last executing test programs:

5m15.659096223s ago: executing program 32 (id=470):
r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
r1 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100202, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000780)={0x11, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0xfffffffffffffc2d, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r2}, &(0x7f0000000180), &(0x7f00000001c0)=r1}, 0x20)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r3}, 0x10)
r4 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r4, 0x0)
write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x2000)

5m8.520434462s ago: executing program 33 (id=587):
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]})
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x8000000000}, 0x18)
mknod$loop(&(0x7f0000000000)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, 0x0)

1m47.953066747s ago: executing program 34 (id=4802):
creat(&(0x7f0000000000)='./file0\x00', 0xd931d3864d39ddd8)
r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x1)
r1 = creat(&(0x7f00000002c0)='./file0\x00', 0x0)
r2 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r2, 0x0)
syz_clone(0x800200, 0x0, 0x0, 0x0, 0x0, 0x0)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x2, 0x4, &(0x7f0000000200)=ANY=[@ANYBLOB="180000000300000000000000fe020010850000000700000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x100, 0x70, '\x00', 0x0, @fallback=0x30, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
write$qrtrtun(r1, &(0x7f0000000300)="ca0e808b", 0x4)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r3, 0x0, 0x30, 0x0, @val=@uprobe_multi={&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)=[0x7], &(0x7f0000000240)=[0x2], 0x0, 0x1}}, 0x40)
mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1f, 0x12, r0, 0x80000000000000)

1m14.288887006s ago: executing program 35 (id=5340):
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xc8, 0x5, [@float={0x8, 0x0, 0x0, 0x10, 0x2}, @ptr={0xa, 0x0, 0x0, 0x2, 0x4}, @enum={0x3, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x2}]}, @union={0xa, 0x3, 0x0, 0x5, 0x1, 0x838, [{0x5, 0x5, 0xf}, {0x10, 0x3, 0xfffffffa}, {0x5, 0x1, 0xfffffffc}]}, @const={0xc, 0x0, 0x0, 0xa, 0x1}, @struct={0xf, 0x6, 0x0, 0x4, 0x1, 0x3, [{0xf, 0x2, 0xcf7}, {0x10, 0x4, 0x7}, {0x6, 0x1, 0x4}, {0x8, 0x2, 0x7}, {0xe, 0x1, 0x7}, {0xb, 0x5, 0x8}]}, @float={0x5, 0x0, 0x0, 0x10, 0x4}]}, {0x0, [0x2e, 0x2e, 0x0]}}, &(0x7f00000003c0)=""/109, 0xe5, 0x6d, 0x0, 0x1, 0x0, @void, @value}, 0x28)
r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd63)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), r1)
bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{}, {0x0, 0x4}, {0x0, 0x4, 0x10009, 0x5}], 0x10, 0xfffffff7, @void, @value}, 0x94)
r2 = socket$kcm(0x10, 0x3, 0x10)
r3 = syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000))
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]})
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r4 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
socket$netlink(0x10, 0x3, 0x0)
r5 = socket$xdp(0x2c, 0x3, 0x0)
r6 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$XDP_RX_RING(r5, 0x11b, 0x2, &(0x7f00000002c0)=0x100, 0x4)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r6, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00'})
mknodat$null(r3, &(0x7f0000000a40)='./file0\x00', 0x200, 0x103)
syz_open_dev$evdev(&(0x7f00000000c0), 0xd, 0x10440)
write$P9_RLERRORu(r4, &(0x7f0000000a80)={0x14, 0x7, 0x1, {{0x7, 'TIPCv2\x00'}, 0x1}}, 0x14)
sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803002d000b12d25a80648c2594f90124fc60100c022300040000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0)

1m13.732576483s ago: executing program 7 (id=5352):
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94)
socket$inet6(0xa, 0x817, 0x80000001)
add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000240)="000000000000003299b8f276dc75584a8d87d907005858367d61f49e1639a48f614a54a8192c2876b7f843cd3a3c07288fa0f1e28983b5cdc2e29b6e", 0x3c, 0xffffffffffffffff)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000080)='kfree\x00', r0}, 0x10)
r1 = syz_open_dev$tty1(0xc, 0x4, 0x3)
ioctl$KDSKBENT(r1, 0x4b47, &(0x7f0000000400)={0x0, 0xa, 0x8001})
syz_emit_ethernet(0x1162, 0x0, 0x0)
r2 = socket$inet6_tcp(0xa, 0x1, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$rds(0x15, 0x5, 0x0)
socket$inet_sctp(0x2, 0x1, 0x84)
mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xfffffffc, 0x6, 0x4, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000001001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r3 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0)
sendmsg$NFT_BATCH(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2d4}}, 0x4048010)
setsockopt$inet6_mreq(r2, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14)
r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00')
preadv(r4, &(0x7f0000000040)=[{&(0x7f0000000180)=""/66, 0x42}], 0x1, 0xe1, 0x3)
socket$nl_generic(0x10, 0x3, 0x10)
r5 = socket$kcm(0xa, 0x2, 0x0)
sendmsg$kcm(r5, &(0x7f0000000000)={&(0x7f0000000100)=@in6={0xa, 0x4e20, 0xffff, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000cc0)=[{0x10, 0x1, 0x1}], 0x10}, 0x5004)
r6 = syz_open_dev$usbfs(&(0x7f0000000080), 0x70, 0x101301)
ioctl$USBDEVFS_IOCTL(r6, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect)

1m13.447752406s ago: executing program 7 (id=5355):
r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0, @ANYRES32=r0, @ANYRES32=r0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10)
r2 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000001000030529bd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="09840000000000003c0012800b00010062726964676500002c000280060027000300000006"], 0x64}}, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xf, &(0x7f0000000000)=ANY=[@ANYRESOCT=r0, @ANYRES32=r0, @ANYRES32=r0], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) (async)
socket$netlink(0x10, 0x3, 0x0) (async)
sendmsg$nl_route(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB="640000001000030529bd70000000000000000000", @ANYRES32=0x0, @ANYBLOB="09840000000000003c0012800b00010062726964676500002c000280060027000300000006"], 0x64}}, 0x0) (async)

1m13.1978146s ago: executing program 7 (id=5357):
r0 = socket$key(0xf, 0x3, 0x2)
r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x18, &(0x7f0000000080)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb7", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000180)='GPL\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10)
sendmsg$key(r0, &(0x7f00000007c0)={0x400000000000000, 0x0, &(0x7f0000000700)={&(0x7f0000001900)=ANY=[@ANYBLOB="020f000015000000000000000000000005000500000000000a00000000000000000000000000000000432e0000000000000000000000000008001200000002000000f1edc4ea000006000000000000000000"], 0xa8}}, 0x40080)

1m12.965306813s ago: executing program 7 (id=5361):
syz_mount_image$ext4(&(0x7f0000000100)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x3000018, &(0x7f00000006c0), 0x1, 0x513, &(0x7f0000000c40)="$eJzs3W1rZFcdAPD/vcmk2d3UTFVkLdgWW9ktujNJY9so0lYQfVVQ6/s1JpMQMsmEzKRuQtEsfgBBRAU/gG8EP4Ag+xFEWND3oqKI7upL3St35kbzMJMMySSzTn4/OJlz7sP5n3PJ3LkPh3sDuLJeioh3ImIsIl6NiOlielqk2OukfLnHjz5YzFMSWfbe35JIimn7deXl8Yi4Uaw2GRFf/0rEt5LjcZs7u2sL9XptqyhXW+ub1ebO7p3V9YWV2kptY25u9o35N+dfn5/JCufqZzki3vrSn370/Z99+a1ffebbv7/7l9vfyZv1hY912h0Ri+cK0EOn7lJ7W+zLt9HWRQQbkrw/pbFhtwIAgH7kx/gfjohPto//p2OsfTQHAAAAjJLs7an4VxKRAQAAACMrjYipSNJKMRZgKtK0UumM4f1oXE/rjWbr08uN7Y2lfF5EOUrp8mq9NlOMFS5HKcnLs8UY2/3ya0fKcxHxXET8cPpau1xZbNSXhn3xAwAAAK6IGy8ePv//53TazgMAAAAjptyzAAAAAIwKp/wAAAAw+pz/AwAAwEj76rvv5inbf4/30vs722uN9+8s1ZprlfXtxcpiY2uzstJorLSf2bd+Wn31RmPzs7Gxfa/aqjVb1ebO7t31xvZG6+7qoVdgAwAAAJfouRcf/C6JiL3PX2unKJ4DCHDIH4fdAGCQxobdAGBoxofdAGBoSqcuYQ8Boy45Zf7xwTuda4Xx64tpDwAAMHi3Pn78/v9EMe/0awPA/zNjfQDg6nF3D66u0llHAN4cdEuAYflQ5+OZXvN7Pryjj/v/nWsMWXamhgEAAAMz1U5JWimO06ciTSuViGfbrwUoJcur9dpMcX7w2+nSM3l5tr1mcuqYYQAAAAAAAAAAAAAAAAAAAAAAAACgI8uSyAAAAICRFpH+OWk/zT/i1vQrU4evDhx569dP3/vxvYVWa2s2YiL5+3Q+aSIiWj8ppr+WeSUAAAAAPAU65+nF5+ywWwMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqHn86IPF/XSZcf/6xYgod4s/HpPtz8koRcT1fyQxfmC9JCLGBhB/735E3OwWP4knWZaVi1Z0i3/tguOX25ume/w0Im4MID5cZQ/y/c873b5/abzU/uz+/Rsv0nn13v+l/93/jfXY/zx7pNzL8w9/Ue0Z/37E8+Pd9z/78ZNO/EMh8sLLffbxm9/Y3e0640CV3eIfjFVtrW9Wmzu7d1bXF1ZqK7WNubnZN+bfnH99fqa6vFqvFX+7hvnBJ3755KT+X+8Rv3y4/8e2/yt99T6Lfz+89+gjnUKpW/zbL3f//b3ZI35a/PZ9qsjn82/t5/c6+YNe+PlvXjip/0s9+j95Sv9v99X/+NyrX/veH7rOObY1AIDL0NzZXVuo12tbJ2Qm+1jmkjNvPx3NGGAmno5mDCuTfbfz/3i+es65+rFMdp7Vx2MAzZg49j0di7NWmETs5XX1+Q8JAACMmP8d9J90BwkAAAAAAAAAAAAAAAAAAAC4SGd8LNlkRPS98NGYe8PpKgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAif4TAAD//4RX0Xo=")
creat(&(0x7f0000000000)='./bus\x00', 0x0)
mount(&(0x7f0000000440)=@loop={'/dev/loop', 0x0}, &(0x7f0000000080)='./bus\x00', 0x0, 0x1000, 0x0)
r0 = open(&(0x7f0000000000)='./bus\x00', 0x0, 0x0)
ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0, 0x5, 0x0, "ef359f00fc0000000000f3ce5d29c3ee5e5ca9000f7ced549dc2aac63a01000000000000004faa2ad9c084a003ea0000000000000000000800002000", "036c47c67808200400000000000000335263bdbcef549ba197fce47ddfdd753abd950100002a00ffffffffffffffff00000000e8f20000000200", "b7326736181c208220000000b9000000000000000000f0fffffffff2ff00", [0x4]})
open(&(0x7f0000000300)='./bus\x00', 0x583281, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005700000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
syz_usb_connect$hid(0x1, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x310, 0x0, 0x0, 0x0, 0x40, 0x56a, 0xb1, 0x40, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x1, 0x5, 0xe0, 0xac, [{{0x9, 0x4, 0x0, 0x6, 0x1, 0x3, 0x1, 0x1, 0x2, {0x9, 0x21, 0x0, 0x5, 0x1, {0x22, 0x33f}}, {{{0x9, 0x5, 0x81, 0x3, 0x20, 0xe3, 0x5, 0x2}}}}}]}}]}}, &(0x7f00000004c0)={0xa, &(0x7f0000000280)={0xa, 0x6, 0x201, 0xa, 0x0, 0x2, 0xff, 0xae}, 0x8c, &(0x7f0000000800)=ANY=[@ANYBLOB="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"], 0x2, [{0xcd, &(0x7f0000000700)=@string={0xcd, 0x3, "4454d759fbb894b1563a77b6449c358ef62c0ea82dc43f8abf7ec9b4237463a1d22d1c0b031f2f9b07b7b6a6f4a36d49e1b3f9655ad347751734c5d10a2d76f3977ffb9aac5eea314b8e6114e586ed803f92ff94b72d9bf5e0cbcf501b4367a989b3c0a8ea4d0ed5aeeccfd04452ad8b768c5c65a6045663a0456a3824dc6b997024e9b3ae4690f86e7c7e43ec4f16e1ed1caee21c9a46d7fef666ecbb1067cf695927f32958a9fdd53c6532fc48ce290b3f401354c0a553eec7f546c1a90f02a704d4ee35933e98ffd50c"}}, {0x4, &(0x7f0000000400)=@lang_id={0x4, 0x3, 0xc09}}]})
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x23)
r2 = socket$phonet_pipe(0x23, 0x5, 0x2)
fgetxattr(r1, &(0x7f00000002c0)=@known='user.incfs.metadata\x00', &(0x7f0000000340)=""/114, 0x72)
r3 = socket$inet6_tcp(0xa, 0x1, 0x0)
listen(r3, 0x0)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]})
shutdown(r3, 0x0)
listen(r2, 0x80000001)
bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94)
pselect6(0x40, &(0x7f0000000100), 0x0, &(0x7f0000000240)={0x1f}, 0x0, 0x0)
r4 = socket$netlink(0x10, 0x3, 0x0)
sendmsg$nl_route_sched(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000005c00)={&(0x7f0000000000)=@newtaction={0xa0, 0x30, 0x9, 0x2, 0x0, {}, [{0x8c, 0x1, [@m_bpf={0x88, 0x1, 0x0, 0x0, {{0x8}, {0x60, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x7}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{}, {}, {0x3}, {0x0, 0x7}, {0x8}, {}, {0x6, 0xfe}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x0, 0x0, 0x0, 0x0, 0xfffffff7}}]}, {0x4}, {0xc}, {0xc}}}]}]}, 0xa0}, 0x1, 0x0, 0x0, 0x24000004}, 0x0)

1m9.93646083s ago: executing program 7 (id=5394):
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1d, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000600)='sys_enter\x00', r0}, 0x10)
link(0x0, 0x0)

1m9.487552806s ago: executing program 7 (id=5400):
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', <r4=>0x0})
sendmsg$nl_route(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000880)=@newlinkprop={0x38, 0x6c, 0x1, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, 0x0, 0x9004}, [@IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'wlan0\x00'}]}]}, 0x38}}, 0x0)

1m9.462387376s ago: executing program 36 (id=5400):
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b7040000000000008500000057000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r1, 0x8933, &(0x7f0000000000)={'batadv_slave_0\x00', <r4=>0x0})
sendmsg$nl_route(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000880)=@newlinkprop={0x38, 0x6c, 0x1, 0x0, 0x25dfdbfd, {0x0, 0x0, 0x0, r4, 0x0, 0x9004}, [@IFLA_PROP_LIST={0x18, 0x34, 0x0, 0x1, [{0x14, 0x35, 'wlan0\x00'}]}]}, 0x38}}, 0x0)

1m5.997340479s ago: executing program 8 (id=5423):
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40201, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'syzkaller1\x00', 0xc201})
r1 = socket$kcm(0x2, 0xa, 0x2)
faccessat2(0xffffffffffffffff, 0x0, 0x81, 0x1000)
creat(0x0, 0xd931d3864d39dcca)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r2, <r3=>0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000300)}, 0x20)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kfree\x00', r4}, 0x10)
r5 = socket$nl_generic(0x10, 0x3, 0x10)
r6 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r5)
sendmsg$ETHTOOL_MSG_TSINFO_GET(r5, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000680)={0x2c, r6, 0x6a98047402e98331, 0x70bd21, 0x8000, {}, [@HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_hsr\x00'}]}]}, 0x2c}, 0x1, 0x0, 0x0, 0x24004040}, 0x4008800)
ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}})
setsockopt$packet_int(0xffffffffffffffff, 0x107, 0xf, &(0x7f0000000100)=0x800009, 0x4)
write$tun(r0, &(0x7f00000000c0)=ANY=[@ANYBLOB="001c86dd2000100000004000000060ec97000fc83c00fe8000000000000000000000000000aaff02000000000000000000000000000121"], 0xffe)
r7 = socket$nl_route(0x10, 0x3, 0x0)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={<r8=>0xffffffffffffffff})
getsockname$packet(r8, &(0x7f0000000100)={0x11, 0x0, <r9=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14)
sendmsg$nl_route_sched(r7, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000740)=@newtaction={0x98, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80d, 0x0, 0x10000000, 0x5, 0x4}, 0x1, r9}}]}, {0x0, 0xa}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x1}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4008001}, 0x0)
r10 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000440)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0xfffeffff, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xf, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000085000000b70000000000000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r11}, 0x10)
pipe2$9p(&(0x7f0000000000)={<r12=>0xffffffffffffffff, <r13=>0xffffffffffffffff}, 0x0)
write$P9_RVERSION(r13, &(0x7f0000000300)=ANY=[@ANYBLOB="1500000065ffff018004000800395032303030"], 0x15)
r14 = dup(r13)
write$P9_RLERRORu(r14, &(0x7f0000000540)=ANY=[@ANYBLOB="8b"], 0x53)
write$RDMA_USER_CM_CMD_SET_OPTION(r14, &(0x7f0000000100)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f0000000880)=[{0x1, 0x0, [0xd, 0x1, 0x10, 0x6, 0x1ff, 0x8, 0xd4, 0x8, 0x7a196fa3, 0x8, 0x9, 0x7fffffff, 0x1, 0x2, 0xfffff0bb, 0x7d3]}, {0x0, 0x0, [0x0, 0xa8e, 0x3, 0xcb60, 0x81, 0xc, 0x9, 0x6, 0x6, 0x1, 0x401, 0x1, 0x80000001, 0x101, 0x4, 0x4]}, {0x4, 0x0, [0x5, 0x0, 0x2, 0x7, 0xb, 0x9, 0x6, 0x7, 0x8, 0xffffff81, 0x0, 0x4, 0xe4, 0xfffffff8, 0x101, 0x8]}, {0x4, 0x0, [0xffff24ed, 0xb05, 0x7, 0xfb97, 0x62, 0x5, 0x3, 0x2, 0x138, 0x6, 0x3, 0x9, 0x1, 0x1, 0x4, 0xe901]}, {0x3a, 0x0, [0x3dcd, 0xfff, 0x4, 0x9, 0x2, 0x2, 0xffff, 0x8001, 0x6, 0x4, 0x9, 0x4c, 0x9, 0x6d2, 0x7, 0x8]}], 0xffffffffffffffff, 0x1, 0x1, 0x168}}, 0x20)
write$binfmt_elf64(r14, &(0x7f0000000340)=ANY=[@ANYBLOB="7f454c4600073f034b0b00000000000003003e00ffffffe93501"], 0x7c8)
mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r12, @ANYBLOB=',wfdno=', @ANYRESHEX=r14])

1m5.90933825s ago: executing program 8 (id=5424):
r0 = syz_io_uring_setup(0xddf, &(0x7f0000000300)={0x0, 0xbbd0, 0x10100, 0x0, 0x242}, &(0x7f0000000100)=<r1=>0x0, &(0x7f0000000140)=<r2=>0x0)
syz_io_uring_submit(r1, r2, &(0x7f00000001c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x20, 0x3})
io_uring_enter(r0, 0x353, 0x0, 0x0, 0x0, 0x0)
r3 = gettid()
timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)=<r4=>0x0)
r5 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000017850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x25, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000500)='percpu_free_percpu\x00', r6}, 0x10)
bpf$MAP_CREATE(0x2000000000000000, &(0x7f0000000280)=ANY=[@ANYBLOB="0600000004000000be7000005c00000000000000", @ANYRES32=r6, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="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"], 0x48)
r7 = socket$nl_rdma(0x10, 0x3, 0x14)
r8 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r9 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x18, 0x7, &(0x7f0000000040)=ANY=[@ANYRES32=r0, @ANYRES8=r8, @ANYRES32=0x0], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x4e8acced, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r9}, 0x10)
sendmsg$RDMA_NLDEV_CMD_NEWLINK(r7, &(0x7f0000000080)={0x0, 0x12, &(0x7f0000000000)={&(0x7f0000000240)={0x38, 0x1403, 0x1, 0x70bd2d, 0x25dfdbff, "", [{{0x9, 0x2, 'syz1\x00'}, {0x8, 0x41, 'siw\x00'}, {0x14, 0x33, 'veth0_to_bridge\x00'}}]}, 0x38}, 0x1, 0x0, 0x0, 0xc080}, 0x20000010)
r10 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48)
bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00'/20, @ANYRES32], 0x48)
r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r10}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x3a66505}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000100)='GPL\x00', 0xe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r11}, 0x10)
sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000000)="d8001c00180081064e81f782db44b9b545c7910006007c09e8fe55a10a0017", 0x1f}], 0x1}, 0x0)
r12 = socket$kcm(0x10, 0x2, 0x0)
write$cgroup_subtree(r12, &(0x7f0000000000)=ANY=[], 0x33fe0)
r13 = socket$nl_generic(0x10, 0x3, 0x10)
r14 = syz_genetlink_get_family_id$devlink(&(0x7f0000000300), 0xffffffffffffffff)
sendmsg$DEVLINK_CMD_RATE_NEW(r13, &(0x7f0000002780)={0x0, 0x0, &(0x7f0000002740)={&(0x7f0000002400)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r14, @ANYBLOB="015768b4f2b01b74c900170000000e0001006ec204657464657673696d0000000f0002006e657464537673696d30"], 0x34}, 0x1, 0x0, 0x0, 0x34000804}, 0x0)
timer_settime(r4, 0x0, 0x0, 0x0)
r15 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0)
read(r15, &(0x7f00000013c0)=""/4089, 0xff9)

1m5.050801101s ago: executing program 8 (id=5433):
r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
write$qrtrtun(r0, &(0x7f0000000740)="b17de66ba8a5f519d5838eeccd69331d7d51ac5d2e419f40034ea5f8b641e36737ed5f26e73108c831759bf59326d06566281c2669331a50fb3a133595734cd74e276b1c7c1725d42342911f7862788c54ff67bd27d36630c29251508d9a7b8eed8e3b6f9f988b2a2309f454b9310916ad754caac3bc0710d100f3b5b2d44c3f", 0x80)
r1 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0)
preadv2(r1, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0)

1m5.026906501s ago: executing program 8 (id=5434):
perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x68, 0x0, 0x0, 0x0, 0x0, 0x1000040, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={0x0}, 0x2804, 0x0, 0x0, 0x0, 0x400, 0x10001, 0x625a, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$OSF_MSG_REMOVE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x1, 0x5, 0x5, 0x0, 0x0, {0x0, 0x0, 0xa}}, 0x14}, 0x1, 0x0, 0x0, 0x8000}, 0x4008040)
syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000200)={[{@quota}, {@oldalloc}, {@barrier_val={'barrier', 0x3d, 0x3}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x80}}, {@block_validity}, {@jqfmt_vfsv1}]}, 0x3, 0x434, &(0x7f0000000940)="$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")
creat(&(0x7f0000000340)='./bus\x00', 0x0)
mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0)
r1 = open(&(0x7f0000000500)='./bus\x00', 0x0, 0x42)
ioctl$LOOP_SET_STATUS64(r1, 0x4c04, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x13, 0x0, "ef359f41a4ae6dddfbd1ce5d29c2ee5e5c9d000ff8ee09e737ff0edf110ff4eb4b78c66ee677df701905b9aafab4ffffffff00", "cba3d625780820d1cbf7db71038259ca171ce1a311ef97e4298d1e14ef01060000e9009600fdff00000000000000000000000000000000000400", "d300e6d6ae9ef30bea2a004000", [0x2]})
setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file1\x00', &(0x7f00000001c0), &(0x7f0000000200)=ANY=[], 0x841, 0x0)
r2 = gettid()
r3 = socket$inet_smc(0x2b, 0x1, 0x0)
listen(r3, 0x0)
listen(r3, 0x5)
timer_create(0x3, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc))
pause()
timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0)

1m4.116089263s ago: executing program 8 (id=5437):
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005000000", @ANYBLOB, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48)
r0 = bpf$MAP_CREATE(0x0, 0x0, 0x50)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000002000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48)
bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r1, 0x0, &(0x7f0000001700)=""/53}, 0x20)
bpf$MAP_CREATE(0x0, &(0x7f0000002040)=ANY=[@ANYBLOB="1e0000000000000005000000ff"], 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000540)='inet_sock_set_state\x00', r2}, 0x10)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000004c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000540)='inet_sock_set_state\x00', r3}, 0x10)
r4 = socket$inet6_tcp(0xa, 0x1, 0x0)
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x275a, 0x0)
fcntl$lock(r5, 0x24, &(0x7f00000000c0)={0x2, 0x2, 0x9, 0x2})
ioctl$PTP_PIN_GETFUNC2(r5, 0xc0603d0f, &(0x7f00000002c0)={'\x00', 0x2, 0x3, 0x8000})
listen(r4, 0x200809)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000500)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x42, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
syslog(0x2, &(0x7f0000001940)=""/94, 0x5e)
syz_pidfd_open(0x0, 0x0)

