2FJ9LoGQG8Ub/TZ599i26Chx13hyou1D0BZ3DfyrXZkYHnuYLDh8203jUfE0Qv/fJlt0Y15CACAW/g+G/8822z8l8YDdef9L19DGYuI/0fE9oi4LyJ2RMT9EdVzH4yIh9ZZfuMKyerxT3r5tgJrUzb+eyFf21o5/itGfzFWynPbqvEPJsdOlOf358/JvhgczvJTa5Txw8u/f16kNzUcqx//ZVtWfjEWzOtxeaBhgm5uZmmm07gLVz6J2DXQLP4kimWcJCJ2RsSu2yzjxNNf72517Nbxr2GNdaZ2Vb6KeKrW/hdiRfw3myppuT459fzh6UOTm6I8v3+yuCpW++W3i2+0Kr+j+Lsga//NTa//5VXgsWRTxOLZcyer67WL6y/j4p+f1fXpFavLWfzptxHrvv6Hkreq6aF834czS0tnpiKGktdW75+++dgiX5yfxb9vb/P+v72uxg9HRHYR74mIR/JF3KztHouIxyNi7xrx//TSE++1Oraq/UeK+NeYle+iLP65W7V/1Lf/+hOlkz9+13b8Tdv/YDW1L9/TzutfuxXs5LkDAACAe0Va/Q58kk4sp9N0YqL2Hf4dsTktLywuPXNs4YPTc7Xvyo/FYFrMdI3WzYdO5XPDRX66IX8gnzf+ojRSzU/MLpTneh089LktLfp/5q9Sr2sH3HFdWEcD7lH6P/Qv/R/6l/4P/Uv/h/7VrP9/3IN6ABvP+z/0L/0f+pf+D/1L/4e+1PK38WlHP/nvcaL43wkd/J2rvY+i48TInSwi0t4H2BeJgU4u43YSw00P9fiFCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoEv+DQAA//9L2OJW") bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff4e) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000008000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) socket$packet(0x11, 0x2, 0x300) r3 = fspick(0xffffffffffffff9c, &(0x7f00000005c0)='.\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_LIST_PHY(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)={0x14, 0x0, 0x30b}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x20000004) 24.301711438s ago: executing program 9 (id=6148): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000400)={[{@nogrpid}, {@noblock_validity}, {@noquota}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}, {@orlov}]}, 0x4, 0x4f5, &(0x7f0000000c00)="$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") bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) io_uring_setup(0xaab, &(0x7f0000000340)={0x0, 0x2c97, 0x1000, 0xfffffffd, 0x17b}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={<r0=>0xffffffffffffffff}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x3e, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x43, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) gettid() recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2000) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, <r3=>0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 23.506942017s ago: executing program 9 (id=6157): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900000000000007020000f8ffffffb703000008000000b7040000000000008500000001002000956dc8f8ebbe32847b4ea62d748672e41724fe17ccae4ed4d615af03ec43456fdef6b9dd362dfd064164d6106ead5f727b54a70045eb471b3222591a7aa5f8038afeb9ff659ac49211f6b0f068f939260dde728f8e7e898dabecbc5a7488e0081d2a6f33501afa7000f4dacdaf2ce74f88cda4fb17778aaccb8c09"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) r1 = socket(0x10, 0x3, 0x6) r2 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) r5 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) close(r4) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000680)={0x90, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x7c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x965}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x90}}, 0x880) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', <r6=>0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x90, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [], 0x0, [0x4, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c4, 0x0, 0x0, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}, @TCA_RATE={0x6}]}, 0x90}}, 0x20000000) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r7}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x80000000, 0x200000) ioctl$RTC_AIE_ON(r8, 0x7001) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000), &(0x7f0000000040)=0x8) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r10 = socket(0x400000000010, 0x3, 0x0) r11 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', <r12=>0x0}) sendmsg$nl_route_sched(r10, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r12, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=@newtfilter={0x40, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r12, {0xb, 0x6}, {0x0, 0x2}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x4}}, @TCA_RATE={0x6, 0x5, {0x8, 0x7}}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x0) 23.417338289s ago: executing program 38 (id=6157): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900000000000007020000f8ffffffb703000008000000b7040000000000008500000001002000956dc8f8ebbe32847b4ea62d748672e41724fe17ccae4ed4d615af03ec43456fdef6b9dd362dfd064164d6106ead5f727b54a70045eb471b3222591a7aa5f8038afeb9ff659ac49211f6b0f068f939260dde728f8e7e898dabecbc5a7488e0081d2a6f33501afa7000f4dacdaf2ce74f88cda4fb17778aaccb8c09"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) r1 = socket(0x10, 0x3, 0x6) r2 = socket(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = socket$tipc(0x1e, 0x5, 0x0) setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) r5 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) close(r4) sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000680)={0x90, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x7c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x965}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x90}}, 0x880) ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', <r6=>0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x90, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [], 0x0, [0x4, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c4, 0x0, 0x0, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}, @TCA_RATE={0x6}]}, 0x90}}, 0x20000000) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r7}, 0x10) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) r8 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x80000000, 0x200000) ioctl$RTC_AIE_ON(r8, 0x7001) madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15) socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000), &(0x7f0000000040)=0x8) r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r10 = socket(0x400000000010, 0x3, 0x0) r11 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', <r12=>0x0}) sendmsg$nl_route_sched(r10, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r12, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r10, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=@newtfilter={0x40, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r12, {0xb, 0x6}, {0x0, 0x2}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x4}}, @TCA_RATE={0x6, 0x5, {0x8, 0x7}}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x0) 16.609476413s ago: executing program 5 (id=6315): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b703000008000040850000006900"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='sys_enter\x00', r1}, 0x10) statx(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x80, &(0x7f00000006c0)) 16.573640814s ago: executing program 5 (id=6317): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0x100}, 0x18) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001300)=@newtaction={0x88c, 0x30, 0xffff, 0x3, 0x0, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x4, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffc, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x7, 0x0, 0x0, 0xfffffffe, {0x3, 0x0, 0x0, 0x0, 0xb, 0x3}, {0x4, 0x2, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x3, 0x2}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x4, 0x0, 0x0, 0x0, 0x1, 0x25d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x2, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x80000, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff81, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x8]}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x1}}}}]}]}, 0x88c}}, 0x0) 16.565664064s ago: executing program 5 (id=6319): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48284b70043dc6124d877142a48448b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d4023f210fa34b63a715a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900000000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b6c7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48fc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f01000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb796ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab04000000ffe760e717a04becff0f719197724f4fce1093b62d7e8c7123d890decace0200f404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef29cd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9fdc75aaaf0100483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270bb29b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214d00000000d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ce21d69993e9960ff5f76015e6c354463d7d0917fc80e5009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab4000000000000000028df75cf43f8ecc8d37b126602111b40e761fd21081920382f14d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd63bed8d31c31c37a373d4efd89fa516dab183ee65744fb8fc4f9ce2242e0f00000000010000000000000000000057d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fa03b84f63e022fe755f4007a4a899eaf52c4f49198e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c716357d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c24936615ee68538e8fddd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba1c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63c41cbde2ba66ad81168070c8c6e18a6e452a31bde54ad3e16304d06a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c7340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85eff010000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f14eafe4b28ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1bfeef448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1099e40550a1cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab916a781b9912160a3fd2a2e74dd690c57bdfdc1f069f9491bca7a8c59363799be70018c25ece5ad7307dc7a95c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2cdfb7fea73ca18874664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677ec97c5c568a89d6e36b165c391339878b699644c96bd6ea589765ed2a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae2676384ff799783f55d7e5a1a092a01b965dc99cb7a9d98440c355927629f2bcf9dc2396eb2f5d25829715b24327642ac4741201014a95e0e65e12cdf27e19043e3c5d3e798375cead35b9a93190a52cdecaaccc854a1d41ef365303f0e9b4fc969c9dab6d00000000000000000000008f6555f3b7d5021dfc8eb504f1e4fef716d60f0d50b03fc014fd3dff46f56750f0ba4f1b9f7de5c17e7d1f18522897edab8e9e76b667ec6b01908400f55e16f0cfbf026be5f5acc681053f697d62b3545aec4606e190216c22c1d8807b6c43f0f0a4b53619fe5c9412821c3816194a5e29cf12cc7a197b5bdafb096d2d7f6be483814c92ef29c3a21c169794c7de3b4c706f4de5f4b93c831944c7b66fa49f317aa22dbc211e19f031c4f8bee14ecd5eb061a052044adc4dd1b63a1500a9c0e09dbba23f2726a55975"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r0}, 0x18) prctl$PR_SET_NAME(0xf, &(0x7f0000000300)='\x04\x00\x00\x00\x00^\xf6jAc') mount$tmpfs(0x0, &(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00), 0x100400, &(0x7f0000001d40)={[{@usrquota_block_hardlimit={'usrquota_block_hardlimit', 0x3d, [0x74, 0x67, 0x74]}}, {@quota}, {@grpquota_block_hardlimit={'grpquota_block_hardlimit', 0x3d, [0x78, 0x30, 0x36]}}, {@inode32}], [{@obj_role={'obj_role', 0x3d, 'tunl0\x00'}}, {@permit_directio}]}) 16.530151334s ago: executing program 5 (id=6320): r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x88882, 0x0) ftruncate(0xffffffffffffffff, 0x2007ffc) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000009) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, r0, 0x2) r1 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x400, 0x17e7b0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x7dd6576e}, 0x10020, 0x3fd, 0x200, 0x8, 0x40004, 0x7ff, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2800004, 0x28011, r1, 0x0) syz_clone(0x40200, 0x0, 0x49, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x474, &(0x7f00000004c0)="$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") bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff4e) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000008000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) socket$packet(0x11, 0x2, 0x300) r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r3) sendmsg$IEEE802154_LIST_PHY(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)={0x14, r4, 0x30b}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x20000004) 16.313074677s ago: executing program 5 (id=6324): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18) r2 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x48002) (fail_nth: 1) 15.820934073s ago: executing program 5 (id=6336): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14008, &(0x7f0000000400)={[{@bsdgroups}]}, 0x1, 0x51c, &(0x7f0000001300)="$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") r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r1}, &(0x7f0000004000), &(0x7f0000004040)}, 0x3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r2, 0x0, 0x8000000000000}, 0x18) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x62, 0x514da, 0x101, 0x8000000, 0x3, 0xfffffffe, 0x200001, 0x0, 0x7cce8c743ee810da}) write$qrtrtun(r0, &(0x7f0000000740)="b17de66ba8a5f519d5838eeccd69331d7d51ac5d2e419f40034ea5f8b641e36737ed5f26e73108c831759bf59326d06566281c2669331a50fb3a133595734cd74e276b1c7c1725d42342911f7862788c54ff67bd27d36630c29251508d9a7b8eed8e3b6f9f988b2a2309f454b9310916ad754caac3bc0710d100f3b5b2d44c3f", 0x80) r3 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0) preadv2(r3, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0) 15.777391404s ago: executing program 39 (id=6336): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14008, &(0x7f0000000400)={[{@bsdgroups}]}, 0x1, 0x51c, &(0x7f0000001300)="$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") r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r1}, &(0x7f0000004000), &(0x7f0000004040)}, 0x3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r2, 0x0, 0x8000000000000}, 0x18) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x62, 0x514da, 0x101, 0x8000000, 0x3, 0xfffffffe, 0x200001, 0x0, 0x7cce8c743ee810da}) write$qrtrtun(r0, &(0x7f0000000740)="b17de66ba8a5f519d5838eeccd69331d7d51ac5d2e419f40034ea5f8b641e36737ed5f26e73108c831759bf59326d06566281c2669331a50fb3a133595734cd74e276b1c7c1725d42342911f7862788c54ff67bd27d36630c29251508d9a7b8eed8e3b6f9f988b2a2309f454b9310916ad754caac3bc0710d100f3b5b2d44c3f", 0x80) r3 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0) preadv2(r3, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0) 11.26905509s ago: executing program 3 (id=6426): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40201, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'syzkaller1\x00', 0xc201}) socket$kcm(0x2, 0xa, 0x2) faccessat2(0xffffffffffffffff, 0x0, 0x81, 0x1000) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, <r2=>0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000300)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={<r4=>0xffffffffffffffff}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000740)=@newtaction={0x98, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80d, 0x0, 0x10000000, 0x5, 0x4}, 0x1, r5}}]}, {0x0, 0xa}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x1}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4008001}, 0x0) 11.164973431s ago: executing program 3 (id=6430): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a3000000100090003007379"], 0x7c}}, 0x0) (fail_nth: 2) 10.857008465s ago: executing program 3 (id=6432): r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x14, &(0x7f0000000140)={<r1=>0xffffffffffffffff}, 0x106, 0x9}}, 0x20) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r3 = socket(0x400000000010, 0x3, 0x0) r4 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', <r5=>0x0}) sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0x5}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xe, 0x4, 0x4, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa02, {{0x6000000, 0x4e24, 0x40003, @mcast1}, {0x2, 0xfff9, 0xc00, @remote, 0xffffffff}, r1, 0x9dffffff}}, 0x48) 10.769390296s ago: executing program 3 (id=6436): r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x88882, 0x0) ftruncate(0xffffffffffffffff, 0x2007ffc) sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000009) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, r0, 0x2) r1 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x400, 0x17e7b0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x7dd6576e}, 0x10020, 0x3fd, 0x200, 0x8, 0x40004, 0x7ff, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2800004, 0x28011, r1, 0x0) syz_clone(0x40200, 0x0, 0x49, 0x0, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x474, &(0x7f00000004c0)="$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") bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff4e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r2) sendmsg$IEEE802154_LIST_PHY(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)={0x14, r3, 0x30b}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x20000004) 10.42367594s ago: executing program 3 (id=6445): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000000)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000004000000b703000008000040850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='sys_enter\x00', r1}, 0x10) statx(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x80, &(0x7f00000006c0)) 9.930070496s ago: executing program 3 (id=6455): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000020000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', <r3=>0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) setrlimit(0x8, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r5 = semget$private(0x0, 0x4, 0x4ac) semctl$IPC_SET(r5, 0x0, 0x1, 0x0) semop(r5, &(0x7f0000000300)=[{0x2, 0x8, 0x800}, {0x2, 0x2, 0x2800}, {0x1, 0xa330, 0x1000}], 0x3) semop(r5, &(0x7f00000000c0)=[{0x1, 0x4, 0x800}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f0000000400000008"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e"], 0x48) sendmsg$nl_route(r4, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001800010000000000000000000a000000000000000000000008000400", @ANYRES32=r3, @ANYBLOB="06001500070000000c00168008000100", @ANYRES64=r2], 0x38}}, 0x10) 9.888086107s ago: executing program 40 (id=6455): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000020000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = socket$nl_route(0x10, 0x3, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', <r3=>0x0}) r4 = socket$nl_route(0x10, 0x3, 0x0) setrlimit(0x8, 0x0) syz_open_pts(0xffffffffffffffff, 0x0) r5 = semget$private(0x0, 0x4, 0x4ac) semctl$IPC_SET(r5, 0x0, 0x1, 0x0) semop(r5, &(0x7f0000000300)=[{0x2, 0x8, 0x800}, {0x2, 0x2, 0x2800}, {0x1, 0xa330, 0x1000}], 0x3) semop(r5, &(0x7f00000000c0)=[{0x1, 0x4, 0x800}], 0x1) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f0000000400000008"], 0x50) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e"], 0x48) sendmsg$nl_route(r4, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001800010000000000000000000a000000000000000000000008000400", @ANYRES32=r3, @ANYBLOB="06001500070000000c00168008000100", @ANYRES64=r2], 0x38}}, 0x10) 2.503287929s ago: executing program 2 (id=6641): r0 = socket(0x10, 0x2, 0x0) r1 = dup2(r0, r0) sendto$inet6(r1, &(0x7f0000000000)="1c00000018001f05b9409b0dffff000d0203be040205060506014007430008000f000000fac8388827a685a168d9a4c6040045653600648dcaaf6c26c291214549932fde4a460c89b6ec0cff3959547f509058ba86c902003a03004a32000400160012000a00000000000000000000080756ede4ccbe5880", 0x78, 0x0, 0x0, 0x0) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, &(0x7f00000001c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b000000050000000100010009000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b708000000f1ff007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$key(0xf, 0x3, 0x2) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x40010, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) 2.45263789s ago: executing program 2 (id=6642): r0 = socket(0x10, 0x3, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x0, 0x7c7, 0x7ff, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x80, 0x4, 0x0, @loopback, @rand_addr=0x64010101}}}}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f3, &(0x7f0000000000)={'gre0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x0, 0x700, 0x6, 0x0, {{0x5, 0x4, 0x0, 0x16, 0x14, 0xfffd, 0x0, 0x1, 0x4, 0x0, @loopback, @rand_addr=0x64010100}}}}) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r3}, 0x10) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="540000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000e1000000240012800b0001006272696467650000140002800500190000000000050018000100000008000a00", @ANYRES32], 0x54}}, 0x0) socket(0x10, 0x3, 0x0) (async) socket$inet_udp(0x2, 0x2, 0x0) (async) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x0, 0x7c7, 0x7ff, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x80, 0x4, 