1m3.50336063s ago: executing program 8 (id=5439):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000ff0f00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500), 0x404200, 0x0)
readv(r2, &(0x7f0000000000)=[{&(0x7f0000001300)=""/241, 0xf1}], 0x1)
prlimit64(0x0, 0xe, &(0x7f0000000180)={0xc, 0x8b}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x1, 0x803, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14)
r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r7}, 0x10)
sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=@newlink={0xc0, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x90646}, [@IFLA_LINKINFO={0x90, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x80, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1f}}, @IFLA_VLAN_ID={0x6, 0x1, 0x1}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_ID={0x6, 0x1, 0x2}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x78}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3e}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x13, 0x2}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0xc0}, 0x1, 0x0, 0x0, 0x600}, 0x0)

1m3.50287974s ago: executing program 37 (id=5439):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0b00000008000000070000000900000001"], 0x50)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000ff0f00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000200)='sched_switch\x00', r1}, 0x10)
r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000500), 0x404200, 0x0)
readv(r2, &(0x7f0000000000)=[{&(0x7f0000001300)=""/241, 0xf1}], 0x1)
prlimit64(0x0, 0xe, &(0x7f0000000180)={0xc, 0x8b}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3ff, @void, @value}, 0x94)
r3 = socket$nl_route(0x10, 0x3, 0x0)
r4 = socket(0x1, 0x803, 0x0)
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14)
r6 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1b, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r6}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r7}, 0x10)
sendmsg$nl_route(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000540)=@newlink={0xc0, 0x10, 0x403, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x90646}, [@IFLA_LINKINFO={0x90, 0x12, 0x0, 0x1, @vlan={{0x9}, {0x80, 0x2, 0x0, 0x1, [@IFLA_VLAN_FLAGS={0xc, 0x2, {0x1f, 0x1f}}, @IFLA_VLAN_ID={0x6, 0x1, 0x1}, @IFLA_VLAN_PROTOCOL={0x6, 0x5, 0x88a8}, @IFLA_VLAN_ID={0x6, 0x1, 0x2}, @IFLA_VLAN_EGRESS_QOS={0x4c, 0x3, 0x0, 0x1, [@IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6, 0x78}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x4}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x2, 0x3}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x7, 0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x6}}, @IFLA_VLAN_QOS_MAPPING={0xc, 0x1, {0x3e}}]}, @IFLA_VLAN_FLAGS={0xc, 0x2, {0x13, 0x2}}]}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0xc0}, 0x1, 0x0, 0x0, 0x600}, 0x0)

25.235757546s ago: executing program 9 (id=6128):
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={<r0=>0xffffffffffffffff})
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000700)='kmem_cache_free\x00', r1, 0x0, 0x8000}, 0x18)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x161042, 0x0)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000740)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r3, 0x0, 0x220}, 0x18)
bpf$MAP_CREATE(0x0, &(0x7f0000000a40)=ANY=[@ANYBLOB="0a000000040000000800000006"], 0x48)
r4 = bpf$BPF_BTF_LOAD(0x12, &(0x7f00000005c0)={&(0x7f00000007c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb8, 0xb8, 0x3, [@struct={0xd, 0x2, 0x0, 0x4, 0x1, 0x3, [{0x6, 0x3, 0x401}, {0x0, 0x3, 0x7}]}, @type_tag={0x4, 0x0, 0x0, 0x12, 0x4}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x5, 0x2, 0x1000}}, @union={0xe, 0x2, 0x0, 0x5, 0x0, 0x7, [{0xd, 0x1, 0x800}, {0x4, 0x4, 0x81}]}, @fwd={0xc}, @struct={0xf, 0x2, 0x0, 0x4, 0x0, 0xdf81, [{0x4, 0x3, 0xa}, {0x4, 0x0, 0x2}]}, @float={0x3, 0x0, 0x0, 0x10, 0x10}, @decl_tag={0xc, 0x0, 0x0, 0x11, 0x2}]}, {0x0, [0x61]}}, &(0x7f00000008c0)=""/234, 0xd3, 0xea, 0x0, 0x0, 0x10000, @value}, 0x28)
bpf$BPF_BTF_GET_NEXT_ID(0x17, &(0x7f0000000640)={0x7, <r5=>0x0}, 0x8)
bpf$PROG_LOAD(0x5, &(0x7f0000000a80)={0x11, 0xc, &(0x7f0000000680)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x12, '\x00', 0x0, @fallback=0x17, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r6 = socket$phonet_pipe(0x23, 0x5, 0x2)
ioctl$SIOCPNENABLEPIPE(r6, 0x89ed, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0)
ioctl$PPPIOCNEWUNIT(r2, 0xc004743e, &(0x7f0000000140))
ioctl$PPPIOCSPASS(r2, 0x40107447, &(0x7f0000000180)={0x2, &(0x7f00000000c0)=[{0x60, 0x1, 0x0, 0x1}, {0x6, 0x0, 0x1}]})
r7 = socket$inet6_sctp(0xa, 0x801, 0x84)
setsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER(r7, 0x84, 0x7b, &(0x7f00000000c0)={0x0, 0x3}, 0x8)
sendto$inet6(r7, &(0x7f0000000040)="aa", 0x1, 0x0, &(0x7f0000000100)={0xa, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x3}, 0x3}, 0x1c)
r8 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0xe1002)
ioctl$SCSI_IOCTL_SEND_COMMAND(r8, 0x1, &(0x7f0000000040)=ANY=[@ANYRES64=r0])

25.100200018s ago: executing program 9 (id=6137):
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40201, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'syzkaller1\x00', 0xc201})
socket$kcm(0x2, 0xa, 0x2)
faccessat2(0xffffffffffffffff, 0x0, 0x81, 0x1000)
creat(0x0, 0xd931d3864d39dcca)
bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kfree\x00', r1}, 0x10)
r2 = socket$nl_route(0x10, 0x3, 0x0)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={<r3=>0xffffffffffffffff})
getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, <r4=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14)
sendmsg$nl_route_sched(r2, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000740)=@newtaction={0x98, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80d, 0x0, 0x10000000, 0x5, 0x4}, 0x1, r4}}]}, {0x0, 0xa}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x1}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4008001}, 0x0)

24.990092049s ago: executing program 9 (id=6142):
bpf$BPF_BTF_LOAD(0x12, &(0x7f00000004c0)={&(0x7f0000000240)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xc8, 0x4, [@float={0x8, 0x0, 0x0, 0x10, 0x2}, @ptr={0xa, 0x0, 0x0, 0x2, 0x4}, @enum={0x3, 0x1, 0x0, 0x6, 0x4, [{0x5, 0x2}]}, @union={0xa, 0x3, 0x0, 0x5, 0x1, 0x838, [{0x5, 0x5, 0xf}, {0x10, 0x3, 0xfffffffa}, {0x5, 0x1, 0xfffffffc}]}, @const={0xc, 0x0, 0x0, 0xa, 0x1}, @struct={0xf, 0x6, 0x0, 0x4, 0x1, 0x3, [{0xf, 0x2, 0xcf7}, {0x10, 0x4, 0x7}, {0x6, 0x1, 0x4}, {0x8, 0x2, 0x7}, {0xe, 0x1, 0x7}, {0xb, 0x5, 0x8}]}, @float={0x5, 0x0, 0x0, 0x10, 0x4}]}, {0x0, [0x2e, 0x0]}}, &(0x7f00000003c0)=""/109, 0xe4, 0x6d, 0x0, 0x1, 0x0, @void, @value}, 0x28)
r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000580)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000014000000b7030000010100008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000001dc0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x2d)
r2 = bpf$MAP_CREATE(0x0, 0x0, 0xfffffffffffffd63)
r3 = socket$nl_generic(0x10, 0x3, 0x10)
syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0), r3)
bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x33, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x3, 0x0, &(0x7f0000000c40)=[{}, {0x0, 0x4}, {0x0, 0x4, 0x10009, 0x5}], 0x10, 0xfffffff7, @void, @value}, 0x94)
r4 = socket$kcm(0x10, 0x3, 0x10)
r5 = syz_mount_image$ext4(0x0, &(0x7f0000000140)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, &(0x7f0000000000))
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]})
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000001000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x29, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r6}, 0x10)
r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff)
r8 = socket$netlink(0x10, 0x3, 0x0)
r9 = socket$xdp(0x2c, 0x3, 0x0)
r10 = socket$inet6_udplite(0xa, 0x2, 0x88)
setsockopt$XDP_RX_RING(r9, 0x11b, 0x2, &(0x7f00000002c0)=0x100, 0x4)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r10, 0x8933, &(0x7f0000000140)={'batadv_slave_0\x00', <r11=>0x0})
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x11, 0x16, &(0x7f0000000740)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x8}, {{0x18, 0x1, 0x1, 0x0, r0}}, {}, [@tail_call={{0x18, 0x2, 0x1, 0x0, r2}}, @ldst={0x3, 0x3, 0x0, 0xa, 0x9, 0x18, 0xffffffffffffffff}, @generic={0x7, 0x4, 0x1, 0x3, 0xa3}], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000500)='syzkaller\x00', 0x5, 0x0, 0x0, 0x0, 0x20, '\x00', r11, 0x0, r7, 0x8, &(0x7f0000000600)={0x9, 0x4}, 0x8, 0x10, &(0x7f0000000640)={0x5, 0x1, 0x1, 0x7}, 0x10, 0x0, 0x0, 0x8, &(0x7f00000008c0)=[r7, r2, r0, r7, r7, r0], &(0x7f0000000900)=[{0x0, 0x2, 0x7, 0xb}, {0x2, 0x2, 0xa, 0xc}, {0x0, 0x5, 0x8, 0x2}, {0x3, 0x2, 0x2, 0x3}, {0x5, 0x3, 0xb, 0x9}, {0x1, 0x2, 0x3, 0xb}, {0x2, 0x5, 0x4, 0x9}, {0x3, 0x2, 0xf, 0x8}], 0x10, 0xff, @void, @value}, 0x94)
mknodat$null(r5, &(0x7f0000000a40)='./file0\x00', 0x200, 0x103)
syz_open_dev$evdev(&(0x7f00000000c0), 0xd, 0x10440)
write$P9_RLERRORu(r7, &(0x7f0000000a80)={0x14, 0x7, 0x1, {{0x7, 'TIPCv2\x00'}, 0x1}}, 0x14)
sendmsg$nl_route_sched(r8, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x4000c00)
sendmsg$kcm(r4, &(0x7f0000000000)={0x0, 0xffffff0a, &(0x7f0000000080)=[{&(0x7f0000000040)="c01803002d000b12d25a80648c2594f90124fc60100c022300040000053582c137153e370248078000f01700d1bd", 0x33fe0}], 0x1}, 0x0)

24.644731053s ago: executing program 9 (id=6144):
r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x88882, 0x0)
ftruncate(0xffffffffffffffff, 0x2007ffc)
sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000009)
perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, r0, 0x2)
r1 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x400, 0x17e7b0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x7dd6576e}, 0x10020, 0x3fd, 0x200, 0x8, 0x40004, 0x7ff, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2800004, 0x28011, r1, 0x0)
syz_clone(0x40200, 0x0, 0x49, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x474, &(0x7f00000004c0)="$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")
bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff4e)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000008000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10)
socket$packet(0x11, 0x2, 0x300)
r3 = fspick(0xffffffffffffff9c, &(0x7f00000005c0)='.\x00', 0x0)
fsconfig$FSCONFIG_CMD_RECONFIGURE(r3, 0x7, 0x0, 0x0, 0x0)
r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$IEEE802154_LIST_PHY(r4, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)={0x14, 0x0, 0x30b}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x20000004)

24.301711438s ago: executing program 9 (id=6148):
syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000400)={[{@nogrpid}, {@noblock_validity}, {@noquota}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}, {@orlov}]}, 0x4, 0x4f5, &(0x7f0000000c00)="$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")
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50)
io_uring_setup(0xaab, &(0x7f0000000340)={0x0, 0x2c97, 0x1000, 0xfffffffd, 0x17b})
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000300)={<r0=>0xffffffffffffffff})
bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0x3e, &(0x7f0000000440)=ANY=[@ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x20, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x43, '\x00', 0x0, @fallback=0x3b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r1}, 0x18)
gettid()
recvmsg$unix(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x2000)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r2, <r3=>0xffffffffffffffff}, &(0x7f0000000580), &(0x7f00000005c0)}, 0x20)
r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r4}, 0x10)
lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00')

23.506942017s ago: executing program 9 (id=6157):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900000000000007020000f8ffffffb703000008000000b7040000000000008500000001002000956dc8f8ebbe32847b4ea62d748672e41724fe17ccae4ed4d615af03ec43456fdef6b9dd362dfd064164d6106ead5f727b54a70045eb471b3222591a7aa5f8038afeb9ff659ac49211f6b0f068f939260dde728f8e7e898dabecbc5a7488e0081d2a6f33501afa7000f4dacdaf2ce74f88cda4fb17778aaccb8c09"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94)
r1 = socket(0x10, 0x3, 0x6)
r2 = socket(0x10, 0x3, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10)
r4 = socket$tipc(0x1e, 0x5, 0x0)
setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10)
r5 = socket$tipc(0x1e, 0x2, 0x0)
setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10)
close(r4)
sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000680)={0x90, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x7c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x965}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x90}}, 0x880)
ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', <r6=>0x0})
sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x90, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [], 0x0, [0x4, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c4, 0x0, 0x0, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}, @TCA_RATE={0x6}]}, 0x90}}, 0x20000000)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r7}, 0x10)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0)
r8 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x80000000, 0x200000)
ioctl$RTC_AIE_ON(r8, 0x7001)
madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15)
socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000), &(0x7f0000000040)=0x8)
r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0)
ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101})
r10 = socket(0x400000000010, 0x3, 0x0)
r11 = socket$unix(0x1, 0x1, 0x0)
ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', <r12=>0x0})
sendmsg$nl_route_sched(r10, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r12, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0)
sendmsg$nl_route_sched(r10, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=@newtfilter={0x40, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r12, {0xb, 0x6}, {0x0, 0x2}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x4}}, @TCA_RATE={0x6, 0x5, {0x8, 0x7}}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x0)

23.417338289s ago: executing program 38 (id=6157):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000600000005"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001900000000000007020000f8ffffffb703000008000000b7040000000000008500000001002000956dc8f8ebbe32847b4ea62d748672e41724fe17ccae4ed4d615af03ec43456fdef6b9dd362dfd064164d6106ead5f727b54a70045eb471b3222591a7aa5f8038afeb9ff659ac49211f6b0f068f939260dde728f8e7e898dabecbc5a7488e0081d2a6f33501afa7000f4dacdaf2ce74f88cda4fb17778aaccb8c09"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x25, '\x00', 0x0, @fallback=0x1d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94)
r1 = socket(0x10, 0x3, 0x6)
r2 = socket(0x10, 0x3, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000750000001801000020646c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000e00000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10)
r4 = socket$tipc(0x1e, 0x5, 0x0)
setsockopt$TIPC_GROUP_JOIN(r4, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10)
r5 = socket$tipc(0x1e, 0x2, 0x0)
setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10)
close(r4)
sendmsg$TIPC_NL_MEDIA_GET(r1, &(0x7f00000005c0)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000000580)={&(0x7f0000000680)={0x90, 0x0, 0x1, 0x70bd27, 0x25dfdbfd, {}, [@TIPC_NLA_LINK={0x7c, 0x4, 0x0, 0x1, [@TIPC_NLA_LINK_NAME={0x13, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_PROP={0x24, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7fffffff}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x40}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_PROP={0x34, 0x7, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x965}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_NAME={0x9, 0x1, 'syz0\x00'}]}]}, 0x90}}, 0x880)
ioctl$ifreq_SIOCGIFINDEX_team(r1, 0x8933, &(0x7f0000000040)={'team0\x00', <r6=>0x0})
sendmsg$nl_route_sched(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000300)=@newqdisc={0x90, 0x24, 0xf0b, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r6, {0x0, 0xffff}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_mqprio={{0xb}, {0x58, 0x2, {{0x2, [], 0x0, [0x4, 0x2, 0xfffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c4, 0x0, 0x0, 0x0, 0x3dc], [0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000]}}}}, @TCA_RATE={0x6}]}, 0x90}}, 0x20000000)
r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r7}, 0x10)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0)
r8 = syz_open_dev$vcsn(&(0x7f00000001c0), 0x80000000, 0x200000)
ioctl$RTC_AIE_ON(r8, 0x7001)
madvise(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x15)
socket$inet6_sctp(0xa, 0x1, 0x84)
getsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffffff, 0x84, 0x13, &(0x7f0000000000), &(0x7f0000000040)=0x8)
r9 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0)
ioctl$TUNSETIFF(r9, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101})
r10 = socket(0x400000000010, 0x3, 0x0)
r11 = socket$unix(0x1, 0x1, 0x0)
ioctl$sock_SIOCGIFINDEX(r11, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', <r12=>0x0})
sendmsg$nl_route_sched(r10, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r12, {0x0, 0x1}, {0xffff, 0xffff}, {0x0, 0x9}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0)
sendmsg$nl_route_sched(r10, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000680)=@newtfilter={0x40, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r12, {0xb, 0x6}, {0x0, 0x2}, {0x7}}, [@filter_kind_options=@f_matchall={{0xd}, {0x4}}, @TCA_RATE={0x6, 0x5, {0x8, 0x7}}]}, 0x40}, 0x1, 0x0, 0x0, 0x10}, 0x0)

16.609476413s ago: executing program 5 (id=6315):
r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000004000000b703000008000040850000006900"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='sys_enter\x00', r1}, 0x10)
statx(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x80, &(0x7f00000006c0))

16.573640814s ago: executing program 5 (id=6317):
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b000000000000"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0x100}, 0x18)
sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001300)=@newtaction={0x88c, 0x30, 0xffff, 0x3, 0x0, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x4, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffc, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x7, 0x0, 0x0, 0xfffffffe, {0x3, 0x0, 0x0, 0x0, 0xb, 0x3}, {0x4, 0x2, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x3, 0x2}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x4, 0x0, 0x0, 0x0, 0x1, 0x25d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x2, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x80000, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff81, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x8]}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x1}}}}]}]}, 0x88c}}, 0x0)

16.565664064s ago: executing program 5 (id=6319):
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r0}, 0x18)
prctl$PR_SET_NAME(0xf, &(0x7f0000000300)='\x04\x00\x00\x00\x00^\xf6jAc')
mount$tmpfs(0x0, &(0x7f0000001cc0)='./file0\x00', &(0x7f0000001d00), 0x100400, &(0x7f0000001d40)={[{@usrquota_block_hardlimit={'usrquota_block_hardlimit', 0x3d, [0x74, 0x67, 0x74]}}, {@quota}, {@grpquota_block_hardlimit={'grpquota_block_hardlimit', 0x3d, [0x78, 0x30, 0x36]}}, {@inode32}], [{@obj_role={'obj_role', 0x3d, 'tunl0\x00'}}, {@permit_directio}]})

16.530151334s ago: executing program 5 (id=6320):
r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x88882, 0x0)
ftruncate(0xffffffffffffffff, 0x2007ffc)
sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000009)
perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, r0, 0x2)
r1 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x400, 0x17e7b0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x7dd6576e}, 0x10020, 0x3fd, 0x200, 0x8, 0x40004, 0x7ff, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2800004, 0x28011, r1, 0x0)
syz_clone(0x40200, 0x0, 0x49, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x474, &(0x7f00000004c0)="$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")
bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff4e)
r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYBLOB="18010000008000000000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0xc, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10)
socket$packet(0x11, 0x2, 0x300)
r3 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r3)
sendmsg$IEEE802154_LIST_PHY(r3, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)={0x14, r4, 0x30b}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x20000004)

16.313074677s ago: executing program 5 (id=6324):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB="0b000000080000000c000000ffffffff01"], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x2}, 0x18)
r2 = socket$kcm(0x10, 0x2, 0x0)
sendmsg$kcm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f00000000c0)="d800000018008103e00312ba0d8105040a600300ff0f040b067c55a1bc000900b80006990700000015000500fef32702d3001500030001400200000901ac040098007f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04000000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad809d5e1cace81ed0b66bce0b42a9ecbee5de6ccd40dd6e4edef3d93452a92307f00000e970300"/216, 0xd8}], 0x1}, 0x48002) (fail_nth: 1)

15.820934073s ago: executing program 5 (id=6336):
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14008, &(0x7f0000000400)={[{@bsdgroups}]}, 0x1, 0x51c, &(0x7f0000001300)="$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")
r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000"], 0x50)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r1}, &(0x7f0000004000), &(0x7f0000004040)}, 0x3b)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r2, 0x0, 0x8000000000000}, 0x18)
ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x62, 0x514da, 0x101, 0x8000000, 0x3, 0xfffffffe, 0x200001, 0x0, 0x7cce8c743ee810da})
write$qrtrtun(r0, &(0x7f0000000740)="b17de66ba8a5f519d5838eeccd69331d7d51ac5d2e419f40034ea5f8b641e36737ed5f26e73108c831759bf59326d06566281c2669331a50fb3a133595734cd74e276b1c7c1725d42342911f7862788c54ff67bd27d36630c29251508d9a7b8eed8e3b6f9f988b2a2309f454b9310916ad754caac3bc0710d100f3b5b2d44c3f", 0x80)
r3 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0)
preadv2(r3, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0)

15.777391404s ago: executing program 39 (id=6336):
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14008, &(0x7f0000000400)={[{@bsdgroups}]}, 0x1, 0x51c, &(0x7f0000001300)="$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")
r0 = creat(&(0x7f0000000100)='./bus\x00', 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="01000000040000"], 0x50)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r1}, &(0x7f0000004000), &(0x7f0000004040)}, 0x3b)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r2, 0x0, 0x8000000000000}, 0x18)
ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(0xffffffffffffffff, 0xc0a85320, &(0x7f00000005c0)={{0x80}, 'port0\x00', 0x62, 0x514da, 0x101, 0x8000000, 0x3, 0xfffffffe, 0x200001, 0x0, 0x7cce8c743ee810da})
write$qrtrtun(r0, &(0x7f0000000740)="b17de66ba8a5f519d5838eeccd69331d7d51ac5d2e419f40034ea5f8b641e36737ed5f26e73108c831759bf59326d06566281c2669331a50fb3a133595734cd74e276b1c7c1725d42342911f7862788c54ff67bd27d36630c29251508d9a7b8eed8e3b6f9f988b2a2309f454b9310916ad754caac3bc0710d100f3b5b2d44c3f", 0x80)
r3 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0)
preadv2(r3, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0)

11.26905509s ago: executing program 3 (id=6426):
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40201, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000380)={'syzkaller1\x00', 0xc201})
socket$kcm(0x2, 0xa, 0x2)
faccessat2(0xffffffffffffffff, 0x0, 0x81, 0x1000)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="0b00000005000000020000000400000005"], 0x48)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r1, <r2=>0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000300)}, 0x20)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000060000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r3 = socket$nl_route(0x10, 0x3, 0x0)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={<r4=>0xffffffffffffffff})
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14)
sendmsg$nl_route_sched(r3, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000740)=@newtaction={0x98, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80d, 0x0, 0x10000000, 0x5, 0x4}, 0x1, r5}}]}, {0x0, 0xa}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x1}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4008001}, 0x0)

11.164973431s ago: executing program 3 (id=6430):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a000000020000000110000007"], 0x50)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c3"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x7, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a3000000100090003007379"], 0x7c}}, 0x0) (fail_nth: 2)

10.857008465s ago: executing program 3 (id=6432):
r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0)
write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x14, &(0x7f0000000140)={<r1=>0xffffffffffffffff}, 0x106, 0x9}}, 0x20)
r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0)
ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101})
r3 = socket(0x400000000010, 0x3, 0x0)
r4 = socket$unix(0x1, 0x5, 0x0)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', <r5=>0x0})
sendmsg$nl_route_sched(r3, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r5, {0x0, 0x5}, {0xffff, 0xffff}, {0x0, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0)
r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000340)=@base={0xe, 0x4, 0x4, 0x6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10)
write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000180)={0x3, 0x40, 0xfa02, {{0x6000000, 0x4e24, 0x40003, @mcast1}, {0x2, 0xfff9, 0xc00, @remote, 0xffffffff}, r1, 0x9dffffff}}, 0x48)

10.769390296s ago: executing program 3 (id=6436):
r0 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./bus\x00', 0x88882, 0x0)
ftruncate(0xffffffffffffffff, 0x2007ffc)
sendfile(r0, 0xffffffffffffffff, 0x0, 0x800000009)
perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x0, 0x1}, 0x8002, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100000001}, 0x0, 0xffffffffffffffff, r0, 0x2)
r1 = perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x5, 0x0, 0x0, 0x0, 0x0, 0x400, 0x17e7b0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x3, 0x7dd6576e}, 0x10020, 0x3fd, 0x200, 0x8, 0x40004, 0x7ff, 0x8}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0)
mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2800004, 0x28011, r1, 0x0)
syz_clone(0x40200, 0x0, 0x49, 0x0, 0x0, 0x0)
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000480)='./file0\x00', 0x10, &(0x7f0000000140)={[{@norecovery}]}, 0xee, 0x474, &(0x7f00000004c0)="$eJzs3EtsG0UfAPD/rvNo+viSr5RHSwuBgqh4JE36oAcuIJA4gIQEhyJOIUmrUrdBTZBoVUHhUI6oEnfEEYk7Eie4IOCAkLjCHVWqql5aOBmtvZs6jp06tRu3+PeT1p7ZXWfm79mxxzN2Auhb49lNErE1Iv6IiNFaduUJ47W7G9fOz/597fxsEpXKm1eT6nnXr52fLU4tHrellqlUIoaz5HCTci++EzFTLs+fyfOTS6fen1w8e+65E6dmjs8fnz89feTIwQN7hg5PH+oovjS/z+K6vuujhd07X3370uuzRy+9+/M3WX235sfr47gtWbQNxmvPbqNHs5snOyrsrvJrdrOtbkcy0PrkiQ2oEO0rRUTWXIPV/j8apRhZPjYar3za08oBd1SlUqk0e3/OXagA/2FJ9LoGQG8Ub/TZ599i26Chx13hyou1D0BZ3DfyrXZkYHnuYLDh8203jUfE0Qv/fJlt0Y15CACAW/g+G/8822z8l8YDdef9L19DGYuI/0fE9oi4LyJ2RMT9EdVzH4yIh9ZZfuMKyerxT3r5tgJrUzb+eyFf21o5/itGfzFWynPbqvEPJsdOlOf358/JvhgczvJTa5Txw8u/f16kNzUcqx//ZVtWfjEWzOtxeaBhgm5uZmmm07gLVz6J2DXQLP4kimWcJCJ2RsSu2yzjxNNf72517Nbxr2GNdaZ2Vb6KeKrW/hdiRfw3myppuT459fzh6UOTm6I8v3+yuCpW++W3i2+0Kr+j+Lsga//NTa//5VXgsWRTxOLZcyer67WL6y/j4p+f1fXpFavLWfzptxHrvv6Hkreq6aF834czS0tnpiKGktdW75+++dgiX5yfxb9vb/P+v72uxg9HRHYR74mIR/JF3KztHouIxyNi7xrx//TSE++1Oraq/UeK+NeYle+iLP65W7V/1Lf/+hOlkz9+13b8Tdv/YDW1L9/TzutfuxXs5LkDAACAe0Va/Q58kk4sp9N0YqL2Hf4dsTktLywuPXNs4YPTc7Xvyo/FYFrMdI3WzYdO5XPDRX66IX8gnzf+ojRSzU/MLpTneh089LktLfp/5q9Sr2sH3HFdWEcD7lH6P/Qv/R/6l/4P/Uv/h/7VrP9/3IN6ABvP+z/0L/0f+pf+D/1L/4e+1PK38WlHP/nvcaL43wkd/J2rvY+i48TInSwi0t4H2BeJgU4u43YSw00P9fiFCQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoEv+DQAA//9L2OJW")
bpf$PROG_LOAD(0x5, 0x0, 0xffffffffffffff4e)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10)
r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10)
r3 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000240), r2)
sendmsg$IEEE802154_LIST_PHY(r2, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000340)={&(0x7f00000005c0)={0x14, r3, 0x30b}, 0x14}, 0x1, 0x0, 0x0, 0x14}, 0x20000004)

10.42367594s ago: executing program 3 (id=6445):
r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000000)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000004000000b703000008000040850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f00000002c0)='sys_enter\x00', r1}, 0x10)
statx(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0, 0x80, &(0x7f00000006c0))

9.930070496s ago: executing program 3 (id=6455):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000020000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10)
r2 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', <r3=>0x0})
r4 = socket$nl_route(0x10, 0x3, 0x0)
setrlimit(0x8, 0x0)
syz_open_pts(0xffffffffffffffff, 0x0)
r5 = semget$private(0x0, 0x4, 0x4ac)
semctl$IPC_SET(r5, 0x0, 0x1, 0x0)
semop(r5, &(0x7f0000000300)=[{0x2, 0x8, 0x800}, {0x2, 0x2, 0x2800}, {0x1, 0xa330, 0x1000}], 0x3)
semop(r5, &(0x7f00000000c0)=[{0x1, 0x4, 0x800}], 0x1)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f0000000400000008"], 0x50)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e"], 0x48)
sendmsg$nl_route(r4, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001800010000000000000000000a000000000000000000000008000400", @ANYRES32=r3, @ANYBLOB="06001500070000000c00168008000100", @ANYRES64=r2], 0x38}}, 0x10)

9.888086107s ago: executing program 40 (id=6455):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000300000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000020000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10)
r2 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r2, 0x8933, &(0x7f0000000200)={'batadv_slave_0\x00', <r3=>0x0})
r4 = socket$nl_route(0x10, 0x3, 0x0)
setrlimit(0x8, 0x0)
syz_open_pts(0xffffffffffffffff, 0x0)
r5 = semget$private(0x0, 0x4, 0x4ac)
semctl$IPC_SET(r5, 0x0, 0x1, 0x0)
semop(r5, &(0x7f0000000300)=[{0x2, 0x8, 0x800}, {0x2, 0x2, 0x2800}, {0x1, 0xa330, 0x1000}], 0x3)
semop(r5, &(0x7f00000000c0)=[{0x1, 0x4, 0x800}], 0x1)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0f0000000400000008"], 0x50)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e"], 0x48)
sendmsg$nl_route(r4, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000500)=ANY=[@ANYBLOB="380000001800010000000000000000000a000000000000000000000008000400", @ANYRES32=r3, @ANYBLOB="06001500070000000c00168008000100", @ANYRES64=r2], 0x38}}, 0x10)

2.503287929s ago: executing program 2 (id=6641):
r0 = socket(0x10, 0x2, 0x0)
r1 = dup2(r0, r0)
sendto$inet6(r1, &(0x7f0000000000)="1c00000018001f05b9409b0dffff000d0203be040205060506014007430008000f000000fac8388827a685a168d9a4c6040045653600648dcaaf6c26c291214549932fde4a460c89b6ec0cff3959547f509058ba86c902003a03004a32000400160012000a00000000000000000000080756ede4ccbe5880", 0x78, 0x0, 0x0, 0x0)
ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, &(0x7f00000001c0))
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b000000050000000100010009000000"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b708000000f1ff007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
socket$key(0xf, 0x3, 0x2)
mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x40010, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140))
mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil)

2.45263789s ago: executing program 2 (id=6642):
r0 = socket(0x10, 0x3, 0x0)
r1 = socket$inet_udp(0x2, 0x2, 0x0)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x0, 0x7c7, 0x7ff, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x80, 0x4, 0x0, @loopback, @rand_addr=0x64010101}}}})
ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f3, &(0x7f0000000000)={'gre0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x0, 0x700, 0x6, 0x0, {{0x5, 0x4, 0x0, 0x16, 0x14, 0xfffd, 0x0, 0x1, 0x4, 0x0, @loopback, @rand_addr=0x64010100}}}})
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r3}, 0x10)
sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="540000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000e1000000240012800b0001006272696467650000140002800500190000000000050018000100000008000a00", @ANYRES32], 0x54}}, 0x0)
socket(0x10, 0x3, 0x0) (async)
socket$inet_udp(0x2, 0x2, 0x0) (async)
ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f0000000440)={'sit0\x00', &(0x7f0000000400)={'syztnl0\x00', 0x0, 0x0, 0x7c7, 0x7ff, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x80, 0x4, 0x0, @loopback, @rand_addr=0x64010101}}}}) (async)
ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r1, 0x89f3, &(0x7f0000000000)={'gre0\x00', &(0x7f0000000040)={'ip_vti0\x00', 0x0, 0x0, 0x700, 0x6, 0x0, {{0x5, 0x4, 0x0, 0x16, 0x14, 0xfffd, 0x0, 0x1, 0x4, 0x0, @loopback, @rand_addr=0x64010100}}}}) (async)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="05000000040000000800000003"], 0x48) (async)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) (async)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000010007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kfree\x00', r3}, 0x10) (async)
sendmsg$nl_route(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="540000001000010400"/20, @ANYRES32=0x0, @ANYBLOB="00000000e1000000240012800b0001006272696467650000140002800500190000000000050018000100000008000a00", @ANYRES32], 0x54}}, 0x0) (async)

1.889564666s ago: executing program 2 (id=6649):
ioperm(0x5, 0x9, 0x80)
mq_notify(0xffffffffffffffff, 0x0)

1.823780887s ago: executing program 2 (id=6653):
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x24044, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x1100, 0x5dd9, 0x0, 0x5, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r0 = socket$inet_smc(0x2b, 0x1, 0x0)
setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000000)={0x1, 'veth0_virt_wifi\x00', 0x2000000}, 0x18)
setsockopt$IP_VS_SO_SET_STOPDAEMON(r0, 0x0, 0x48c, &(0x7f00000002c0)={0x1, 'ipvlan1\x00', 0x100}, 0x18)
r1 = fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0)
fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0)
r2 = fsmount(r1, 0x1, 0x0)
syz_emit_ethernet(0x7e, &(0x7f0000000040)={@link_local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x80}, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "f53a04", 0x48, 0x3a, 0x0, @remote, @mcast2, {[], @param_prob={0x2, 0x0, 0x0, 0x500, {0x0, 0x6, "508359", 0x0, 0x0, 0x0, @private1, @mcast1={0xff, 0x0, '\x00', 0x0}, [@hopopts={0x3a, 0x1, '\x00', [@calipso={0x7, 0x8}]}]}}}}}}}, 0x0)
perf_event_open(&(0x7f0000001700)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x0, 0x1}, 0x8806, 0x3, 0x634e, 0x0, 0x0, 0x1, 0xfff6, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
r3 = socket$nl_route(0x10, 0x3, 0x0)
sendmsg$nl_route(r3, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000d00)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800010009000000000000000a00000000000000080001000200000004000b"], 0x24}}, 0x0)
fchdir(r2)
pipe2$9p(&(0x7f0000000080), 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121042, 0x18)
syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, &(0x7f0000000080)={[{@usrquota}, {@noblock_validity}, {@bh}, {@max_batch_time={'max_batch_time', 0x3d, 0x8c9}}, {@debug}, {@inlinecrypt}]}, 0x6, 0x5fc, &(0x7f0000000c00)="$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")

1.823080257s ago: executing program 4 (id=6655):
r0 = socket(0x10, 0x2, 0x0)
r1 = dup2(r0, r0)
sendto$inet6(r1, &(0x7f0000000000)="7800000018001f05b9409b0dffff000d0203be040205060506014007430008000f000000fac8388827a685a168d9a4c6040045653600648dcaaf6c26c291214549932fde4a460c89b6ec0cff3959547f509058ba86c902003a03004a32000400160012000a00000000000000000000080756ede4ccbe5880", 0x78, 0x0, 0x0, 0x0) (fail_nth: 4)
ioctl$PPPIOCGDEBUG(0xffffffffffffffff, 0x80047441, &(0x7f00000001c0))
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="0b000000050000000100010009000000"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000004c0)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b708000000f1ff007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
socket$key(0xf, 0x3, 0x2)
mmap$xdp(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x2, 0x40010, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000140))
mremap(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000, 0x0, &(0x7f00008b5000/0x1000)=nil)

1.709848079s ago: executing program 4 (id=6657):
r0 = socket$nl_route(0x10, 0x3, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0x100}, 0x18)
sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001300)=@newtaction={0x88c, 0x30, 0xffff, 0x3, 0x0, {}, [{0x878, 0x1, [@m_police={0x874, 0x1, 0x0, 0x0, {{0xb}, {0x848, 0x2, 0x0, 0x1, [[@TCA_POLICE_RATE={0x404, 0x2, [0x1, 0x4, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x22, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0xfffffffc, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000, 0x0, 0x0, 0x4, 0x0, 0x0, 0x1000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7fff, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x0, 0x7, 0x0, 0x0, 0xfffffffe, {0x3, 0x0, 0x0, 0x0, 0xb, 0x3}, {0x4, 0x2, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x3, 0x2}}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, 0x80000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x4, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x1ffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x6, 0x2, 0x4, 0x0, 0x0, 0x0, 0x1, 0x25d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x2, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x80000, 0x0, 0x0, 0x0, 0xf9, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0xffffff81, 0x0, 0x0, 0xffffff7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x8]}]]}, {0x4}, {0xc, 0xb}, {0xc, 0xa, {0x1}}}}]}]}, 0x88c}}, 0x0)

1.356294853s ago: executing program 4 (id=6662):
r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x40801, 0x0)
fcntl$setstatus(r0, 0x4, 0x42000)
ioctl$FS_IOC_GETFLAGS(r0, 0x5437, 0x0)
r1 = socket$can_bcm(0x1d, 0x2, 0x2)
connect$can_bcm(r1, &(0x7f00000000c0), 0x10)
sendmsg$can_bcm(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=ANY=[@ANYBLOB="05000000000500"/16, @ANYRES64=0x0, @ANYRES64=0xea60, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="000000000100000000000000000000003fae8a9ad451a727"], 0x48}}, 0x0)
r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000009f910000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10)
r4 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000940)=@generic={&(0x7f0000000900)='./file0\x00', 0x0, 0x8}, 0x18)
sendmsg$can_bcm(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000880)=ANY=[@ANYBLOB='\x00'/16, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r4, @ANYRES64=0x0, @ANYBLOB="0200004001000000030000e006030000e05ad60a92c50497", @ANYRES32=r0], 0x48}, 0x1, 0x0, 0x0, 0x40}, 0x40000)
sendmsg$can_bcm(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="050000009f6000"/16, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYRES64=0x0, @ANYRES64=0x2710, @ANYBLOB="0000000003"], 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x8800)
socket$nl_generic(0x10, 0x3, 0x10)
r5 = socket$nl_generic(0x10, 0x3, 0x10)
ioctl$sock_SIOCADDRT(r1, 0x890b, &(0x7f00000007c0)={0x0, @isdn={0x22, 0x5, 0x9, 0xdc, 0x7f}, @sco={0x1f, @none}, @vsock={0x28, 0x0, 0x2710, @my=0x0}, 0x7, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000780)='wg0\x00', 0xffffffff, 0x1, 0xa})
r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff)
sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r5, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001a00)=ANY=[@ANYBLOB="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", @ANYRES16=r6, @ANYBLOB="01000000000000000000390000001c000d80180003801400050005000b0007000700ff03060006000500"], 0x30}, 0x1, 0x0, 0x0, 0x11}, 0x80)
r7 = socket$netlink(0x10, 0x3, 0x8000000004)
ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f00000005c0))
r8 = socket$inet6(0xa, 0x2, 0x0)
setsockopt$sock_int(r8, 0x1, 0xf, &(0x7f0000000240)=0x9, 0x4)
sendmsg$IPSET_CMD_PROTOCOL(r7, &(0x7f0000000840)={&(0x7f0000000600)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000680)={&(0x7f0000000640)=ANY=[@ANYBLOB="1c0000c0010601020000000000000001050000090500000000"], 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x40080)
r9 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000100), r7)
sendmsg$MPTCP_PM_CMD_ADD_ADDR(r5, &(0x7f0000000580)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000400)={&(0x7f0000000300)=ANY=[@ANYBLOB="241d0000", @ANYRES16=r9, @ANYBLOB="1e5b2cbd7000fcdbdf250100000005000500d20000000500050061000000"], 0x24}, 0x1, 0x0, 0x0, 0x90}, 0x0)
r10 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50)
r11 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r10, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r11, 0x0, 0x8000000000000}, 0x18)
bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="2100000000000000000000000000100000040000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000d3000000000000000000000000000000000200000000000000004d0dc5312a38d561b6065bff18460f3a2b2f26639c4ea38808344e080c8941962cbc902e4588e6d8c25fe33dbb50c91b3e0b6c4c6879a13aaa497cc0d1ff5580d6f3727f15ac7f8673"], 0x50)
writev(r7, &(0x7f0000000180)=[{&(0x7f00000001c0)="580000001400add427323b472545b45602117fffffff81000e220e227f000008925aa80013007b00090080007f000001e809000000ff0000f03ac7100003ffffffffffffffffffffffe7ee000000deff0000000200000000", 0x58}], 0x1)

1.316279434s ago: executing program 4 (id=6664):
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10)
r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000400)='GPL\x00', 0x4d2, 0xb3, &(0x7f00000004c0)=""/179, 0x41100, 0x40, '\x00', 0x0, 0x18, r2, 0x8, &(0x7f0000000580)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xb, 0x2, 0x76}, 0x10, 0x7f1, 0xffffffffffffffff, 0x0, &(0x7f0000000600)=[r1, r1, r1, r1, r3], 0x0, 0x10, 0x5a, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ipvlan0\x00', <r5=>0x0})
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_usb_disconnect(0xffffffffffffffff)
bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e00000000000000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bf"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, &(0x7f0000000380))
io_uring_enter(0xffffffffffffffff, 0x5a30, 0xf2ed, 0x1e, &(0x7f0000000000)={[0x3]}, 0x8)
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
openat$cgroup(0xffffffffffffffff, &(0x7f0000000980)='syz0\x00', 0x200002, 0x0)
bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000a00)={0x7955}, 0x8)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000fedbdf25080000001800028014000380100001800400030008000100050000000c00018008000100", @ANYRES32=r5], 0x38}, 0x1, 0x0, 0x0, 0x4000814}, 0x0)

1.229638305s ago: executing program 2 (id=6665):
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10)
r4 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff)
bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0)
bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000680)=@bpf_tracing={0x1a, 0x0, 0x0, &(0x7f0000000400)='GPL\x00', 0x4d2, 0xb3, &(0x7f00000004c0)=""/179, 0x41100, 0x40, '\x00', 0x0, 0x18, r2, 0x8, &(0x7f0000000580)={0x1, 0x2}, 0x8, 0x10, &(0x7f00000005c0)={0x1, 0xb, 0x2, 0x76}, 0x10, 0x7f1, 0xffffffffffffffff, 0x0, &(0x7f0000000600)=[r1, r1, r1, r1, r3], 0x0, 0x10, 0x5a, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000100)={'ipvlan0\x00', <r5=>0x0})
perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
syz_usb_disconnect(0xffffffffffffffff)
bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000ed07449e00000000000000", @ANYRES32, @ANYBLOB="0000000000000008b70800000000396f7b8af8ff00000000bf"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, &(0x7f0000000380))
bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
openat$cgroup(0xffffffffffffffff, &(0x7f0000000980)='syz0\x00', 0x200002, 0x0)
bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000a00)={0x7955}, 0x8)
bpf$BPF_PROG_ATTACH(0x8, 0x0, 0x0)
sendmsg$ETHTOOL_MSG_DEBUG_SET(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)=ANY=[@ANYBLOB='8\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000fedbdf25080000001800028014000380100001800400030008000100050000000c00018008000100", @ANYRES32=r5], 0x38}, 0x1, 0x0, 0x0, 0x4000814}, 0x0)

865.280849ms ago: executing program 6 (id=6674):
r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000000)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRESDEC=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f00000000c0)=0xffffffffffffffff, 0x4)
r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='setgroups\x00')
close_range(r3, 0xffffffffffffffff, 0x0)
ioctl$USBDEVFS_SUBMITURB(r3, 0x8038550a, &(0x7f0000000580)=@urb_type_interrupt={0x1, {0x8, 0x1}, 0x9, 0x80, &(0x7f0000000640)="c87132714ccfd26518b951229c968afaceb822697a6ca6ec22019baa8b26c62afa3dd8a2b754f33e7b399846ca1a44eaba82eb2b544b1c4a5c8e2306e59c3eced2493c30d0fbfaa1c634187602acdc00803756d13fc50a316eb610d865bcb31628d23d9dd586d150288ebbfafd281e82b1826d2e103dd3fff34f9b25f11ca50c98db76bc", 0x84, 0x5c34ac39, 0xc, 0x0, 0x3, 0x7, &(0x7f00000007c0)="6037279ff40821478e31d804063101863a82234793c024e05b940dac6e4022872dc521d9c96b5a842da6d5ea5f53cef0bf11cb40ddfadaa8bdb21db3119e233ff3e16fcb1051dae49304d78938fcf8886045c40d93ebe37809acb5c0a2383e5286e4013743ebe20b1205453ecf1f8911bf94dc7ab8c2e3b000fb4e4ff0c4487fde80d0867d41ab17f09629324d6ff4f7a202af022dcc77d1417d0dff9cf273333efd736e8b0a7f9611eb9dabfb5eff196081fa80e43a10ec3379ef85c5ce98f9ed8a4c51dbdb9c3a826766be3989dfe065a0e364473fd3"})
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000480)={r1, 0xe0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=[0x0], ""/16, <r4=>0x0, 0x0, 0x0, 0x0, 0x7, 0x8, &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x0, 0x46, &(0x7f0000000200)=[{}], 0x8, 0x10, &(0x7f0000000240), &(0x7f0000000300), 0x8, 0xdf, 0x8, 0x8, &(0x7f0000000340)}}, 0x10)
socket$inet6_udp(0xa, 0x2, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_config_ext={0x2, 0x800000000003}, 0x1320, 0xffffffff, 0x3, 0x5, 0x8, 0x1088f109, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
mknodat$loop(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6004, 0x1)
syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x2000c16, &(0x7f0000000500)={[{@resuid}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}]}, 0xff, 0x247, &(0x7f0000000ac0)="$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")
r5 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000000)='cpu.stat\x00', 0x275a, 0x0)
ioctl$FS_IOC_GETFSMAP(r5, 0xc0c0583b, &(0x7f0000005d00)=ANY=[@ANYBLOB="000000004c900200080000000300010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000070000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff"])
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x1e, 0x10, &(0x7f0000000100)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback=0x21, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000280)='sched_switch\x00', r6}, 0x18)
syz_clone(0x40800000, 0x0, 0x0, 0x0, 0x0, 0x0)

776.71042ms ago: executing program 6 (id=6677):
bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="06000000040000000800000008"], 0x48)
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000600)={&(0x7f00000005c0)='sys_enter\x00', r0}, 0x10)
r1 = open(&(0x7f0000000240)='./file1\x00', 0x145142, 0x0)
ftruncate(r1, 0x2007ffc)

776.29542ms ago: executing program 6 (id=6678):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=ANY=[], 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000001c0)={{r0, <r1=>0xffffffffffffffff}, &(0x7f0000000340), &(0x7f0000000300)}, 0x20)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000067dfb4a518110000", @ANYRES32=r1, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kfree\x00', r2}, 0x10)
r3 = socket$nl_route(0x10, 0x3, 0x0)
socketpair(0x1, 0x20000000000001, 0x0, &(0x7f0000000100)={<r4=>0xffffffffffffffff})
getsockname$packet(r4, &(0x7f0000000100)={0x11, 0x0, <r5=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000400)=0x14)
sendmsg$nl_route_sched(r3, &(0x7f0000006280)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000740)=@newtaction={0x98, 0x30, 0x1, 0x0, 0x0, {0x0, 0x0, 0x6a00}, [{0x84, 0x1, [@m_mirred={0x50, 0x1, 0x0, 0x0, {{0xb}, {0x24, 0x2, 0x0, 0x1, [@TCA_MIRRED_PARMS={0x20, 0x2, {{0x80d, 0x0, 0x10000000, 0x5, 0x4}, 0x1, r5}}]}, {0x0, 0xa}, {0xc}, {0xc, 0x8, {0x2}}}}, @m_mpls={0x30, 0x2, 0x0, 0x0, {{0x9}, {0x1}, {0x4}, {0xc}, {0xc}}}]}]}, 0x98}, 0x1, 0x0, 0x0, 0x4008001}, 0x0)

722.551511ms ago: executing program 6 (id=6679):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x10, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000006, 0x5d031, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0)
remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0)

701.296511ms ago: executing program 6 (id=6682):
r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101})
r1 = socket(0x400000000010, 0x3, 0x0)
r2 = socket$unix(0x1, 0x1, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', <r3=>0x0})
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000040000000c"], 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10)
sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000003580)=@newtfilter={0x78, 0x2c, 0xd27, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0xfff3, 0x7}, {}, {0xa, 0x1}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x48, 0x2, [@TCA_CGROUP_EMATCHES={0x44, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x38, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x34, 0x1, 0x0, 0x0, {{0xe37, 0x9, 0x5}, [@TCA_EM_IPT_MATCH_DATA={0x4}, @TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xba}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}]}}]}]}]}}]}, 0x78}, 0x1, 0x0, 0x0, 0x80}, 0x40010)

663.802072ms ago: executing program 6 (id=6684):
r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffe}, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="280000000400000558000000086138611d7e977ba8de6d0500000000000000fc7d8a000045847a3fb0bfa0356a6aab8c4c0c9f344b2564ed5375b8273d679aa844eb3421da6786caf1e6a14bb16a28672ca2cc3999cd78a173d5052376a7be72c6653f8c5f6a1352f2a84b3a33063c"], 0x48)
io_setup(0x8, &(0x7f0000000000)=<r3=>0x0)
r4 = eventfd2(0x0, 0x80001)
io_submit(r3, 0x3, &(0x7f00000005c0)=[&(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, r4, &(0x7f0000000280)="d1f7624a6b0e53c3", 0x8, 0x2}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x5, r2, 0x0, 0x0, 0x0, 0x0, 0x0, r4}, 0x0])
openat$urandom(0xffffffffffffff9c, &(0x7f0000000300), 0x682202, 0x0)
writev(r1, &(0x7f0000000400), 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x18, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10)
syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1809049, 0x0, 0xff, 0x0, 0x0)
setxattr$security_capability(0x0, &(0x7f0000000280), 0x0, 0x0, 0x0)
lsetxattr$security_capability(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000040)=@v3, 0x18, 0x0)
lgetxattr(&(0x7f0000000000)='./file0\x00', &(0x7f0000000280)=ANY=[], 0x0, 0x0)

568.029533ms ago: executing program 4 (id=6687):
syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000400)={[{@nogrpid}, {@noblock_validity}, {@noquota}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}, {@orlov}]}, 0x4, 0x4f5, &(0x7f0000000c00)="$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")
sendmsg$unix(0xffffffffffffffff, 0x0, 0x4004881)
recvmsg$unix(0xffffffffffffffff, 0x0, 0x2000)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, <r1=>0xffffffffffffffff}, 0x0, &(0x7f00000005c0)}, 0x20)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10)
lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00')