0x0, @loopback, @rand_addr=0x64010101}}}}) (async) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f3, &(0x7f0000000000)={'gre0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x0, 0x700, 0x6, 0x0, {{0x5, 0x4, 0x0, 0x16, 0x14, 0xfffd, 0x0, 0x1, 0x4, 0x0, @loopback, @rand_addr=0x64010100}}}}) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) (async) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r3}, 0x10) (async) sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="540000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000e1000000240012800b0001006272696467650000140002800500190000000000050018000100000008000a00", @ANYRES32], 0x54}}, 0x0) (async) 1.889564666s ago: executing program 2 (id=6649): ioperm(0x5, 0x9, 0x80) mq_notify(0xffffffffffffffff, 0x0) 1.823780887s ago: executing program 2 (id=6653): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x24044, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1100, 0x5dd9, 0x0, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth0_virt_wifi\x00', 0x2000000}, 0x18) setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000002c0)={0x1, 'ipvlan1\x00', 0x100}, 0x18) r1 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x1, 0x0) syz_emit_ethernet(0x7e, &(0x7f0000000040)={@link_local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x80}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f53a04", 0x48, 0x3a, 0x0, @remote, @mcast2, {[], @param_prob={0x2, 0x0, 0x0, 0x500, {0x0, 0x6, "508359", 0x0, 0x0, 0x0, @private1, @mcast1={0xff, 0x0, '\x00', 0x0}, [@hopopts={0x3a, 0x1, '\x00', [@calipso={0x7, 0x8}]}]}}}}}}}, 0x0) perf_event_open(&(0x7f0000001700)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x1}, 0x8806, 0x3, 0x634e, 0x0, 0x0, 0x1, 0xfff6, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800010009000000000000000a00000000000000080001000200000004000b"], 0x24}}, 0x0) fchdir(r2) pipe2$9p(&(0x7f0000000080), 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121042, 0x18) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={[{@usrquota}, {@noblock_validity}, {@bh}, {@max_batch_time={'max_batch_time', 0x3d, 0x8c9}}, {@debug}, {@inlinecrypt}]}, 0x6, 0x5fc, &(0x7f0000000c00)="$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") 1.823080257s ago: executing program 4 (id=6655): r0 = socket(0x10, 0x2, 0x0) r1 = dup2(r0, r0) sendto$inet6(r1, &(0x7f0000000000)="7800000018001f05b9409b0dffff000d0203be040205060506014007430008000f000000fac8388827a685a168d9a4c6040045653600648dcaaf6c26c291214549932fde4a460c89b6ec0cff3959547f509058ba86c902003a03004a32000400160012000a00000000000000000000080756ede4ccbe5880", 0x78, 0x0, 0x0, 0x0) (fail_nth: 4) ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, &(0x7f00000001c0)) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b000000050000000100010009000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b708000000f1ff007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socket$key(0xf, 0x3, 0x2) mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x40010, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140)) mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil) 1.709848079s ago: executing program 4 (id=6657): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0x100}, 0x18) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001300)=@newtaction={0x88c, 0x30, 0xffff, 0x3, 0x0, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x4, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffc, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x7, 0x0, 0x0, 0xfffffffe, {0x3, 0x0, 0x0, 0x0, 0xb, 0x3}, {0x4, 0x2, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x3, 0x2}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x4, 0x0, 0x0, 0x0, 0x1, 0x25d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x2, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x80000, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff81, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x8]}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x1}}}}]}]}, 0x88c}}, 0x0) 1.356294853s ago: executing program 4 (id=6662): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x40801, 0x0) fcntl$setstatus(r0, 0x4, 0x42000) ioctl$FS_IOC_GETFLAGS(r0, 0x5437, 0x0) r1 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r1, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=ANY=[@ANYBLOB="05000000000500"/16, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000000000003fae8a9ad451a727"], 0x48}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000009f910000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@generic={&(0x7f0000000900)='./file0\x00', 0x0, 0x8}, 0x18) sendmsg$can_bcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000880)=ANY=[@ANYBLOB='\x00'/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r4, @ANYRES64=0x0, @ANYBLOB="0200004001000000030000e006030000e05ad60a92c50497", @ANYRES32=r0], 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x40000) sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="050000009f6000"/16, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000003"], 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x8800) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f00000007c0)={0x0, @isdn={0x22, 0x5, 0x9, 0xdc, 0x7f}, @sco={0x1f, @none}, @vsock={0x28, 0x0, 0x2710, @my=0x0}, 0x7, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)='wg0\x00', 0xffffffff, 0x1, 0xa}) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001a00)=ANY=[@ANYBLOB="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", @ANYRES16=r6, @ANYBLOB="01000000000000000000390000001c000d80180003801400050005000b0007000700ff03060006000500"], 0x30}, 0x1, 0x0, 0x0, 0x11}, 0x80) r7 = socket$netlink(0x10, 0x3, 0x8000000004) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000005c0)) r8 = socket$inet6(0xa, 0x2, 0x0) setsockopt$sock_int(r8, 0x1, 0xf, &(0x7f0000000240)=0x9, 0x4) sendmsg$IPSET_CMD_PROTOCOL(r7, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=ANY=[@ANYBLOB="1c0000c0010601020000000000000001050000090500000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40080) r9 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), r7) sendmsg$MPTCP_PM_CMD_ADD_ADDR(r5, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYBLOB="241d0000", @ANYRES16=r9, @ANYBLOB="1e5b2cbd7000fcdbdf250100000005000500d20000000500050061000000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0) r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r11, 0x0, 0x8000000000000}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="2100000000000000000000000000100000040000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000d3000000000000000000000000000000000200000000000000004d0dc5312a38d561b6065bff18460f3a2b2f26639c4ea38808344e080c8941962cbc902e4588e6d8c25fe33dbb50c91b3e0b6c4c6879a13aaa497cc0d1ff5580d6f3727f15ac7f8673"], 0x50) writev(r7, &(0x7f0000000180)=[{&(0x7f00000001c0)="580000001400add427323b472545b45602117fffffff81000e220e227f000008925aa80013007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000deff0000000200000000", 0x58}], 0x1) 1.316279434s ago: executing program 4 (id=6664): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000400)='GPL\x00', 0x4d2, 0xb3, &(0x7f00000004c0)=""/179, 0x41100, 0x40, '\x00', 0x0, 0x18, r2, 0x8, &(0x7f0000000580)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xb, 0x2, 0x76}, 0x10, 0x7f1, 0xffffffffffffffff, 0x0, &(0x7f0000000600)=[r1, r1, r1, r1, r3], 0x0, 0x10, 0x5a, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ipvlan0\x00', <r5=>0x0}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_usb_disconnect(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e00000000000000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bf"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, &(0x7f0000000380)) io_uring_enter(0xffffffffffffffff, 0x5a30, 0xf2ed, 0x1e, &(0x7f0000000000)={[0x3]}, 0x8) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000980)='syz0\x00', 0x200002, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000a00)={0x7955}, 0x8) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000fedbdf25080000001800028014000380100001800400030008000100050000000c00018008000100", @ANYRES32=r5], 0x38}, 0x1, 0x0, 0x0, 0x4000814}, 0x0) 1.229638305s ago: executing program 2 (id=6665): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000400)='GPL\x00', 0x4d2, 0xb3, &(0x7f00000004c0)=""/179, 0x41100, 0x40, '\x00', 0x0, 0x18, r2, 0x8, &(0x7f0000000580)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xb, 0x2, 0x76}, 0x10, 0x7f1, 0xffffffffffffffff, 0x0, &(0x7f0000000600)=[r1, r1, r1, r1, r3], 0x0, 0x10, 0x5a, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ipvlan0\x00', <r5=>0x0}) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_usb_disconnect(0xffffffffffffffff) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e00000000000000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bf"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, &(0x7f0000000380)) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) openat$cgroup(0xffffffffffffffff, &(0x7f0000000980)='syz0\x00', 0x200002, 0x0) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000a00)={0x7955}, 0x8) bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000fedbdf25080000001800028014000380100001800400030008000100050000000c00018008000100", @ANYRES32=r5], 0x38}, 0x1, 0x0, 0x0, 0x4000814}, 0x0) 865.280849ms ago: executing program 6 (id=6674): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRESDEC=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='setgroups\x00') close_range(r3, 0xffffffffffffffff, 0x0) ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000580)=@urb_type_interrupt={0x1, {0x8, 0x1}, 0x9, 0x80, &(0x7f0000000640)="c87132714ccfd26518b951229c968afaceb822697a6ca6ec22019baa8b26c62afa3dd8a2b754f33e7b399846ca1a44eaba82eb2b544b1c4a5c8e2306e59c3eced2493c30d0fbfaa1c634187602acdc00803756d13fc50a316eb610d865bcb31628d23d9dd586d150288ebbfafd281e82b1826d2e103dd3fff34f9b25f11ca50c98db76bc", 0x84, 0x5c34ac39, 0xc, 0x0, 0x3, 0x7, &(0x7f00000007c0)="6037279ff40821478e31d804063101863a82234793c024e05b940dac6e4022872dc521d9c96b5a842da6d5ea5f53cef0bf11cb40ddfadaa8bdb21db3119e233ff3e16fcb1051dae49304d78938fcf8886045c40d93ebe37809acb5c0a2383e5286e4013743ebe20b1205453ecf1f8911bf94dc7ab8c2e3b000fb4e4ff0c4487fde80d0867d41ab17f09629324d6ff4f7a202af022dcc77d1417d0dff9cf273333efd736e8b0a7f9611eb9dabfb5eff196081fa80e43a10ec3379ef85c5ce98f9ed8a4c51dbdb9c3a826766be3989dfe065a0e364473fd3"}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, <r4=>0x0, 0x0, 0x0, 0x0, 0x7, 0x8, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x46, &(0x7f0000000200)=[{}], 0x8, 0x10, &(0x7f0000000240), &(0x7f0000000300), 0x8, 0xdf, 0x8, 0x8, &(0x7f0000000340)}}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x2, 0x800000000003}, 0x1320, 0xffffffff, 0x3, 0x5, 0x8, 0x1088f109, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c16, &(0x7f0000000500)={[{@resuid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}]}, 0xff, 0x247, &(0x7f0000000ac0)="$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") r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x275a, 0x0) ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000005d00)=ANY=[@ANYBLOB="000000004c900200080000000300010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff"]) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0x10, &(0x7f0000000100)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback=0x21, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r6}, 0x18) syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0) 776.71042ms ago: executing program 6 (id=6677): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10) r1 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0) ftruncate(r1, 0x2007ffc) 776.29542ms ago: executing program 6 (id=6678): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, <r1=>0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000300)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kfree\x00', r2}, 0x10) r3 = socket$nl_route(0x10, 0x3, 0x0) socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={<r4=>0xffffffffffffffff}) getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14) sendmsg$nl_route_sched(r3, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000740)=@newtaction={0x98, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80d, 0x0, 0x10000000, 0x5, 0x4}, 0x1, r5}}]}, {0x0, 0xa}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x1}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4008001}, 0x0) 722.551511ms ago: executing program 6 (id=6679): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x10, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000006, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) 701.296511ms ago: executing program 6 (id=6682): r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', <r3=>0x0}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000040000000c"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000003580)=@newtfilter={0x78, 0x2c, 0xd27, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0xfff3, 0x7}, {}, {0xa, 0x1}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x48, 0x2, [@TCA_CGROUP_EMATCHES={0x44, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x38, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x34, 0x1, 0x0, 0x0, {{0xe37, 0x9, 0x5}, [@TCA_EM_IPT_MATCH_DATA={0x4}, @TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xba}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}]}}]}]}]}}]}, 0x78}, 0x1, 0x0, 0x0, 0x80}, 0x40010) 663.802072ms ago: executing program 6 (id=6684): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="280000000400000558000000086138611d7e977ba8de6d0500000000000000fc7d8a000045847a3fb0bfa0356a6aab8c4c0c9f344b2564ed5375b8273d679aa844eb3421da6786caf1e6a14bb16a28672ca2cc3999cd78a173d5052376a7be72c6653f8c5f6a1352f2a84b3a33063c"], 0x48) io_setup(0x8, &(0x7f0000000000)=<r3=>0x0) r4 = eventfd2(0x0, 0x80001) io_submit(r3, 0x3, &(0x7f00000005c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000280)="d1f7624a6b0e53c3", 0x8, 0x2}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x5, r2, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x0]) openat$urandom(0xffffffffffffff9c, &(0x7f0000000300), 0x682202, 0x0) writev(r1, &(0x7f0000000400), 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1809049, 0x0, 0xff, 0x0, 0x0) setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0) lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0) lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0) 568.029533ms ago: executing program 4 (id=6687): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000400)={[{@nogrpid}, {@noblock_validity}, {@noquota}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}, {@orlov}]}, 0x4, 0x4f5, &(0x7f0000000c00)="$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") sendmsg$unix(0xffffffffffffffff, 0x0, 0x4004881) recvmsg$unix(0xffffffffffffffff, 0x0, 0x2000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, <r1=>0xffffffffffffffff}, 0x0, &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 562.282823ms ago: executing program 4 (id=6689): r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'dummy0\x00', <r5=>0x0}) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', <r7=>0x0}) bind$can_raw(r0, &(0x7f0000000480)={0x1d, r7}, 0x10) close(r0) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r9 = socket$unix(0x1, 0x5, 0x0) r10 = socket$can_bcm(0x1d, 0x2, 0x2) ioctl$ifreq_SIOCGIFINDEX_vcan(r10, 0x8933, &(0x7f0000000100)={'vcan0\x00', <r11=>0x0}) connect$can_bcm(r10, &(0x7f00000000c0)={0x1d, r11}, 0x10) sendmsg$can_bcm(r10, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="0100000003ece1e40ad8871461ab0800", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r9, @ANYBLOB="3bf81bb9f9"], 0x20000600}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$can_bcm(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[], 0x4640}, 0x2}, 0x0) pipe(&(0x7f0000000080)={<r12=>0xffffffffffffffff, <r13=>0xffffffffffffffff}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newqdisc={0x3c, 0x24, 0x0, 0x0, 0x0, {}, [@qdisc_kind_options=@q_codel={{0xa}, {0xc, 0x2, [@TCA_CODEL_INTERVAL={0x8, 0x3, 0x6}]}}]}, 0x3c}}, 0x0) r14 = socket$inet_udp(0x2, 0x2, 0x0) close(r14) socket$nl_route(0x10, 0x3, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)={0x0, 0x0, 0x100, {0x0, 0xa}, {0x3}, @const={0x0, {0x1, 0x8, 0x4, 0x881}}}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4808000010001fff3a4ee9bfd5c3a3696c40af0b", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e"], 0x3}}, 0x0) write$binfmt_misc(r13, &(0x7f0000000000), 0xfffffecc) splice(r12, 0x0, r14, 0x0, 0x4ffe6, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, r13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 537.810713ms ago: executing program 2 (id=6690): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x2, @perf_config_ext={0xf60, 0x40ffffffff}, 0x1100, 0x5, 0x3a65, 0x5, 0x0, 0x5, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) read$hiddev(r2, 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x5, 0x6, 0x5, 0xd, 0x0, 0x4, 0x400, 0x7, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000440), 0x1}, 0x100000, 0x0, 0x401, 0x9, 0x6, 0x8, 0x8000, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xa, r2, 0x2) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000006c0)='kfree\x00', r4}, 0x18) r5 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000840)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f0000000bc0)="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", 0x12d, r5) r6 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x4, 0x4}, 0x400, 0xffffffff, 0x6, 0x5, 0x0, 0x40000001, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002080)={&(0x7f0000000300)='kfree\x00', r8, 0x0, 0xfffffffffffffffc}, 0x18) r9 = socket$netlink(0x10, 0x3, 0x14) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x8, 0xc0100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xffffffff, 0x6, 0x4, 0x6, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0) r10 = syz_io_uring_setup(0x45f7, &(0x7f0000000980)={0x0, 0x5885, 0x80, 0x3, 0x4}, &(0x7f00000001c0)=<r11=>0x0, &(0x7f0000000280)=<r12=>0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r11, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r11, r12, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x4004, @fd_index=0x3, 0x0, 0x0}) r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000480)='svc_xprt_enqueue\x00', r13, 0x0, 0x99c}, 0x18) io_uring_enter(r10, 0x3516, 0x0, 0x0, 0x0, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000540)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020073797a30000000000800410073697700140033006c6f000000000000000000000000000049e252f3bed8ca8836c2ddb213da871e43b409"], 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=r7, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) 513.240904ms ago: executing program 0 (id=6692): bpf$TOKEN_CREATE(0x24, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, 0x0) (async) sendmsg$inet(0xffffffffffffffff, 0x0, 0x4051) (async) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000040000000900000001"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000f9ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10) setregid(0xee01, 0x0) (async) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x111d, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) r2 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101b01) ioctl$USBDEVFS_DISCONNECT_CLAIM(r2, 0x8108551b, &(0x7f0000002600)={0x0, 0x0, "5a77bd318786aeb879ca62cdab2a02fa560186d85b25a5665a3247e500f61681905db88235f8a5447dd2a2ed6e91626f068881e50f68530c2b21a100efb76cba37ff3111d6847e0c7f719e169a596e5fc008daefba68f6222103472bc55704cdb72b4b996ed82ccb1eaae27969d008ba7d34171113d806726615380fe65a6a0a72e19c2b60bd6276fd8bb6363d10f70da60fd53ded22c87eb2be010e4a62fb73c33424b437bb192c9d06ea6ed04983fe5c5ca033dfce0a82575ef14eee686be0fc58e384f93a13e4e8bbf599394baea3a9ca1864f0a35d6cc38fca32ad6b39905a9727d2001457df7be7e1aefe3635b2ee97c143f28def4b73905ca14d90d1f6"}) (async) ioctl$USBDEVFS_ALLOW_SUSPEND(r2, 0x5522) (async) syz_open_dev$usbfs(&(0x7f0000000240), 0x74, 0x200000) (async) r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000001c0)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff}) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async) sendmsg$inet(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000880)="b9", 0x1}], 0x1}, 0x20048811) (async) sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000b00)='>', 0x1}], 0x1}, 0x20000040) recvmsg$unix(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0}, 0x40) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @generic={0x66}, @initr0, @exit, @alu={0x4, 0x0, 0xa, 0x3}]}, &(0x7f0000001300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) r6 = socket$unix(0x1, 0x2, 0x0) bind$unix(r6, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async) accept4$unix(r6, 0x0, &(0x7f0000000280), 0x40000) 448.355784ms ago: executing program 0 (id=6693): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x10, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r1}, 0x18) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000006, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) 447.489764ms ago: executing program 0 (id=6694): bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) accept4(0xffffffffffffffff, &(0x7f00000009c0)=@ax25={{0x3, @default}, [@rose, @null, @bcast, @rose, @default, @netrom]}, &(0x7f0000000b00)=0x80, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) setitimer(0x2, 0x0, 0x0) 418.892845ms ago: executing program 0 (id=6695): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', <r3=>0x0}) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000040000000c"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000003580)=@newtfilter={0x78, 0x2c, 0xd27, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0xfff3, 0x7}, {}, {0xa, 0x1}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x48, 0x2, [@TCA_CGROUP_EMATCHES={0x44, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x38, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x34, 0x1, 0x0, 0x0, {{0xe37, 0x9, 0x5}, [@TCA_EM_IPT_MATCH_DATA={0x4}, @TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xba}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}]}}]}]}]}}]}, 0x78}, 0x1, 0x0, 0x0, 0x80}, 0x40010) 382.871235ms ago: executing program 0 (id=6696): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@var={0x82, 0x0, 0x0, 0x11, 0x3, 0xffffffff}, @const={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x2, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x2e, 0x2e]}}, 0x0, 0x44, 0x0, 0x0, 0x800, 0x0, @void, @value}, 0x28) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/13], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) rt_tgsigqueueinfo(0x0, 0x0, 0x1c, &(0x7f0000000580)={0x40, 0x5e, 0x2}) r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB="2eaf824e0000004000000000000000ebff00000000400000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000000)=0x8, 0x4) ppoll(&(0x7f0000000040)=[{r1, 0x100}], 0x1, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = syz_open_procfs(0x0, &(0x7f0000000480)='pagemap\x00') io_setup(0x2278, &(0x7f0000000180)=<r3=>0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r4=>0xffffffffffffffff}) setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f0000000000)={0x0, 0xea60}, 0x10) r5 = eventfd(0x101) r6 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x800, 0x0, 0x103, 0x1}, 0xf01a7180595e49a4) io_submit(r3, 0x2, &(0x7f0000000140)=[&(0x7f00000001c0)={0x0, 0x4, 0x0, 0x0, 0x0, r4, &(0x7f0000000200)=' ', 0x1, 0x0, 0x0, 0x2}, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x7, 0x2, r4, 0x0, 0x0, 0x0, 0x0, 0x1, r5}]) syz_clone(0x640c70a7, 0x0, 0x0, 0x0, 0x0, 0x0) preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000b00)=""/152, 0x98}, {&(0x7f0000000500)=""/189, 0x7fffef68}], 0x2, 0x0, 0x0) r7 = socket$kcm(0x10, 0x2, 0x0) perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x5d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600722, 0x66) ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0) sendmsg$inet(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000c40)="5c00000016006bab9a3fe3d86e17aa0a046b876c060048007ea60864160af36504811a0038001d001931a0e69ee517d34460be06000000a705251e6182949a9a7b9bcb84c9f4d4938037e70e4509c5bb4de385aa2adb88a899a655ab", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 228.421218ms ago: executing program 1 (id=6699): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000400)={[{@nogrpid}, {@noblock_validity}, {@noquota}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}, {@orlov}]}, 0x4, 0x4f5, &(0x7f0000000c00)="$eJzs3U9sVFsZAPDvTjttX1955elbqFEfIoqGMP0DNAQXwkZjCImBuHIBtR2apjNM02mRVhZl6d5EEle6duXOhQkrF+7c6c6NLkxQiYaauBhz79y2Q9vpFGg70Pn9ktt7zzml3zkdzjn3nmE4AfSsMxGxHhEDEXEvIkbz/CQ/4nrzSL/v5YvHMxsvHs8k0Wjc+WeSlad50fJnUh/mP3MoIm5/N+JHye649dW1helKpbyUp8eWq4tj9dW1i/OFPGdyamJq/OqlK5OH1tZPq795/p35mz/43W+/9Nc/rn/zJ2m1Rn56KitrbcdruT24b3Gz6cUYacnrj4ibbxTs3dSf//3h/ZP2ts9ExNms/49GX/ZqAgAnWaMxGo3R1jQAcNKlz/8jkRRK+VrASBQKpVJzDe+TGC5UavXlC6O1lQezka1hnY5i4f58pTyerxWejmKSpiey6+305I70pYj4OCJ+NvhBli7N1Cqz3bzxAYAe9uGO+f8/g835HwA44Ya6XQEA4NiZ/wGg95j/AaD3vMb879OBAHBCeP4HgN5j/geA3tNx/n9yPPUAAI7F92/dSo/GRv7/X88+XF351sjDi7Pl+kKpujJTmqktLZbmarW5Srk002h0+nmVWm1x4vJWsr66drdaW3mwfHe+Oj1XvlsuHnF7AIDOPv702Z+TiFi/9kF2RMteDuZqONkK3a4A0DV93a4A0DU+zwO96wDP+JYB4ITbY4veV7T9J0JPbf4K76vzn7f+D73K+j/0rjdb///2odcDOH7W/6F3NRqJPf8BoMdY4wfe6v1/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6FEj2ZEUStle4Ovp10KpFHEqIk5HMbk/XymPR8RHEfGnweJgmp7odqUBgLdU+HuS7/91fvRcejsQAy2lA8l/BzfzfvyLOz9/NL28vDSR5v9rK3/5aZ4/OdCtRgAAm67vzmrO0/m55UH+5YvHM5vHcVbx+Y3m5qJp3I38aJb0R392HopiRAz/O8nTTen9St8hxF9/EhGf227/o5YII9kaSHPn053x09injiD+9u9/Z/zCK/ELWVl6Lma/i88eQl2g1zy70Rwn876XdrG8/xXiTHbeu/8PZSPU29sc/zZ2jX+FrfGvb1f8JOvzZ7bS+9fk+eXff29XZmO0WfYk4gv9e8VPtuInbcbfcwds41+++OWz7coav4w4H3vHb6pmw+zYcnVxrL66dnG+Oj1Xnis/mJycmpgav3rpyuRYtkbd/PqHvWL849qFj9rFT9s/3Cb+UIf2f+2A7f/V/+798Cv7xP/GV/d+/T/ZJ346J379gPGnh6+33b47jT/bpv2dXv8LzbcFOvr139ZmD1hVAOAY1FfXFqYrlfJSh4v0XrPT97h4Py9iPeIdqIaLd+qi2yMTcNS2O323awIAAAAAAAAAAAAAALRTX11bGIyj/ThRt9sIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAyfX/AAAA//81As8n") sendmsg$unix(0xffffffffffffffff, 0x0, 0x4004881) recvmsg$unix(0xffffffffffffffff, 0x0, 0x2000) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, <r1=>0xffffffffffffffff}, 0x0, &(0x7f00000005c0)}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00') 227.933538ms ago: executing program 1 (id=6700): bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e0000008500000005"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) socket$inet6(0xa, 0x817, 0x80000001) add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000240)="000000000000003299b8f276dc75584a8d87d907005858367d61f49e1639a48f614a54a8192c2876b7f843cd3a3c07288fa0f1e28983b5cdc2e29b6e", 0x3c, 0xffffffffffffffff) r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000400)={0x0, 0xa, 0x8001}) syz_emit_ethernet(0x1162, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$rds(0x15, 0x5, 0x0) socket$inet_sctp(0x2, 0x1, 0x84) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xfffffffc, 0x6, 0x4, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000001001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2d4}}, 0x4048010) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00') preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000180)=""/66, 0x42}], 0x1, 0xe1, 0x3) socket$nl_generic(0x10, 0x3, 0x10) r4 = socket$kcm(0xa, 0x2, 0x0) sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f0000000100)=@in6={0xa, 0x4e20, 0xffff, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000cc0)=[{0x10, 0x1, 0x1}], 0x10}, 0x5004) r5 = syz_open_dev$usbfs(&(0x7f0000000080), 0x70, 0x101301) ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 68.978579ms ago: executing program 0 (id=6701): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff}) sendmsg$unix(r0, 0x0, 0x0) recvmmsg(r1, &(0x7f0000001140), 0x700, 0x2, 0x0) 62.424259ms ago: executing program 1 (id=6702): creat(&(0x7f0000000100)='./bus\x00', 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r0}, &(0x7f0000004000), &(0x7f0000004040)}, 0x3b) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r1, 0x0, 0x8000000000000}, 0x18) r2 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0) preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0) 46.20907ms ago: executing program 1 (id=6703): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14008, &(0x7f0000000400)={[{@bsdgroups}]}, 0x1, 0x51c, &(0x7f0000001300)="$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") creat(&(0x7f0000000100)='./bus\x00', 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r0, 0x0, 0x8000000000000}, 0x18) r1 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0) preadv2(r1, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0) 24.29307ms ago: executing program 1 (id=6704): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x10, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000006, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0) 0s ago: executing program 1 (id=6705): mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) (async) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES8=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000010a850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) (async) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff}) r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f00000014c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000760b49", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f00000014c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000760b49", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10) bind$unix(r3, &(0x7f0000000240)=@file={0x1, './file0/file0/file0\x00'}, 0x6e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000b00)='kmem_cache_free\x00', r2, 0x0, 0x1034}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f50bb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48284b70043dc6124d877142a48448b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68af2ad0810000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d4023f210fa34b63a715a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900000000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80aff9fa740b6c7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48fc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f01000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb796ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd317902f19e385be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab04000000ffe760e717a04becff0f719197724f4fce1093b62d7e8c7123d890decace0200f404e4e1f74b7eed82571be54c72d978cf906df0042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef29cd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9fdc75aaaf0100483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5ea1393fdf24285bf16b99c9cc0ad1857216f1a985f369191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a998de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270bb29b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214d00000000d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf0d031b0c7f0ce21d69993e9960ff5f76015e6c354463d7d0917fc80e5009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546b3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab4000000000000000028df75cf43f8ecc8d37b126602111b40e761fd21081920382f14d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d42645288d7226bbd9c9e9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df0e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd63bed8d31c31c37a373d4efd89fa516dab183ee65744fb8fc4f9ce2242e0f00000000010000000000000000000057d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fa03b84f63e022fe755f4007a4a899eaf52c4f49198e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c716357d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c24936615ee68538e8fddd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba1c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63c41cbde2ba66ad81168070c8c6e18a6e452a31bde54ad3e16304d06a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c7340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b9e6626f19eecb87e39175e85eff010000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f14eafe4b28ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1bfeef448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1099e40550a1cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab916a781b9912160a3fd2a2e74dd690c57bdfdc1f069f9491bca7a8c59363799be70018c25ece5ad7307dc7a95c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2cdfb7fea73ca18874664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677ec97c5c568a89d6e36b165c391339878b699644c96bd6ea589765ed2a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae2676384ff799783f55d7e5a1a092a01b965dc99cb7a9d98440c355927629f2bcf9dc2396eb2f5d25829715b24327642ac4741201014a95e0e65e12cdf27e19043e3c5d3e798375cead35b9a93190a52cdecaaccc854a1d41ef365303f0e9b4fc969c9dab6d00000000000000000000008f6555f3b7d5021dfc8eb504f1e4fef716d60f0d50b03fc014fd3dff46f56750f0ba4f1b9f7de5c17e7d1f18522897edab8e9e76b667ec6b01908400f55e16f0cfbf026be5f5acc681053f697d62b3545aec4606e190216c22c1d8807b6c43f0f0a4b53619fe5c9412821c3816194a5e29cf12cc7a197b5bdafb096d2d7f6be483814c92ef29c3a21c169794c7de3b4c706f4de5f4b93c831944c7b66fa49f317aa22dbc211e19f031c4f8bee14ecd5eb061a052044adc4dd1b63a1500a9c0e09dbba23f2726a55975efb4519d864d984dcb3a1dcafa1124a6b004029a706478df3be2438d2e35e6ca674dc190143a0b6f7db3408c0c08011e5d8f54711a0bd410ab53a15b1596cb77d2b58df2d8d8"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r6}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1fff}]}) setgroups(0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, @void, @value}, 0x94) gettid() (async) r8 = gettid() process_vm_writev(r8, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) (async) process_vm_writev(r8, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x141b82, 0x0) write$cgroup_int(r9, &(0x7f0000000000)=0x700, 0x12) (async) write$cgroup_int(r9, &(0x7f0000000000)=0x700, 0x12) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r1, 0x0, 0xf7}, 0x18) symlink(&(0x7f00000049c0)='.\x00', &(0x7f00000059c0)='./file0\x00') (async) symlink(&(0x7f00000049c0)='.\x00', &(0x7f00000059c0)='./file0\x00') r10 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) fcntl$lock(r10, 0x24, &(0x7f0000000400)={0x0, 0x2, 0x7ffffffffffffffc}) kernel console output (not intermixed with test programs): ack+0x1d/0x30 [ 353.553711][T21869] dump_stack_lvl+0xe8/0x140 [ 353.553745][T21869] dump_stack+0x15/0x1b [ 353.553767][T21869] should_fail_ex+0x265/0x280 [ 353.553809][T21869] should_fail+0xb/0x20 [ 353.553845][T21869] should_fail_usercopy+0x1a/0x20 [ 353.553868][T21869] strncpy_from_user+0x25/0x230 [ 353.553979][T21869] ? kmem_cache_alloc_noprof+0x186/0x310 [ 353.554049][T21869] ? getname_flags+0x80/0x3b0 [ 353.554097][T21869] getname_flags+0xae/0x3b0 [ 353.554135][T21869] __x64_sys_unlink+0x21/0x40 [ 353.554239][T21869] x64_sys_call+0x22a6/0x2fb0 [ 353.554309][T21869] do_syscall_64+0xd0/0x1a0 [ 353.554330][T21869] ? clear_bhb_loop+0x25/0x80 [ 353.554351][T21869] ? clear_bhb_loop+0x25/0x80 [ 353.554447][T21869] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 353.554474][T21869] RIP: 0033:0x7f191635e969 [ 353.554490][T21869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.554512][T21869] RSP: 002b:00007f19149a6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000057 [ 353.554535][T21869] RAX: ffffffffffffffda RBX: 00007f1916586080 RCX: 00007f191635e969 [ 353.554562][T21869] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000180 [ 353.554578][T21869] RBP: 00007f19149a6090 R08: 0000000000000000 R09: 0000000000000000 [ 353.554594][T21869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 353.554610][T21869] R13: 0000000000000000 R14: 00007f1916586080 R15: 00007ffdceba1a48 [ 353.554662][T21869] </TASK> [ 353.562132][T21872] loop3: detected capacity change from 0 to 1024 [ 353.577800][T21659] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 353.647441][T21872] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 353.657856][T21659] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.782119][T21659] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.790976][T21659] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.799694][T21659] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 353.824811][T21877] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz.3.6014: bg 0: block 88: padding at end of block bitmap is not set [ 353.841161][T21872] FAULT_INJECTION: forcing a failure. [ 353.841161][T21872] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 353.854353][T21872] CPU: 0 UID: 0 PID: 21872 Comm: syz.3.6014 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 353.854386][T21872] Tainted: [W]=WARN [ 353.854393][T21872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 353.854406][T21872] Call Trace: [ 353.854413][T21872] <TASK> [ 353.854420][T21872] __dump_stack+0x1d/0x30 [ 353.854452][T21872] dump_stack_lvl+0xe8/0x140 [ 353.854472][T21872] dump_stack+0x15/0x1b [ 353.854489][T21872] should_fail_ex+0x265/0x280 [ 353.854522][T21872] should_fail+0xb/0x20 [ 353.854559][T21872] should_fail_usercopy+0x1a/0x20 [ 353.854578][T21872] _copy_from_user+0x1c/0xb0 [ 353.854653][T21872] do_ip6t_set_ctl+0x3a9/0x840 [ 353.854706][T21872] nf_setsockopt+0x196/0x1b0 [ 353.854742][T21872] ipv6_setsockopt+0x11a/0x130 [ 353.854829][T21872] udpv6_setsockopt+0x99/0xb0 [ 353.854870][T21872] sock_common_setsockopt+0x66/0x80 [ 353.854898][T21872] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 353.854926][T21872] __sys_setsockopt+0x181/0x200 [ 353.854974][T21872] __x64_sys_setsockopt+0x64/0x80 [ 353.855008][T21872] x64_sys_call+0x2bd5/0x2fb0 [ 353.855029][T21872] do_syscall_64+0xd0/0x1a0 [ 353.855051][T21872] ? clear_bhb_loop+0x25/0x80 [ 353.855117][T21872] ? clear_bhb_loop+0x25/0x80 [ 353.855139][T21872] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 353.855160][T21872] RIP: 0033:0x7f000391e969 [ 353.855176][T21872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 353.855194][T21872] RSP: 002b:00007f0001f87038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 353.855223][T21872] RAX: ffffffffffffffda RBX: 00007f0003b45fa0 RCX: 00007f000391e969 [ 353.855236][T21872] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 000000000000000b [ 353.855248][T21872] RBP: 00007f0001f87090 R08: 0000000000000660 R09: 0000000000000000 [ 353.855285][T21872] R10: 0000200000001240 R11: 0000000000000246 R12: 0000000000000001 [ 353.855297][T21872] R13: 0000000000000000 R14: 00007f0003b45fa0 R15: 00007ffea23b9fb8 [ 353.855317][T21872] </TASK> [ 354.137049][T21892] netlink: 'syz.0.6018': attribute type 10 has an invalid length. [ 354.152021][T21892] hsr_slave_0: left promiscuous mode [ 354.161385][T21892] hsr_slave_1: left promiscuous mode [ 354.179050][T19317] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 354.254162][T21903] siw: device registration error -23 [ 354.261007][T21903] __nla_validate_parse: 16 callbacks suppressed [ 354.261026][T21903] netlink: 188 bytes leftover after parsing attributes in process `syz.3.6020'. [ 354.324490][T21907] IPVS: set_ctl: invalid protocol: 59 172.20.20.35:20003 [ 354.401455][T21913] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6026'. [ 354.410493][T21913] netlink: 32 bytes leftover after parsing attributes in process `syz.1.6026'. [ 354.419612][T21913] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6026'. [ 354.430011][T21913] netlink: 32 bytes leftover after parsing attributes in process `syz.1.6026'. [ 354.585237][T21924] netlink: 48 bytes leftover after parsing attributes in process `syz.1.6031'. [ 354.674689][T21932] siw: device registration error -23 [ 354.682389][T21932] netlink: 188 bytes leftover after parsing attributes in process `syz.1.6034'. [ 354.717914][T21935] netlink: 'syz.1.6035': attribute type 13 has an invalid length. [ 354.735926][T21935] netlink: 'syz.1.6035': attribute type 1 has an invalid length. [ 354.743785][T21935] netlink: 199820 bytes leftover after parsing attributes in process `syz.1.6035'. [ 354.761667][T21937] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6036'. [ 354.770804][T21937] netlink: 32 bytes leftover after parsing attributes in process `syz.3.6036'. [ 354.854978][T21943] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=21943 comm=syz.3.6039 [ 355.014860][T21957] siw: device registration error -23 [ 355.090167][T21965] program syz.1.6049 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 355.175504][T21975] siw: device registration error -23 [ 355.339526][T21996] program syz.2.6063 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 355.406995][T22002] netlink: 'syz.9.6067': attribute type 10 has an invalid length. [ 355.423911][T22002] hsr_slave_0: left promiscuous mode [ 355.429779][T22002] hsr_slave_1: left promiscuous mode [ 355.627168][T22019] siw: device registration error -23 [ 355.709540][T22021] netlink: 'syz.1.6074': attribute type 13 has an invalid length. [ 355.733182][T22021] netlink: 'syz.1.6074': attribute type 1 has an invalid length. [ 355.766778][T22025] 9pnet_fd: Insufficient options for proto=fd [ 356.059743][T22043] siw: device registration error -23 [ 356.172297][T22058] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 356.180267][T22058] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 356.234420][T22063] netlink: 'syz.0.6094': attribute type 10 has an invalid length. [ 356.476974][T22079] block device autoloading is deprecated and will be removed. [ 356.581472][T22091] only policy match revision 0 supported [ 356.581490][T22091] unable to load match [ 356.807559][T22107] loop9: detected capacity change from 0 to 512 [ 356.850228][T22111] netlink: 'syz.1.6113': attribute type 13 has