562.282823ms ago: executing program 4 (id=6689):
r0 = socket$can_raw(0x1d, 0x3, 0x1)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50)
r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r3}, 0x10)
r4 = socket$nl_route(0x10, 0x3, 0x0)
ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'dummy0\x00', <r5=>0x0})
sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=@newlink={0x44, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @ipvlan={{0xb}, {0x4}}}, @IFLA_LINK={0x8, 0x5, r5}, @IFLA_MASTER={0x8, 0xa, r5}]}, 0x44}}, 0x0)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r6}, 0x10)
ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', <r7=>0x0})
bind$can_raw(r0, &(0x7f0000000480)={0x1d, r7}, 0x10)
close(r0)
r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x5, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r9 = socket$unix(0x1, 0x5, 0x0)
r10 = socket$can_bcm(0x1d, 0x2, 0x2)
ioctl$ifreq_SIOCGIFINDEX_vcan(r10, 0x8933, &(0x7f0000000100)={'vcan0\x00', <r11=>0x0})
connect$can_bcm(r10, &(0x7f00000000c0)={0x1d, r11}, 0x10)
sendmsg$can_bcm(r10, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[@ANYBLOB="0100000003ece1e40ad8871461ab0800", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=r9, @ANYBLOB="3bf81bb9f9"], 0x20000600}, 0x1, 0x0, 0x0, 0x40000}, 0x0)
sendmsg$can_bcm(r10, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000580)=ANY=[], 0x4640}, 0x2}, 0x0)
pipe(&(0x7f0000000080)={<r12=>0xffffffffffffffff, <r13=>0xffffffffffffffff})
sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newqdisc={0x3c, 0x24, 0x0, 0x0, 0x0, {}, [@qdisc_kind_options=@q_codel={{0xa}, {0xc, 0x2, [@TCA_CODEL_INTERVAL={0x8, 0x3, 0x6}]}}]}, 0x3c}}, 0x0)
r14 = socket$inet_udp(0x2, 0x2, 0x0)
close(r14)
socket$nl_route(0x10, 0x3, 0x0)
ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000040)={0x0, 0x0, 0x100, {0x0, 0xa}, {0x3}, @const={0x0, {0x1, 0x8, 0x4, 0x881}}})
sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="4808000010001fff3a4ee9bfd5c3a3696c40af0b", @ANYRES32=0x0, @ANYBLOB="0000000000000000280012800a00010076786c616e"], 0x3}}, 0x0)
write$binfmt_misc(r13, &(0x7f0000000000), 0xfffffecc)
splice(r12, 0x0, r14, 0x0, 0x4ffe6, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, r13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)

537.810713ms ago: executing program 2 (id=6690):
r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x8000, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x2, @perf_config_ext={0xf60, 0x40ffffffff}, 0x1100, 0x5, 0x3a65, 0x5, 0x0, 0x5, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000b40)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0)
read$hiddev(r2, 0x0, 0x0)
perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x5, 0x6, 0x5, 0xd, 0x0, 0x4, 0x400, 0x7, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x3ff, 0x1, @perf_bp={&(0x7f0000000440), 0x1}, 0x100000, 0x0, 0x401, 0x9, 0x6, 0x8, 0x8000, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xa, r2, 0x2)
ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1)
r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f00000006c0)='kfree\x00', r4}, 0x18)
r5 = add_key$keyring(&(0x7f0000000300), &(0x7f0000000840)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f0000000040)='ceph\x00', 0x0, &(0x7f0000000bc0)="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", 0x12d, r5)
r6 = perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_config_ext={0x4, 0x4}, 0x400, 0xffffffff, 0x6, 0x5, 0x0, 0x40000001, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x8)
ioctl$PERF_EVENT_IOC_SET_BPF(r6, 0x40042408, 0xffffffffffffffff)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]})
r7 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002080)={&(0x7f0000000300)='kfree\x00', r8, 0x0, 0xfffffffffffffffc}, 0x18)
r9 = socket$netlink(0x10, 0x3, 0x14)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x8, 0xc0100, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xffffffff, 0x6, 0x4, 0x6, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]})
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x4000000000000, 0x40, 0x0, 0x0)
r10 = syz_io_uring_setup(0x45f7, &(0x7f0000000980)={0x0, 0x5885, 0x80, 0x3, 0x4}, &(0x7f00000001c0)=<r11=>0x0, &(0x7f0000000280)=<r12=>0x0)
syz_memcpy_off$IO_URING_METADATA_GENERIC(r11, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4)
syz_io_uring_submit(r11, r12, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x4004, @fd_index=0x3, 0x0, 0x0})
r13 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="1801000000000000000000000000ea04850000005000000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000480)='svc_xprt_enqueue\x00', r13, 0x0, 0x99c}, 0x18)
io_uring_enter(r10, 0x3516, 0x0, 0x0, 0x0, 0x0)
sendmsg$RDMA_NLDEV_CMD_NEWLINK(r9, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000001200)={&(0x7f0000000540)=ANY=[@ANYBLOB="38000000031401002dbd7000000000000900020073797a30000000000800410073697700140033006c6f000000000000000000000000000049e252f3bed8ca8836c2ddb213da871e43b409"], 0x38}, 0x1, 0x0, 0x0, 0x854}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB, @ANYRES32=r7, @ANYBLOB="0000000000000000b70200001400ffd9b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000084000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)

513.240904ms ago: executing program 0 (id=6692):
bpf$TOKEN_CREATE(0x24, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x1, 0x0, 0x0) (async)
sendmsg$inet(0xffffffffffffffff, 0x0, 0x4051) (async)
perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000040000000900000001"], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000f9ffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='sys_enter\x00', r1}, 0x10)
setregid(0xee01, 0x0) (async)
perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5c31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x111d, 0x0, 0x2, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
r2 = syz_open_dev$usbfs(&(0x7f0000000100), 0x76, 0x101b01)
ioctl$USBDEVFS_DISCONNECT_CLAIM(r2, 0x8108551b, &(0x7f0000002600)={0x0, 0x0, "5a77bd318786aeb879ca62cdab2a02fa560186d85b25a5665a3247e500f61681905db88235f8a5447dd2a2ed6e91626f068881e50f68530c2b21a100efb76cba37ff3111d6847e0c7f719e169a596e5fc008daefba68f6222103472bc55704cdb72b4b996ed82ccb1eaae27969d008ba7d34171113d806726615380fe65a6a0a72e19c2b60bd6276fd8bb6363d10f70da60fd53ded22c87eb2be010e4a62fb73c33424b437bb192c9d06ea6ed04983fe5c5ca033dfce0a82575ef14eee686be0fc58e384f93a13e4e8bbf599394baea3a9ca1864f0a35d6cc38fca32ad6b39905a9727d2001457df7be7e1aefe3635b2ee97c143f28def4b73905ca14d90d1f6"}) (async)
ioctl$USBDEVFS_ALLOW_SUSPEND(r2, 0x5522) (async)
syz_open_dev$usbfs(&(0x7f0000000240), 0x74, 0x200000) (async)
r3 = bpf$MAP_CREATE(0x100000000000000, &(0x7f00000001c0)=@base={0xa, 0x16, 0xb3, 0x7f, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) (async)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000029c0)={<r4=>0xffffffffffffffff, <r5=>0xffffffffffffffff})
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) (async)
sendmsg$inet(r5, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000a40)=[{&(0x7f0000000880)="b9", 0x1}], 0x1}, 0x20048811) (async)
sendmsg$inet(r5, &(0x7f0000000500)={0x0, 0x0, &(0x7f0000001740)=[{&(0x7f0000000b00)='>', 0x1}], 0x1}, 0x20000040)
recvmsg$unix(r4, &(0x7f00000009c0)={0x0, 0x0, 0x0}, 0x40) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000080)=@framed={{0x18, 0x3}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x0, 0x1, 0x0, r3}, @generic={0x66}, @initr0, @exit, @alu={0x4, 0x0, 0xa, 0x3}]}, &(0x7f0000001300)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async)
r6 = socket$unix(0x1, 0x2, 0x0)
bind$unix(r6, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) (async)
accept4$unix(r6, 0x0, &(0x7f0000000280), 0x40000)

448.355784ms ago: executing program 0 (id=6693):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x10, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={0x0, r1}, 0x18)
mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000006, 0x5d031, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0)
remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0)

447.489764ms ago: executing program 0 (id=6694):
bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48)
accept4(0xffffffffffffffff, &(0x7f00000009c0)=@ax25={{0x3, @default}, [@rose, @null, @bcast, @rose, @default, @netrom]}, &(0x7f0000000b00)=0x80, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]})
setitimer(0x2, 0x0, 0x0)

418.892845ms ago: executing program 0 (id=6695):
r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0)
ioctl$TUNSETIFF(r0, 0x400454ca, 0x0)
r1 = socket(0x400000000010, 0x3, 0x0)
r2 = socket$unix(0x1, 0x1, 0x0)
ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', <r3=>0x0})
r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000040000000c"], 0x48)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10)
sendmsg$nl_route_sched(r1, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2d, 0xffffffff, {0x0, 0x0, 0x0, r3, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x1, 0xf}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x28}}}]}, 0x38}}, 0x0)
sendmsg$nl_route_sched(r1, &(0x7f0000006040)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000003580)=@newtfilter={0x78, 0x2c, 0xd27, 0x70bd25, 0x25dfdbfd, {0x0, 0x0, 0x0, r3, {0xfff3, 0x7}, {}, {0xa, 0x1}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x48, 0x2, [@TCA_CGROUP_EMATCHES={0x44, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x38, 0x2, 0x0, 0x1, [@TCF_EM_IPT={0x34, 0x1, 0x0, 0x0, {{0xe37, 0x9, 0x5}, [@TCA_EM_IPT_MATCH_DATA={0x4}, @TCA_EM_IPT_HOOK={0x8}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xba}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0xa}]}}]}]}]}}]}, 0x78}, 0x1, 0x0, 0x0, 0x80}, 0x40010)

382.871235ms ago: executing program 0 (id=6696):
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]})
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x28, 0x28, 0x4, [@var={0x82, 0x0, 0x0, 0x11, 0x3, 0xffffffff}, @const={0x0, 0x0, 0x0, 0x2, 0x3}, @func_proto={0x2, 0x0, 0x0, 0x8, 0x2}]}, {0x0, [0x2e, 0x2e]}}, 0x0, 0x44, 0x0, 0x0, 0x800, 0x0, @void, @value}, 0x28)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100"/13], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
rt_tgsigqueueinfo(0x0, 0x0, 0x1c, &(0x7f0000000580)={0x40, 0x5e, 0x2})
r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000020000000000000", @ANYRES32, @ANYBLOB="2eaf824e0000004000000000000000ebff00000000400000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48)
r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2)
setsockopt$sock_int(r1, 0x1, 0x2e, &(0x7f0000000000)=0x8, 0x4)
ppoll(&(0x7f0000000040)=[{r1, 0x100}], 0x1, 0x0, 0x0, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1e, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r2 = syz_open_procfs(0x0, &(0x7f0000000480)='pagemap\x00')
io_setup(0x2278, &(0x7f0000000180)=<r3=>0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, <r4=>0xffffffffffffffff})
setsockopt$sock_timeval(r4, 0x1, 0x14, &(0x7f0000000000)={0x0, 0xea60}, 0x10)
r5 = eventfd(0x101)
r6 = socket$inet6(0xa, 0x1, 0x0)
setsockopt$inet6_IPV6_FLOWLABEL_MGR(r6, 0x29, 0x20, &(0x7f00000000c0)={@remote, 0x800, 0x0, 0x103, 0x1}, 0xf01a7180595e49a4)
io_submit(r3, 0x2, &(0x7f0000000140)=[&(0x7f00000001c0)={0x0, 0x4, 0x0, 0x0, 0x0, r4, &(0x7f0000000200)=' ', 0x1, 0x0, 0x0, 0x2}, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x7, 0x2, r4, 0x0, 0x0, 0x0, 0x0, 0x1, r5}])
syz_clone(0x640c70a7, 0x0, 0x0, 0x0, 0x0, 0x0)
preadv(r2, &(0x7f0000000640)=[{&(0x7f0000000b00)=""/152, 0x98}, {&(0x7f0000000500)=""/189, 0x7fffef68}], 0x2, 0x0, 0x0)
r7 = socket$kcm(0x10, 0x2, 0x0)
perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0x5d, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0)
madvise(&(0x7f0000000000/0x600000)=nil, 0x600722, 0x66)
ioctl$BLKTRACESTOP(0xffffffffffffffff, 0x1275, 0x0)
sendmsg$inet(r7, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000c40)="5c00000016006bab9a3fe3d86e17aa0a046b876c060048007ea60864160af36504811a0038001d001931a0e69ee517d34460be06000000a705251e6182949a9a7b9bcb84c9f4d4938037e70e4509c5bb4de385aa2adb88a899a655ab", 0x5c}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000015c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)

228.421218ms ago: executing program 1 (id=6699):
syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x1000410, &(0x7f0000000400)={[{@nogrpid}, {@noblock_validity}, {@noquota}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}, {@orlov}]}, 0x4, 0x4f5, &(0x7f0000000c00)="$eJzs3U9sVFsZAPDvTjttX1955elbqFEfIoqGMP0DNAQXwkZjCImBuHIBtR2apjNM02mRVhZl6d5EEle6duXOhQkrF+7c6c6NLkxQiYaauBhz79y2Q9vpFGg70Pn9ktt7zzml3zkdzjn3nmE4AfSsMxGxHhEDEXEvIkbz/CQ/4nrzSL/v5YvHMxsvHs8k0Wjc+WeSlad50fJnUh/mP3MoIm5/N+JHye649dW1helKpbyUp8eWq4tj9dW1i/OFPGdyamJq/OqlK5OH1tZPq795/p35mz/43W+/9Nc/rn/zJ2m1Rn56KitrbcdruT24b3Gz6cUYacnrj4ibbxTs3dSf//3h/ZP2ts9ExNms/49GX/ZqAgAnWaMxGo3R1jQAcNKlz/8jkRRK+VrASBQKpVJzDe+TGC5UavXlC6O1lQezka1hnY5i4f58pTyerxWejmKSpiey6+305I70pYj4OCJ+NvhBli7N1Cqz3bzxAYAe9uGO+f8/g835HwA44Ya6XQEA4NiZ/wGg95j/AaD3vMb879OBAHBCeP4HgN5j/geA3tNx/n9yPPUAAI7F92/dSo/GRv7/X88+XF351sjDi7Pl+kKpujJTmqktLZbmarW5Srk002h0+nmVWm1x4vJWsr66drdaW3mwfHe+Oj1XvlsuHnF7AIDOPv702Z+TiFi/9kF2RMteDuZqONkK3a4A0DV93a4A0DU+zwO96wDP+JYB4ITbY4veV7T9J0JPbf4K76vzn7f+D73K+j/0rjdb///2odcDOH7W/6F3NRqJPf8BoMdY4wfe6v1/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA6FEj2ZEUStle4Ovp10KpFHEqIk5HMbk/XymPR8RHEfGnweJgmp7odqUBgLdU+HuS7/91fvRcejsQAy2lA8l/BzfzfvyLOz9/NL28vDSR5v9rK3/5aZ4/OdCtRgAAm67vzmrO0/m55UH+5YvHM5vHcVbx+Y3m5qJp3I38aJb0R392HopiRAz/O8nTTen9St8hxF9/EhGf227/o5YII9kaSHPn053x09injiD+9u9/Z/zCK/ELWVl6Lma/i88eQl2g1zy70Rwn876XdrG8/xXiTHbeu/8PZSPU29sc/zZ2jX+FrfGvb1f8JOvzZ7bS+9fk+eXff29XZmO0WfYk4gv9e8VPtuInbcbfcwds41+++OWz7coav4w4H3vHb6pmw+zYcnVxrL66dnG+Oj1Xnis/mJycmpgav3rpyuRYtkbd/PqHvWL849qFj9rFT9s/3Cb+UIf2f+2A7f/V/+798Cv7xP/GV/d+/T/ZJ346J379gPGnh6+33b47jT/bpv2dXv8LzbcFOvr139ZmD1hVAOAY1FfXFqYrlfJSh4v0XrPT97h4Py9iPeIdqIaLd+qi2yMTcNS2O323awIAAAAAAAAAAAAAALRTX11bGIyj/ThRt9sIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAyfX/AAAA//81As8n")
sendmsg$unix(0xffffffffffffffff, 0x0, 0x4004881)
recvmsg$unix(0xffffffffffffffff, 0x0, 0x2000)
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=@base={0xb, 0x7, 0x10001, 0x9, 0x1, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000000)={{r0, <r1=>0xffffffffffffffff}, 0x0, &(0x7f00000005c0)}, 0x20)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000680)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r2}, 0x10)
lremovexattr(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=@known='system.posix_acl_access\x00')

227.933538ms ago: executing program 1 (id=6700):
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e0000008500000005"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94)
socket$inet6(0xa, 0x817, 0x80000001)
add_key(&(0x7f0000000000)='rxrpc\x00', 0x0, &(0x7f0000000240)="000000000000003299b8f276dc75584a8d87d907005858367d61f49e1639a48f614a54a8192c2876b7f843cd3a3c07288fa0f1e28983b5cdc2e29b6e", 0x3c, 0xffffffffffffffff)
r0 = syz_open_dev$tty1(0xc, 0x4, 0x3)
ioctl$KDSKBENT(r0, 0x4b47, &(0x7f0000000400)={0x0, 0xa, 0x8001})
syz_emit_ethernet(0x1162, 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
socket$nl_route(0x10, 0x3, 0x0)
socket$rds(0x15, 0x5, 0x0)
socket$inet_sctp(0x2, 0x1, 0x84)
mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x8, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, @perf_bp={0x0, 0x13}, 0x400, 0xfffffffc, 0x6, 0x4, 0x0, 0x1, 0xfff9, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000540)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000001001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0)
sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2d4}}, 0x4048010)
setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000200)={@dev}, 0x14)
r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net/anycast6\x00')
preadv(r3, &(0x7f0000000040)=[{&(0x7f0000000180)=""/66, 0x42}], 0x1, 0xe1, 0x3)
socket$nl_generic(0x10, 0x3, 0x10)
r4 = socket$kcm(0xa, 0x2, 0x0)
sendmsg$kcm(r4, &(0x7f0000000000)={&(0x7f0000000100)=@in6={0xa, 0x4e20, 0xffff, @loopback}, 0x80, 0x0, 0x0, &(0x7f0000000cc0)=[{0x10, 0x1, 0x1}], 0x10}, 0x5004)
r5 = syz_open_dev$usbfs(&(0x7f0000000080), 0x70, 0x101301)
ioctl$USBDEVFS_IOCTL(r5, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect)

68.978579ms ago: executing program 0 (id=6701):
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={<r0=>0xffffffffffffffff, <r1=>0xffffffffffffffff})
sendmsg$unix(r0, 0x0, 0x0)
recvmmsg(r1, &(0x7f0000001140), 0x700, 0x2, 0x0)

62.424259ms ago: executing program 1 (id=6702):
creat(&(0x7f0000000100)='./bus\x00', 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000004080)={{r0}, &(0x7f0000004000), &(0x7f0000004040)}, 0x3b)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r1, 0x0, 0x8000000000000}, 0x18)
r2 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0)
preadv2(r2, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0)

46.20907ms ago: executing program 1 (id=6703):
syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f00000001c0)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x14008, &(0x7f0000000400)={[{@bsdgroups}]}, 0x1, 0x51c, &(0x7f0000001300)="$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")
creat(&(0x7f0000000100)='./bus\x00', 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0100000004000000ff0f000007"], 0x50)
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='kfree\x00', r0, 0x0, 0x8000000000000}, 0x18)
r1 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0)
preadv2(r1, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0)

24.29307ms ago: executing program 1 (id=6704):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x9, 0x4, 0x8, 0x10, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000040)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0)
mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000006, 0x5d031, 0xffffffffffffffff, 0x0)
remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0)
remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x0, 0x0)

0s ago: executing program 1 (id=6705):
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff) (async)
mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x1ff)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000990000000d"], 0x50)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYRES8=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000010a850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x12, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)) (async)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, <r3=>0xffffffffffffffff})
r4 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r4}, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f00000014c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000760b49", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async)
r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x10, &(0x7f00000014c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000760b49", @ANYRES32=r4, @ANYBLOB="0000000000000000b70500000800000085000000a50000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r5}, 0x10)
bind$unix(r3, &(0x7f0000000240)=@file={0x1, './file0/file0/file0\x00'}, 0x6e)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000ac0)={&(0x7f0000000b00)='kmem_cache_free\x00', r2, 0x0, 0x1034}, 0x18)
r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000300)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41)
prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00')
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f00000015c0)='kmem_cache_free\x00', r6}, 0x10)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1fff}]})
setgroups(0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) (async)
r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$PROG_LOAD(0x5, &(0x7f00000008c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, @void, @value}, 0x94)
gettid() (async)
r8 = gettid()
process_vm_writev(r8, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) (async)
process_vm_writev(r8, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0x7ffff000}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0)
mbind(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2)
r9 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x141b82, 0x0)
write$cgroup_int(r9, &(0x7f0000000000)=0x700, 0x12) (async)
write$cgroup_int(r9, &(0x7f0000000000)=0x700, 0x12)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000340)='kmem_cache_free\x00', r1, 0x0, 0xf7}, 0x18)
symlink(&(0x7f00000049c0)='.\x00', &(0x7f00000059c0)='./file0\x00') (async)
symlink(&(0x7f00000049c0)='.\x00', &(0x7f00000059c0)='./file0\x00')
r10 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0)
fcntl$lock(r10, 0x24, &(0x7f0000000400)={0x0, 0x2, 0x7ffffffffffffffc})

kernel console output (not intermixed with test programs):

ack+0x1d/0x30
[  353.553711][T21869]  dump_stack_lvl+0xe8/0x140
[  353.553745][T21869]  dump_stack+0x15/0x1b
[  353.553767][T21869]  should_fail_ex+0x265/0x280
[  353.553809][T21869]  should_fail+0xb/0x20
[  353.553845][T21869]  should_fail_usercopy+0x1a/0x20
[  353.553868][T21869]  strncpy_from_user+0x25/0x230
[  353.553979][T21869]  ? kmem_cache_alloc_noprof+0x186/0x310
[  353.554049][T21869]  ? getname_flags+0x80/0x3b0
[  353.554097][T21869]  getname_flags+0xae/0x3b0
[  353.554135][T21869]  __x64_sys_unlink+0x21/0x40
[  353.554239][T21869]  x64_sys_call+0x22a6/0x2fb0
[  353.554309][T21869]  do_syscall_64+0xd0/0x1a0
[  353.554330][T21869]  ? clear_bhb_loop+0x25/0x80
[  353.554351][T21869]  ? clear_bhb_loop+0x25/0x80
[  353.554447][T21869]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  353.554474][T21869] RIP: 0033:0x7f191635e969
[  353.554490][T21869] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  353.554512][T21869] RSP: 002b:00007f19149a6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000057
[  353.554535][T21869] RAX: ffffffffffffffda RBX: 00007f1916586080 RCX: 00007f191635e969
[  353.554562][T21869] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000180
[  353.554578][T21869] RBP: 00007f19149a6090 R08: 0000000000000000 R09: 0000000000000000
[  353.554594][T21869] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  353.554610][T21869] R13: 0000000000000000 R14: 00007f1916586080 R15: 00007ffdceba1a48
[  353.554662][T21869]  </TASK>
[  353.562132][T21872] loop3: detected capacity change from 0 to 1024
[  353.577800][T21659] batman_adv: batadv0: Interface activated: batadv_slave_1
[  353.647441][T21872] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  353.657856][T21659] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  353.782119][T21659] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  353.790976][T21659] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  353.799694][T21659] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  353.824811][T21877] EXT4-fs error (device loop3): ext4_validate_block_bitmap:441: comm syz.3.6014: bg 0: block 88: padding at end of block bitmap is not set
[  353.841161][T21872] FAULT_INJECTION: forcing a failure.
[  353.841161][T21872] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  353.854353][T21872] CPU: 0 UID: 0 PID: 21872 Comm: syz.3.6014 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  353.854386][T21872] Tainted: [W]=WARN
[  353.854393][T21872] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  353.854406][T21872] Call Trace:
[  353.854413][T21872]  <TASK>
[  353.854420][T21872]  __dump_stack+0x1d/0x30
[  353.854452][T21872]  dump_stack_lvl+0xe8/0x140
[  353.854472][T21872]  dump_stack+0x15/0x1b
[  353.854489][T21872]  should_fail_ex+0x265/0x280
[  353.854522][T21872]  should_fail+0xb/0x20
[  353.854559][T21872]  should_fail_usercopy+0x1a/0x20
[  353.854578][T21872]  _copy_from_user+0x1c/0xb0
[  353.854653][T21872]  do_ip6t_set_ctl+0x3a9/0x840
[  353.854706][T21872]  nf_setsockopt+0x196/0x1b0
[  353.854742][T21872]  ipv6_setsockopt+0x11a/0x130
[  353.854829][T21872]  udpv6_setsockopt+0x99/0xb0
[  353.854870][T21872]  sock_common_setsockopt+0x66/0x80
[  353.854898][T21872]  ? __pfx_sock_common_setsockopt+0x10/0x10
[  353.854926][T21872]  __sys_setsockopt+0x181/0x200
[  353.854974][T21872]  __x64_sys_setsockopt+0x64/0x80
[  353.855008][T21872]  x64_sys_call+0x2bd5/0x2fb0
[  353.855029][T21872]  do_syscall_64+0xd0/0x1a0
[  353.855051][T21872]  ? clear_bhb_loop+0x25/0x80
[  353.855117][T21872]  ? clear_bhb_loop+0x25/0x80
[  353.855139][T21872]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  353.855160][T21872] RIP: 0033:0x7f000391e969
[  353.855176][T21872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  353.855194][T21872] RSP: 002b:00007f0001f87038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[  353.855223][T21872] RAX: ffffffffffffffda RBX: 00007f0003b45fa0 RCX: 00007f000391e969
[  353.855236][T21872] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 000000000000000b
[  353.855248][T21872] RBP: 00007f0001f87090 R08: 0000000000000660 R09: 0000000000000000
[  353.855285][T21872] R10: 0000200000001240 R11: 0000000000000246 R12: 0000000000000001
[  353.855297][T21872] R13: 0000000000000000 R14: 00007f0003b45fa0 R15: 00007ffea23b9fb8
[  353.855317][T21872]  </TASK>
[  354.137049][T21892] netlink: 'syz.0.6018': attribute type 10 has an invalid length.
[  354.152021][T21892] hsr_slave_0: left promiscuous mode
[  354.161385][T21892] hsr_slave_1: left promiscuous mode
[  354.179050][T19317] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  354.254162][T21903] siw: device registration error -23
[  354.261007][T21903] __nla_validate_parse: 16 callbacks suppressed
[  354.261026][T21903] netlink: 188 bytes leftover after parsing attributes in process `syz.3.6020'.
[  354.324490][T21907] IPVS: set_ctl: invalid protocol: 59 172.20.20.35:20003
[  354.401455][T21913] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6026'.
[  354.410493][T21913] netlink: 32 bytes leftover after parsing attributes in process `syz.1.6026'.
[  354.419612][T21913] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6026'.
[  354.430011][T21913] netlink: 32 bytes leftover after parsing attributes in process `syz.1.6026'.
[  354.585237][T21924] netlink: 48 bytes leftover after parsing attributes in process `syz.1.6031'.
[  354.674689][T21932] siw: device registration error -23
[  354.682389][T21932] netlink: 188 bytes leftover after parsing attributes in process `syz.1.6034'.
[  354.717914][T21935] netlink: 'syz.1.6035': attribute type 13 has an invalid length.
[  354.735926][T21935] netlink: 'syz.1.6035': attribute type 1 has an invalid length.
[  354.743785][T21935] netlink: 199820 bytes leftover after parsing attributes in process `syz.1.6035'.
[  354.761667][T21937] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6036'.
[  354.770804][T21937] netlink: 32 bytes leftover after parsing attributes in process `syz.3.6036'.
[  354.854978][T21943] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=10 sclass=netlink_route_socket pid=21943 comm=syz.3.6039
[  355.014860][T21957] siw: device registration error -23
[  355.090167][T21965] program syz.1.6049 is using a deprecated SCSI ioctl, please convert it to SG_IO
[  355.175504][T21975] siw: device registration error -23
[  355.339526][T21996] program syz.2.6063 is using a deprecated SCSI ioctl, please convert it to SG_IO
[  355.406995][T22002] netlink: 'syz.9.6067': attribute type 10 has an invalid length.
[  355.423911][T22002] hsr_slave_0: left promiscuous mode
[  355.429779][T22002] hsr_slave_1: left promiscuous mode
[  355.627168][T22019] siw: device registration error -23
[  355.709540][T22021] netlink: 'syz.1.6074': attribute type 13 has an invalid length.
[  355.733182][T22021] netlink: 'syz.1.6074': attribute type 1 has an invalid length.
[  355.766778][T22025] 9pnet_fd: Insufficient options for proto=fd
[  356.059743][T22043] siw: device registration error -23
[  356.172297][T22058] batman_adv: batadv0: Removing interface: batadv_slave_0
[  356.180267][T22058] batman_adv: batadv0: Removing interface: batadv_slave_1
[  356.234420][T22063] netlink: 'syz.0.6094': attribute type 10 has an invalid length.
[  356.476974][T22079] block device autoloading is deprecated and will be removed.
[  356.581472][T22091] only policy match revision 0 supported
[  356.581490][T22091] unable to load match
[  356.807559][T22107] loop9: detected capacity change from 0 to 512
[  356.850228][T22111] netlink: 'syz.1.6113': attribute type 13 has an invalid length.
[  356.874151][T22111] netlink: 'syz.1.6113': attribute type 1 has an invalid length.
[  356.902349][T22107] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback.
[  356.943830][T22107] ext4 filesystem being mounted at /133/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff)
[  357.014017][T22121] dummy0: entered promiscuous mode
[  357.020003][T22121] bridge0: port 3(dummy0) entered blocking state
[  357.026520][T22121] bridge0: port 3(dummy0) entered disabled state
[  357.042149][T22121] dummy0: entered allmulticast mode
[  357.054414][T22121] bridge0: port 3(dummy0) entered blocking state
[  357.060907][T22121] bridge0: port 3(dummy0) entered forwarding state
[  357.128033][T19036] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000d40000.
[  357.361121][   T29] kauditd_printk_skb: 490 callbacks suppressed
[  357.361137][   T29] audit: type=1326 audit(1746707164.713:27913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22134 comm="syz.9.6122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f723074e969 code=0x7ffc0000
[  357.391066][   T29] audit: type=1326 audit(1746707164.713:27914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22134 comm="syz.9.6122" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f723074e969 code=0x7ffc0000
[  357.519596][   T29] audit: type=1326 audit(1746707164.753:27915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  357.543410][   T29] audit: type=1326 audit(1746707164.753:27916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  357.567089][   T29] audit: type=1326 audit(1746707164.763:27917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  357.590623][   T29] audit: type=1326 audit(1746707164.763:27918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  357.614220][   T29] audit: type=1326 audit(1746707164.763:27919): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  357.638130][   T29] audit: type=1326 audit(1746707164.763:27920): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  357.661630][   T29] audit: type=1326 audit(1746707164.763:27921): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  357.685227][   T29] audit: type=1326 audit(1746707164.783:27922): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22124 comm="syz.1.6119" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  357.793100][T22152] program syz.9.6128 is using a deprecated SCSI ioctl, please convert it to SG_IO
[  358.021767][T22180] FAULT_INJECTION: forcing a failure.
[  358.021767][T22180] name failslab, interval 1, probability 0, space 0, times 0
[  358.034585][T22180] CPU: 1 UID: 0 PID: 22180 Comm: syz.3.6140 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  358.034625][T22180] Tainted: [W]=WARN
[  358.034634][T22180] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  358.034656][T22180] Call Trace:
[  358.034663][T22180]  <TASK>
[  358.034739][T22180]  __dump_stack+0x1d/0x30
[  358.034766][T22180]  dump_stack_lvl+0xe8/0x140
[  358.034789][T22180]  dump_stack+0x15/0x1b
[  358.034810][T22180]  should_fail_ex+0x265/0x280
[  358.034850][T22180]  should_failslab+0x8c/0xb0
[  358.034913][T22180]  __kvmalloc_node_noprof+0x126/0x4d0
[  358.034934][T22180]  ? alloc_netdev_mqs+0x5ac/0xab0
[  358.034957][T22180]  ? netif_set_tso_max_size+0xc5/0xe0
[  358.034998][T22180]  alloc_netdev_mqs+0x5ac/0xab0
[  358.035024][T22180]  rtnl_create_link+0x239/0x710
[  358.035195][T22180]  rtnl_newlink_create+0x151/0x630
[  358.035230][T22180]  ? security_capable+0x83/0x90
[  358.035349][T22180]  ? netlink_ns_capable+0x86/0xa0
[  358.035385][T22180]  rtnl_newlink+0xf29/0x12d0
[  358.035473][T22180]  ? __pfx_rtnl_newlink+0x10/0x10
[  358.035558][T22180]  rtnetlink_rcv_msg+0x5fb/0x6d0
[  358.035590][T22180]  netlink_rcv_skb+0x120/0x220
[  358.035626][T22180]  ? __pfx_rtnetlink_rcv_msg+0x10/0x10
[  358.035719][T22180]  rtnetlink_rcv+0x1c/0x30
[  358.035740][T22180]  netlink_unicast+0x59e/0x670
[  358.035771][T22180]  netlink_sendmsg+0x58b/0x6b0
[  358.035806][T22180]  ? __pfx_netlink_sendmsg+0x10/0x10
[  358.035907][T22180]  __sock_sendmsg+0x142/0x180
[  358.035968][T22180]  ____sys_sendmsg+0x31e/0x4e0
[  358.035990][T22180]  ___sys_sendmsg+0x17b/0x1d0
[  358.036086][T22180]  __x64_sys_sendmsg+0xd4/0x160
[  358.036110][T22180]  x64_sys_call+0x2999/0x2fb0
[  358.036238][T22180]  do_syscall_64+0xd0/0x1a0
[  358.036260][T22180]  ? clear_bhb_loop+0x25/0x80
[  358.036282][T22180]  ? clear_bhb_loop+0x25/0x80
[  358.036304][T22180]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  358.036351][T22180] RIP: 0033:0x7f000391e969
[  358.036366][T22180] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  358.036384][T22180] RSP: 002b:00007f0001f87038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  358.036404][T22180] RAX: ffffffffffffffda RBX: 00007f0003b45fa0 RCX: 00007f000391e969
[  358.036473][T22180] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000006
[  358.036486][T22180] RBP: 00007f0001f87090 R08: 0000000000000000 R09: 0000000000000000
[  358.036498][T22180] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  358.036510][T22180] R13: 0000000000000000 R14: 00007f0003b45fa0 R15: 00007ffea23b9fb8
[  358.036599][T22180]  </TASK>
[  358.317785][T22185] validate_nla: 1 callbacks suppressed
[  358.317804][T22185] netlink: 'syz.9.6142': attribute type 13 has an invalid length.
[  358.335316][T22185] netlink: 'syz.9.6142': attribute type 1 has an invalid length.
[  358.364342][T22184] netlink: 'syz.1.6141': attribute type 10 has an invalid length.
[  358.397404][T22184] dummy0: entered promiscuous mode
[  358.429695][T22191] loop9: detected capacity change from 0 to 512
[  358.431498][T22184] bridge0: port 3(dummy0) entered blocking state
[  358.443091][T22184] bridge0: port 3(dummy0) entered disabled state
[  358.461528][T22191] EXT4-fs (loop9): invalid journal inode
[  358.466754][T22196] loop3: detected capacity change from 0 to 1024
[  358.467199][T22191] EXT4-fs (loop9): can't get journal size
[  358.530608][T22196] EXT4-fs: inline encryption not supported
[  358.538940][T22184] dummy0: entered allmulticast mode
[  358.544640][T22196] EXT4-fs: Ignoring removed bh option
[  358.556883][T22191] EXT4-fs (loop9): 1 truncate cleaned up
[  358.575774][T22191] EXT4-fs (loop9): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  358.612348][T22196] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
[  358.635892][T22191] EXT4-fs (loop9): re-mounted 00000000-0000-0000-0000-000000000000.
[  358.701155][T19036] EXT4-fs error (device loop9): ext4_lookup:1789: inode #14: comm syz-executor: invalid fast symlink length 39
[  358.729612][T19036] EXT4-fs error (device loop9): ext4_lookup:1789: inode #14: comm syz-executor: invalid fast symlink length 39
[  358.753624][T19317] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  359.031801][T22197] EXT4-fs (loop9): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  359.318665][T22222] siw: device registration error -23
[  359.405216][T22222] __nla_validate_parse: 42 callbacks suppressed
[  359.405237][T22222] netlink: 188 bytes leftover after parsing attributes in process `syz.3.6154'.
[  359.442211][T14051] dummy0: left allmulticast mode
[  359.447376][T14051] bridge0: port 2(dummy0) entered disabled state
[  359.497317][T14051] bridge_slave_0: left allmulticast mode
[  359.503032][T14051] bridge_slave_0: left promiscuous mode
[  359.508821][T14051] bridge0: port 1(bridge_slave_0) entered disabled state
[  359.716044][T14051] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  359.740078][T14051] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  359.766831][T14051] bond0 (unregistering): Released all slaves
[  359.786929][T14051] bond1 (unregistering): Released all slaves
[  359.864225][T14051] batman_adv: batadv0: Removing interface: batadv_slave_0
[  359.896597][T14051] batman_adv: batadv0: Removing interface: batadv_slave_1
[  359.914376][T22245] netlink: 'syz.1.6161': attribute type 10 has an invalid length.
[  359.922301][T22245] netlink: 40 bytes leftover after parsing attributes in process `syz.1.6161'.
[  360.024166][T14051] team0 (unregistering): Port device team_slave_1 removed
[  360.041695][T14051] team0 (unregistering): Port device team_slave_0 removed
[  360.302250][T22258] netlink: 48 bytes leftover after parsing attributes in process `syz.3.6164'.
[  360.414709][T22235] chnl_net:caif_netlink_parms(): no params data found
[  360.518844][T22278] siw: device registration error -23
[  360.534284][T22278] netlink: 188 bytes leftover after parsing attributes in process `syz.3.6171'.
[  360.558516][T22235] bridge0: port 1(bridge_slave_0) entered blocking state
[  360.565689][T22235] bridge0: port 1(bridge_slave_0) entered disabled state
[  360.574879][T22235] bridge_slave_0: entered allmulticast mode
[  360.581717][T22235] bridge_slave_0: entered promiscuous mode
[  360.588779][T22235] bridge0: port 2(bridge_slave_1) entered blocking state
[  360.595961][T22235] bridge0: port 2(bridge_slave_1) entered disabled state
[  360.604874][T22235] bridge_slave_1: entered allmulticast mode
[  360.612116][T22235] bridge_slave_1: entered promiscuous mode
[  360.632333][T22235] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  360.639940][T22283] program syz.3.6173 is using a deprecated SCSI ioctl, please convert it to SG_IO
[  360.643578][T22235] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  360.673878][T22235] team0: Port device team_slave_0 added
[  360.680702][T22235] team0: Port device team_slave_1 added
[  360.699785][T22235] batman_adv: batadv0: Adding interface: batadv_slave_0
[  360.706793][T22235] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  360.732903][T22235] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  360.744432][T22235] batman_adv: batadv0: Adding interface: batadv_slave_1
[  360.751581][T22235] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  360.777498][T22235] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  360.807067][T22235] hsr_slave_0: entered promiscuous mode
[  360.813849][T22235] hsr_slave_1: entered promiscuous mode
[  360.819890][T22235] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  360.827482][T22235] Cannot create hsr debugfs directory
[  361.002704][T22303] SELinux: syz.1.6182 (22303) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace.
[  361.016574][T22303] FAULT_INJECTION: forcing a failure.
[  361.016574][T22303] name failslab, interval 1, probability 0, space 0, times 0
[  361.029246][T22303] CPU: 0 UID: 0 PID: 22303 Comm: syz.1.6182 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  361.029308][T22303] Tainted: [W]=WARN
[  361.029317][T22303] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  361.029333][T22303] Call Trace:
[  361.029341][T22303]  <TASK>
[  361.029351][T22303]  __dump_stack+0x1d/0x30
[  361.029375][T22303]  dump_stack_lvl+0xe8/0x140
[  361.029392][T22303]  dump_stack+0x15/0x1b
[  361.029407][T22303]  should_fail_ex+0x265/0x280
[  361.029552][T22303]  should_failslab+0x8c/0xb0
[  361.029597][T22303]  __kmalloc_node_track_caller_noprof+0xa4/0x410
[  361.029693][T22303]  ? security_context_to_sid_core+0x69/0x3b0
[  361.029743][T22303]  kmemdup_nul+0x36/0xc0
[  361.029821][T22303]  security_context_to_sid_core+0x69/0x3b0
[  361.029935][T22303]  security_context_str_to_sid+0x33/0x40
[  361.029972][T22303]  sel_write_user+0x1ee/0x440
[  361.029999][T22303]  selinux_transaction_write+0xc3/0x110
[  361.030062][T22303]  ? __pfx_selinux_transaction_write+0x10/0x10
[  361.030117][T22303]  vfs_write+0x266/0x8d0
[  361.030144][T22303]  ? __rcu_read_unlock+0x4f/0x70
[  361.030165][T22303]  ? __fget_files+0x184/0x1c0
[  361.030193][T22303]  ksys_write+0xda/0x1a0
[  361.030223][T22303]  __x64_sys_write+0x40/0x50
[  361.030317][T22303]  x64_sys_call+0x2cdd/0x2fb0
[  361.030361][T22303]  do_syscall_64+0xd0/0x1a0
[  361.030389][T22303]  ? clear_bhb_loop+0x25/0x80
[  361.030417][T22303]  ? clear_bhb_loop+0x25/0x80
[  361.030461][T22303]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  361.030487][T22303] RIP: 0033:0x7fd57aa8e969
[  361.030567][T22303] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  361.030587][T22303] RSP: 002b:00007fd5790f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  361.030605][T22303] RAX: ffffffffffffffda RBX: 00007fd57acb5fa0 RCX: 00007fd57aa8e969
[  361.030617][T22303] RDX: 0000000000000024 RSI: 0000200000000740 RDI: 0000000000000006
[  361.030628][T22303] RBP: 00007fd5790f7090 R08: 0000000000000000 R09: 0000000000000000
[  361.030684][T22303] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  361.030695][T22303] R13: 0000000000000000 R14: 00007fd57acb5fa0 R15: 00007fffd76dfb48
[  361.030712][T22303]  </TASK>
[  361.357767][T22320] netlink: 100 bytes leftover after parsing attributes in process `syz.2.6190'.
[  361.367308][T22320] SELinux: syz.2.6190 (22320) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace.
[  361.395055][T22235] netdevsim netdevsim5 netdevsim0: renamed from eth0
[  361.413179][T22235] netdevsim netdevsim5 netdevsim1: renamed from eth1
[  361.426149][T22235] netdevsim netdevsim5 netdevsim2: renamed from eth2
[  361.440899][T22235] netdevsim netdevsim5 netdevsim3: renamed from eth3
[  361.486218][T22235] 8021q: adding VLAN 0 to HW filter on device bond0
[  361.501683][T22235] 8021q: adding VLAN 0 to HW filter on device team0
[  361.512744][   T31] bridge0: port 1(bridge_slave_0) entered blocking state
[  361.519943][   T31] bridge0: port 1(bridge_slave_0) entered forwarding state
[  361.531517][   T31] bridge0: port 2(bridge_slave_1) entered blocking state
[  361.538724][   T31] bridge0: port 2(bridge_slave_1) entered forwarding state
[  361.613321][T22235] 8021q: adding VLAN 0 to HW filter on device batadv0
[  361.723445][T22235] veth0_vlan: entered promiscuous mode
[  361.732271][T22235] veth1_vlan: entered promiscuous mode
[  361.749179][T22235] veth0_macvtap: entered promiscuous mode
[  361.757802][T22235] veth1_macvtap: entered promiscuous mode
[  361.769318][T22235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[  361.779915][T22235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  361.789792][T22235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[  361.800363][T22235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  361.810223][T22235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[  361.820751][T22235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  361.833321][T22235] batman_adv: batadv0: Interface activated: batadv_slave_0
[  361.845838][T22235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[  361.856409][T22235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  361.866309][T22235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[  361.877037][T22235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  361.887025][T22235] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[  361.897710][T22235] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  361.909264][T22235] batman_adv: batadv0: Interface activated: batadv_slave_1
[  361.920052][T22235] netdevsim netdevsim5 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  361.928916][T22235] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  361.937768][T22235] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  361.946775][T22235] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  362.079164][T22382] loop5: detected capacity change from 0 to 764
[  362.130782][T22386] loop5: detected capacity change from 0 to 512
[  362.142680][T22386] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback.
[  362.155674][T22386] ext4 filesystem being mounted at /4/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff)
[  362.200856][T22235] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000d40000.
[  362.225205][T22391] netlink: 48 bytes leftover after parsing attributes in process `syz.1.6209'.
[  362.283657][T22398] loop5: detected capacity change from 0 to 512
[  362.305499][T22401] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6213'.
[  362.309970][T22398] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback.
[  362.314531][T22401] netlink: 32 bytes leftover after parsing attributes in process `syz.3.6213'.
[  362.327866][T22398] ext4 filesystem being mounted at /7/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff)
[  362.336011][T22401] netlink: 28 bytes leftover after parsing attributes in process `syz.3.6213'.
[  362.382353][T22401] netlink: 32 bytes leftover after parsing attributes in process `syz.3.6213'.
[  362.393885][T22235] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000d40000.
[  362.433230][T22409] bridge0: port 4(macvlan2) entered blocking state
[  362.439975][T22409] bridge0: port 4(macvlan2) entered disabled state
[  362.446731][T22409] macvlan2: entered allmulticast mode
[  362.453176][T22409] macvlan2: left allmulticast mode
[  362.511594][   T29] kauditd_printk_skb: 308 callbacks suppressed
[  362.511612][   T29] audit: type=1326 audit(1746707169.864:28231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe92308e969 code=0x7ffc0000
[  362.548763][   T29] audit: type=1326 audit(1746707169.894:28232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=36 compat=0 ip=0x7fe92308e969 code=0x7ffc0000
[  362.572643][   T29] audit: type=1326 audit(1746707169.894:28233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe92308e969 code=0x7ffc0000