an invalid length. [ 356.874151][T22111] netlink: 'syz.1.6113': attribute type 1 has an invalid length. [ 356.902349][T22107] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 356.943830][T22107] ext4 filesystem being mounted at /133/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 357.014017][T22121] dummy0: entered promiscuous mode [ 357.020003][T22121] bridge0: port 3(dummy0) entered blocking state [ 357.026520][T22121] bridge0: port 3(dummy0) entered disabled state [ 357.042149][T22121] dummy0: entered allmulticast mode [ 357.054414][T22121] bridge0: port 3(dummy0) entered blocking state [ 357.060907][T22121] bridge0: port 3(dummy0) entered forwarding state [ 357.128033][T19036] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 357.361121][ T29] kauditd_printk_skb: 490 callbacks suppressed [ 357.361137][ T29] audit: type=1326 audit(1746707164.713:27913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22134 comm="syz.9.6122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f723074e969 code=0x7ffc0000 [ 357.391066][ T29] audit: type=1326 audit(1746707164.713:27914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22134 comm="syz.9.6122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f723074e969 code=0x7ffc0000 [ 357.519596][ T29] audit: type=1326 audit(1746707164.753:27915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 357.543410][ T29] audit: type=1326 audit(1746707164.753:27916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 357.567089][ T29] audit: type=1326 audit(1746707164.763:27917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 357.590623][ T29] audit: type=1326 audit(1746707164.763:27918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 357.614220][ T29] audit: type=1326 audit(1746707164.763:27919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 357.638130][ T29] audit: type=1326 audit(1746707164.763:27920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 357.661630][ T29] audit: type=1326 audit(1746707164.763:27921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 357.685227][ T29] audit: type=1326 audit(1746707164.783:27922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 357.793100][T22152] program syz.9.6128 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 358.021767][T22180] FAULT_INJECTION: forcing a failure. [ 358.021767][T22180] name failslab, interval 1, probability 0, space 0, times 0 [ 358.034585][T22180] CPU: 1 UID: 0 PID: 22180 Comm: syz.3.6140 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 358.034625][T22180] Tainted: [W]=WARN [ 358.034634][T22180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 358.034656][T22180] Call Trace: [ 358.034663][T22180] <TASK> [ 358.034739][T22180] __dump_stack+0x1d/0x30 [ 358.034766][T22180] dump_stack_lvl+0xe8/0x140 [ 358.034789][T22180] dump_stack+0x15/0x1b [ 358.034810][T22180] should_fail_ex+0x265/0x280 [ 358.034850][T22180] should_failslab+0x8c/0xb0 [ 358.034913][T22180] __kvmalloc_node_noprof+0x126/0x4d0 [ 358.034934][T22180] ? alloc_netdev_mqs+0x5ac/0xab0 [ 358.034957][T22180] ? netif_set_tso_max_size+0xc5/0xe0 [ 358.034998][T22180] alloc_netdev_mqs+0x5ac/0xab0 [ 358.035024][T22180] rtnl_create_link+0x239/0x710 [ 358.035195][T22180] rtnl_newlink_create+0x151/0x630 [ 358.035230][T22180] ? security_capable+0x83/0x90 [ 358.035349][T22180] ? netlink_ns_capable+0x86/0xa0 [ 358.035385][T22180] rtnl_newlink+0xf29/0x12d0 [ 358.035473][T22180] ? __pfx_rtnl_newlink+0x10/0x10 [ 358.035558][T22180] rtnetlink_rcv_msg+0x5fb/0x6d0 [ 358.035590][T22180] netlink_rcv_skb+0x120/0x220 [ 358.035626][T22180] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 358.035719][T22180] rtnetlink_rcv+0x1c/0x30 [ 358.035740][T22180] netlink_unicast+0x59e/0x670 [ 358.035771][T22180] netlink_sendmsg+0x58b/0x6b0 [ 358.035806][T22180] ? __pfx_netlink_sendmsg+0x10/0x10 [ 358.035907][T22180] __sock_sendmsg+0x142/0x180 [ 358.035968][T22180] ____sys_sendmsg+0x31e/0x4e0 [ 358.035990][T22180] ___sys_sendmsg+0x17b/0x1d0 [ 358.036086][T22180] __x64_sys_sendmsg+0xd4/0x160 [ 358.036110][T22180] x64_sys_call+0x2999/0x2fb0 [ 358.036238][T22180] do_syscall_64+0xd0/0x1a0 [ 358.036260][T22180] ? clear_bhb_loop+0x25/0x80 [ 358.036282][T22180] ? clear_bhb_loop+0x25/0x80 [ 358.036304][T22180] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 358.036351][T22180] RIP: 0033:0x7f000391e969 [ 358.036366][T22180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 358.036384][T22180] RSP: 002b:00007f0001f87038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 358.036404][T22180] RAX: ffffffffffffffda RBX: 00007f0003b45fa0 RCX: 00007f000391e969 [ 358.036473][T22180] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000006 [ 358.036486][T22180] RBP: 00007f0001f87090 R08: 0000000000000000 R09: 0000000000000000 [ 358.036498][T22180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 358.036510][T22180] R13: 0000000000000000 R14: 00007f0003b45fa0 R15: 00007ffea23b9fb8 [ 358.036599][T22180] </TASK> [ 358.317785][T22185] validate_nla: 1 callbacks suppressed [ 358.317804][T22185] netlink: 'syz.9.6142': attribute type 13 has an invalid length. [ 358.335316][T22185] netlink: 'syz.9.6142': attribute type 1 has an invalid length. [ 358.364342][T22184] netlink: 'syz.1.6141': attribute type 10 has an invalid length. [ 358.397404][T22184] dummy0: entered promiscuous mode [ 358.429695][T22191] loop9: detected capacity change from 0 to 512 [ 358.431498][T22184] bridge0: port 3(dummy0) entered blocking state [ 358.443091][T22184] bridge0: port 3(dummy0) entered disabled state [ 358.461528][T22191] EXT4-fs (loop9): invalid journal inode [ 358.466754][T22196] loop3: detected capacity change from 0 to 1024 [ 358.467199][T22191] EXT4-fs (loop9): can't get journal size [ 358.530608][T22196] EXT4-fs: inline encryption not supported [ 358.538940][T22184] dummy0: entered allmulticast mode [ 358.544640][T22196] EXT4-fs: Ignoring removed bh option [ 358.556883][T22191] EXT4-fs (loop9): 1 truncate cleaned up [ 358.575774][T22191] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 358.612348][T22196] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 358.635892][T22191] EXT4-fs (loop9): re-mounted 00000000-0000-0000-0000-000000000000. [ 358.701155][T19036] EXT4-fs error (device loop9): ext4_lookup:1789: inode #14: comm syz-executor: invalid fast symlink length 39 [ 358.729612][T19036] EXT4-fs error (device loop9): ext4_lookup:1789: inode #14: comm syz-executor: invalid fast symlink length 39 [ 358.753624][T19317] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 359.031801][T22197] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 359.318665][T22222] siw: device registration error -23 [ 359.405216][T22222] __nla_validate_parse: 42 callbacks suppressed [ 359.405237][T22222] netlink: 188 bytes leftover after parsing attributes in process `syz.3.6154'. [ 359.442211][T14051] dummy0: left allmulticast mode [ 359.447376][T14051] bridge0: port 2(dummy0) entered disabled state [ 359.497317][T14051] bridge_slave_0: left allmulticast mode [ 359.503032][T14051] bridge_slave_0: left promiscuous mode [ 359.508821][T14051] bridge0: port 1(bridge_slave_0) entered disabled state [ 359.716044][T14051] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 359.740078][T14051] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 359.766831][T14051] bond0 (unregistering): Released all slaves [ 359.786929][T14051] bond1 (unregistering): Released all slaves [ 359.864225][T14051] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 359.896597][T14051] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 359.914376][T22245] netlink: 'syz.1.6161': attribute type 10 has an invalid length. [ 359.922301][T22245] netlink: 40 bytes leftover after parsing attributes in process `syz.1.6161'. [ 360.024166][T14051] team0 (unregistering): Port device team_slave_1 removed [ 360.041695][T14051] team0 (unregistering): Port device team_slave_0 removed [ 360.302250][T22258] netlink: 48 bytes leftover after parsing attributes in process `syz.3.6164'. [ 360.414709][T22235] chnl_net:caif_netlink_parms(): no params data found [ 360.518844][T22278] siw: device registration error -23 [ 360.534284][T22278] netlink: 188 bytes leftover after parsing attributes in process `syz.3.6171'. [ 360.558516][T22235] bridge0: port 1(bridge_slave_0) entered blocking state [ 360.565689][T22235] bridge0: port 1(bridge_slave_0) entered disabled state [ 360.574879][T22235] bridge_slave_0: entered allmulticast mode [ 360.581717][T22235] bridge_slave_0: entered promiscuous mode [ 360.588779][T22235] bridge0: port 2(bridge_slave_1) entered blocking state [ 360.595961][T22235] bridge0: port 2(bridge_slave_1) entered disabled state [ 360.604874][T22235] bridge_slave_1: entered allmulticast mode [ 360.612116][T22235] bridge_slave_1: entered promiscuous mode [ 360.632333][T22235] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 360.639940][T22283] program syz.3.6173 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 360.643578][T22235] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 360.673878][T22235] team0: Port device team_slave_0 added [ 360.680702][T22235] team0: Port device team_slave_1 added [ 360.699785][T22235] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 360.706793][T22235] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 360.732903][T22235] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 360.744432][T22235] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 360.751581][T22235] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 360.777498][T22235] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 360.807067][T22235] hsr_slave_0: entered promiscuous mode [ 360.813849][T22235] hsr_slave_1: entered promiscuous mode [ 360.819890][T22235] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 360.827482][T22235] Cannot create hsr debugfs directory [ 361.002704][T22303] SELinux: syz.1.6182 (22303) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 361.016574][T22303] FAULT_INJECTION: forcing a failure. [ 361.016574][T22303] name failslab, interval 1, probability 0, space 0, times 0 [ 361.029246][T22303] CPU: 0 UID: 0 PID: 22303 Comm: syz.1.6182 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 361.029308][T22303] Tainted: [W]=WARN [ 361.029317][T22303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 361.029333][T22303] Call Trace: [ 361.029341][T22303] <TASK> [ 361.029351][T22303] __dump_stack+0x1d/0x30 [ 361.029375][T22303] dump_stack_lvl+0xe8/0x140 [ 361.029392][T22303] dump_stack+0x15/0x1b [ 361.029407][T22303] should_fail_ex+0x265/0x280 [ 361.029552][T22303] should_failslab+0x8c/0xb0 [ 361.029597][T22303] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 361.029693][T22303] ? security_context_to_sid_core+0x69/0x3b0 [ 361.029743][T22303] kmemdup_nul+0x36/0xc0 [ 361.029821][T22303] security_context_to_sid_core+0x69/0x3b0 [ 361.029935][T22303] security_context_str_to_sid+0x33/0x40 [ 361.029972][T22303] sel_write_user+0x1ee/0x440 [ 361.029999][T22303] selinux_transaction_write+0xc3/0x110 [ 361.030062][T22303] ? __pfx_selinux_transaction_write+0x10/0x10 [ 361.030117][T22303] vfs_write+0x266/0x8d0 [ 361.030144][T22303] ? __rcu_read_unlock+0x4f/0x70 [ 361.030165][T22303] ? __fget_files+0x184/0x1c0 [ 361.030193][T22303] ksys_write+0xda/0x1a0 [ 361.030223][T22303] __x64_sys_write+0x40/0x50 [ 361.030317][T22303] x64_sys_call+0x2cdd/0x2fb0 [ 361.030361][T22303] do_syscall_64+0xd0/0x1a0 [ 361.030389][T22303] ? clear_bhb_loop+0x25/0x80 [ 361.030417][T22303] ? clear_bhb_loop+0x25/0x80 [ 361.030461][T22303] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 361.030487][T22303] RIP: 0033:0x7fd57aa8e969 [ 361.030567][T22303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 361.030587][T22303] RSP: 002b:00007fd5790f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 361.030605][T22303] RAX: ffffffffffffffda RBX: 00007fd57acb5fa0 RCX: 00007fd57aa8e969 [ 361.030617][T22303] RDX: 0000000000000024 RSI: 0000200000000740 RDI: 0000000000000006 [ 361.030628][T22303] RBP: 00007fd5790f7090 R08: 0000000000000000 R09: 0000000000000000 [ 361.030684][T22303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 361.030695][T22303] R13: 0000000000000000 R14: 00007fd57acb5fa0 R15: 00007fffd76dfb48 [ 361.030712][T22303] </TASK> [ 361.357767][T22320] netlink: 100 bytes leftover after parsing attributes in process `syz.2.6190'. [ 361.367308][T22320] SELinux: syz.2.6190 (22320) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 361.395055][T22235] netdevsim netdevsim5 netdevsim0: renamed from eth0 [ 361.413179][T22235] netdevsim netdevsim5 netdevsim1: renamed from eth1 [ 361.426149][T22235] netdevsim netdevsim5 netdevsim2: renamed from eth2 [ 361.440899][T22235] netdevsim netdevsim5 netdevsim3: renamed from eth3 [ 361.486218][T22235] 8021q: adding VLAN 0 to HW filter on device bond0 [ 361.501683][T22235] 8021q: adding VLAN 0 to HW filter on device team0 [ 361.512744][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 361.519943][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 361.531517][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 361.538724][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 361.613321][T22235] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 361.723445][T22235] veth0_vlan: entered promiscuous mode [ 361.732271][T22235] veth1_vlan: entered promiscuous mode [ 361.749179][T22235] veth0_macvtap: entered promiscuous mode [ 361.757802][T22235] veth1_macvtap: entered promiscuous mode [ 361.769318][T22235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 361.779915][T22235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.789792][T22235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 361.800363][T22235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.810223][T22235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 361.820751][T22235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.833321][T22235] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 361.845838][T22235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 361.856409][T22235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.866309][T22235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 361.877037][T22235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.887025][T22235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 361.897710][T22235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 361.909264][T22235] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 361.920052][T22235] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 361.928916][T22235] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 361.937768][T22235] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 361.946775][T22235] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 362.079164][T22382] loop5: detected capacity change from 0 to 764 [ 362.130782][T22386] loop5: detected capacity change from 0 to 512 [ 362.142680][T22386] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 362.155674][T22386] ext4 filesystem being mounted at /4/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 362.200856][T22235] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 362.225205][T22391] netlink: 48 bytes leftover after parsing attributes in process `syz.1.6209'. [ 362.283657][T22398] loop5: detected capacity change from 0 to 512 [ 362.305499][T22401] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6213'. [ 362.309970][T22398] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 362.314531][T22401] netlink: 32 bytes leftover after parsing attributes in process `syz.3.6213'. [ 362.327866][T22398] ext4 filesystem being mounted at /7/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 362.336011][T22401] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6213'. [ 362.382353][T22401] netlink: 32 bytes leftover after parsing attributes in process `syz.3.6213'. [ 362.393885][T22235] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 362.433230][T22409] bridge0: port 4(macvlan2) entered blocking state [ 362.439975][T22409] bridge0: port 4(macvlan2) entered disabled state [ 362.446731][T22409] macvlan2: entered allmulticast mode [ 362.453176][T22409] macvlan2: left allmulticast mode [ 362.511594][ T29] kauditd_printk_skb: 308 callbacks suppressed [ 362.511612][ T29] audit: type=1326 audit(1746707169.864:28231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe92308e969 code=0x7ffc0000 [ 362.548763][ T29] audit: type=1326 audit(1746707169.894:28232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=36 compat=0 ip=0x7fe92308e969 code=0x7ffc0000 [ 362.572643][ T29] audit: type=1326 audit(1746707169.894:28233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe92308e969 code=0x7ffc0000 [ 362.596316][ T29] audit: type=1326 audit(1746707169.894:28234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe92308e969 code=0x7ffc0000 [ 362.620064][ T29] audit: type=1326 audit(1746707169.894:28235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe92308e969 code=0x7ffc0000 [ 362.643705][ T29] audit: type=1326 audit(1746707169.894:28236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe92308e969 code=0x7ffc0000 [ 362.667411][ T29] audit: type=1326 audit(1746707169.894:28237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe92308e969 code=0x7ffc0000 [ 362.691018][ T29] audit: type=1326 audit(1746707169.894:28238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fe92308e969 code=0x7ffc0000 [ 362.714659][ T29] audit: type=1326 audit(1746707169.894:28239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe92308e969 code=0x7ffc0000 [ 362.738293][ T29] audit: type=1326 audit(1746707169.894:28240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe92308e969 code=0x7ffc0000 [ 362.765424][T22424] netlink: 'syz.1.6222': attribute type 10 has an invalid length. [ 362.782899][T22424] hsr_slave_0: left promiscuous mode [ 362.792004][T22424] hsr_slave_1: left promiscuous mode [ 363.055354][T22450] only policy match revision 0 supported [ 363.055369][T22450] unable to load match [ 363.254646][T22472] netlink: 'syz.1.6242': attribute type 13 has an invalid length. [ 363.269121][T22472] netlink: 'syz.1.6242': attribute type 1 has an invalid length. [ 363.295047][T22474] program syz.2.6243 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 363.322820][T22479] loop5: detected capacity change from 0 to 764 [ 363.345546][T22479] FAULT_INJECTION: forcing a failure. [ 363.345546][T22479] name failslab, interval 1, probability 0, space 0, times 0 [ 363.358315][T22479] CPU: 1 UID: 0 PID: 22479 Comm: syz.5.6245 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 363.358427][T22479] Tainted: [W]=WARN [ 363.358434][T22479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 363.358446][T22479] Call Trace: [ 363.358453][T22479] <TASK> [ 363.358461][T22479] __dump_stack+0x1d/0x30 [ 363.358486][T22479] dump_stack_lvl+0xe8/0x140 [ 363.358505][T22479] dump_stack+0x15/0x1b [ 363.358521][T22479] should_fail_ex+0x265/0x280 [ 363.358559][T22479] ? sctp_add_bind_addr+0x71/0x1e0 [ 363.358591][T22479] should_failslab+0x8c/0xb0 [ 363.358668][T22479] __kmalloc_cache_noprof+0x4c/0x320 [ 363.358692][T22479] sctp_add_bind_addr+0x71/0x1e0 [ 363.358724][T22479] sctp_copy_local_addr_list+0x199/0x220 [ 363.358753][T22479] sctp_copy_one_addr+0x7f/0x280 [ 363.358865][T22479] sctp_bind_addr_copy+0x79/0x290 [ 363.358898][T22479] sctp_assoc_set_bind_addr_from_ep+0xce/0xe0 [ 363.358929][T22479] sctp_connect_new_asoc+0x1c3/0x3a0 [ 363.358969][T22479] sctp_sendmsg+0xf10/0x18d0 [ 363.359118][T22479] ? selinux_socket_sendmsg+0x141/0x1b0 [ 363.359151][T22479] ? __pfx_sctp_sendmsg+0x10/0x10 [ 363.359191][T22479] inet_sendmsg+0xc2/0xd0 [ 363.359224][T22479] __sock_sendmsg+0x102/0x180 [ 363.359270][T22479] ____sys_sendmsg+0x345/0x4e0 [ 363.359291][T22479] ___sys_sendmsg+0x17b/0x1d0 [ 363.359323][T22479] __sys_sendmmsg+0x178/0x300 [ 363.359361][T22479] __x64_sys_sendmmsg+0x57/0x70 [ 363.359387][T22479] x64_sys_call+0x2f2f/0x2fb0 [ 363.359443][T22479] do_syscall_64+0xd0/0x1a0 [ 363.359470][T22479] ? clear_bhb_loop+0x25/0x80 [ 363.359496][T22479] ? clear_bhb_loop+0x25/0x80 [ 363.359569][T22479] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 363.359594][T22479] RIP: 0033:0x7fe92308e969 [ 363.359664][T22479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 363.359682][T22479] RSP: 002b:00007fe9216f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 363.359700][T22479] RAX: ffffffffffffffda RBX: 00007fe9232b5fa0 RCX: 00007fe92308e969 [ 363.359721][T22479] RDX: 0000000000000002 RSI: 0000200000000880 RDI: 0000000000000004 [ 363.359797][T22479] RBP: 00007fe9216f7090 R08: 0000000000000000 R09: 0000000000000000 [ 363.359851][T22479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 363.359863][T22479] R13: 0000000000000000 R14: 00007fe9232b5fa0 R15: 00007ffef84b5458 [ 363.359881][T22479] </TASK> [ 363.709870][T22499] netlink: 'syz.3.6253': attribute type 10 has an invalid length. [ 363.718502][T22499] dummy0: entered promiscuous mode [ 363.724604][T22499] bridge0: port 3(dummy0) entered blocking state [ 363.731021][T22499] bridge0: port 3(dummy0) entered disabled state [ 363.740132][T22499] dummy0: entered allmulticast mode [ 363.746154][T22499] bridge0: port 3(dummy0) entered blocking state [ 363.752667][T22499] bridge0: port 3(dummy0) entered forwarding state [ 363.881143][T22518] program syz.2.6261 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 364.079342][T22529] FAULT_INJECTION: forcing a failure. [ 364.079342][T22529] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 364.092545][T22529] CPU: 0 UID: 0 PID: 22529 Comm: syz.0.6265 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 364.092623][T22529] Tainted: [W]=WARN [ 364.092630][T22529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 364.092707][T22529] Call Trace: [ 364.092716][T22529] <TASK> [ 364.092726][T22529] __dump_stack+0x1d/0x30 [ 364.092784][T22529] dump_stack_lvl+0xe8/0x140 [ 364.092847][T22529] dump_stack+0x15/0x1b [ 364.092867][T22529] should_fail_ex+0x265/0x280 [ 364.092898][T22529] should_fail+0xb/0x20 [ 364.092926][T22529] should_fail_usercopy+0x1a/0x20 [ 364.093011][T22529] _copy_from_user+0x1c/0xb0 [ 364.093062][T22529] ___sys_recvmsg+0xaa/0x370 [ 364.093089][T22529] do_recvmmsg+0x1ef/0x540 [ 364.093117][T22529] ? fput+0x8f/0xc0 [ 364.093133][T22529] __x64_sys_recvmmsg+0xe5/0x170 [ 364.093153][T22529] x64_sys_call+0x1c6a/0x2fb0 [ 364.093185][T22529] do_syscall_64+0xd0/0x1a0 [ 364.093208][T22529] ? clear_bhb_loop+0x25/0x80 [ 364.093227][T22529] ? clear_bhb_loop+0x25/0x80 [ 364.093246][T22529] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 364.093290][T22529] RIP: 0033:0x7feaedfce969 [ 364.093351][T22529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 364.093411][T22529] RSP: 002b:00007feaec637038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 364.093429][T22529] RAX: ffffffffffffffda RBX: 00007feaee1f5fa0 RCX: 00007feaedfce969 [ 364.093484][T22529] RDX: 0000000000000700 RSI: 0000200000001140 RDI: 0000000000000004 [ 364.093495][T22529] RBP: 00007feaec637090 R08: 0000000000000000 R09: 0000000000000000 [ 364.093506][T22529] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 364.093516][T22529] R13: 0000000000000000 R14: 00007feaee1f5fa0 R15: 00007fff07bc0078 [ 364.093533][T22529] </TASK> [ 364.319098][T22535] netlink: 'syz.0.6268': attribute type 10 has an invalid length. [ 364.327034][T22535] dummy0: entered promiscuous mode [ 364.333318][T22535] bridge0: port 3(dummy0) entered blocking state [ 364.339884][T22535] bridge0: port 3(dummy0) entered disabled state [ 364.347792][T22535] dummy0: entered allmulticast mode [ 364.353745][T22537] netlink: 'syz.2.6269': attribute type 13 has an invalid length. [ 364.354009][T22535] bridge0: port 3(dummy0) entered blocking state [ 364.367993][T22535] bridge0: port 3(dummy0) entered forwarding state [ 364.419617][T22543] siw: device registration error -23 [ 364.423602][T22537] bridge0: port 3(dummy0) entered disabled state [ 364.432023][T22537] bridge0: port 2(bridge_slave_1) entered disabled state [ 364.439212][T22537] bridge0: port 1(bridge_slave_0) entered disabled state [ 364.446723][T22541] ALSA: seq fatal error: cannot create timer (-19) [ 364.448699][T22543] __nla_validate_parse: 13 callbacks suppressed [ 364.448722][T22543] netlink: 188 bytes leftover after parsing attributes in process `syz.0.6271'. [ 364.488910][T22546] FAULT_INJECTION: forcing a failure. [ 364.488910][T22546] name failslab, interval 1, probability 0, space 0, times 0 [ 364.501752][T22546] CPU: 1 UID: 0 PID: 22546 Comm: syz.1.6272 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 364.501926][T22546] Tainted: [W]=WARN [ 364.501935][T22546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 364.501947][T22546] Call Trace: [ 364.501953][T22546] <TASK> [ 364.501961][T22546] __dump_stack+0x1d/0x30 [ 364.501983][T22546] dump_stack_lvl+0xe8/0x140 [ 364.502002][T22546] dump_stack+0x15/0x1b [ 364.502091][T22546] should_fail_ex+0x265/0x280 [ 364.502131][T22546] should_failslab+0x8c/0xb0 [ 364.502261][T22546] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 364.502289][T22546] ? sidtab_sid2str_get+0xa0/0x130 [ 364.502334][T22546] kmemdup_noprof+0x2b/0x70 [ 364.502358][T22546] sidtab_sid2str_get+0xa0/0x130 [ 364.502443][T22546] security_sid_to_context_core+0x1eb/0x2e0 [ 364.502477][T22546] security_sid_to_context+0x27/0x40 [ 364.502502][T22546] selinux_lsmprop_to_secctx+0x67/0xf0 [ 364.502604][T22546] security_lsmprop_to_secctx+0x43/0x80 [ 364.502691][T22546] audit_log_task_context+0x77/0x190 [ 364.502794][T22546] audit_log_task+0xf4/0x250 [ 364.502822][T22546] audit_seccomp+0x61/0x100 [ 364.502844][T22546] ? __seccomp_filter+0x68c/0x10d0 [ 364.502875][T22546] __seccomp_filter+0x69d/0x10d0 [ 364.502915][T22546] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 364.502951][T22537] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 364.502948][T22546] ? vfs_write+0x75e/0x8d0 [ 364.502991][T22546] ? __rcu_read_unlock+0x4f/0x70 [ 364.503020][T22546] ? __fget_files+0x184/0x1c0 [ 364.503060][T22546] __secure_computing+0x82/0x150 [ 364.503088][T22546] syscall_trace_enter+0xcf/0x1e0 [ 364.503171][T22546] do_syscall_64+0xaa/0x1a0 [ 364.503211][T22546] ? clear_bhb_loop+0x25/0x80 [ 364.503239][T22546] ? clear_bhb_loop+0x25/0x80 [ 364.503267][T22546] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 364.503294][T22546] RIP: 0033:0x7fd57aa8e969 [ 364.503315][T22546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 364.503348][T22546] RSP: 002b:00007fd5790f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fd [ 364.503373][T22546] RAX: ffffffffffffffda RBX: 00007fd57acb5fa0 RCX: 00007fd57aa8e969 [ 364.503389][T22546] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 364.503429][T22546] RBP: 00007fd5790f7090 R08: 0000000000000000 R09: 0000000000000000 [ 364.503444][T22546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 364.503460][T22546] R13: 0000000000000000 R14: 00007fd57acb5fa0 R15: 00007fffd76dfb48 [ 364.503485][T22546] </TASK> [ 364.766038][T22537] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 364.797954][T22537] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 364.807193][T22537] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 364.816303][T22537] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 364.825259][T22537] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 364.838413][ T3394] syz1: Port: 1 Link DOWN [ 364.935162][T22561] netlink: 'syz.3.6277': attribute type 13 has an invalid length. [ 364.936806][T22556] bond1: entered promiscuous mode [ 364.948143][T22556] bond1: entered allmulticast mode [ 364.953792][T22556] 8021q: adding VLAN 0 to HW filter on device bond1 [ 364.962999][T22556] bond1 (unregistering): Released all slaves [ 364.983779][T22570] netlink: 'syz.3.6277': attribute type 1 has an invalid length. [ 364.991608][T22570] netlink: 199820 bytes leftover after parsing attributes in process `syz.3.6277'. [ 365.023013][T22558] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6276'. [ 365.042127][T22561] bridge0: port 3(dummy0) entered disabled state [ 365.048732][T22561] bridge0: port 2(bridge_slave_1) entered disabled state [ 365.056101][T22561] bridge0: port 1(bridge_slave_0) entered disabled state [ 365.074834][T22577] SELinux: Context system_u:object_r:net_conf_t:s0 is not valid (left unmapped). [ 365.111318][T22561] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 365.121781][T22561] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 365.153041][T22561] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 365.162306][T22561] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 365.171466][T22561] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 365.180479][T22561] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 365.204289][T22567] bond_slave_1: entered promiscuous mode [ 365.232797][T22558] bond0: (slave bond_slave_1): Releasing backup interface [ 365.243446][T22558] bond_slave_1 (unregistering): left promiscuous mode [ 365.275017][T22586] netlink: 188 bytes leftover after parsing attributes in process `syz.2.6285'. [ 365.292564][T22587] FAULT_INJECTION: forcing a failure. [ 365.292564][T22587] name failslab, interval 1, probability 0, space 0, times 0 [ 365.305441][T22587] CPU: 0 UID: 0 PID: 22587 Comm: syz.3.6282 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 365.305479][T22587] Tainted: [W]=WARN [ 365.305485][T22587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 365.305498][T22587] Call Trace: [ 365.305503][T22587] <TASK> [ 365.305555][T22587] __dump_stack+0x1d/0x30 [ 365.305581][T22587] dump_stack_lvl+0xe8/0x140 [ 365.305600][T22587] dump_stack+0x15/0x1b [ 365.305616][T22587] should_fail_ex+0x265/0x280 [ 365.305681][T22587] should_failslab+0x8c/0xb0 [ 365.305711][T22587] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 365.305771][T22587] ? sidtab_sid2str_get+0xa0/0x130 [ 365.305821][T22587] kmemdup_noprof+0x2b/0x70 [ 365.305840][T22587] sidtab_sid2str_get+0xa0/0x130 [ 365.305868][T22587] security_sid_to_context_core+0x1eb/0x2e0 [ 365.305921][T22587] security_sid_to_context+0x27/0x40 [ 365.306010][T22587] selinux_lsmprop_to_secctx+0x67/0xf0 [ 365.306044][T22587] security_lsmprop_to_secctx+0x43/0x80 [ 365.306065][T22587] audit_log_task_context+0x77/0x190 [ 365.306136][T22587] audit_log_task+0xf4/0x250 [ 365.306171][T22587] audit_seccomp+0x61/0x100 [ 365.306217][T22587] ? __seccomp_filter+0x68c/0x10d0 [ 365.306237][T22587] __seccomp_filter+0x69d/0x10d0 [ 365.306268][T22587] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 365.306324][T22587] ? vfs_write+0x75e/0x8d0 [ 365.306412][T22587] ? __rcu_read_unlock+0x4f/0x70 [ 365.306434][T22587] ? __fget_files+0x184/0x1c0 [ 365.306466][T22587] __secure_computing+0x82/0x150 [ 365.306492][T22587] syscall_trace_enter+0xcf/0x1e0 [ 365.306523][T22587] do_syscall_64+0xaa/0x1a0 [ 365.306589][T22587] ? clear_bhb_loop+0x25/0x80 [ 365.306609][T22587] ? clear_bhb_loop+0x25/0x80 [ 365.306654][T22587] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 365.306675][T22587] RIP: 0033:0x7f000391e969 [ 365.306689][T22587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 365.306706][T22587] RSP: 002b:00007f0001f66038 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 365.306735][T22587] RAX: ffffffffffffffda RBX: 00007f0003b46080 RCX: 00007f000391e969 [ 365.306751][T22587] RDX: 0000000000000001 RSI: 0000200000000000 RDI: 0000000000000005 [ 365.306767][T22587] RBP: 00007f0001f66090 R08: 0000000000000000 R09: 0000000000000000 [ 365.306779][T22587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 365.306791][T22587] R13: 0000000000000000 R14: 00007f0003b46080 R15: 00007ffea23b9fb8 [ 365.306809][T22587] </TASK> [ 365.562070][T22589] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6286'. [ 365.579818][T22589] netem: change failed [ 365.912551][T22617] siw: device registration error -23 [ 365.919562][T22617] netlink: 188 bytes leftover after parsing attributes in process `syz.5.6296'. [ 365.960283][T22620] netlink: 48 bytes leftover after parsing attributes in process `syz.1.6297'. [ 366.156604][T22636] loop5: detected capacity change from 0 to 512 [ 366.177718][T22638] only policy match revision 0 supported [ 366.177766][T22638] unable to load match [ 366.190537][T22636] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 366.203678][T22636] ext4 filesystem being mounted at /22/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 366.251001][T22235] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 366.281871][T22646] siw: device registration error -23 [ 366.288506][T22646] netlink: 188 bytes leftover after parsing attributes in process `syz.1.6309'. [ 366.379660][T22654] netlink: 76 bytes leftover after parsing attributes in process `syz.1.6313'. [ 366.437919][T22667] netlink: 'syz.1.6318': attribute type 13 has an invalid length. [ 366.455884][T22667] netlink: 'syz.1.6318': attribute type 1 has an invalid length. [ 366.463798][T22667] netlink: 199820 bytes leftover after parsing attributes in process `syz.1.6318'. [ 366.517778][T22671] loop5: detected capacity change from 0 to 512 [ 366.540251][T22671] EXT4-fs (loop5): invalid journal inode [ 366.546075][T22671] EXT4-fs (loop5): can't get journal size [ 366.572355][T22677] only policy match revision 0 supported [ 366.572370][T22677] unable to load match [ 366.587910][T22671] EXT4-fs (loop5): 1 truncate cleaned up [ 366.601341][T22671] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 366.674050][T22235] EXT4-fs error (device loop5): ext4_lookup:1789: inode #14: comm syz-executor: invalid fast symlink length 39 [ 366.749450][T22235] EXT4-fs error (device loop5): ext4_lookup:1789: inode #14: comm syz-executor: invalid fast symlink length 39 [ 366.795915][T22686] IPv6: Can't replace route, no match found [ 366.838925][T22675] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 366.910000][T22697] netlink: 'syz.2.6331': attribute type 13 has an invalid length. [ 366.919857][T22697] netlink: 'syz.2.6331': attribute type 1 has an invalid length. [ 367.057535][ T3434] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 367.094812][T22709] netlink: 'syz.3.6335': attribute type 13 has an invalid length. [ 367.111982][ T3434] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 367.204031][ T3434] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 367.263061][ T3434] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 367.367701][ T3434] bridge_slave_1: left allmulticast mode [ 367.373572][ T3434] bridge_slave_1: left promiscuous mode [ 367.379841][ T3434] bridge0: port 2(bridge_slave_1) entered disabled state [ 367.387940][ T3434] bridge_slave_0: left allmulticast mode [ 367.393706][ T3434] bridge_slave_0: left promiscuous mode [ 367.399657][ T3434] bridge0: port 1(bridge_slave_0) entered disabled state [ 367.482113][ T3434] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 367.492122][ T3434] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 367.502552][ T3434] bond0 (unregistering): Released all slaves [ 367.550089][ T29] kauditd_printk_skb: 703 callbacks suppressed [ 367.550107][ T29] audit: type=1326 audit(1746707174.905:28942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 367.580178][ T29] audit: type=1326 audit(1746707174.905:28943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 367.604197][ T29] audit: type=1326 audit(1746707174.905:28944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 367.612924][T22715] chnl_net:caif_netlink_parms(): no params data found [ 367.627603][ T29] audit: type=1326 audit(1746707174.905:28945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 367.627640][ T29] audit: type=1326 audit(1746707174.905:28946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 367.627688][ T29] audit: type=1326 audit(1746707174.905:28947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 367.627720][ T29] audit: type=1326 audit(1746707174.905:28948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 367.728963][ T29] audit: type=1326 audit(1746707174.905:28949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 367.752660][ T29] audit: type=1326 audit(1746707174.905:28950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 367.776233][ T29] audit: type=1326 audit(1746707174.905:28951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 367.805807][ T3434] hsr_slave_0: left promiscuous mode [ 367.811633][ T3434] hsr_slave_1: left promiscuous mode [ 367.817262][ T3434] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 367.824700][ T3434] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 367.832529][ T3434] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 367.840035][ T3434] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 367.850877][ T3434] veth1_macvtap: left promiscuous mode [ 367.856422][ T3434] veth0_macvtap: left promiscuous mode [ 367.862138][ T3434] veth1_vlan: left promiscuous mode [ 367.869751][ T3434] veth0_vlan: left promiscuous mode [ 367.880258][T22736] SELinux: syz.0.6341 (22736) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 367.957469][ T3434] team0 (unregistering): Port device team_slave_1 removed [ 367.967540][ T3434] team0 (unregistering): Port device team_slave_0 removed [ 368.032191][T22715] bridge0: port 1(bridge_slave_0) entered blocking state [ 368.039341][T22715] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.046831][T22715] bridge_slave_0: entered allmulticast mode [ 368.057414][T22715] bridge_slave_0: entered promiscuous mode [ 368.079743][T22715] bridge0: port 2(bridge_slave_1) entered blocking state [ 368.079776][T22715] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.079888][T22715] bridge_slave_1: entered allmulticast mode [ 368.081310][T22715] bridge_slave_1: entered promiscuous mode [ 368.127226][T22715] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 368.128876][T22715] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 368.165626][T22715] team0: Port device team_slave_0 added [ 368.166707][T22715] team0: Port device team_slave_1 added [ 368.215114][T22715] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 368.222250][T22715] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 368.248425][T22715] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 368.260474][T22715] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 368.267463][T22715] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 368.293494][T22715] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 368.324539][T22715] hsr_slave_0: entered promiscuous mode [ 368.330776][T22715] hsr_slave_1: entered promiscuous mode [ 368.336745][T22715] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 368.344456][T22715] Cannot create hsr debugfs directory [ 368.459504][T22768] only policy match revision 0 supported [ 368.459519][T22768] unable to load match [ 368.543116][T22772] SELinux: syz.0.6354 (22772) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 368.595448][T22772] SELinux: policydb version -2069960659 does not match my version range 15-34 [ 368.604760][T22772] SELinux: failed to load policy [ 368.681233][T22776] bridge0: port 3(dummy0) entered disabled state [ 368.687830][T22776] bridge0: port 2(bridge_slave_1) entered disabled state [ 368.695072][T22776] bridge0: port 1(bridge_slave_0) entered disabled state [ 368.734388][T22776] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 368.744455][T22776] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 368.774833][T22776] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 368.783858][T22776] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 368.792892][T22776] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 368.801919][T22776] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 369.243330][T22715] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 369.261704][T22715] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 369.275210][T22715] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 369.284779][T22715] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 369.343250][T22715] 8021q: adding VLAN 0 to HW filter on device bond0 [ 369.355155][T22812] validate_nla: 6 callbacks suppressed [ 369.355190][T22812] netlink: 'syz.2.6372': attribute type 10 has an invalid length. [ 369.371861][T22715] 8021q: adding VLAN 0 to HW filter on device team0 [ 369.379355][T22812] hsr_slave_0: left promiscuous mode [ 369.385076][T22812] hsr_slave_1: left promiscuous mode [ 369.443908][T14051] bridge0: port 1(bridge_slave_0) entered blocking state [ 369.451122][T14051] bridge0: port 1(bridge_slave_0) entered forwarding state [ 369.468682][T14042] bridge0: port 2(bridge_slave_1) entered blocking state [ 369.475867][T14042] bridge0: port 2(bridge_slave_1) entered forwarding state [ 369.584798][T22715] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 369.673515][T22831] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw [ 369.724682][T22715] veth0_vlan: entered promiscuous mode [ 369.733100][T22838] FAULT_INJECTION: forcing a failure. [ 369.733100][T22838] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 369.733332][T22715] veth1_vlan: entered promiscuous mode [ 369.746448][T22838] CPU: 1 UID: 0 PID: 22838 Comm: syz.2.6375 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 369.746537][T22838] Tainted: [W]=WARN [ 369.746546][T22838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 369.746563][T22838] Call Trace: [ 369.746571][T22838] <TASK> [ 369.746580][T22838] __dump_stack+0x1d/0x30 [ 369.746651][T22838] dump_stack_lvl+0xe8/0x140 [ 369.746676][T22838] dump_stack+0x15/0x1b [ 369.746698][T22838] should_fail_ex+0x265/0x280 [ 369.746740][T22838] should_fail+0xb/0x20 [ 369.746802][T22838] should_fail_usercopy+0x1a/0x20 [ 369.746826][T22838] _copy_from_user+0x1c/0xb0 [ 369.746854][T22838] do_ipv6_setsockopt+0x220/0x22e0 [ 369.746883][T22838] ? kstrtoull+0x111/0x140 [ 369.746990][T22838] ? __rcu_read_unlock+0x4f/0x70 [ 369.747018][T22838] ? avc_has_perm_noaudit+0x1b1/0x200 [ 369.747064][T22838] ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0 [ 369.747110][T22838] ipv6_setsockopt+0x59/0x130 [ 369.747136][T22838] tcp_setsockopt+0x95/0xb0 [ 369.747175][T22838] sock_common_setsockopt+0x66/0x80 [ 369.747211][T22838] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 369.747298][T22838] __sys_setsockopt+0x181/0x200 [ 369.747373][T22838] __x64_sys_setsockopt+0x64/0x80 [ 369.747416][T22838] x64_sys_call+0x2bd5/0x2fb0 [ 369.747444][T22838] do_syscall_64+0xd0/0x1a0 [ 369.747472][T22838] ? clear_bhb_loop+0x25/0x80 [ 369.747573][T22838] ? clear_bhb_loop+0x25/0x80 [ 369.747602][T22838] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 369.747713][T22838] RIP: 0033:0x7f191635e969 [ 369.747733][T22838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 369.747757][T22838] RSP: 002b:00007f19149c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 369.747782][T22838] RAX: ffffffffffffffda RBX: 00007f1916585fa0 RCX: 00007f191635e969 [ 369.747798][T22838] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000005 [ 369.747814][T22838] RBP: 00007f19149c7090 R08: 0000000000000380 R09: 0000000000000000 [ 369.747874][T22838] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000001 [ 369.747891][T22838] R13: 0000000000000000 R14: 00007f1916585fa0 R15: 00007ffdceba1a48 [ 369.747925][T22838] </TASK> [ 369.989693][T22715] veth0_macvtap: entered promiscuous mode [ 369.997198][T22715] veth1_macvtap: entered promiscuous mode [ 370.008130][T22840] program syz.2.6376 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 370.010216][T22715] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 370.052590][T22715] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 370.063540][T22715] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 370.072390][T22715] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 370.081248][T22715] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 370.090049][T22715] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 370.199279][T22851] siw: device registration error -23 [ 370.215454][T22851] __nla_validate_parse: 18 callbacks suppressed [ 370.215492][T22851] netlink: 188 bytes leftover after parsing attributes in process `syz.1.6380'. [ 370.310237][T22857] netlink: 48 bytes leftover after parsing attributes in process `syz.6.6338'. [ 370.345078][T22860] netlink: 48 bytes leftover after parsing attributes in process `syz.1.6382'. [ 370.525841][T22882] siw: device registration error -23 [ 370.534002][T22882] netlink: 188 bytes leftover after parsing attributes in process `syz.0.6392'. [ 370.548410][T22883] FAULT_INJECTION: forcing a failure. [ 370.548410][T22883] name failslab, interval 1, probability 0, space 0, times 0 [ 370.561277][T22883] CPU: 0 UID: 0 PID: 22883 Comm: syz.6.6391 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 370.561316][T22883] Tainted: [W]=WARN [ 370.561324][T22883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 370.561419][T22883] Call Trace: [ 370.561427][T22883] <TASK> [ 370.561436][T22883] __dump_stack+0x1d/0x30 [ 370.561463][T22883] dump_stack_lvl+0xe8/0x140 [ 370.561486][T22883] dump_stack+0x15/0x1b [ 370.561521][T22883] should_fail_ex+0x265/0x280 [ 370.561562][T22883] should_failslab+0x8c/0xb0 [ 370.561643][T22883] kmem_cache_alloc_noprof+0x50/0x310 [ 370.561685][T22883] ? security_inode_alloc+0x37/0x100 [ 370.561713][T22883] security_inode_alloc+0x37/0x100 [ 370.561739][T22883] inode_init_always_gfp+0x4b7/0x500 [ 370.561848][T22883] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 370.561909][T22883] alloc_inode+0x58/0x170 [ 370.561939][T22883] new_inode+0x1d/0xe0 [ 370.561970][T22883] shmem_get_inode+0x244/0x750 [ 370.562008][T22883] __shmem_file_setup+0x122/0x1f0 [ 370.562095][T22883] shmem_file_setup+0x3b/0x50 [ 370.562125][T22883] __se_sys_memfd_create+0x2c3/0x590 [ 370.562158][T22883] __x64_sys_memfd_create+0x31/0x40 [ 370.562208][T22883] x64_sys_call+0x122f/0x2fb0 [ 370.562231][T22883] do_syscall_64+0xd0/0x1a0 [ 370.562254][T22883] ? clear_bhb_loop+0x25/0x80 [ 370.562331][T22883] ? clear_bhb_loop+0x25/0x80 [ 370.562359][T22883] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 370.562386][T22883] RIP: 0033:0x7fec2965e969 [ 370.562402][T22883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 370.562420][T22883] RSP: 002b:00007fec27ca5e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 370.562458][T22883] RAX: ffffffffffffffda RBX: 000000000000045c RCX: 00007fec2965e969 [ 370.562475][T22883] RDX: 00007fec27ca5ef0 RSI: 0000000000000000 RDI: 00007fec296e1444 [ 370.562535][T22883] RBP: 0000200000002400 R08: 00007fec27ca5bb7 R09: 00007fec27ca5e40 [ 370.562547][T22883] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 370.562559][T22883] R13: 00007fec27ca5ef0 R14: 00007fec27ca5eb0 R15: 0000200000000680 [ 370.562607][T22883] </TASK> [ 370.881975][T22899] loop6: detected capacity change from 0 to 512 [ 370.888952][T22898] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6400'. [ 370.898132][T22898] netlink: 32 bytes leftover after parsing attributes in process `syz.0.6400'. [ 370.907109][T22898] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6400'. [ 370.924429][T22898] netlink: 32 bytes leftover after parsing attributes in process `syz.0.6400'. [ 370.944690][T22899] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 370.962096][T22899] ext4 filesystem being mounted at /3/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 371.007248][T22907] netlink: 'syz.0.6403': attribute type 13 has an invalid length. [ 371.023410][T22907] netlink: 'syz.0.6403': attribute type 1 has an invalid length. [ 371.031269][T22907] netlink: 199820 bytes leftover after parsing attributes in process `syz.0.6403'. [ 371.041683][T22715] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 371.084935][T22915] FAULT_INJECTION: forcing a failure. [ 371.084935][T22915] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 371.098102][T22915] CPU: 0 UID: 0 PID: 22915 Comm: syz.6.6405 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 371.098145][T22915] Tainted: [W]=WARN [ 371.098220][T22915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 371.098269][T22915] Call Trace: [ 371.098278][T22915] <TASK> [ 371.098288][T22915] __dump_stack+0x1d/0x30 [ 371.098357][T22915] dump_stack_lvl+0xe8/0x140 [ 371.098375][T22915] dump_stack+0x15/0x1b [ 371.098390][T22915] should_fail_ex+0x265/0x280 [ 371.098429][T22915] should_fail+0xb/0x20 [ 371.098493][T22915] should_fail_usercopy+0x1a/0x20 [ 371.098512][T22915] _copy_from_user+0x1c/0xb0 [ 371.098532][T22915] ___sys_sendmsg+0xc1/0x1d0 [ 371.098566][T22915] __x64_sys_sendmsg+0xd4/0x160 [ 371.098595][T22915] x64_sys_call+0x2999/0x2fb0 [ 371.098696][T22915] do_syscall_64+0xd0/0x1a0 [ 371.098724][T22915] ? clear_bhb_loop+0x25/0x80 [ 371.098749][T22915] ? clear_bhb_loop+0x25/0x80 [ 371.098816][T22915] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 371.098843][T22915] RIP: 0033:0x7fec2965e969 [ 371.098862][T22915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 371.098882][T22915] RSP: 002b:00007fec27cc7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 371.098901][T22915] RAX: ffffffffffffffda RBX: 00007fec29885fa0 RCX: 00007fec2965e969 [ 371.098913][T22915] RDX: 0000000000048002 RSI: 0000200000000080 RDI: 0000000000000006 [ 371.098925][T22915] RBP: 00007fec27cc7090 R08: 0000000000000000 R09: 0000000000000000 [ 371.098941][T22915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 371.098952][T22915] R13: 0000000000000000 R14: 00007fec29885fa0 R15: 00007ffd76a676b8 [ 371.098975][T22915] </TASK> [ 371.300714][T22921] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6408'. [ 371.340016][T22926] netlink: 'syz.3.6411': attribute type 10 has an invalid length. [ 371.348793][T22927] loop6: detected capacity change from 0 to 512 [ 371.368471][T22927] EXT4-fs error (device loop6): ext4_iget_extra_inode:4693: inode #15: comm syz.6.6410: corrupted in-inode xattr: invalid ea_ino [ 371.400571][T22927] EXT4-fs error (device loop6): ext4_orphan_get:1396: comm syz.6.6410: couldn't read orphan inode 15 (err -117) [ 371.414479][T22927] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 371.485505][T22715] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 371.508942][T22942] netlink: 'syz.0.6417': attribute type 10 has an invalid length. [ 371.577310][T22948] sch_tbf: peakrate 64 is lower than or equals to rate 14020585672542658070 ! [ 371.873297][T22974] FAULT_INJECTION: forcing a failure. [ 371.873297][T22974] name failslab, interval 1, probability 0, space 0, times 0 [ 371.886113][T22974] CPU: 0 UID: 0 PID: 22974 Comm: syz.3.6430 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 371.886172][T22974] Tainted: [W]=WARN [ 371.886209][T22974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 371.886285][T22974] Call Trace: [ 371.886334][T22974] <TASK> [ 371.886343][T22974] __dump_stack+0x1d/0x30 [ 371.886370][T22974] dump_stack_lvl+0xe8/0x140 [ 371.886394][T22974] dump_stack+0x15/0x1b [ 371.886416][T22974] should_fail_ex+0x265/0x280 [ 371.886498][T22974] should_failslab+0x8c/0xb0 [ 371.886605][T22974] kmem_cache_alloc_node_noprof+0x57/0x320 [ 371.886694][T22974] ? __alloc_skb+0x101/0x320 [ 371.886733][T22974] __alloc_skb+0x101/0x320 [ 371.886830][T22974] netlink_alloc_large_skb+0xba/0xf0 [ 371.886860][T22974] netlink_sendmsg+0x3cf/0x6b0 [ 371.886962][T22974] ? __pfx_netlink_sendmsg+0x10/0x10 [ 371.887043][T22974] __sock_sendmsg+0x142/0x180 [ 371.887072][T22974] ____sys_sendmsg+0x31e/0x4e0 [ 371.887094][T22974] ___sys_sendmsg+0x17b/0x1d0 [ 371.887197][T22974] __x64_sys_sendmsg+0xd4/0x160 [ 371.887223][T22974] x64_sys_call+0x2999/0x2fb0 [ 371.887255][T22974] do_syscall_64+0xd0/0x1a0 [ 371.887284][T22974] ? clear_bhb_loop+0x25/0x80 [ 371.887311][T22974] ? clear_bhb_loop+0x25/0x80 [ 371.887339][T22974] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 371.887366][T22974] RIP: 0033:0x7f000391e969 [ 371.887385][T22974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 371.887473][T22974] RSP: 002b:00007f0001f87038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 371.887497][T22974] RAX: ffffffffffffffda RBX: 00007f0003b45fa0 RCX: 00007f000391e969 [ 371.887594][T22974] RDX: 0000000000000000 RSI: 000020000000c2c0 RDI: 0000000000000004 [ 371.887610][T22974] RBP: 00007f0001f87090 R08: 0000000000000000 R09: 0000000000000000 [ 371.887626][T22974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 371.887642][T22974] R13: 0000000000000000 R14: 00007f0003b45fa0 R15: 00007ffea23b9fb8 [ 371.887712][T22974] </TASK> [ 372.304972][T22988] loop3: detected capacity change from 0 to 512 [ 372.332027][T22988] EXT4-fs (loop3): invalid journal inode [ 372.353852][T22988] EXT4-fs (loop3): can't get journal size [ 372.388588][T22988] EXT4-fs (loop3): 1 truncate cleaned up [ 372.404650][T22988] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 372.579859][T19317] EXT4-fs error (device loop3): ext4_lookup:1789: inode #14: comm syz-executor: invalid fast symlink length 39 [ 372.646008][T19317] EXT4-fs error (device loop3): ext4_lookup:1789: inode #14: comm syz-executor: invalid fast symlink length 39 [ 372.753361][T22994] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 372.764125][T23024] FAULT_INJECTION: forcing a failure. [ 372.764125][T23024] name failslab, interval 1, probability 0, space 0, times 0 [ 372.776995][T23024] CPU: 0 UID: 0 PID: 23024 Comm: syz.2.6451 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 372.777043][T23024] Tainted: [W]=WARN [ 372.777051][T23024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 372.777067][T23024] Call Trace: [ 372.777077][T23024] <TASK> [ 372.777087][T23024] __dump_stack+0x1d/0x30 [ 372.777113][T23024] dump_stack_lvl+0xe8/0x140 [ 372.777139][T23024] dump_stack+0x15/0x1b [ 372.777158][T23024] should_fail_ex+0x265/0x280 [ 372.777240][T23024] should_failslab+0x8c/0xb0 [ 372.777277][T23024] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 372.777459][T23024] ? __d_alloc+0x3d/0x350 [ 372.777498][T23024] __d_alloc+0x3d/0x350 [ 372.777548][T23024] ? mpol_shared_policy_init+0xbd/0x4c0 [ 372.777578][T23024] d_alloc_pseudo+0x1e/0x80 [ 372.777623][T23024] alloc_file_pseudo+0x71/0x160 [ 372.777673][T23024] __shmem_file_setup+0x1b9/0x1f0 [ 372.777698][T23024] shmem_file_setup+0x3b/0x50 [ 372.777721][T23024] __se_sys_memfd_create+0x2c3/0x590 [ 372.777784][T23024] __x64_sys_memfd_create+0x31/0x40 [ 372.777892][T23024] x64_sys_call+0x122f/0x2fb0 [ 372.777915][T23024] do_syscall_64+0xd0/0x1a0 [ 372.778004][T23024] ? clear_bhb_loop+0x25/0x80 [ 372.778062][T23024] ? clear_bhb_loop+0x25/0x80 [ 372.778082][T23024] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 372.778104][T23024] RIP: 0033:0x7f191635e969 [ 372.778123][T23024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 372.778175][T23024] RSP: 002b:00007f19149c6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 372.778192][T23024] RAX: ffffffffffffffda RBX: 00000000000004dd RCX: 00007f191635e969 [ 372.778204][T23024] RDX: 00007f19149c6ef0 RSI: 0000000000000000 RDI: 00007f19163e1444 [ 372.778220][T23024] RBP: 0000200000000c40 R08: 00007f19149c6bb7 R09: 00007f19149c6e40 [ 372.778236][T23024] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000080 [ 372.778311][T23024] R13: 00007f19149c6ef0 R14: 00007f19149c6eb0 R15: 00002000000000c0 [ 372.778333][T23024] </TASK> [ 373.080706][T23034] IPv6: Can't replace route, no match found [ 373.119662][ T29] kauditd_printk_skb: 226 callbacks suppressed [ 373.119677][ T29] audit: type=1400 audit(1746707180.476:29178): avc: denied { read } for pid=23031 comm="syz.2.6454" lport=8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 373.257009][T23047] loop6: detected capacity change from 0 to 2048 [ 373.315564][ T3434] dummy0: left allmulticast mode [ 373.320840][ T3434] bridge0: port 3(dummy0) entered disabled state [ 373.337937][ T3434] bridge_slave_1: left allmulticast mode [ 373.343647][ T3434] bridge_slave_1: left promiscuous mode [ 373.349434][ T3434] bridge0: port 2(bridge_slave_1) entered disabled state [ 373.361491][ T3434] bridge_slave_0: left allmulticast mode [ 373.367533][ T3434] bridge_slave_0: left promiscuous mode [ 373.373212][ T3434] bridge0: port 1(bridge_slave_0) entered disabled state [ 373.421926][T23047] FAULT_INJECTION: forcing a failure. [ 373.421926][T23047] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 373.435263][T23047] CPU: 0 UID: 0 PID: 23047 Comm: syz.6.6458 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 373.435362][T23047] Tainted: [W]=WARN [ 373.435371][T23047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 373.435386][T23047] Call Trace: [ 373.435395][T23047] <TASK> [ 373.435409][T23047] __dump_stack+0x1d/0x30 [ 373.435437][T23047] dump_stack_lvl+0xe8/0x140 [ 373.435456][T23047] dump_stack+0x15/0x1b [ 373.435471][T23047] should_fail_ex+0x265/0x280 [ 373.435537][T23047] should_fail_alloc_page+0xf2/0x100 [ 373.435577][T23047] alloc_pages_bulk_noprof+0xef/0x540 [ 373.435655][T23047] copy_splice_read+0xf3/0x5f0 [ 373.435683][T23047] ? __pfx_filemap_splice_read+0x10/0x10 [ 373.435719][T23047] splice_direct_to_actor+0x290/0x680 [ 373.435748][T23047] ? __pfx_direct_splice_actor+0x10/0x10 [ 373.435829][T23047] do_splice_direct+0xda/0x150 [ 373.435849][T23047] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 373.435875][T23047] do_sendfile+0x380/0x640 [ 373.435944][T23047] __x64_sys_sendfile64+0x105/0x150 [ 373.435980][T23047] x64_sys_call+0xb39/0x2fb0 [ 373.436007][T23047] do_syscall_64+0xd0/0x1a0 [ 373.436052][T23047] ? clear_bhb_loop+0x25/0x80 [ 373.436079][T23047] ? clear_bhb_loop+0x25/0x80 [ 373.436106][T23047] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 373.436133][T23047] RIP: 0033:0x7fec2965e969 [ 373.436150][T23047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 373.436224][T23047] RSP: 002b:00007fec27ca6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 373.436247][T23047] RAX: ffffffffffffffda RBX: 00007fec29886080 RCX: 00007fec2965e969 [ 373.436263][T23047] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 0000000000000009 [ 373.436279][T23047] RBP: 00007fec27ca6090 R08: 0000000000000000 R09: 0000000000000000 [ 373.436294][T23047] R10: 0000000800000009 R11: 0000000000000246 R12: 0000000000000001 [ 373.436309][T23047] R13: 0000000000000000 R14: 00007fec29886080 R15: 00007ffd76a676b8 [ 373.436334][T23047] </TASK> [ 373.651912][ T3434] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 373.662820][ T3434] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 373.672329][ T3434] bond0 (unregistering): Released all slaves [ 373.721753][ T3434] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 373.751021][ T3434] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 373.776666][T23063] FAULT_INJECTION: forcing a failure. [ 373.776666][T23063] name failslab, interval 1, probability 0, space 0, times 0 [ 373.789567][T23063] CPU: 0 UID: 0 PID: 23063 Comm: syz.0.6462 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 373.789602][T23063] Tainted: [W]=WARN [ 373.789611][T23063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 373.789626][T23063] Call Trace: [ 373.789633][T23063] <TASK> [ 373.789642][T23063] __dump_stack+0x1d/0x30 [ 373.789699][T23063] dump_stack_lvl+0xe8/0x140 [ 373.789723][T23063] dump_stack+0x15/0x1b [ 373.789740][T23063] should_fail_ex+0x265/0x280 [ 373.789797][T23063] should_failslab+0x8c/0xb0 [ 373.789825][T23063] kmem_cache_alloc_noprof+0x50/0x310 [ 373.789865][T23063] ? security_file_alloc+0x32/0x100 [ 373.789899][T23063] security_file_alloc+0x32/0x100 [ 373.789968][T23063] init_file+0x5c/0x1d0 [ 373.789998][T23063] alloc_empty_file+0x8b/0x200 [ 373.790039][T23063] path_openat+0x68/0x2170 [ 373.790094][T23063] ? _parse_integer_limit+0x170/0x190 [ 373.790123][T23063] ? _parse_integer+0x27/0x40 [ 373.790151][T23063] ? kstrtoull+0x111/0x140 [ 373.790222][T23063] ? kstrtouint+0x76/0xc0 [ 373.790256][T23063] do_filp_open+0x109/0x230 [ 373.790286][T23063] do_sys_openat2+0xa6/0x110 [ 373.790306][T23063] __x64_sys_creat+0x65/0x90 [ 373.790356][T23063] x64_sys_call+0x114d/0x2fb0 [ 373.790383][T23063] do_syscall_64+0xd0/0x1a0 [ 373.790420][T23063] ? clear_bhb_loop+0x25/0x80 [ 373.790460][T23063] ? clear_bhb_loop+0x25/0x80 [ 373.790543][T23063] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 373.790631][T23063] RIP: 0033:0x7feaedfce969 [ 373.790648][T23063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 373.790672][T23063] RSP: 002b:00007feaec637038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 373.790695][T23063] RAX: ffffffffffffffda RBX: 00007feaee1f5fa0 RCX: 00007feaedfce969 [ 373.790721][T23063] RDX: 0000000000000000 RSI: 0000000000000090 RDI: 0000200000000200 [ 373.790737][T23063] RBP: 00007feaec637090 R08: 0000000000000000 R09: 0000000000000000 [ 373.790801][T23063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 373.790816][T23063] R13: 0000000000000000 R14: 00007feaee1f5fa0 R15: 00007fff07bc0078 [ 373.790837][T23063] </TASK> [ 374.087022][ T29] audit: type=1326 audit(1746707181.436:29179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 374.110768][ T29] audit: type=1326 audit(1746707181.436:29180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 374.134616][ T29] audit: type=1326 audit(1746707181.436:29181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 374.158229][ T29] audit: type=1326 audit(1746707181.436:29182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 374.181938][ T29] audit: type=1326 audit(1746707181.436:29183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 374.205557][ T29] audit: type=1326 audit(1746707181.436:29184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 374.229233][ T29] audit: type=1326 audit(1746707181.436:29185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 374.252870][ T29] audit: type=1326 audit(1746707181.436:29186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 374.276542][ T29] audit: type=1326 audit(1746707181.436:29187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 374.333966][ T3434] team0 (unregistering): Port device team_slave_1 removed [ 374.343998][ T3434] team0 (unregistering): Port device team_slave_0 removed [ 374.379783][T23079] netlink: 'syz.0.6464': attribute type 21 has an invalid length. [ 374.500631][T23086] usb usb2: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 374.508215][T23086] vhci_hcd: default hub control req: 6011 v8001 i0001 l0 [ 374.508870][T23044] chnl_net:caif_netlink_parms(): no params data found [ 374.552368][T23044] bridge0: port 1(bridge_slave_0) entered blocking state [ 374.559570][T23044] bridge0: port 1(bridge_slave_0) entered disabled state [ 374.566740][T23044] bridge_slave_0: entered allmulticast mode [ 374.573424][T23044] bridge_slave_0: entered promiscuous mode [ 374.580625][T23044] bridge0: port 2(bridge_slave_1) entered blocking state [ 374.587812][T23044] bridge0: port 2(bridge_slave_1) entered disabled state [ 374.594959][T23044] bridge_slave_1: entered allmulticast mode [ 374.601554][T23044] bridge_slave_1: entered promiscuous mode [ 374.620624][T23044] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 