[  362.596316][   T29] audit: type=1326 audit(1746707169.894:28234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe92308e969 code=0x7ffc0000
[  362.620064][   T29] audit: type=1326 audit(1746707169.894:28235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fe92308e969 code=0x7ffc0000
[  362.643705][   T29] audit: type=1326 audit(1746707169.894:28236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe92308e969 code=0x7ffc0000
[  362.667411][   T29] audit: type=1326 audit(1746707169.894:28237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe92308e969 code=0x7ffc0000
[  362.691018][   T29] audit: type=1326 audit(1746707169.894:28238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7fe92308e969 code=0x7ffc0000
[  362.714659][   T29] audit: type=1326 audit(1746707169.894:28239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe92308e969 code=0x7ffc0000
[  362.738293][   T29] audit: type=1326 audit(1746707169.894:28240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22410 comm="syz.5.6216" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fe92308e969 code=0x7ffc0000
[  362.765424][T22424] netlink: 'syz.1.6222': attribute type 10 has an invalid length.
[  362.782899][T22424] hsr_slave_0: left promiscuous mode
[  362.792004][T22424] hsr_slave_1: left promiscuous mode
[  363.055354][T22450] only policy match revision 0 supported
[  363.055369][T22450] unable to load match
[  363.254646][T22472] netlink: 'syz.1.6242': attribute type 13 has an invalid length.
[  363.269121][T22472] netlink: 'syz.1.6242': attribute type 1 has an invalid length.
[  363.295047][T22474] program syz.2.6243 is using a deprecated SCSI ioctl, please convert it to SG_IO
[  363.322820][T22479] loop5: detected capacity change from 0 to 764
[  363.345546][T22479] FAULT_INJECTION: forcing a failure.
[  363.345546][T22479] name failslab, interval 1, probability 0, space 0, times 0
[  363.358315][T22479] CPU: 1 UID: 0 PID: 22479 Comm: syz.5.6245 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  363.358427][T22479] Tainted: [W]=WARN
[  363.358434][T22479] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  363.358446][T22479] Call Trace:
[  363.358453][T22479]  <TASK>
[  363.358461][T22479]  __dump_stack+0x1d/0x30
[  363.358486][T22479]  dump_stack_lvl+0xe8/0x140
[  363.358505][T22479]  dump_stack+0x15/0x1b
[  363.358521][T22479]  should_fail_ex+0x265/0x280
[  363.358559][T22479]  ? sctp_add_bind_addr+0x71/0x1e0
[  363.358591][T22479]  should_failslab+0x8c/0xb0
[  363.358668][T22479]  __kmalloc_cache_noprof+0x4c/0x320
[  363.358692][T22479]  sctp_add_bind_addr+0x71/0x1e0
[  363.358724][T22479]  sctp_copy_local_addr_list+0x199/0x220
[  363.358753][T22479]  sctp_copy_one_addr+0x7f/0x280
[  363.358865][T22479]  sctp_bind_addr_copy+0x79/0x290
[  363.358898][T22479]  sctp_assoc_set_bind_addr_from_ep+0xce/0xe0
[  363.358929][T22479]  sctp_connect_new_asoc+0x1c3/0x3a0
[  363.358969][T22479]  sctp_sendmsg+0xf10/0x18d0
[  363.359118][T22479]  ? selinux_socket_sendmsg+0x141/0x1b0
[  363.359151][T22479]  ? __pfx_sctp_sendmsg+0x10/0x10
[  363.359191][T22479]  inet_sendmsg+0xc2/0xd0
[  363.359224][T22479]  __sock_sendmsg+0x102/0x180
[  363.359270][T22479]  ____sys_sendmsg+0x345/0x4e0
[  363.359291][T22479]  ___sys_sendmsg+0x17b/0x1d0
[  363.359323][T22479]  __sys_sendmmsg+0x178/0x300
[  363.359361][T22479]  __x64_sys_sendmmsg+0x57/0x70
[  363.359387][T22479]  x64_sys_call+0x2f2f/0x2fb0
[  363.359443][T22479]  do_syscall_64+0xd0/0x1a0
[  363.359470][T22479]  ? clear_bhb_loop+0x25/0x80
[  363.359496][T22479]  ? clear_bhb_loop+0x25/0x80
[  363.359569][T22479]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  363.359594][T22479] RIP: 0033:0x7fe92308e969
[  363.359664][T22479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  363.359682][T22479] RSP: 002b:00007fe9216f7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133
[  363.359700][T22479] RAX: ffffffffffffffda RBX: 00007fe9232b5fa0 RCX: 00007fe92308e969
[  363.359721][T22479] RDX: 0000000000000002 RSI: 0000200000000880 RDI: 0000000000000004
[  363.359797][T22479] RBP: 00007fe9216f7090 R08: 0000000000000000 R09: 0000000000000000
[  363.359851][T22479] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  363.359863][T22479] R13: 0000000000000000 R14: 00007fe9232b5fa0 R15: 00007ffef84b5458
[  363.359881][T22479]  </TASK>
[  363.709870][T22499] netlink: 'syz.3.6253': attribute type 10 has an invalid length.
[  363.718502][T22499] dummy0: entered promiscuous mode
[  363.724604][T22499] bridge0: port 3(dummy0) entered blocking state
[  363.731021][T22499] bridge0: port 3(dummy0) entered disabled state
[  363.740132][T22499] dummy0: entered allmulticast mode
[  363.746154][T22499] bridge0: port 3(dummy0) entered blocking state
[  363.752667][T22499] bridge0: port 3(dummy0) entered forwarding state
[  363.881143][T22518] program syz.2.6261 is using a deprecated SCSI ioctl, please convert it to SG_IO
[  364.079342][T22529] FAULT_INJECTION: forcing a failure.
[  364.079342][T22529] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  364.092545][T22529] CPU: 0 UID: 0 PID: 22529 Comm: syz.0.6265 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  364.092623][T22529] Tainted: [W]=WARN
[  364.092630][T22529] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  364.092707][T22529] Call Trace:
[  364.092716][T22529]  <TASK>
[  364.092726][T22529]  __dump_stack+0x1d/0x30
[  364.092784][T22529]  dump_stack_lvl+0xe8/0x140
[  364.092847][T22529]  dump_stack+0x15/0x1b
[  364.092867][T22529]  should_fail_ex+0x265/0x280
[  364.092898][T22529]  should_fail+0xb/0x20
[  364.092926][T22529]  should_fail_usercopy+0x1a/0x20
[  364.093011][T22529]  _copy_from_user+0x1c/0xb0
[  364.093062][T22529]  ___sys_recvmsg+0xaa/0x370
[  364.093089][T22529]  do_recvmmsg+0x1ef/0x540
[  364.093117][T22529]  ? fput+0x8f/0xc0
[  364.093133][T22529]  __x64_sys_recvmmsg+0xe5/0x170
[  364.093153][T22529]  x64_sys_call+0x1c6a/0x2fb0
[  364.093185][T22529]  do_syscall_64+0xd0/0x1a0
[  364.093208][T22529]  ? clear_bhb_loop+0x25/0x80
[  364.093227][T22529]  ? clear_bhb_loop+0x25/0x80
[  364.093246][T22529]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  364.093290][T22529] RIP: 0033:0x7feaedfce969
[  364.093351][T22529] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  364.093411][T22529] RSP: 002b:00007feaec637038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[  364.093429][T22529] RAX: ffffffffffffffda RBX: 00007feaee1f5fa0 RCX: 00007feaedfce969
[  364.093484][T22529] RDX: 0000000000000700 RSI: 0000200000001140 RDI: 0000000000000004
[  364.093495][T22529] RBP: 00007feaec637090 R08: 0000000000000000 R09: 0000000000000000
[  364.093506][T22529] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[  364.093516][T22529] R13: 0000000000000000 R14: 00007feaee1f5fa0 R15: 00007fff07bc0078
[  364.093533][T22529]  </TASK>
[  364.319098][T22535] netlink: 'syz.0.6268': attribute type 10 has an invalid length.
[  364.327034][T22535] dummy0: entered promiscuous mode
[  364.333318][T22535] bridge0: port 3(dummy0) entered blocking state
[  364.339884][T22535] bridge0: port 3(dummy0) entered disabled state
[  364.347792][T22535] dummy0: entered allmulticast mode
[  364.353745][T22537] netlink: 'syz.2.6269': attribute type 13 has an invalid length.
[  364.354009][T22535] bridge0: port 3(dummy0) entered blocking state
[  364.367993][T22535] bridge0: port 3(dummy0) entered forwarding state
[  364.419617][T22543] siw: device registration error -23
[  364.423602][T22537] bridge0: port 3(dummy0) entered disabled state
[  364.432023][T22537] bridge0: port 2(bridge_slave_1) entered disabled state
[  364.439212][T22537] bridge0: port 1(bridge_slave_0) entered disabled state
[  364.446723][T22541] ALSA: seq fatal error: cannot create timer (-19)
[  364.448699][T22543] __nla_validate_parse: 13 callbacks suppressed
[  364.448722][T22543] netlink: 188 bytes leftover after parsing attributes in process `syz.0.6271'.
[  364.488910][T22546] FAULT_INJECTION: forcing a failure.
[  364.488910][T22546] name failslab, interval 1, probability 0, space 0, times 0
[  364.501752][T22546] CPU: 1 UID: 0 PID: 22546 Comm: syz.1.6272 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  364.501926][T22546] Tainted: [W]=WARN
[  364.501935][T22546] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  364.501947][T22546] Call Trace:
[  364.501953][T22546]  <TASK>
[  364.501961][T22546]  __dump_stack+0x1d/0x30
[  364.501983][T22546]  dump_stack_lvl+0xe8/0x140
[  364.502002][T22546]  dump_stack+0x15/0x1b
[  364.502091][T22546]  should_fail_ex+0x265/0x280
[  364.502131][T22546]  should_failslab+0x8c/0xb0
[  364.502261][T22546]  __kmalloc_node_track_caller_noprof+0xa4/0x410
[  364.502289][T22546]  ? sidtab_sid2str_get+0xa0/0x130
[  364.502334][T22546]  kmemdup_noprof+0x2b/0x70
[  364.502358][T22546]  sidtab_sid2str_get+0xa0/0x130
[  364.502443][T22546]  security_sid_to_context_core+0x1eb/0x2e0
[  364.502477][T22546]  security_sid_to_context+0x27/0x40
[  364.502502][T22546]  selinux_lsmprop_to_secctx+0x67/0xf0
[  364.502604][T22546]  security_lsmprop_to_secctx+0x43/0x80
[  364.502691][T22546]  audit_log_task_context+0x77/0x190
[  364.502794][T22546]  audit_log_task+0xf4/0x250
[  364.502822][T22546]  audit_seccomp+0x61/0x100
[  364.502844][T22546]  ? __seccomp_filter+0x68c/0x10d0
[  364.502875][T22546]  __seccomp_filter+0x69d/0x10d0
[  364.502915][T22546]  ? __pfx_proc_fail_nth_write+0x10/0x10
[  364.502951][T22537] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[  364.502948][T22546]  ? vfs_write+0x75e/0x8d0
[  364.502991][T22546]  ? __rcu_read_unlock+0x4f/0x70
[  364.503020][T22546]  ? __fget_files+0x184/0x1c0
[  364.503060][T22546]  __secure_computing+0x82/0x150
[  364.503088][T22546]  syscall_trace_enter+0xcf/0x1e0
[  364.503171][T22546]  do_syscall_64+0xaa/0x1a0
[  364.503211][T22546]  ? clear_bhb_loop+0x25/0x80
[  364.503239][T22546]  ? clear_bhb_loop+0x25/0x80
[  364.503267][T22546]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  364.503294][T22546] RIP: 0033:0x7fd57aa8e969
[  364.503315][T22546] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  364.503348][T22546] RSP: 002b:00007fd5790f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fd
[  364.503373][T22546] RAX: ffffffffffffffda RBX: 00007fd57acb5fa0 RCX: 00007fd57aa8e969
[  364.503389][T22546] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000
[  364.503429][T22546] RBP: 00007fd5790f7090 R08: 0000000000000000 R09: 0000000000000000
[  364.503444][T22546] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  364.503460][T22546] R13: 0000000000000000 R14: 00007fd57acb5fa0 R15: 00007fffd76dfb48
[  364.503485][T22546]  </TASK>
[  364.766038][T22537] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[  364.797954][T22537] netdevsim netdevsim2 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0
[  364.807193][T22537] netdevsim netdevsim2 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0
[  364.816303][T22537] netdevsim netdevsim2 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0
[  364.825259][T22537] netdevsim netdevsim2 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0
[  364.838413][ T3394] syz1: Port: 1 Link DOWN
[  364.935162][T22561] netlink: 'syz.3.6277': attribute type 13 has an invalid length.
[  364.936806][T22556] bond1: entered promiscuous mode
[  364.948143][T22556] bond1: entered allmulticast mode
[  364.953792][T22556] 8021q: adding VLAN 0 to HW filter on device bond1
[  364.962999][T22556] bond1 (unregistering): Released all slaves
[  364.983779][T22570] netlink: 'syz.3.6277': attribute type 1 has an invalid length.
[  364.991608][T22570] netlink: 199820 bytes leftover after parsing attributes in process `syz.3.6277'.
[  365.023013][T22558] netlink: 4 bytes leftover after parsing attributes in process `syz.0.6276'.
[  365.042127][T22561] bridge0: port 3(dummy0) entered disabled state
[  365.048732][T22561] bridge0: port 2(bridge_slave_1) entered disabled state
[  365.056101][T22561] bridge0: port 1(bridge_slave_0) entered disabled state
[  365.074834][T22577] SELinux:  Context system_u:object_r:net_conf_t:s0 is not valid (left unmapped).
[  365.111318][T22561] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[  365.121781][T22561] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[  365.153041][T22561] netdevsim netdevsim3 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0
[  365.162306][T22561] netdevsim netdevsim3 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0
[  365.171466][T22561] netdevsim netdevsim3 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0
[  365.180479][T22561] netdevsim netdevsim3 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0
[  365.204289][T22567] bond_slave_1: entered promiscuous mode
[  365.232797][T22558] bond0: (slave bond_slave_1): Releasing backup interface
[  365.243446][T22558] bond_slave_1 (unregistering): left promiscuous mode
[  365.275017][T22586] netlink: 188 bytes leftover after parsing attributes in process `syz.2.6285'.
[  365.292564][T22587] FAULT_INJECTION: forcing a failure.
[  365.292564][T22587] name failslab, interval 1, probability 0, space 0, times 0
[  365.305441][T22587] CPU: 0 UID: 0 PID: 22587 Comm: syz.3.6282 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  365.305479][T22587] Tainted: [W]=WARN
[  365.305485][T22587] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  365.305498][T22587] Call Trace:
[  365.305503][T22587]  <TASK>
[  365.305555][T22587]  __dump_stack+0x1d/0x30
[  365.305581][T22587]  dump_stack_lvl+0xe8/0x140
[  365.305600][T22587]  dump_stack+0x15/0x1b
[  365.305616][T22587]  should_fail_ex+0x265/0x280
[  365.305681][T22587]  should_failslab+0x8c/0xb0
[  365.305711][T22587]  __kmalloc_node_track_caller_noprof+0xa4/0x410
[  365.305771][T22587]  ? sidtab_sid2str_get+0xa0/0x130
[  365.305821][T22587]  kmemdup_noprof+0x2b/0x70
[  365.305840][T22587]  sidtab_sid2str_get+0xa0/0x130
[  365.305868][T22587]  security_sid_to_context_core+0x1eb/0x2e0
[  365.305921][T22587]  security_sid_to_context+0x27/0x40
[  365.306010][T22587]  selinux_lsmprop_to_secctx+0x67/0xf0
[  365.306044][T22587]  security_lsmprop_to_secctx+0x43/0x80
[  365.306065][T22587]  audit_log_task_context+0x77/0x190
[  365.306136][T22587]  audit_log_task+0xf4/0x250
[  365.306171][T22587]  audit_seccomp+0x61/0x100
[  365.306217][T22587]  ? __seccomp_filter+0x68c/0x10d0
[  365.306237][T22587]  __seccomp_filter+0x69d/0x10d0
[  365.306268][T22587]  ? __pfx_proc_fail_nth_write+0x10/0x10
[  365.306324][T22587]  ? vfs_write+0x75e/0x8d0
[  365.306412][T22587]  ? __rcu_read_unlock+0x4f/0x70
[  365.306434][T22587]  ? __fget_files+0x184/0x1c0
[  365.306466][T22587]  __secure_computing+0x82/0x150
[  365.306492][T22587]  syscall_trace_enter+0xcf/0x1e0
[  365.306523][T22587]  do_syscall_64+0xaa/0x1a0
[  365.306589][T22587]  ? clear_bhb_loop+0x25/0x80
[  365.306609][T22587]  ? clear_bhb_loop+0x25/0x80
[  365.306654][T22587]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  365.306675][T22587] RIP: 0033:0x7f000391e969
[  365.306689][T22587] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  365.306706][T22587] RSP: 002b:00007f0001f66038 EFLAGS: 00000246 ORIG_RAX: 0000000000000013
[  365.306735][T22587] RAX: ffffffffffffffda RBX: 00007f0003b46080 RCX: 00007f000391e969
[  365.306751][T22587] RDX: 0000000000000001 RSI: 0000200000000000 RDI: 0000000000000005
[  365.306767][T22587] RBP: 00007f0001f66090 R08: 0000000000000000 R09: 0000000000000000
[  365.306779][T22587] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  365.306791][T22587] R13: 0000000000000000 R14: 00007f0003b46080 R15: 00007ffea23b9fb8
[  365.306809][T22587]  </TASK>
[  365.562070][T22589] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6286'.
[  365.579818][T22589] netem: change failed
[  365.912551][T22617] siw: device registration error -23
[  365.919562][T22617] netlink: 188 bytes leftover after parsing attributes in process `syz.5.6296'.
[  365.960283][T22620] netlink: 48 bytes leftover after parsing attributes in process `syz.1.6297'.
[  366.156604][T22636] loop5: detected capacity change from 0 to 512
[  366.177718][T22638] only policy match revision 0 supported
[  366.177766][T22638] unable to load match
[  366.190537][T22636] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback.
[  366.203678][T22636] ext4 filesystem being mounted at /22/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff)
[  366.251001][T22235] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000d40000.
[  366.281871][T22646] siw: device registration error -23
[  366.288506][T22646] netlink: 188 bytes leftover after parsing attributes in process `syz.1.6309'.
[  366.379660][T22654] netlink: 76 bytes leftover after parsing attributes in process `syz.1.6313'.
[  366.437919][T22667] netlink: 'syz.1.6318': attribute type 13 has an invalid length.
[  366.455884][T22667] netlink: 'syz.1.6318': attribute type 1 has an invalid length.
[  366.463798][T22667] netlink: 199820 bytes leftover after parsing attributes in process `syz.1.6318'.
[  366.517778][T22671] loop5: detected capacity change from 0 to 512
[  366.540251][T22671] EXT4-fs (loop5): invalid journal inode
[  366.546075][T22671] EXT4-fs (loop5): can't get journal size
[  366.572355][T22677] only policy match revision 0 supported
[  366.572370][T22677] unable to load match
[  366.587910][T22671] EXT4-fs (loop5): 1 truncate cleaned up
[  366.601341][T22671] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  366.674050][T22235] EXT4-fs error (device loop5): ext4_lookup:1789: inode #14: comm syz-executor: invalid fast symlink length 39
[  366.749450][T22235] EXT4-fs error (device loop5): ext4_lookup:1789: inode #14: comm syz-executor: invalid fast symlink length 39
[  366.795915][T22686] IPv6: Can't replace route, no match found
[  366.838925][T22675] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  366.910000][T22697] netlink: 'syz.2.6331': attribute type 13 has an invalid length.
[  366.919857][T22697] netlink: 'syz.2.6331': attribute type 1 has an invalid length.
[  367.057535][ T3434] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  367.094812][T22709] netlink: 'syz.3.6335': attribute type 13 has an invalid length.
[  367.111982][ T3434] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  367.204031][ T3434] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  367.263061][ T3434] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[  367.367701][ T3434] bridge_slave_1: left allmulticast mode
[  367.373572][ T3434] bridge_slave_1: left promiscuous mode
[  367.379841][ T3434] bridge0: port 2(bridge_slave_1) entered disabled state
[  367.387940][ T3434] bridge_slave_0: left allmulticast mode
[  367.393706][ T3434] bridge_slave_0: left promiscuous mode
[  367.399657][ T3434] bridge0: port 1(bridge_slave_0) entered disabled state
[  367.482113][ T3434] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  367.492122][ T3434] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  367.502552][ T3434] bond0 (unregistering): Released all slaves
[  367.550089][   T29] kauditd_printk_skb: 703 callbacks suppressed
[  367.550107][   T29] audit: type=1326 audit(1746707174.905:28942): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  367.580178][   T29] audit: type=1326 audit(1746707174.905:28943): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  367.604197][   T29] audit: type=1326 audit(1746707174.905:28944): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=2 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  367.612924][T22715] chnl_net:caif_netlink_parms(): no params data found
[  367.627603][   T29] audit: type=1326 audit(1746707174.905:28945): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  367.627640][   T29] audit: type=1326 audit(1746707174.905:28946): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  367.627688][   T29] audit: type=1326 audit(1746707174.905:28947): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  367.627720][   T29] audit: type=1326 audit(1746707174.905:28948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  367.728963][   T29] audit: type=1326 audit(1746707174.905:28949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  367.752660][   T29] audit: type=1326 audit(1746707174.905:28950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  367.776233][   T29] audit: type=1326 audit(1746707174.905:28951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22728 comm="syz.1.6340" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  367.805807][ T3434] hsr_slave_0: left promiscuous mode
[  367.811633][ T3434] hsr_slave_1: left promiscuous mode
[  367.817262][ T3434] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[  367.824700][ T3434] batman_adv: batadv0: Removing interface: batadv_slave_0
[  367.832529][ T3434] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[  367.840035][ T3434] batman_adv: batadv0: Removing interface: batadv_slave_1
[  367.850877][ T3434] veth1_macvtap: left promiscuous mode
[  367.856422][ T3434] veth0_macvtap: left promiscuous mode
[  367.862138][ T3434] veth1_vlan: left promiscuous mode
[  367.869751][ T3434] veth0_vlan: left promiscuous mode
[  367.880258][T22736] SELinux: syz.0.6341 (22736) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace.
[  367.957469][ T3434] team0 (unregistering): Port device team_slave_1 removed
[  367.967540][ T3434] team0 (unregistering): Port device team_slave_0 removed
[  368.032191][T22715] bridge0: port 1(bridge_slave_0) entered blocking state
[  368.039341][T22715] bridge0: port 1(bridge_slave_0) entered disabled state
[  368.046831][T22715] bridge_slave_0: entered allmulticast mode
[  368.057414][T22715] bridge_slave_0: entered promiscuous mode
[  368.079743][T22715] bridge0: port 2(bridge_slave_1) entered blocking state
[  368.079776][T22715] bridge0: port 2(bridge_slave_1) entered disabled state
[  368.079888][T22715] bridge_slave_1: entered allmulticast mode
[  368.081310][T22715] bridge_slave_1: entered promiscuous mode
[  368.127226][T22715] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  368.128876][T22715] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  368.165626][T22715] team0: Port device team_slave_0 added
[  368.166707][T22715] team0: Port device team_slave_1 added
[  368.215114][T22715] batman_adv: batadv0: Adding interface: batadv_slave_0
[  368.222250][T22715] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  368.248425][T22715] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  368.260474][T22715] batman_adv: batadv0: Adding interface: batadv_slave_1
[  368.267463][T22715] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  368.293494][T22715] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  368.324539][T22715] hsr_slave_0: entered promiscuous mode
[  368.330776][T22715] hsr_slave_1: entered promiscuous mode
[  368.336745][T22715] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[  368.344456][T22715] Cannot create hsr debugfs directory
[  368.459504][T22768] only policy match revision 0 supported
[  368.459519][T22768] unable to load match
[  368.543116][T22772] SELinux: syz.0.6354 (22772) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace.
[  368.595448][T22772] SELinux:  policydb version -2069960659 does not match my version range 15-34
[  368.604760][T22772] SELinux: failed to load policy
[  368.681233][T22776] bridge0: port 3(dummy0) entered disabled state
[  368.687830][T22776] bridge0: port 2(bridge_slave_1) entered disabled state
[  368.695072][T22776] bridge0: port 1(bridge_slave_0) entered disabled state
[  368.734388][T22776] batman_adv: batadv0: Interface deactivated: batadv_slave_0
[  368.744455][T22776] batman_adv: batadv0: Interface deactivated: batadv_slave_1
[  368.774833][T22776] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0
[  368.783858][T22776] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0
[  368.792892][T22776] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0
[  368.801919][T22776] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0
[  369.243330][T22715] netdevsim netdevsim6 netdevsim0: renamed from eth0
[  369.261704][T22715] netdevsim netdevsim6 netdevsim1: renamed from eth1
[  369.275210][T22715] netdevsim netdevsim6 netdevsim2: renamed from eth2
[  369.284779][T22715] netdevsim netdevsim6 netdevsim3: renamed from eth3
[  369.343250][T22715] 8021q: adding VLAN 0 to HW filter on device bond0
[  369.355155][T22812] validate_nla: 6 callbacks suppressed
[  369.355190][T22812] netlink: 'syz.2.6372': attribute type 10 has an invalid length.
[  369.371861][T22715] 8021q: adding VLAN 0 to HW filter on device team0
[  369.379355][T22812] hsr_slave_0: left promiscuous mode
[  369.385076][T22812] hsr_slave_1: left promiscuous mode
[  369.443908][T14051] bridge0: port 1(bridge_slave_0) entered blocking state
[  369.451122][T14051] bridge0: port 1(bridge_slave_0) entered forwarding state
[  369.468682][T14042] bridge0: port 2(bridge_slave_1) entered blocking state
[  369.475867][T14042] bridge0: port 2(bridge_slave_1) entered forwarding state
[  369.584798][T22715] 8021q: adding VLAN 0 to HW filter on device batadv0
[  369.673515][T22831] x_tables: ip6_tables: TCPOPTSTRIP target: only valid in mangle table, not raw
[  369.724682][T22715] veth0_vlan: entered promiscuous mode
[  369.733100][T22838] FAULT_INJECTION: forcing a failure.
[  369.733100][T22838] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  369.733332][T22715] veth1_vlan: entered promiscuous mode
[  369.746448][T22838] CPU: 1 UID: 0 PID: 22838 Comm: syz.2.6375 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  369.746537][T22838] Tainted: [W]=WARN
[  369.746546][T22838] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  369.746563][T22838] Call Trace:
[  369.746571][T22838]  <TASK>
[  369.746580][T22838]  __dump_stack+0x1d/0x30
[  369.746651][T22838]  dump_stack_lvl+0xe8/0x140
[  369.746676][T22838]  dump_stack+0x15/0x1b
[  369.746698][T22838]  should_fail_ex+0x265/0x280
[  369.746740][T22838]  should_fail+0xb/0x20
[  369.746802][T22838]  should_fail_usercopy+0x1a/0x20
[  369.746826][T22838]  _copy_from_user+0x1c/0xb0
[  369.746854][T22838]  do_ipv6_setsockopt+0x220/0x22e0
[  369.746883][T22838]  ? kstrtoull+0x111/0x140
[  369.746990][T22838]  ? __rcu_read_unlock+0x4f/0x70
[  369.747018][T22838]  ? avc_has_perm_noaudit+0x1b1/0x200
[  369.747064][T22838]  ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0
[  369.747110][T22838]  ipv6_setsockopt+0x59/0x130
[  369.747136][T22838]  tcp_setsockopt+0x95/0xb0
[  369.747175][T22838]  sock_common_setsockopt+0x66/0x80
[  369.747211][T22838]  ? __pfx_sock_common_setsockopt+0x10/0x10
[  369.747298][T22838]  __sys_setsockopt+0x181/0x200
[  369.747373][T22838]  __x64_sys_setsockopt+0x64/0x80
[  369.747416][T22838]  x64_sys_call+0x2bd5/0x2fb0
[  369.747444][T22838]  do_syscall_64+0xd0/0x1a0
[  369.747472][T22838]  ? clear_bhb_loop+0x25/0x80
[  369.747573][T22838]  ? clear_bhb_loop+0x25/0x80
[  369.747602][T22838]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  369.747713][T22838] RIP: 0033:0x7f191635e969
[  369.747733][T22838] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  369.747757][T22838] RSP: 002b:00007f19149c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[  369.747782][T22838] RAX: ffffffffffffffda RBX: 00007f1916585fa0 RCX: 00007f191635e969
[  369.747798][T22838] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000005
[  369.747814][T22838] RBP: 00007f19149c7090 R08: 0000000000000380 R09: 0000000000000000
[  369.747874][T22838] R10: 00002000000010c0 R11: 0000000000000246 R12: 0000000000000001
[  369.747891][T22838] R13: 0000000000000000 R14: 00007f1916585fa0 R15: 00007ffdceba1a48
[  369.747925][T22838]  </TASK>
[  369.989693][T22715] veth0_macvtap: entered promiscuous mode
[  369.997198][T22715] veth1_macvtap: entered promiscuous mode
[  370.008130][T22840] program syz.2.6376 is using a deprecated SCSI ioctl, please convert it to SG_IO
[  370.010216][T22715] batman_adv: batadv0: Interface activated: batadv_slave_0
[  370.052590][T22715] batman_adv: batadv0: Interface activated: batadv_slave_1
[  370.063540][T22715] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  370.072390][T22715] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  370.081248][T22715] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  370.090049][T22715] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  370.199279][T22851] siw: device registration error -23
[  370.215454][T22851] __nla_validate_parse: 18 callbacks suppressed
[  370.215492][T22851] netlink: 188 bytes leftover after parsing attributes in process `syz.1.6380'.
[  370.310237][T22857] netlink: 48 bytes leftover after parsing attributes in process `syz.6.6338'.
[  370.345078][T22860] netlink: 48 bytes leftover after parsing attributes in process `syz.1.6382'.
[  370.525841][T22882] siw: device registration error -23
[  370.534002][T22882] netlink: 188 bytes leftover after parsing attributes in process `syz.0.6392'.
[  370.548410][T22883] FAULT_INJECTION: forcing a failure.
[  370.548410][T22883] name failslab, interval 1, probability 0, space 0, times 0
[  370.561277][T22883] CPU: 0 UID: 0 PID: 22883 Comm: syz.6.6391 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  370.561316][T22883] Tainted: [W]=WARN
[  370.561324][T22883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  370.561419][T22883] Call Trace:
[  370.561427][T22883]  <TASK>
[  370.561436][T22883]  __dump_stack+0x1d/0x30
[  370.561463][T22883]  dump_stack_lvl+0xe8/0x140
[  370.561486][T22883]  dump_stack+0x15/0x1b
[  370.561521][T22883]  should_fail_ex+0x265/0x280
[  370.561562][T22883]  should_failslab+0x8c/0xb0
[  370.561643][T22883]  kmem_cache_alloc_noprof+0x50/0x310
[  370.561685][T22883]  ? security_inode_alloc+0x37/0x100
[  370.561713][T22883]  security_inode_alloc+0x37/0x100
[  370.561739][T22883]  inode_init_always_gfp+0x4b7/0x500
[  370.561848][T22883]  ? __pfx_shmem_alloc_inode+0x10/0x10
[  370.561909][T22883]  alloc_inode+0x58/0x170
[  370.561939][T22883]  new_inode+0x1d/0xe0
[  370.561970][T22883]  shmem_get_inode+0x244/0x750
[  370.562008][T22883]  __shmem_file_setup+0x122/0x1f0
[  370.562095][T22883]  shmem_file_setup+0x3b/0x50
[  370.562125][T22883]  __se_sys_memfd_create+0x2c3/0x590
[  370.562158][T22883]  __x64_sys_memfd_create+0x31/0x40
[  370.562208][T22883]  x64_sys_call+0x122f/0x2fb0
[  370.562231][T22883]  do_syscall_64+0xd0/0x1a0
[  370.562254][T22883]  ? clear_bhb_loop+0x25/0x80
[  370.562331][T22883]  ? clear_bhb_loop+0x25/0x80
[  370.562359][T22883]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  370.562386][T22883] RIP: 0033:0x7fec2965e969
[  370.562402][T22883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  370.562420][T22883] RSP: 002b:00007fec27ca5e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f
[  370.562458][T22883] RAX: ffffffffffffffda RBX: 000000000000045c RCX: 00007fec2965e969
[  370.562475][T22883] RDX: 00007fec27ca5ef0 RSI: 0000000000000000 RDI: 00007fec296e1444
[  370.562535][T22883] RBP: 0000200000002400 R08: 00007fec27ca5bb7 R09: 00007fec27ca5e40
[  370.562547][T22883] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000
[  370.562559][T22883] R13: 00007fec27ca5ef0 R14: 00007fec27ca5eb0 R15: 0000200000000680
[  370.562607][T22883]  </TASK>
[  370.881975][T22899] loop6: detected capacity change from 0 to 512
[  370.888952][T22898] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6400'.
[  370.898132][T22898] netlink: 32 bytes leftover after parsing attributes in process `syz.0.6400'.
[  370.907109][T22898] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6400'.
[  370.924429][T22898] netlink: 32 bytes leftover after parsing attributes in process `syz.0.6400'.
[  370.944690][T22899] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback.
[  370.962096][T22899] ext4 filesystem being mounted at /3/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff)
[  371.007248][T22907] netlink: 'syz.0.6403': attribute type 13 has an invalid length.
[  371.023410][T22907] netlink: 'syz.0.6403': attribute type 1 has an invalid length.
[  371.031269][T22907] netlink: 199820 bytes leftover after parsing attributes in process `syz.0.6403'.
[  371.041683][T22715] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000d40000.
[  371.084935][T22915] FAULT_INJECTION: forcing a failure.
[  371.084935][T22915] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  371.098102][T22915] CPU: 0 UID: 0 PID: 22915 Comm: syz.6.6405 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  371.098145][T22915] Tainted: [W]=WARN
[  371.098220][T22915] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  371.098269][T22915] Call Trace:
[  371.098278][T22915]  <TASK>
[  371.098288][T22915]  __dump_stack+0x1d/0x30
[  371.098357][T22915]  dump_stack_lvl+0xe8/0x140
[  371.098375][T22915]  dump_stack+0x15/0x1b
[  371.098390][T22915]  should_fail_ex+0x265/0x280
[  371.098429][T22915]  should_fail+0xb/0x20
[  371.098493][T22915]  should_fail_usercopy+0x1a/0x20
[  371.098512][T22915]  _copy_from_user+0x1c/0xb0
[  371.098532][T22915]  ___sys_sendmsg+0xc1/0x1d0
[  371.098566][T22915]  __x64_sys_sendmsg+0xd4/0x160
[  371.098595][T22915]  x64_sys_call+0x2999/0x2fb0
[  371.098696][T22915]  do_syscall_64+0xd0/0x1a0
[  371.098724][T22915]  ? clear_bhb_loop+0x25/0x80
[  371.098749][T22915]  ? clear_bhb_loop+0x25/0x80
[  371.098816][T22915]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  371.098843][T22915] RIP: 0033:0x7fec2965e969
[  371.098862][T22915] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  371.098882][T22915] RSP: 002b:00007fec27cc7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  371.098901][T22915] RAX: ffffffffffffffda RBX: 00007fec29885fa0 RCX: 00007fec2965e969
[  371.098913][T22915] RDX: 0000000000048002 RSI: 0000200000000080 RDI: 0000000000000006
[  371.098925][T22915] RBP: 00007fec27cc7090 R08: 0000000000000000 R09: 0000000000000000
[  371.098941][T22915] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  371.098952][T22915] R13: 0000000000000000 R14: 00007fec29885fa0 R15: 00007ffd76a676b8
[  371.098975][T22915]  </TASK>
[  371.300714][T22921] netlink: 28 bytes leftover after parsing attributes in process `syz.1.6408'.
[  371.340016][T22926] netlink: 'syz.3.6411': attribute type 10 has an invalid length.
[  371.348793][T22927] loop6: detected capacity change from 0 to 512
[  371.368471][T22927] EXT4-fs error (device loop6): ext4_iget_extra_inode:4693: inode #15: comm syz.6.6410: corrupted in-inode xattr: invalid ea_ino
[  371.400571][T22927] EXT4-fs error (device loop6): ext4_orphan_get:1396: comm syz.6.6410: couldn't read orphan inode 15 (err -117)
[  371.414479][T22927] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  371.485505][T22715] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  371.508942][T22942] netlink: 'syz.0.6417': attribute type 10 has an invalid length.
[  371.577310][T22948] sch_tbf: peakrate 64 is lower than or equals to rate 14020585672542658070 !
[  371.873297][T22974] FAULT_INJECTION: forcing a failure.
[  371.873297][T22974] name failslab, interval 1, probability 0, space 0, times 0
[  371.886113][T22974] CPU: 0 UID: 0 PID: 22974 Comm: syz.3.6430 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  371.886172][T22974] Tainted: [W]=WARN
[  371.886209][T22974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  371.886285][T22974] Call Trace:
[  371.886334][T22974]  <TASK>
[  371.886343][T22974]  __dump_stack+0x1d/0x30
[  371.886370][T22974]  dump_stack_lvl+0xe8/0x140
[  371.886394][T22974]  dump_stack+0x15/0x1b
[  371.886416][T22974]  should_fail_ex+0x265/0x280
[  371.886498][T22974]  should_failslab+0x8c/0xb0
[  371.886605][T22974]  kmem_cache_alloc_node_noprof+0x57/0x320
[  371.886694][T22974]  ? __alloc_skb+0x101/0x320
[  371.886733][T22974]  __alloc_skb+0x101/0x320
[  371.886830][T22974]  netlink_alloc_large_skb+0xba/0xf0
[  371.886860][T22974]  netlink_sendmsg+0x3cf/0x6b0
[  371.886962][T22974]  ? __pfx_netlink_sendmsg+0x10/0x10
[  371.887043][T22974]  __sock_sendmsg+0x142/0x180
[  371.887072][T22974]  ____sys_sendmsg+0x31e/0x4e0
[  371.887094][T22974]  ___sys_sendmsg+0x17b/0x1d0
[  371.887197][T22974]  __x64_sys_sendmsg+0xd4/0x160
[  371.887223][T22974]  x64_sys_call+0x2999/0x2fb0
[  371.887255][T22974]  do_syscall_64+0xd0/0x1a0
[  371.887284][T22974]  ? clear_bhb_loop+0x25/0x80
[  371.887311][T22974]  ? clear_bhb_loop+0x25/0x80
[  371.887339][T22974]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  371.887366][T22974] RIP: 0033:0x7f000391e969
[  371.887385][T22974] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  371.887473][T22974] RSP: 002b:00007f0001f87038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  371.887497][T22974] RAX: ffffffffffffffda RBX: 00007f0003b45fa0 RCX: 00007f000391e969
[  371.887594][T22974] RDX: 0000000000000000 RSI: 000020000000c2c0 RDI: 0000000000000004
[  371.887610][T22974] RBP: 00007f0001f87090 R08: 0000000000000000 R09: 0000000000000000
[  371.887626][T22974] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  371.887642][T22974] R13: 0000000000000000 R14: 00007f0003b45fa0 R15: 00007ffea23b9fb8
[  371.887712][T22974]  </TASK>
[  372.304972][T22988] loop3: detected capacity change from 0 to 512
[  372.332027][T22988] EXT4-fs (loop3): invalid journal inode
[  372.353852][T22988] EXT4-fs (loop3): can't get journal size
[  372.388588][T22988] EXT4-fs (loop3): 1 truncate cleaned up
[  372.404650][T22988] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  372.579859][T19317] EXT4-fs error (device loop3): ext4_lookup:1789: inode #14: comm syz-executor: invalid fast symlink length 39
[  372.646008][T19317] EXT4-fs error (device loop3): ext4_lookup:1789: inode #14: comm syz-executor: invalid fast symlink length 39
[  372.753361][T22994] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  372.764125][T23024] FAULT_INJECTION: forcing a failure.
[  372.764125][T23024] name failslab, interval 1, probability 0, space 0, times 0
[  372.776995][T23024] CPU: 0 UID: 0 PID: 23024 Comm: syz.2.6451 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  372.777043][T23024] Tainted: [W]=WARN
[  372.777051][T23024] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  372.777067][T23024] Call Trace:
[  372.777077][T23024]  <TASK>
[  372.777087][T23024]  __dump_stack+0x1d/0x30
[  372.777113][T23024]  dump_stack_lvl+0xe8/0x140
[  372.777139][T23024]  dump_stack+0x15/0x1b
[  372.777158][T23024]  should_fail_ex+0x265/0x280
[  372.777240][T23024]  should_failslab+0x8c/0xb0
[  372.777277][T23024]  kmem_cache_alloc_lru_noprof+0x55/0x310
[  372.777459][T23024]  ? __d_alloc+0x3d/0x350
[  372.777498][T23024]  __d_alloc+0x3d/0x350
[  372.777548][T23024]  ? mpol_shared_policy_init+0xbd/0x4c0
[  372.777578][T23024]  d_alloc_pseudo+0x1e/0x80
[  372.777623][T23024]  alloc_file_pseudo+0x71/0x160
[  372.777673][T23024]  __shmem_file_setup+0x1b9/0x1f0
[  372.777698][T23024]  shmem_file_setup+0x3b/0x50
[  372.777721][T23024]  __se_sys_memfd_create+0x2c3/0x590
[  372.777784][T23024]  __x64_sys_memfd_create+0x31/0x40
[  372.777892][T23024]  x64_sys_call+0x122f/0x2fb0
[  372.777915][T23024]  do_syscall_64+0xd0/0x1a0
[  372.778004][T23024]  ? clear_bhb_loop+0x25/0x80
[  372.778062][T23024]  ? clear_bhb_loop+0x25/0x80
[  372.778082][T23024]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  372.778104][T23024] RIP: 0033:0x7f191635e969
[  372.778123][T23024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  372.778175][T23024] RSP: 002b:00007f19149c6e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f
[  372.778192][T23024] RAX: ffffffffffffffda RBX: 00000000000004dd RCX: 00007f191635e969
[  372.778204][T23024] RDX: 00007f19149c6ef0 RSI: 0000000000000000 RDI: 00007f19163e1444
[  372.778220][T23024] RBP: 0000200000000c40 R08: 00007f19149c6bb7 R09: 00007f19149c6e40
[  372.778236][T23024] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000080
[  372.778311][T23024] R13: 00007f19149c6ef0 R14: 00007f19149c6eb0 R15: 00002000000000c0
[  372.778333][T23024]  </TASK>
[  373.080706][T23034] IPv6: Can't replace route, no match found
[  373.119662][   T29] kauditd_printk_skb: 226 callbacks suppressed
[  373.119677][   T29] audit: type=1400 audit(1746707180.476:29178): avc:  denied  { read } for  pid=23031 comm="syz.2.6454" lport=8 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[  373.257009][T23047] loop6: detected capacity change from 0 to 2048
[  373.315564][ T3434] dummy0: left allmulticast mode
[  373.320840][ T3434] bridge0: port 3(dummy0) entered disabled state
[  373.337937][ T3434] bridge_slave_1: left allmulticast mode
[  373.343647][ T3434] bridge_slave_1: left promiscuous mode
[  373.349434][ T3434] bridge0: port 2(bridge_slave_1) entered disabled state
[  373.361491][ T3434] bridge_slave_0: left allmulticast mode
[  373.367533][ T3434] bridge_slave_0: left promiscuous mode
[  373.373212][ T3434] bridge0: port 1(bridge_slave_0) entered disabled state
[  373.421926][T23047] FAULT_INJECTION: forcing a failure.
[  373.421926][T23047] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[  373.435263][T23047] CPU: 0 UID: 0 PID: 23047 Comm: syz.6.6458 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  373.435362][T23047] Tainted: [W]=WARN
[  373.435371][T23047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  373.435386][T23047] Call Trace:
[  373.435395][T23047]  <TASK>
[  373.435409][T23047]  __dump_stack+0x1d/0x30
[  373.435437][T23047]  dump_stack_lvl+0xe8/0x140
[  373.435456][T23047]  dump_stack+0x15/0x1b
[  373.435471][T23047]  should_fail_ex+0x265/0x280
[  373.435537][T23047]  should_fail_alloc_page+0xf2/0x100
[  373.435577][T23047]  alloc_pages_bulk_noprof+0xef/0x540
[  373.435655][T23047]  copy_splice_read+0xf3/0x5f0
[  373.435683][T23047]  ? __pfx_filemap_splice_read+0x10/0x10
[  373.435719][T23047]  splice_direct_to_actor+0x290/0x680
[  373.435748][T23047]  ? __pfx_direct_splice_actor+0x10/0x10
[  373.435829][T23047]  do_splice_direct+0xda/0x150
[  373.435849][T23047]  ? __pfx_direct_file_splice_eof+0x10/0x10
[  373.435875][T23047]  do_sendfile+0x380/0x640
[  373.435944][T23047]  __x64_sys_sendfile64+0x105/0x150
[  373.435980][T23047]  x64_sys_call+0xb39/0x2fb0
[  373.436007][T23047]  do_syscall_64+0xd0/0x1a0
[  373.436052][T23047]  ? clear_bhb_loop+0x25/0x80
[  373.436079][T23047]  ? clear_bhb_loop+0x25/0x80
[  373.436106][T23047]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  373.436133][T23047] RIP: 0033:0x7fec2965e969
[  373.436150][T23047] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  373.436224][T23047] RSP: 002b:00007fec27ca6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[  373.436247][T23047] RAX: ffffffffffffffda RBX: 00007fec29886080 RCX: 00007fec2965e969
[  373.436263][T23047] RDX: 0000000000000000 RSI: 0000000000000009 RDI: 0000000000000009
[  373.436279][T23047] RBP: 00007fec27ca6090 R08: 0000000000000000 R09: 0000000000000000
[  373.436294][T23047] R10: 0000000800000009 R11: 0000000000000246 R12: 0000000000000001
[  373.436309][T23047] R13: 0000000000000000 R14: 00007fec29886080 R15: 00007ffd76a676b8
[  373.436334][T23047]  </TASK>
[  373.651912][ T3434] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface
[  373.662820][ T3434] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface
[  373.672329][ T3434] bond0 (unregistering): Released all slaves
[  373.721753][ T3434] batman_adv: batadv0: Removing interface: batadv_slave_0
[  373.751021][ T3434] batman_adv: batadv0: Removing interface: batadv_slave_1
[  373.776666][T23063] FAULT_INJECTION: forcing a failure.
[  373.776666][T23063] name failslab, interval 1, probability 0, space 0, times 0
[  373.789567][T23063] CPU: 0 UID: 0 PID: 23063 Comm: syz.0.6462 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  373.789602][T23063] Tainted: [W]=WARN
[  373.789611][T23063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  373.789626][T23063] Call Trace:
[  373.789633][T23063]  <TASK>
[  373.789642][T23063]  __dump_stack+0x1d/0x30
[  373.789699][T23063]  dump_stack_lvl+0xe8/0x140
[  373.789723][T23063]  dump_stack+0x15/0x1b
[  373.789740][T23063]  should_fail_ex+0x265/0x280
[  373.789797][T23063]  should_failslab+0x8c/0xb0
[  373.789825][T23063]  kmem_cache_alloc_noprof+0x50/0x310
[  373.789865][T23063]  ? security_file_alloc+0x32/0x100
[  373.789899][T23063]  security_file_alloc+0x32/0x100
[  373.789968][T23063]  init_file+0x5c/0x1d0
[  373.789998][T23063]  alloc_empty_file+0x8b/0x200
[  373.790039][T23063]  path_openat+0x68/0x2170
[  373.790094][T23063]  ? _parse_integer_limit+0x170/0x190
[  373.790123][T23063]  ? _parse_integer+0x27/0x40
[  373.790151][T23063]  ? kstrtoull+0x111/0x140
[  373.790222][T23063]  ? kstrtouint+0x76/0xc0
[  373.790256][T23063]  do_filp_open+0x109/0x230
[  373.790286][T23063]  do_sys_openat2+0xa6/0x110
[  373.790306][T23063]  __x64_sys_creat+0x65/0x90
[  373.790356][T23063]  x64_sys_call+0x114d/0x2fb0
[  373.790383][T23063]  do_syscall_64+0xd0/0x1a0
[  373.790420][T23063]  ? clear_bhb_loop+0x25/0x80
[  373.790460][T23063]  ? clear_bhb_loop+0x25/0x80
[  373.790543][T23063]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  373.790631][T23063] RIP: 0033:0x7feaedfce969
[  373.790648][T23063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  373.790672][T23063] RSP: 002b:00007feaec637038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055
[  373.790695][T23063] RAX: ffffffffffffffda RBX: 00007feaee1f5fa0 RCX: 00007feaedfce969
[  373.790721][T23063] RDX: 0000000000000000 RSI: 0000000000000090 RDI: 0000200000000200
[  373.790737][T23063] RBP: 00007feaec637090 R08: 0000000000000000 R09: 0000000000000000
[  373.790801][T23063] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  373.790816][T23063] R13: 0000000000000000 R14: 00007feaee1f5fa0 R15: 00007fff07bc0078
[  373.790837][T23063]  </TASK>
[  374.087022][   T29] audit: type=1326 audit(1746707181.436:29179): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  374.110768][   T29] audit: type=1326 audit(1746707181.436:29180): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  374.134616][   T29] audit: type=1326 audit(1746707181.436:29181): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  374.158229][   T29] audit: type=1326 audit(1746707181.436:29182): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  374.181938][   T29] audit: type=1326 audit(1746707181.436:29183): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  374.205557][   T29] audit: type=1326 audit(1746707181.436:29184): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  374.229233][   T29] audit: type=1326 audit(1746707181.436:29185): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  374.252870][   T29] audit: type=1326 audit(1746707181.436:29186): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  374.276542][   T29] audit: type=1326 audit(1746707181.436:29187): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23074 comm="syz.1.6467" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  374.333966][ T3434] team0 (unregistering): Port device team_slave_1 removed
[  374.343998][ T3434] team0 (unregistering): Port device team_slave_0 removed
[  374.379783][T23079] netlink: 'syz.0.6464': attribute type 21 has an invalid length.
[  374.500631][T23086] usb usb2: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK.
[  374.508215][T23086] vhci_hcd: default hub control req: 6011 v8001 i0001 l0
[  374.508870][T23044] chnl_net:caif_netlink_parms(): no params data found
[  374.552368][T23044] bridge0: port 1(bridge_slave_0) entered blocking state
[  374.559570][T23044] bridge0: port 1(bridge_slave_0) entered disabled state
[  374.566740][T23044] bridge_slave_0: entered allmulticast mode
[  374.573424][T23044] bridge_slave_0: entered promiscuous mode
[  374.580625][T23044] bridge0: port 2(bridge_slave_1) entered blocking state
[  374.587812][T23044] bridge0: port 2(bridge_slave_1) entered disabled state
[  374.594959][T23044] bridge_slave_1: entered allmulticast mode
[  374.601554][T23044] bridge_slave_1: entered promiscuous mode
[  374.620624][T23044] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[  374.631497][T23044] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[  374.664293][T23044] team0: Port device team_slave_0 added
[  374.678216][T23044] team0: Port device team_slave_1 added
[  374.696751][T23044] batman_adv: batadv0: Adding interface: batadv_slave_0
[  374.703782][T23044] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  374.729876][T23044] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[  374.741731][T23044] batman_adv: batadv0: Adding interface: batadv_slave_1
[  374.748892][T23044] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[  374.774972][T23044] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[  374.830509][T23044] hsr_slave_0: entered promiscuous mode
[  374.839853][T23044] hsr_slave_1: entered promiscuous mode
[  374.929136][T23109] loop6: detected capacity change from 0 to 512
[  374.988479][T23109] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000d40000 r/w without journal. Quota mode: writeback.
[  375.015694][T23109] ext4 filesystem being mounted at /25/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa supports timestamps until 2038-01-19 (0x7fffffff)
[  375.092355][T22715] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000d40000.
[  375.155143][T23131] loop6: detected capacity change from 0 to 764
[  375.221345][T23141] __nla_validate_parse: 34 callbacks suppressed
[  375.221362][T23141] netlink: 16215 bytes leftover after parsing attributes in process `syz.2.6491'.
[  375.248588][T23144] program syz.0.6493 is using a deprecated SCSI ioctl, please convert it to SG_IO
[  375.258235][T23141] netlink: 24 bytes leftover after parsing attributes in process `syz.2.6491'.
[  375.297544][T23146] siw: device registration error -23
[  375.301971][T23149] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6495'.