374.631497][T23044] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 374.664293][T23044] team0: Port device team_slave_0 added [ 374.678216][T23044] team0: Port device team_slave_1 added [ 374.696751][T23044] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 374.703782][T23044] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 374.729876][T23044] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 374.741731][T23044] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 374.748892][T23044] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 374.774972][T23044] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 374.830509][T23044] hsr_slave_0: entered promiscuous mode [ 374.839853][T23044] hsr_slave_1: entered promiscuous mode [ 374.929136][T23109] loop6: detected capacity change from 0 to 512 [ 374.988479][T23109] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback. [ 375.015694][T23109] ext4 filesystem being mounted at /25/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff) [ 375.092355][T22715] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000d40000. [ 375.155143][T23131] loop6: detected capacity change from 0 to 764 [ 375.221345][T23141] __nla_validate_parse: 34 callbacks suppressed [ 375.221362][T23141] netlink: 16215 bytes leftover after parsing attributes in process `syz.2.6491'. [ 375.248588][T23144] program syz.0.6493 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 375.258235][T23141] netlink: 24 bytes leftover after parsing attributes in process `syz.2.6491'. [ 375.297544][T23146] siw: device registration error -23 [ 375.301971][T23149] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6495'. [ 375.311921][T23149] netlink: 32 bytes leftover after parsing attributes in process `syz.0.6495'. [ 375.320915][T23149] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6495'. [ 375.332436][T23146] netlink: 188 bytes leftover after parsing attributes in process `syz.6.6492'. [ 375.341859][T23149] netlink: 32 bytes leftover after parsing attributes in process `syz.0.6495'. [ 375.399444][T23044] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 375.411074][T23044] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 375.428824][T23044] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 375.437884][T23044] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 375.459745][T23163] loop6: detected capacity change from 0 to 1024 [ 375.461705][T23044] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.473265][T23044] bridge0: port 2(bridge_slave_1) entered forwarding state [ 375.480632][T23044] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.487762][T23044] bridge0: port 1(bridge_slave_0) entered forwarding state [ 375.496457][T12286] bridge0: port 1(bridge_slave_0) entered disabled state [ 375.504638][T12286] bridge0: port 2(bridge_slave_1) entered disabled state [ 375.513984][T23163] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 375.538824][T22715] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 375.557978][T23044] 8021q: adding VLAN 0 to HW filter on device bond0 [ 375.571009][T23044] 8021q: adding VLAN 0 to HW filter on device team0 [ 375.584543][T14042] bridge0: port 1(bridge_slave_0) entered blocking state [ 375.591730][T14042] bridge0: port 1(bridge_slave_0) entered forwarding state [ 375.604189][ T3434] bridge0: port 2(bridge_slave_1) entered blocking state [ 375.611324][ T3434] bridge0: port 2(bridge_slave_1) entered forwarding state [ 375.637600][T23044] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 375.648236][T23044] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 375.716291][T23184] netlink: 'syz.2.6506': attribute type 13 has an invalid length. [ 375.726874][T23184] netlink: 'syz.2.6506': attribute type 1 has an invalid length. [ 375.734794][T23184] netlink: 199820 bytes leftover after parsing attributes in process `syz.2.6506'. [ 375.759779][T23044] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 375.767398][T23188] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6507'. [ 375.776484][T23188] netlink: 32 bytes leftover after parsing attributes in process `syz.2.6507'. [ 375.891007][T23044] veth0_vlan: entered promiscuous mode [ 375.900484][T23044] veth1_vlan: entered promiscuous mode [ 375.919014][T23044] veth0_macvtap: entered promiscuous mode [ 375.927069][T23044] veth1_macvtap: entered promiscuous mode [ 375.938837][T23044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 375.949373][T23044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 375.960354][T23044] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 375.971008][T23044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 375.981757][T23044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 375.992494][T23044] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 376.002755][T23044] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 376.011584][T23044] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 376.020539][T23044] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 376.029327][T23044] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 376.136712][T23223] FAULT_INJECTION: forcing a failure. [ 376.136712][T23223] name failslab, interval 1, probability 0, space 0, times 0 [ 376.149454][T23223] CPU: 1 UID: 0 PID: 23223 Comm: syz.2.6515 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 376.149505][T23223] Tainted: [W]=WARN [ 376.149586][T23223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 376.149603][T23223] Call Trace: [ 376.149610][T23223] <TASK> [ 376.149618][T23223] __dump_stack+0x1d/0x30 [ 376.149680][T23223] dump_stack_lvl+0xe8/0x140 [ 376.149705][T23223] dump_stack+0x15/0x1b [ 376.149725][T23223] should_fail_ex+0x265/0x280 [ 376.149757][T23223] should_failslab+0x8c/0xb0 [ 376.149785][T23223] __kmalloc_noprof+0xa5/0x3e0 [ 376.149827][T23223] ? ip_options_get+0x52/0x350 [ 376.149853][T23223] ip_options_get+0x52/0x350 [ 376.149880][T23223] do_ip_setsockopt+0x19d4/0x2240 [ 376.149917][T23223] ip_setsockopt+0x58/0x110 [ 376.149961][T23223] dccp_setsockopt+0xe4/0x660 [ 376.149995][T23223] sock_common_setsockopt+0x66/0x80 [ 376.150029][T23223] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 376.150064][T23223] __sys_setsockopt+0x181/0x200 [ 376.150119][T23223] __x64_sys_setsockopt+0x64/0x80 [ 376.150160][T23223] x64_sys_call+0x2bd5/0x2fb0 [ 376.150187][T23223] do_syscall_64+0xd0/0x1a0 [ 376.150215][T23223] ? clear_bhb_loop+0x25/0x80 [ 376.150255][T23223] ? clear_bhb_loop+0x25/0x80 [ 376.150274][T23223] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 376.150320][T23223] RIP: 0033:0x7f191635e969 [ 376.150334][T23223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 376.150401][T23223] RSP: 002b:00007f19149c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 376.150417][T23223] RAX: ffffffffffffffda RBX: 00007f1916585fa0 RCX: 00007f191635e969 [ 376.150428][T23223] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000006 [ 376.150439][T23223] RBP: 00007f19149c7090 R08: 0000000000000000 R09: 0000000000000000 [ 376.150449][T23223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 376.150460][T23223] R13: 0000000000000000 R14: 00007f1916585fa0 R15: 00007ffdceba1a48 [ 376.150487][T23223] </TASK> [ 376.390768][T23233] netlink: 'syz.2.6519': attribute type 13 has an invalid length. [ 376.400524][T23233] netlink: 'syz.2.6519': attribute type 1 has an invalid length. [ 376.773953][T23280] loop6: detected capacity change from 0 to 164 [ 376.783597][T23280] Unable to read rock-ridge attributes [ 377.076703][T23325] loop6: detected capacity change from 0 to 128 [ 377.127713][T23329] 8021q: VLANs not supported on tunl0 [ 377.262225][T23346] FAULT_INJECTION: forcing a failure. [ 377.262225][T23346] name failslab, interval 1, probability 0, space 0, times 0 [ 377.274958][T23346] CPU: 0 UID: 0 PID: 23346 Comm: syz.6.6566 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 377.275001][T23346] Tainted: [W]=WARN [ 377.275095][T23346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 377.275169][T23346] Call Trace: [ 377.275175][T23346] <TASK> [ 377.275183][T23346] __dump_stack+0x1d/0x30 [ 377.275321][T23346] dump_stack_lvl+0xe8/0x140 [ 377.275338][T23346] dump_stack+0x15/0x1b [ 377.275354][T23346] should_fail_ex+0x265/0x280 [ 377.275384][T23346] should_failslab+0x8c/0xb0 [ 377.275450][T23346] __kmalloc_noprof+0xa5/0x3e0 [ 377.275466][T23346] ? iovec_from_user+0x84/0x210 [ 377.275486][T23346] iovec_from_user+0x84/0x210 [ 377.275513][T23346] __import_iovec+0xf3/0x540 [ 377.275567][T23346] ? terminate_walk+0x27f/0x2a0 [ 377.275593][T23346] import_iovec+0x61/0x80 [ 377.275613][T23346] process_vm_rw+0xea/0x950 [ 377.275629][T23346] ? _parse_integer+0x27/0x40 [ 377.275718][T23346] ? kstrtoull+0x111/0x140 [ 377.275750][T23346] ? __fget_files+0x184/0x1c0 [ 377.275806][T23346] ? fput+0x8f/0xc0 [ 377.275822][T23346] __x64_sys_process_vm_writev+0x78/0x90 [ 377.275852][T23346] x64_sys_call+0xe80/0x2fb0 [ 377.275871][T23346] do_syscall_64+0xd0/0x1a0 [ 377.275904][T23346] ? clear_bhb_loop+0x25/0x80 [ 377.275922][T23346] ? clear_bhb_loop+0x25/0x80 [ 377.275940][T23346] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 377.276003][T23346] RIP: 0033:0x7fec2965e969 [ 377.276016][T23346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 377.276057][T23346] RSP: 002b:00007fec27cc7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000137 [ 377.276073][T23346] RAX: ffffffffffffffda RBX: 00007fec29885fa0 RCX: 00007fec2965e969 [ 377.276084][T23346] RDX: 000000000000002b RSI: 0000200000c22000 RDI: 000000000000005d [ 377.276100][T23346] RBP: 00007fec27cc7090 R08: 0000000000000001 R09: 0000000000000000 [ 377.276111][T23346] R10: 0000200000c22fa0 R11: 0000000000000246 R12: 0000000000000001 [ 377.276121][T23346] R13: 0000000000000000 R14: 00007fec29885fa0 R15: 00007ffd76a676b8 [ 377.276137][T23346] </TASK> [ 377.693196][T23361] FAULT_INJECTION: forcing a failure. [ 377.693196][T23361] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 377.706431][T23361] CPU: 1 UID: 0 PID: 23361 Comm: syz.1.6572 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 377.706546][T23361] Tainted: [W]=WARN [ 377.706553][T23361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 377.706569][T23361] Call Trace: [ 377.706576][T23361] <TASK> [ 377.706584][T23361] __dump_stack+0x1d/0x30 [ 377.706626][T23361] dump_stack_lvl+0xe8/0x140 [ 377.706650][T23361] dump_stack+0x15/0x1b [ 377.706686][T23361] should_fail_ex+0x265/0x280 [ 377.706752][T23361] should_fail+0xb/0x20 [ 377.706785][T23361] should_fail_usercopy+0x1a/0x20 [ 377.706886][T23361] _copy_from_user+0x1c/0xb0 [ 377.706913][T23361] kstrtouint_from_user+0x69/0xf0 [ 377.706950][T23361] ? avc_policy_seqno+0x15/0x30 [ 377.706987][T23361] proc_fail_nth_write+0x50/0x160 [ 377.707112][T23361] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 377.707200][T23361] vfs_write+0x266/0x8d0 [ 377.707267][T23361] ? vfs_read+0x47f/0x6f0 [ 377.707294][T23361] ? __rcu_read_unlock+0x4f/0x70 [ 377.707320][T23361] ? __fget_files+0x184/0x1c0 [ 377.707356][T23361] ksys_write+0xda/0x1a0 [ 377.707385][T23361] __x64_sys_write+0x40/0x50 [ 377.707410][T23361] x64_sys_call+0x2cdd/0x2fb0 [ 377.707489][T23361] do_syscall_64+0xd0/0x1a0 [ 377.707517][T23361] ? clear_bhb_loop+0x25/0x80 [ 377.707546][T23361] ? clear_bhb_loop+0x25/0x80 [ 377.707567][T23361] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 377.707588][T23361] RIP: 0033:0x7fd57aa8d41f [ 377.707651][T23361] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 377.707673][T23361] RSP: 002b:00007fd5790f7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 377.707696][T23361] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd57aa8d41f [ 377.707727][T23361] RDX: 0000000000000001 RSI: 00007fd5790f70a0 RDI: 0000000000000008 [ 377.707738][T23361] RBP: 00007fd5790f7090 R08: 0000000000000000 R09: 0000000000000000 [ 377.707750][T23361] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 377.707761][T23361] R13: 0000000000000000 R14: 00007fd57acb5fa0 R15: 00007fffd76dfb48 [ 377.707813][T23361] </TASK> [ 378.039721][T23386] FAULT_INJECTION: forcing a failure. [ 378.039721][T23386] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 378.049549][T23384] SELinux: failed to load policy [ 378.052842][T23386] CPU: 0 UID: 0 PID: 23386 Comm: syz.0.6581 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 378.052884][T23386] Tainted: [W]=WARN [ 378.052893][T23386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 378.052911][T23386] Call Trace: [ 378.052920][T23386] <TASK> [ 378.052998][T23386] __dump_stack+0x1d/0x30 [ 378.053062][T23386] dump_stack_lvl+0xe8/0x140 [ 378.053087][T23386] dump_stack+0x15/0x1b [ 378.053109][T23386] should_fail_ex+0x265/0x280 [ 378.053152][T23386] should_fail+0xb/0x20 [ 378.053188][T23386] should_fail_usercopy+0x1a/0x20 [ 378.053229][T23386] _copy_from_user+0x1c/0xb0 [ 378.053258][T23386] kstrtouint_from_user+0x69/0xf0 [ 378.053326][T23386] ? avc_policy_seqno+0x15/0x30 [ 378.053370][T23386] proc_fail_nth_write+0x50/0x160 [ 378.053404][T23386] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 378.053437][T23386] vfs_write+0x266/0x8d0 [ 378.053493][T23386] ? vfs_read+0x47f/0x6f0 [ 378.053523][T23386] ? __rcu_read_unlock+0x4f/0x70 [ 378.053551][T23386] ? __fget_files+0x184/0x1c0 [ 378.053662][T23386] ksys_write+0xda/0x1a0 [ 378.053696][T23386] __x64_sys_write+0x40/0x50 [ 378.053729][T23386] x64_sys_call+0x2cdd/0x2fb0 [ 378.053757][T23386] do_syscall_64+0xd0/0x1a0 [ 378.053785][T23386] ? clear_bhb_loop+0x25/0x80 [ 378.053868][T23386] ? clear_bhb_loop+0x25/0x80 [ 378.053895][T23386] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 378.053924][T23386] RIP: 0033:0x7feaedfcd41f [ 378.053944][T23386] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 378.053968][T23386] RSP: 002b:00007feaec637030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 378.054060][T23386] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007feaedfcd41f [ 378.054077][T23386] RDX: 0000000000000001 RSI: 00007feaec6370a0 RDI: 0000000000000007 [ 378.054093][T23386] RBP: 00007feaec637090 R08: 0000000000000000 R09: 0000000000000000 [ 378.054109][T23386] R10: 0000000004000000 R11: 0000000000000293 R12: 0000000000000001 [ 378.054125][T23386] R13: 0000000000000000 R14: 00007feaee1f5fa0 R15: 00007fff07bc0078 [ 378.054149][T23386] </TASK> [ 378.186467][ T29] kauditd_printk_skb: 545 callbacks suppressed [ 378.186487][ T29] audit: type=1326 audit(1746707185.537:29733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23391 comm="syz.2.6584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f191635e969 code=0x7ffc0000 [ 378.303534][ T29] audit: type=1326 audit(1746707185.547:29734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23391 comm="syz.2.6584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=38 compat=0 ip=0x7f191635e969 code=0x7ffc0000 [ 378.327261][ T29] audit: type=1326 audit(1746707185.547:29735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23391 comm="syz.2.6584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f191635e969 code=0x7ffc0000 [ 378.351152][ T29] audit: type=1326 audit(1746707185.547:29736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23391 comm="syz.2.6584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f191635e969 code=0x7ffc0000 [ 378.374883][ T29] audit: type=1326 audit(1746707185.587:29737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23394 comm="syz.0.6585" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaedfce969 code=0x7ffc0000 [ 378.398496][ T29] audit: type=1326 audit(1746707185.587:29738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23394 comm="syz.0.6585" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaedfce969 code=0x7ffc0000 [ 378.422226][ T29] audit: type=1326 audit(1746707185.587:29739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23394 comm="syz.0.6585" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feaedfce969 code=0x7ffc0000 [ 378.445965][ T29] audit: type=1326 audit(1746707185.587:29740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23394 comm="syz.0.6585" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaedfce969 code=0x7ffc0000 [ 378.448825][T23395] netlink: 'syz.0.6585': attribute type 1 has an invalid length. [ 378.469742][ T29] audit: type=1326 audit(1746707185.587:29741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23394 comm="syz.0.6585" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaedfce969 code=0x7ffc0000 [ 378.501226][ T29] audit: type=1326 audit(1746707185.587:29742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23394 comm="syz.0.6585" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feaedfce969 code=0x7ffc0000 [ 378.607841][T23405] ucma_write: process 37 (syz.4.6589) changed security contexts after opening file descriptor, this is not allowed. [ 378.673012][T23415] FAULT_INJECTION: forcing a failure. [ 378.673012][T23415] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 378.686186][T23415] CPU: 0 UID: 0 PID: 23415 Comm: syz.6.6593 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 378.686323][T23415] Tainted: [W]=WARN [ 378.686331][T23415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 378.686346][T23415] Call Trace: [ 378.686353][T23415] <TASK> [ 378.686361][T23415] __dump_stack+0x1d/0x30 [ 378.686382][T23415] dump_stack_lvl+0xe8/0x140 [ 378.686401][T23415] dump_stack+0x15/0x1b [ 378.686416][T23415] should_fail_ex+0x265/0x280 [ 378.686482][T23415] should_fail+0xb/0x20 [ 378.686518][T23415] should_fail_usercopy+0x1a/0x20 [ 378.686585][T23415] _copy_from_user+0x1c/0xb0 [ 378.686612][T23415] sel_write_load+0x192/0x380 [ 378.686727][T23415] ? __pfx_sel_write_load+0x10/0x10 [ 378.686759][T23415] vfs_write+0x266/0x8d0 [ 378.686790][T23415] ? __rcu_read_unlock+0x4f/0x70 [ 378.686857][T23415] ? __fget_files+0x184/0x1c0 [ 378.686893][T23415] ksys_write+0xda/0x1a0 [ 378.686976][T23415] __x64_sys_write+0x40/0x50 [ 378.687015][T23415] x64_sys_call+0x2cdd/0x2fb0 [ 378.687042][T23415] do_syscall_64+0xd0/0x1a0 [ 378.687067][T23415] ? clear_bhb_loop+0x25/0x80 [ 378.687158][T23415] ? clear_bhb_loop+0x25/0x80 [ 378.687178][T23415] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 378.687202][T23415] RIP: 0033:0x7fec2965e969 [ 378.687221][T23415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 378.687244][T23415] RSP: 002b:00007fec27cc7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 378.687267][T23415] RAX: ffffffffffffffda RBX: 00007fec29885fa0 RCX: 00007fec2965e969 [ 378.687286][T23415] RDX: 0000000000002000 RSI: 0000200000000000 RDI: 0000000000000007 [ 378.687366][T23415] RBP: 00007fec27cc7090 R08: 0000000000000000 R09: 0000000000000000 [ 378.687379][T23415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 378.687395][T23415] R13: 0000000000000000 R14: 00007fec29885fa0 R15: 00007ffd76a676b8 [ 378.687465][T23415] </TASK> [ 378.932656][T23423] netlink: 'syz.4.6597': attribute type 30 has an invalid length. [ 378.946616][T23425] FAULT_INJECTION: forcing a failure. [ 378.946616][T23425] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 378.959890][T23425] CPU: 1 UID: 0 PID: 23425 Comm: syz.6.6598 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 378.959970][T23425] Tainted: [W]=WARN [ 378.959979][T23425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 378.960055][T23425] Call Trace: [ 378.960063][T23425] <TASK> [ 378.960073][T23425] __dump_stack+0x1d/0x30 [ 378.960099][T23425] dump_stack_lvl+0xe8/0x140 [ 378.960123][T23425] dump_stack+0x15/0x1b [ 378.960145][T23425] should_fail_ex+0x265/0x280 [ 378.960184][T23425] should_fail+0xb/0x20 [ 378.960228][T23425] should_fail_usercopy+0x1a/0x20 [ 378.960252][T23425] _copy_from_user+0x1c/0xb0 [ 378.960307][T23425] memdup_user+0x5e/0xd0 [ 378.960328][T23425] strndup_user+0x68/0xb0 [ 378.960350][T23425] perf_uprobe_init+0x48/0x150 [ 378.960438][T23425] perf_uprobe_event_init+0xea/0x150 [ 378.960479][T23425] perf_try_init_event+0xd0/0x540 [ 378.960570][T23425] ? perf_event_alloc+0xab1/0x15c0 [ 378.960596][T23425] perf_event_alloc+0xabc/0x15c0 [ 378.960629][T23425] __se_sys_perf_event_open+0x5a8/0x1170 [ 378.960776][T23425] ? __rcu_read_unlock+0x4f/0x70 [ 378.960809][T23425] __x64_sys_perf_event_open+0x67/0x80 [ 378.960862][T23425] x64_sys_call+0x27ec/0x2fb0 [ 378.960884][T23425] do_syscall_64+0xd0/0x1a0 [ 378.960906][T23425] ? clear_bhb_loop+0x25/0x80 [ 378.960927][T23425] ? clear_bhb_loop+0x25/0x80 [ 378.960981][T23425] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 378.961090][T23425] RIP: 0033:0x7fec2965e969 [ 378.961106][T23425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 378.961125][T23425] RSP: 002b:00007fec27cc7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a [ 378.961143][T23425] RAX: ffffffffffffffda RBX: 00007fec29885fa0 RCX: 00007fec2965e969 [ 378.961180][T23425] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000 [ 378.961194][T23425] RBP: 00007fec27cc7090 R08: 0000000000000000 R09: 0000000000000000 [ 378.961206][T23425] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001 [ 378.961298][T23425] R13: 0000000000000000 R14: 00007fec29885fa0 R15: 00007ffd76a676b8 [ 378.961338][T23425] </TASK> [ 379.209159][T23434] FAULT_INJECTION: forcing a failure. [ 379.209159][T23434] name failslab, interval 1, probability 0, space 0, times 0 [ 379.221897][T23434] CPU: 1 UID: 0 PID: 23434 Comm: syz.4.6601 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 379.221939][T23434] Tainted: [W]=WARN [ 379.221948][T23434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 379.221964][T23434] Call Trace: [ 379.221972][T23434] <TASK> [ 379.221988][T23434] __dump_stack+0x1d/0x30 [ 379.222057][T23434] dump_stack_lvl+0xe8/0x140 [ 379.222081][T23434] dump_stack+0x15/0x1b [ 379.222181][T23434] should_fail_ex+0x265/0x280 [ 379.222221][T23434] should_failslab+0x8c/0xb0 [ 379.222257][T23434] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 379.222333][T23434] ? sidtab_sid2str_get+0xa0/0x130 [ 379.222370][T23434] kmemdup_noprof+0x2b/0x70 [ 379.222393][T23434] sidtab_sid2str_get+0xa0/0x130 [ 379.222455][T23434] security_sid_to_context_core+0x1eb/0x2e0 [ 379.222491][T23434] security_sid_to_context+0x27/0x40 [ 379.222525][T23434] selinux_lsmprop_to_secctx+0x67/0xf0 [ 379.222576][T23434] security_lsmprop_to_secctx+0x43/0x80 [ 379.222627][T23434] audit_log_task_context+0x77/0x190 [ 379.222751][T23434] audit_log_task+0xf4/0x250 [ 379.222856][T23434] audit_seccomp+0x61/0x100 [ 379.222886][T23434] ? __seccomp_filter+0x68c/0x10d0 [ 379.222912][T23434] __seccomp_filter+0x69d/0x10d0 [ 379.222936][T23434] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 379.223044][T23434] ? vfs_write+0x75e/0x8d0 [ 379.223075][T23434] ? __rcu_read_unlock+0x4f/0x70 [ 379.223171][T23434] ? __fget_files+0x184/0x1c0 [ 379.223205][T23434] __secure_computing+0x82/0x150 [ 379.223227][T23434] syscall_trace_enter+0xcf/0x1e0 [ 379.223251][T23434] do_syscall_64+0xaa/0x1a0 [ 379.223341][T23434] ? clear_bhb_loop+0x25/0x80 [ 379.223367][T23434] ? clear_bhb_loop+0x25/0x80 [ 379.223394][T23434] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 379.223421][T23434] RIP: 0033:0x7f821801e969 [ 379.223441][T23434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 379.223460][T23434] RSP: 002b:00007f8216687038 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 379.223498][T23434] RAX: ffffffffffffffda RBX: 00007f8218245fa0 RCX: 00007f821801e969 [ 379.223510][T23434] RDX: 0000000000019039 RSI: 000020000001a240 RDI: 0000000000000003 [ 379.223526][T23434] RBP: 00007f8216687090 R08: 0000000000000000 R09: 0000000000000000 [ 379.223541][T23434] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001 [ 379.223557][T23434] R13: 0000000000000000 R14: 00007f8218245fa0 R15: 00007ffd84e26d78 [ 379.223631][T23434] </TASK> [ 379.490074][T23436] FAULT_INJECTION: forcing a failure. [ 379.490074][T23436] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 379.503189][T23436] CPU: 1 UID: 0 PID: 23436 Comm: syz.2.6603 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 379.503233][T23436] Tainted: [W]=WARN [ 379.503242][T23436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 379.503265][T23436] Call Trace: [ 379.503273][T23436] <TASK> [ 379.503282][T23436] __dump_stack+0x1d/0x30 [ 379.503310][T23436] dump_stack_lvl+0xe8/0x140 [ 379.503335][T23436] dump_stack+0x15/0x1b [ 379.503354][T23436] should_fail_ex+0x265/0x280 [ 379.503412][T23436] should_fail+0xb/0x20 [ 379.503447][T23436] should_fail_usercopy+0x1a/0x20 [ 379.503471][T23436] _copy_from_user+0x1c/0xb0 [ 379.503549][T23436] ___sys_recvmsg+0xaa/0x370 [ 379.503588][T23436] do_recvmmsg+0x1ef/0x540 [ 379.503616][T23436] ? fput+0x8f/0xc0 [ 379.503705][T23436] __x64_sys_recvmmsg+0xe5/0x170 [ 379.503733][T23436] x64_sys_call+0x1c6a/0x2fb0 [ 379.503760][T23436] do_syscall_64+0xd0/0x1a0 [ 379.503788][T23436] ? clear_bhb_loop+0x25/0x80 [ 379.503812][T23436] ? clear_bhb_loop+0x25/0x80 [ 379.503903][T23436] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 379.503974][T23436] RIP: 0033:0x7f191635e969 [ 379.503994][T23436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 379.504017][T23436] RSP: 002b:00007f19149c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b [ 379.504041][T23436] RAX: ffffffffffffffda RBX: 00007f1916585fa0 RCX: 00007f191635e969 [ 379.504057][T23436] RDX: 0000000000000220 RSI: 00002000000002c0 RDI: 0000000000000003 [ 379.504073][T23436] RBP: 00007f19149c7090 R08: 0000000000000000 R09: 0000000000000000 [ 379.504098][T23436] R10: 0000000000000100 R11: 0000000000000246 R12: 0000000000000001 [ 379.504112][T23436] R13: 0000000000000000 R14: 00007f1916585fa0 R15: 00007ffdceba1a48 [ 379.504177][T23436] </TASK> [ 379.880790][T23459] FAULT_INJECTION: forcing a failure. [ 379.880790][T23459] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 379.893947][T23459] CPU: 1 UID: 0 PID: 23459 Comm: syz.0.6615 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 379.893988][T23459] Tainted: [W]=WARN [ 379.894041][T23459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 379.894057][T23459] Call Trace: [ 379.894066][T23459] <TASK> [ 379.894076][T23459] __dump_stack+0x1d/0x30 [ 379.894101][T23459] dump_stack_lvl+0xe8/0x140 [ 379.894120][T23459] dump_stack+0x15/0x1b [ 379.894139][T23459] should_fail_ex+0x265/0x280 [ 379.894175][T23459] should_fail+0xb/0x20 [ 379.894261][T23459] should_fail_usercopy+0x1a/0x20 [ 379.894279][T23459] strncpy_from_user+0x25/0x230 [ 379.894310][T23459] ? kmem_cache_alloc_noprof+0x186/0x310 [ 379.894398][T23459] ? getname_flags+0x80/0x3b0 [ 379.894436][T23459] getname_flags+0xae/0x3b0 [ 379.894472][T23459] __se_sys_move_mount+0x16d/0x440 [ 379.894506][T23459] __x64_sys_move_mount+0x67/0x80 [ 379.894597][T23459] x64_sys_call+0x1f00/0x2fb0 [ 379.894681][T23459] do_syscall_64+0xd0/0x1a0 [ 379.894708][T23459] ? clear_bhb_loop+0x25/0x80 [ 379.894735][T23459] ? clear_bhb_loop+0x25/0x80 [ 379.894757][T23459] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 379.894783][T23459] RIP: 0033:0x7feaedfce969 [ 379.894879][T23459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 379.894902][T23459] RSP: 002b:00007feaec637038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ad [ 379.894925][T23459] RAX: ffffffffffffffda RBX: 00007feaee1f5fa0 RCX: 00007feaedfce969 [ 379.894944][T23459] RDX: 0000000000000003 RSI: 0000200000000080 RDI: 0000000000000003 [ 379.894956][T23459] RBP: 00007feaec637090 R08: 0000000000000153 R09: 0000000000000000 [ 379.894967][T23459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 379.894978][T23459] R13: 0000000000000000 R14: 00007feaee1f5fa0 R15: 00007fff07bc0078 [ 379.895019][T23459] </TASK> [ 380.207416][T23460] @: renamed from vlan0 (while UP) [ 380.257824][T23483] sg_write: data in/out 512/1 bytes for SCSI command 0xb7-- guessing data in; [ 380.257824][T23483] program syz.4.6628 not setting count and/or reply_len properly [ 380.297570][T23485] usb usb2: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK. [ 380.305193][T23485] vhci_hcd: default hub control req: 6011 v8001 i0001 l0 [ 380.462334][T23512] __nla_validate_parse: 36 callbacks suppressed [ 380.462385][T23512] netlink: 188 bytes leftover after parsing attributes in process `syz.2.6639'. [ 380.504781][T23514] FAULT_INJECTION: forcing a failure. [ 380.504781][T23514] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 380.518168][T23514] CPU: 0 UID: 0 PID: 23514 Comm: syz.1.6640 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 380.518204][T23514] Tainted: [W]=WARN [ 380.518211][T23514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 380.518252][T23514] Call Trace: [ 380.518279][T23514] <TASK> [ 380.518288][T23514] __dump_stack+0x1d/0x30 [ 380.518353][T23514] dump_stack_lvl+0xe8/0x140 [ 380.518391][T23514] dump_stack+0x15/0x1b [ 380.518412][T23514] should_fail_ex+0x265/0x280 [ 380.518473][T23514] should_fail+0xb/0x20 [ 380.518518][T23514] should_fail_usercopy+0x1a/0x20 [ 380.518541][T23514] _copy_from_iter+0xcf/0xdd0 [ 380.518571][T23514] hci_sock_sendmsg+0x36d/0x900 [ 380.518647][T23514] ? __pfx_hci_sock_sendmsg+0x10/0x10 [ 380.518740][T23514] __sock_sendmsg+0x142/0x180 [ 380.518766][T23514] sock_write_iter+0x165/0x1b0 [ 380.518876][T23514] aio_write+0x2e2/0x410 [ 380.518926][T23514] io_submit_one+0xac8/0x11b0 [ 380.518958][T23514] __se_sys_io_submit+0xfb/0x280 [ 380.519047][T23514] __x64_sys_io_submit+0x43/0x50 [ 380.519069][T23514] x64_sys_call+0xfc4/0x2fb0 [ 380.519089][T23514] do_syscall_64+0xd0/0x1a0 [ 380.519111][T23514] ? clear_bhb_loop+0x25/0x80 [ 380.519185][T23514] ? clear_bhb_loop+0x25/0x80 [ 380.519207][T23514] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 380.519231][T23514] RIP: 0033:0x7fd57aa8e969 [ 380.519303][T23514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 380.519382][T23514] RSP: 002b:00007fd5790f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 380.519466][T23514] RAX: ffffffffffffffda RBX: 00007fd57acb5fa0 RCX: 00007fd57aa8e969 [ 380.519483][T23514] RDX: 0000200000000340 RSI: 0000000000000001 RDI: 00007fd57b7f1000 [ 380.519498][T23514] RBP: 00007fd5790f7090 R08: 0000000000000000 R09: 0000000000000000 [ 380.519514][T23514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 380.519551][T23514] R13: 0000000000000000 R14: 00007fd57acb5fa0 R15: 00007fffd76dfb48 [ 380.519575][T23514] </TASK> [ 380.734376][T23519] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6642'. [ 380.819467][T23530] FAULT_INJECTION: forcing a failure. [ 380.819467][T23530] name failslab, interval 1, probability 0, space 0, times 0 [ 380.832257][T23530] CPU: 1 UID: 0 PID: 23530 Comm: syz.6.6646 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 380.832326][T23530] Tainted: [W]=WARN [ 380.832335][T23530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 380.832383][T23530] Call Trace: [ 380.832391][T23530] <TASK> [ 380.832400][T23530] __dump_stack+0x1d/0x30 [ 380.832427][T23530] dump_stack_lvl+0xe8/0x140 [ 380.832505][T23530] dump_stack+0x15/0x1b [ 380.832526][T23530] should_fail_ex+0x265/0x280 [ 380.832566][T23530] should_failslab+0x8c/0xb0 [ 380.832646][T23530] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 380.832674][T23530] ? sidtab_sid2str_get+0xa0/0x130 [ 380.832712][T23530] kmemdup_noprof+0x2b/0x70 [ 380.832736][T23530] sidtab_sid2str_get+0xa0/0x130 [ 380.832838][T23530] security_sid_to_context_core+0x1eb/0x2e0 [ 380.832876][T23530] security_sid_to_context+0x27/0x40 [ 380.832933][T23530] selinux_lsmprop_to_secctx+0x67/0xf0 [ 380.832971][T23530] security_lsmprop_to_secctx+0x43/0x80 [ 380.832998][T23530] audit_log_task_context+0x77/0x190 [ 380.833040][T23530] audit_log_task+0xf4/0x250 [ 380.833137][T23530] audit_seccomp+0x61/0x100 [ 380.833170][T23530] ? __seccomp_filter+0x68c/0x10d0 [ 380.833197][T23530] __seccomp_filter+0x69d/0x10d0 [ 380.833224][T23530] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 380.833265][T23530] ? vfs_write+0x75e/0x8d0 [ 380.833295][T23530] ? __rcu_read_unlock+0x4f/0x70 [ 380.833370][T23530] ? __fget_files+0x184/0x1c0 [ 380.833407][T23530] __secure_computing+0x82/0x150 [ 380.833432][T23530] syscall_trace_enter+0xcf/0x1e0 [ 380.833467][T23530] do_syscall_64+0xaa/0x1a0 [ 380.833494][T23530] ? clear_bhb_loop+0x25/0x80 [ 380.833521][T23530] ? clear_bhb_loop+0x25/0x80 [ 380.833548][T23530] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 380.833575][T23530] RIP: 0033:0x7fec2965e969 [ 380.833604][T23530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 380.833627][T23530] RSP: 002b:00007fec27cc7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e8 [ 380.833649][T23530] RAX: ffffffffffffffda RBX: 00007fec29885fa0 RCX: 00007fec2965e969 [ 380.833665][T23530] RDX: 0000000000000001 RSI: 00002000000000c0 RDI: 0000000000000005 [ 380.833681][T23530] RBP: 00007fec27cc7090 R08: 0000000000000000 R09: 0000000000000000 [ 380.833730][T23530] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001 [ 380.833801][T23530] R13: 0000000000000000 R14: 00007fec29885fa0 R15: 00007ffd76a676b8 [ 380.833823][T23530] </TASK> [ 381.180397][T23548] FAULT_INJECTION: forcing a failure. [ 381.180397][T23548] name failslab, interval 1, probability 0, space 0, times 0 [ 381.180492][T23544] FAULT_INJECTION: forcing a failure. [ 381.180492][T23544] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 381.193193][T23548] CPU: 1 UID: 0 PID: 23548 Comm: syz.4.6655 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 381.193241][T23548] Tainted: [W]=WARN [ 381.193250][T23548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 381.193267][T23548] Call Trace: [ 381.193277][T23548] <TASK> [ 381.193288][T23548] __dump_stack+0x1d/0x30 [ 381.193316][T23548] dump_stack_lvl+0xe8/0x140 [ 381.193407][T23548] dump_stack+0x15/0x1b [ 381.193429][T23548] should_fail_ex+0x265/0x280 [ 381.193534][T23548] should_failslab+0x8c/0xb0 [ 381.193572][T23548] kmem_cache_alloc_noprof+0x50/0x310 [ 381.193615][T23548] ? skb_clone+0x151/0x1f0 [ 381.193703][T23548] skb_clone+0x151/0x1f0 [ 381.193728][T23548] __netlink_deliver_tap+0x2c9/0x500 [ 381.193785][T23548] netlink_unicast+0x64c/0x670 [ 381.193823][T23548] netlink_sendmsg+0x58b/0x6b0 [ 381.193867][T23548] ? __pfx_netlink_sendmsg+0x10/0x10 [ 381.193909][T23548] __sock_sendmsg+0x142/0x180 [ 381.194022][T23548] __sys_sendto+0x268/0x330 [ 381.194073][T23548] __x64_sys_sendto+0x76/0x90 [ 381.194112][T23548] x64_sys_call+0x2eb6/0x2fb0 [ 381.194140][T23548] do_syscall_64+0xd0/0x1a0 [ 381.194238][T23548] ? clear_bhb_loop+0x25/0x80 [ 381.194265][T23548] ? clear_bhb_loop+0x25/0x80 [ 381.194293][T23548] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 381.194320][T23548] RIP: 0033:0x7f821801e969 [ 381.194341][T23548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 381.194432][T23548] RSP: 002b:00007f8216687038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 381.194456][T23548] RAX: ffffffffffffffda RBX: 00007f8218245fa0 RCX: 00007f821801e969 [ 381.194472][T23548] RDX: 0000000000000078 RSI: 0000200000000000 RDI: 0000000000000003 [ 381.194488][T23548] RBP: 00007f8216687090 R08: 0000000000000000 R09: 0000000000000000 [ 381.194504][T23548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 381.194520][T23548] R13: 0000000000000000 R14: 00007f8218245fa0 R15: 00007ffd84e26d78 [ 381.194592][T23548] </TASK> [ 381.224514][T23551] IPVS: Error connecting to the multicast addr [ 381.225006][T23544] CPU: 0 UID: 0 PID: 23544 Comm: syz.0.6651 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 381.225045][T23544] Tainted: [W]=WARN [ 381.225097][T23544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 381.225188][T23544] Call Trace: [ 381.225196][T23544] <TASK> [ 381.225205][T23544] __dump_stack+0x1d/0x30 [ 381.225234][T23544] dump_stack_lvl+0xe8/0x140 [ 381.225259][T23544] dump_stack+0x15/0x1b [ 381.225281][T23544] should_fail_ex+0x265/0x280 [ 381.225323][T23544] should_fail+0xb/0x20 [ 381.225366][T23544] should_fail_usercopy+0x1a/0x20 [ 381.225390][T23544] _copy_from_iter+0xcf/0xdd0 [ 381.225418][T23544] ? __build_skb_around+0x1a0/0x200 [ 381.225459][T23544] ? __alloc_skb+0x223/0x320 [ 381.225499][T23544] netlink_sendmsg+0x471/0x6b0 [ 381.225658][T23544] ? __pfx_netlink_sendmsg+0x10/0x10 [ 381.225701][T23544] __sock_sendmsg+0x142/0x180 [ 381.225734][T23544] ____sys_sendmsg+0x31e/0x4e0 [ 381.225882][T23544] ___sys_sendmsg+0x17b/0x1d0 [ 381.225924][T23544] __x64_sys_sendmsg+0xd4/0x160 [ 381.225954][T23544] x64_sys_call+0x2999/0x2fb0 [ 381.226052][T23544] do_syscall_64+0xd0/0x1a0 [ 381.226136][T23544] ? clear_bhb_loop+0x25/0x80 [ 381.226192][T23544] ? clear_bhb_loop+0x25/0x80 [ 381.226244][T23544] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 381.226293][T23544] RIP: 0033:0x7feaedfce969 [ 381.226313][T23544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 381.226337][T23544] RSP: 002b:00007feaec637038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 381.226362][T23544] RAX: ffffffffffffffda RBX: 00007feaee1f5fa0 RCX: 00007feaedfce969 [ 381.226381][T23544] RDX: 0000000000000000 RSI: 00002000000012c0 RDI: 0000000000000003 [ 381.226397][T23544] RBP: 00007feaec637090 R08: 0000000000000000 R09: 0000000000000000 [ 381.226414][T23544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 381.226430][T23544] R13: 0000000000000000 R14: 00007feaee1f5fa0 R15: 00007fff07bc0078 [ 381.226471][T23544] </TASK> [ 381.656649][T23568] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=23568 comm=syz.4.6662 [ 382.173978][T23600] netlink: 188 bytes leftover after parsing attributes in process `syz.0.6675'. [ 382.227781][T23607] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6678'. [ 382.237023][T23607] netlink: 32 bytes leftover after parsing attributes in process `syz.6.6678'. [ 382.246059][T23607] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6678'. [ 382.255197][T23607] netlink: 32 bytes leftover after parsing attributes in process `syz.6.6678'. [ 382.406367][T23626] netlink: 'syz.0.6686': attribute type 4 has an invalid length. [ 382.438288][T23630] netlink: 188 bytes leftover after parsing attributes in process `syz.0.6688'. [ 382.561553][T23632] netlink: 2028 bytes leftover after parsing attributes in process `syz.4.6689'. [ 382.570998][T23632] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6689'. [ 382.645455][T23654] lo speed is unknown, defaulting to 1000 [ 382.651977][T23654] lo speed is unknown, defaulting to 1000 [ 382.658216][T23654] lo speed is unknown, defaulting to 1000 [ 382.666295][T23654] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 382.680975][T23654] lo speed is unknown, defaulting to 1000 [ 382.694101][T23654] lo speed is unknown, defaulting to 1000 [ 382.702108][T23659] xt_CT: You must specify a L4 protocol and not use inversions on it [ 382.718212][T23654] lo speed is unknown, defaulting to 1000 [ 382.724490][T23654] lo speed is unknown, defaulting to 1000 [ 382.730901][T23660] lo speed is unknown, defaulting to 1000 [ 382.737114][T23654] lo speed is unknown, defaulting to 1000 [ 383.026872][T23677] ================================================================== [ 383.035013][T23677] BUG: KCSAN: data-race in _copy_from_iter / _copy_from_iter [ 383.042407][T23677] [ 383.044741][T23677] write to 0xffff888105485000 of 4096 bytes by task 23676 on cpu 0: [ 383.052724][T23677] _copy_from_iter+0x130/0xdd0 [ 383.057497][T23677] copy_page_from_iter+0x15a/0x290 [ 383.062645][T23677] process_vm_rw+0x659/0x950 [ 383.067257][T23677] __x64_sys_process_vm_writev+0x78/0x90 [ 383.072914][T23677] x64_sys_call+0xe80/0x2fb0 [ 383.077518][T23677] do_syscall_64+0xd0/0x1a0 [ 383.082039][T23677] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 383.088027][T23677] [ 383.090354][T23677] write to 0xffff888105485000 of 4096 bytes by task 23677 on cpu 1: [ 383.098338][T23677] _copy_from_iter+0x130/0xdd0 [ 383.103110][T23677] copy_page_from_iter+0x15a/0x290 [ 383.108240][T23677] process_vm_rw+0x659/0x950 [ 383.112834][T23677] __x64_sys_process_vm_writev+0x78/0x90 [ 383.118492][T23677] x64_sys_call+0xe80/0x2fb0 [ 383.123100][T23677] do_syscall_64+0xd0/0x1a0 [ 383.127627][T23677] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 383.133545][T23677] [ 383.135881][T23677] Reported by Kernel Concurrency Sanitizer on: [ 383.142043][T23677] CPU: 1 UID: 0 PID: 23677 Comm: syz.1.6705 Tainted: G W 6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) [ 383.156122][T23677] Tainted: [W]=WARN [ 383.159933][T23677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025 [ 383.169998][T23677] ================================================================== [ 383.194182][ T29] kauditd_printk_skb: 495 callbacks suppressed [ 383.194202][ T29] audit: type=1326 audit(1746707190.548:30236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 383.223585][ T29] audit: type=1326 audit(1746707190.548:30237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 383.247569][ T29] audit: type=1326 audit(1746707190.608:30238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 383.250182][T23676] block device autoloading is deprecated and will be removed. [ 383.270709][ T29] audit: type=1326 audit(1746707190.608:30239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 383.280118][T23676] bio_check_eod: 24050 callbacks suppressed [ 383.280135][T23676] +}[@: attempt to access beyond end of device [ 383.280135][T23676] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 383.301269][ T29] audit: type=1326 audit(1746707190.608:30240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 383.301312][ T29] audit: type=1326 audit(1746707190.608:30241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 383.368882][ T29] audit: type=1326 audit(1746707190.728:30242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 383.392599][ T29] audit: type=1326 audit(1746707190.728:30243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 383.416138][ T29] audit: type=1326 audit(1746707190.728:30244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=88 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000 [ 383.439399][ T29] audit: type=1326 audit(1746707190.728:30245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000