[  375.311921][T23149] netlink: 32 bytes leftover after parsing attributes in process `syz.0.6495'.
[  375.320915][T23149] netlink: 28 bytes leftover after parsing attributes in process `syz.0.6495'.
[  375.332436][T23146] netlink: 188 bytes leftover after parsing attributes in process `syz.6.6492'.
[  375.341859][T23149] netlink: 32 bytes leftover after parsing attributes in process `syz.0.6495'.
[  375.399444][T23044] netdevsim netdevsim4 netdevsim0: renamed from eth0
[  375.411074][T23044] netdevsim netdevsim4 netdevsim1: renamed from eth1
[  375.428824][T23044] netdevsim netdevsim4 netdevsim2: renamed from eth2
[  375.437884][T23044] netdevsim netdevsim4 netdevsim3: renamed from eth3
[  375.459745][T23163] loop6: detected capacity change from 0 to 1024
[  375.461705][T23044] bridge0: port 2(bridge_slave_1) entered blocking state
[  375.473265][T23044] bridge0: port 2(bridge_slave_1) entered forwarding state
[  375.480632][T23044] bridge0: port 1(bridge_slave_0) entered blocking state
[  375.487762][T23044] bridge0: port 1(bridge_slave_0) entered forwarding state
[  375.496457][T12286] bridge0: port 1(bridge_slave_0) entered disabled state
[  375.504638][T12286] bridge0: port 2(bridge_slave_1) entered disabled state
[  375.513984][T23163] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[  375.538824][T22715] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[  375.557978][T23044] 8021q: adding VLAN 0 to HW filter on device bond0
[  375.571009][T23044] 8021q: adding VLAN 0 to HW filter on device team0
[  375.584543][T14042] bridge0: port 1(bridge_slave_0) entered blocking state
[  375.591730][T14042] bridge0: port 1(bridge_slave_0) entered forwarding state
[  375.604189][ T3434] bridge0: port 2(bridge_slave_1) entered blocking state
[  375.611324][ T3434] bridge0: port 2(bridge_slave_1) entered forwarding state
[  375.637600][T23044] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[  375.648236][T23044] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[  375.716291][T23184] netlink: 'syz.2.6506': attribute type 13 has an invalid length.
[  375.726874][T23184] netlink: 'syz.2.6506': attribute type 1 has an invalid length.
[  375.734794][T23184] netlink: 199820 bytes leftover after parsing attributes in process `syz.2.6506'.
[  375.759779][T23044] 8021q: adding VLAN 0 to HW filter on device batadv0
[  375.767398][T23188] netlink: 28 bytes leftover after parsing attributes in process `syz.2.6507'.
[  375.776484][T23188] netlink: 32 bytes leftover after parsing attributes in process `syz.2.6507'.
[  375.891007][T23044] veth0_vlan: entered promiscuous mode
[  375.900484][T23044] veth1_vlan: entered promiscuous mode
[  375.919014][T23044] veth0_macvtap: entered promiscuous mode
[  375.927069][T23044] veth1_macvtap: entered promiscuous mode
[  375.938837][T23044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[  375.949373][T23044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  375.960354][T23044] batman_adv: batadv0: Interface activated: batadv_slave_0
[  375.971008][T23044] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[  375.981757][T23044] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[  375.992494][T23044] batman_adv: batadv0: Interface activated: batadv_slave_1
[  376.002755][T23044] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[  376.011584][T23044] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[  376.020539][T23044] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[  376.029327][T23044] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[  376.136712][T23223] FAULT_INJECTION: forcing a failure.
[  376.136712][T23223] name failslab, interval 1, probability 0, space 0, times 0
[  376.149454][T23223] CPU: 1 UID: 0 PID: 23223 Comm: syz.2.6515 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  376.149505][T23223] Tainted: [W]=WARN
[  376.149586][T23223] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  376.149603][T23223] Call Trace:
[  376.149610][T23223]  <TASK>
[  376.149618][T23223]  __dump_stack+0x1d/0x30
[  376.149680][T23223]  dump_stack_lvl+0xe8/0x140
[  376.149705][T23223]  dump_stack+0x15/0x1b
[  376.149725][T23223]  should_fail_ex+0x265/0x280
[  376.149757][T23223]  should_failslab+0x8c/0xb0
[  376.149785][T23223]  __kmalloc_noprof+0xa5/0x3e0
[  376.149827][T23223]  ? ip_options_get+0x52/0x350
[  376.149853][T23223]  ip_options_get+0x52/0x350
[  376.149880][T23223]  do_ip_setsockopt+0x19d4/0x2240
[  376.149917][T23223]  ip_setsockopt+0x58/0x110
[  376.149961][T23223]  dccp_setsockopt+0xe4/0x660
[  376.149995][T23223]  sock_common_setsockopt+0x66/0x80
[  376.150029][T23223]  ? __pfx_sock_common_setsockopt+0x10/0x10
[  376.150064][T23223]  __sys_setsockopt+0x181/0x200
[  376.150119][T23223]  __x64_sys_setsockopt+0x64/0x80
[  376.150160][T23223]  x64_sys_call+0x2bd5/0x2fb0
[  376.150187][T23223]  do_syscall_64+0xd0/0x1a0
[  376.150215][T23223]  ? clear_bhb_loop+0x25/0x80
[  376.150255][T23223]  ? clear_bhb_loop+0x25/0x80
[  376.150274][T23223]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  376.150320][T23223] RIP: 0033:0x7f191635e969
[  376.150334][T23223] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  376.150401][T23223] RSP: 002b:00007f19149c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036
[  376.150417][T23223] RAX: ffffffffffffffda RBX: 00007f1916585fa0 RCX: 00007f191635e969
[  376.150428][T23223] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000006
[  376.150439][T23223] RBP: 00007f19149c7090 R08: 0000000000000000 R09: 0000000000000000
[  376.150449][T23223] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  376.150460][T23223] R13: 0000000000000000 R14: 00007f1916585fa0 R15: 00007ffdceba1a48
[  376.150487][T23223]  </TASK>
[  376.390768][T23233] netlink: 'syz.2.6519': attribute type 13 has an invalid length.
[  376.400524][T23233] netlink: 'syz.2.6519': attribute type 1 has an invalid length.
[  376.773953][T23280] loop6: detected capacity change from 0 to 164
[  376.783597][T23280] Unable to read rock-ridge attributes
[  377.076703][T23325] loop6: detected capacity change from 0 to 128
[  377.127713][T23329] 8021q: VLANs not supported on tunl0
[  377.262225][T23346] FAULT_INJECTION: forcing a failure.
[  377.262225][T23346] name failslab, interval 1, probability 0, space 0, times 0
[  377.274958][T23346] CPU: 0 UID: 0 PID: 23346 Comm: syz.6.6566 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  377.275001][T23346] Tainted: [W]=WARN
[  377.275095][T23346] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  377.275169][T23346] Call Trace:
[  377.275175][T23346]  <TASK>
[  377.275183][T23346]  __dump_stack+0x1d/0x30
[  377.275321][T23346]  dump_stack_lvl+0xe8/0x140
[  377.275338][T23346]  dump_stack+0x15/0x1b
[  377.275354][T23346]  should_fail_ex+0x265/0x280
[  377.275384][T23346]  should_failslab+0x8c/0xb0
[  377.275450][T23346]  __kmalloc_noprof+0xa5/0x3e0
[  377.275466][T23346]  ? iovec_from_user+0x84/0x210
[  377.275486][T23346]  iovec_from_user+0x84/0x210
[  377.275513][T23346]  __import_iovec+0xf3/0x540
[  377.275567][T23346]  ? terminate_walk+0x27f/0x2a0
[  377.275593][T23346]  import_iovec+0x61/0x80
[  377.275613][T23346]  process_vm_rw+0xea/0x950
[  377.275629][T23346]  ? _parse_integer+0x27/0x40
[  377.275718][T23346]  ? kstrtoull+0x111/0x140
[  377.275750][T23346]  ? __fget_files+0x184/0x1c0
[  377.275806][T23346]  ? fput+0x8f/0xc0
[  377.275822][T23346]  __x64_sys_process_vm_writev+0x78/0x90
[  377.275852][T23346]  x64_sys_call+0xe80/0x2fb0
[  377.275871][T23346]  do_syscall_64+0xd0/0x1a0
[  377.275904][T23346]  ? clear_bhb_loop+0x25/0x80
[  377.275922][T23346]  ? clear_bhb_loop+0x25/0x80
[  377.275940][T23346]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  377.276003][T23346] RIP: 0033:0x7fec2965e969
[  377.276016][T23346] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  377.276057][T23346] RSP: 002b:00007fec27cc7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000137
[  377.276073][T23346] RAX: ffffffffffffffda RBX: 00007fec29885fa0 RCX: 00007fec2965e969
[  377.276084][T23346] RDX: 000000000000002b RSI: 0000200000c22000 RDI: 000000000000005d
[  377.276100][T23346] RBP: 00007fec27cc7090 R08: 0000000000000001 R09: 0000000000000000
[  377.276111][T23346] R10: 0000200000c22fa0 R11: 0000000000000246 R12: 0000000000000001
[  377.276121][T23346] R13: 0000000000000000 R14: 00007fec29885fa0 R15: 00007ffd76a676b8
[  377.276137][T23346]  </TASK>
[  377.693196][T23361] FAULT_INJECTION: forcing a failure.
[  377.693196][T23361] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  377.706431][T23361] CPU: 1 UID: 0 PID: 23361 Comm: syz.1.6572 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  377.706546][T23361] Tainted: [W]=WARN
[  377.706553][T23361] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  377.706569][T23361] Call Trace:
[  377.706576][T23361]  <TASK>
[  377.706584][T23361]  __dump_stack+0x1d/0x30
[  377.706626][T23361]  dump_stack_lvl+0xe8/0x140
[  377.706650][T23361]  dump_stack+0x15/0x1b
[  377.706686][T23361]  should_fail_ex+0x265/0x280
[  377.706752][T23361]  should_fail+0xb/0x20
[  377.706785][T23361]  should_fail_usercopy+0x1a/0x20
[  377.706886][T23361]  _copy_from_user+0x1c/0xb0
[  377.706913][T23361]  kstrtouint_from_user+0x69/0xf0
[  377.706950][T23361]  ? avc_policy_seqno+0x15/0x30
[  377.706987][T23361]  proc_fail_nth_write+0x50/0x160
[  377.707112][T23361]  ? __pfx_proc_fail_nth_write+0x10/0x10
[  377.707200][T23361]  vfs_write+0x266/0x8d0
[  377.707267][T23361]  ? vfs_read+0x47f/0x6f0
[  377.707294][T23361]  ? __rcu_read_unlock+0x4f/0x70
[  377.707320][T23361]  ? __fget_files+0x184/0x1c0
[  377.707356][T23361]  ksys_write+0xda/0x1a0
[  377.707385][T23361]  __x64_sys_write+0x40/0x50
[  377.707410][T23361]  x64_sys_call+0x2cdd/0x2fb0
[  377.707489][T23361]  do_syscall_64+0xd0/0x1a0
[  377.707517][T23361]  ? clear_bhb_loop+0x25/0x80
[  377.707546][T23361]  ? clear_bhb_loop+0x25/0x80
[  377.707567][T23361]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  377.707588][T23361] RIP: 0033:0x7fd57aa8d41f
[  377.707651][T23361] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48
[  377.707673][T23361] RSP: 002b:00007fd5790f7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
[  377.707696][T23361] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fd57aa8d41f
[  377.707727][T23361] RDX: 0000000000000001 RSI: 00007fd5790f70a0 RDI: 0000000000000008
[  377.707738][T23361] RBP: 00007fd5790f7090 R08: 0000000000000000 R09: 0000000000000000
[  377.707750][T23361] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001
[  377.707761][T23361] R13: 0000000000000000 R14: 00007fd57acb5fa0 R15: 00007fffd76dfb48
[  377.707813][T23361]  </TASK>
[  378.039721][T23386] FAULT_INJECTION: forcing a failure.
[  378.039721][T23386] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  378.049549][T23384] SELinux: failed to load policy
[  378.052842][T23386] CPU: 0 UID: 0 PID: 23386 Comm: syz.0.6581 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  378.052884][T23386] Tainted: [W]=WARN
[  378.052893][T23386] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  378.052911][T23386] Call Trace:
[  378.052920][T23386]  <TASK>
[  378.052998][T23386]  __dump_stack+0x1d/0x30
[  378.053062][T23386]  dump_stack_lvl+0xe8/0x140
[  378.053087][T23386]  dump_stack+0x15/0x1b
[  378.053109][T23386]  should_fail_ex+0x265/0x280
[  378.053152][T23386]  should_fail+0xb/0x20
[  378.053188][T23386]  should_fail_usercopy+0x1a/0x20
[  378.053229][T23386]  _copy_from_user+0x1c/0xb0
[  378.053258][T23386]  kstrtouint_from_user+0x69/0xf0
[  378.053326][T23386]  ? avc_policy_seqno+0x15/0x30
[  378.053370][T23386]  proc_fail_nth_write+0x50/0x160
[  378.053404][T23386]  ? __pfx_proc_fail_nth_write+0x10/0x10
[  378.053437][T23386]  vfs_write+0x266/0x8d0
[  378.053493][T23386]  ? vfs_read+0x47f/0x6f0
[  378.053523][T23386]  ? __rcu_read_unlock+0x4f/0x70
[  378.053551][T23386]  ? __fget_files+0x184/0x1c0
[  378.053662][T23386]  ksys_write+0xda/0x1a0
[  378.053696][T23386]  __x64_sys_write+0x40/0x50
[  378.053729][T23386]  x64_sys_call+0x2cdd/0x2fb0
[  378.053757][T23386]  do_syscall_64+0xd0/0x1a0
[  378.053785][T23386]  ? clear_bhb_loop+0x25/0x80
[  378.053868][T23386]  ? clear_bhb_loop+0x25/0x80
[  378.053895][T23386]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  378.053924][T23386] RIP: 0033:0x7feaedfcd41f
[  378.053944][T23386] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48
[  378.053968][T23386] RSP: 002b:00007feaec637030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001
[  378.054060][T23386] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007feaedfcd41f
[  378.054077][T23386] RDX: 0000000000000001 RSI: 00007feaec6370a0 RDI: 0000000000000007
[  378.054093][T23386] RBP: 00007feaec637090 R08: 0000000000000000 R09: 0000000000000000
[  378.054109][T23386] R10: 0000000004000000 R11: 0000000000000293 R12: 0000000000000001
[  378.054125][T23386] R13: 0000000000000000 R14: 00007feaee1f5fa0 R15: 00007fff07bc0078
[  378.054149][T23386]  </TASK>
[  378.186467][   T29] kauditd_printk_skb: 545 callbacks suppressed
[  378.186487][   T29] audit: type=1326 audit(1746707185.537:29733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23391 comm="syz.2.6584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f191635e969 code=0x7ffc0000
[  378.303534][   T29] audit: type=1326 audit(1746707185.547:29734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23391 comm="syz.2.6584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=38 compat=0 ip=0x7f191635e969 code=0x7ffc0000
[  378.327261][   T29] audit: type=1326 audit(1746707185.547:29735): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23391 comm="syz.2.6584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f191635e969 code=0x7ffc0000
[  378.351152][   T29] audit: type=1326 audit(1746707185.547:29736): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23391 comm="syz.2.6584" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f191635e969 code=0x7ffc0000
[  378.374883][   T29] audit: type=1326 audit(1746707185.587:29737): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23394 comm="syz.0.6585" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaedfce969 code=0x7ffc0000
[  378.398496][   T29] audit: type=1326 audit(1746707185.587:29738): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23394 comm="syz.0.6585" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaedfce969 code=0x7ffc0000
[  378.422226][   T29] audit: type=1326 audit(1746707185.587:29739): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23394 comm="syz.0.6585" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feaedfce969 code=0x7ffc0000
[  378.445965][   T29] audit: type=1326 audit(1746707185.587:29740): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23394 comm="syz.0.6585" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaedfce969 code=0x7ffc0000
[  378.448825][T23395] netlink: 'syz.0.6585': attribute type 1 has an invalid length.
[  378.469742][   T29] audit: type=1326 audit(1746707185.587:29741): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23394 comm="syz.0.6585" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7feaedfce969 code=0x7ffc0000
[  378.501226][   T29] audit: type=1326 audit(1746707185.587:29742): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23394 comm="syz.0.6585" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7feaedfce969 code=0x7ffc0000
[  378.607841][T23405] ucma_write: process 37 (syz.4.6589) changed security contexts after opening file descriptor, this is not allowed.
[  378.673012][T23415] FAULT_INJECTION: forcing a failure.
[  378.673012][T23415] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  378.686186][T23415] CPU: 0 UID: 0 PID: 23415 Comm: syz.6.6593 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  378.686323][T23415] Tainted: [W]=WARN
[  378.686331][T23415] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  378.686346][T23415] Call Trace:
[  378.686353][T23415]  <TASK>
[  378.686361][T23415]  __dump_stack+0x1d/0x30
[  378.686382][T23415]  dump_stack_lvl+0xe8/0x140
[  378.686401][T23415]  dump_stack+0x15/0x1b
[  378.686416][T23415]  should_fail_ex+0x265/0x280
[  378.686482][T23415]  should_fail+0xb/0x20
[  378.686518][T23415]  should_fail_usercopy+0x1a/0x20
[  378.686585][T23415]  _copy_from_user+0x1c/0xb0
[  378.686612][T23415]  sel_write_load+0x192/0x380
[  378.686727][T23415]  ? __pfx_sel_write_load+0x10/0x10
[  378.686759][T23415]  vfs_write+0x266/0x8d0
[  378.686790][T23415]  ? __rcu_read_unlock+0x4f/0x70
[  378.686857][T23415]  ? __fget_files+0x184/0x1c0
[  378.686893][T23415]  ksys_write+0xda/0x1a0
[  378.686976][T23415]  __x64_sys_write+0x40/0x50
[  378.687015][T23415]  x64_sys_call+0x2cdd/0x2fb0
[  378.687042][T23415]  do_syscall_64+0xd0/0x1a0
[  378.687067][T23415]  ? clear_bhb_loop+0x25/0x80
[  378.687158][T23415]  ? clear_bhb_loop+0x25/0x80
[  378.687178][T23415]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  378.687202][T23415] RIP: 0033:0x7fec2965e969
[  378.687221][T23415] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  378.687244][T23415] RSP: 002b:00007fec27cc7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001
[  378.687267][T23415] RAX: ffffffffffffffda RBX: 00007fec29885fa0 RCX: 00007fec2965e969
[  378.687286][T23415] RDX: 0000000000002000 RSI: 0000200000000000 RDI: 0000000000000007
[  378.687366][T23415] RBP: 00007fec27cc7090 R08: 0000000000000000 R09: 0000000000000000
[  378.687379][T23415] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  378.687395][T23415] R13: 0000000000000000 R14: 00007fec29885fa0 R15: 00007ffd76a676b8
[  378.687465][T23415]  </TASK>
[  378.932656][T23423] netlink: 'syz.4.6597': attribute type 30 has an invalid length.
[  378.946616][T23425] FAULT_INJECTION: forcing a failure.
[  378.946616][T23425] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  378.959890][T23425] CPU: 1 UID: 0 PID: 23425 Comm: syz.6.6598 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  378.959970][T23425] Tainted: [W]=WARN
[  378.959979][T23425] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  378.960055][T23425] Call Trace:
[  378.960063][T23425]  <TASK>
[  378.960073][T23425]  __dump_stack+0x1d/0x30
[  378.960099][T23425]  dump_stack_lvl+0xe8/0x140
[  378.960123][T23425]  dump_stack+0x15/0x1b
[  378.960145][T23425]  should_fail_ex+0x265/0x280
[  378.960184][T23425]  should_fail+0xb/0x20
[  378.960228][T23425]  should_fail_usercopy+0x1a/0x20
[  378.960252][T23425]  _copy_from_user+0x1c/0xb0
[  378.960307][T23425]  memdup_user+0x5e/0xd0
[  378.960328][T23425]  strndup_user+0x68/0xb0
[  378.960350][T23425]  perf_uprobe_init+0x48/0x150
[  378.960438][T23425]  perf_uprobe_event_init+0xea/0x150
[  378.960479][T23425]  perf_try_init_event+0xd0/0x540
[  378.960570][T23425]  ? perf_event_alloc+0xab1/0x15c0
[  378.960596][T23425]  perf_event_alloc+0xabc/0x15c0
[  378.960629][T23425]  __se_sys_perf_event_open+0x5a8/0x1170
[  378.960776][T23425]  ? __rcu_read_unlock+0x4f/0x70
[  378.960809][T23425]  __x64_sys_perf_event_open+0x67/0x80
[  378.960862][T23425]  x64_sys_call+0x27ec/0x2fb0
[  378.960884][T23425]  do_syscall_64+0xd0/0x1a0
[  378.960906][T23425]  ? clear_bhb_loop+0x25/0x80
[  378.960927][T23425]  ? clear_bhb_loop+0x25/0x80
[  378.960981][T23425]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  378.961090][T23425] RIP: 0033:0x7fec2965e969
[  378.961106][T23425] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  378.961125][T23425] RSP: 002b:00007fec27cc7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012a
[  378.961143][T23425] RAX: ffffffffffffffda RBX: 00007fec29885fa0 RCX: 00007fec2965e969
[  378.961180][T23425] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000200000000000
[  378.961194][T23425] RBP: 00007fec27cc7090 R08: 0000000000000000 R09: 0000000000000000
[  378.961206][T23425] R10: ffffffffffffffff R11: 0000000000000246 R12: 0000000000000001
[  378.961298][T23425] R13: 0000000000000000 R14: 00007fec29885fa0 R15: 00007ffd76a676b8
[  378.961338][T23425]  </TASK>
[  379.209159][T23434] FAULT_INJECTION: forcing a failure.
[  379.209159][T23434] name failslab, interval 1, probability 0, space 0, times 0
[  379.221897][T23434] CPU: 1 UID: 0 PID: 23434 Comm: syz.4.6601 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  379.221939][T23434] Tainted: [W]=WARN
[  379.221948][T23434] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  379.221964][T23434] Call Trace:
[  379.221972][T23434]  <TASK>
[  379.221988][T23434]  __dump_stack+0x1d/0x30
[  379.222057][T23434]  dump_stack_lvl+0xe8/0x140
[  379.222081][T23434]  dump_stack+0x15/0x1b
[  379.222181][T23434]  should_fail_ex+0x265/0x280
[  379.222221][T23434]  should_failslab+0x8c/0xb0
[  379.222257][T23434]  __kmalloc_node_track_caller_noprof+0xa4/0x410
[  379.222333][T23434]  ? sidtab_sid2str_get+0xa0/0x130
[  379.222370][T23434]  kmemdup_noprof+0x2b/0x70
[  379.222393][T23434]  sidtab_sid2str_get+0xa0/0x130
[  379.222455][T23434]  security_sid_to_context_core+0x1eb/0x2e0
[  379.222491][T23434]  security_sid_to_context+0x27/0x40
[  379.222525][T23434]  selinux_lsmprop_to_secctx+0x67/0xf0
[  379.222576][T23434]  security_lsmprop_to_secctx+0x43/0x80
[  379.222627][T23434]  audit_log_task_context+0x77/0x190
[  379.222751][T23434]  audit_log_task+0xf4/0x250
[  379.222856][T23434]  audit_seccomp+0x61/0x100
[  379.222886][T23434]  ? __seccomp_filter+0x68c/0x10d0
[  379.222912][T23434]  __seccomp_filter+0x69d/0x10d0
[  379.222936][T23434]  ? __pfx_proc_fail_nth_write+0x10/0x10
[  379.223044][T23434]  ? vfs_write+0x75e/0x8d0
[  379.223075][T23434]  ? __rcu_read_unlock+0x4f/0x70
[  379.223171][T23434]  ? __fget_files+0x184/0x1c0
[  379.223205][T23434]  __secure_computing+0x82/0x150
[  379.223227][T23434]  syscall_trace_enter+0xcf/0x1e0
[  379.223251][T23434]  do_syscall_64+0xaa/0x1a0
[  379.223341][T23434]  ? clear_bhb_loop+0x25/0x80
[  379.223367][T23434]  ? clear_bhb_loop+0x25/0x80
[  379.223394][T23434]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  379.223421][T23434] RIP: 0033:0x7f821801e969
[  379.223441][T23434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  379.223460][T23434] RSP: 002b:00007f8216687038 EFLAGS: 00000246 ORIG_RAX: 0000000000000011
[  379.223498][T23434] RAX: ffffffffffffffda RBX: 00007f8218245fa0 RCX: 00007f821801e969
[  379.223510][T23434] RDX: 0000000000019039 RSI: 000020000001a240 RDI: 0000000000000003
[  379.223526][T23434] RBP: 00007f8216687090 R08: 0000000000000000 R09: 0000000000000000
[  379.223541][T23434] R10: 0000000000000003 R11: 0000000000000246 R12: 0000000000000001
[  379.223557][T23434] R13: 0000000000000000 R14: 00007f8218245fa0 R15: 00007ffd84e26d78
[  379.223631][T23434]  </TASK>
[  379.490074][T23436] FAULT_INJECTION: forcing a failure.
[  379.490074][T23436] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  379.503189][T23436] CPU: 1 UID: 0 PID: 23436 Comm: syz.2.6603 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  379.503233][T23436] Tainted: [W]=WARN
[  379.503242][T23436] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  379.503265][T23436] Call Trace:
[  379.503273][T23436]  <TASK>
[  379.503282][T23436]  __dump_stack+0x1d/0x30
[  379.503310][T23436]  dump_stack_lvl+0xe8/0x140
[  379.503335][T23436]  dump_stack+0x15/0x1b
[  379.503354][T23436]  should_fail_ex+0x265/0x280
[  379.503412][T23436]  should_fail+0xb/0x20
[  379.503447][T23436]  should_fail_usercopy+0x1a/0x20
[  379.503471][T23436]  _copy_from_user+0x1c/0xb0
[  379.503549][T23436]  ___sys_recvmsg+0xaa/0x370
[  379.503588][T23436]  do_recvmmsg+0x1ef/0x540
[  379.503616][T23436]  ? fput+0x8f/0xc0
[  379.503705][T23436]  __x64_sys_recvmmsg+0xe5/0x170
[  379.503733][T23436]  x64_sys_call+0x1c6a/0x2fb0
[  379.503760][T23436]  do_syscall_64+0xd0/0x1a0
[  379.503788][T23436]  ? clear_bhb_loop+0x25/0x80
[  379.503812][T23436]  ? clear_bhb_loop+0x25/0x80
[  379.503903][T23436]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  379.503974][T23436] RIP: 0033:0x7f191635e969
[  379.503994][T23436] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  379.504017][T23436] RSP: 002b:00007f19149c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000012b
[  379.504041][T23436] RAX: ffffffffffffffda RBX: 00007f1916585fa0 RCX: 00007f191635e969
[  379.504057][T23436] RDX: 0000000000000220 RSI: 00002000000002c0 RDI: 0000000000000003
[  379.504073][T23436] RBP: 00007f19149c7090 R08: 0000000000000000 R09: 0000000000000000
[  379.504098][T23436] R10: 0000000000000100 R11: 0000000000000246 R12: 0000000000000001
[  379.504112][T23436] R13: 0000000000000000 R14: 00007f1916585fa0 R15: 00007ffdceba1a48
[  379.504177][T23436]  </TASK>
[  379.880790][T23459] FAULT_INJECTION: forcing a failure.
[  379.880790][T23459] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  379.893947][T23459] CPU: 1 UID: 0 PID: 23459 Comm: syz.0.6615 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  379.893988][T23459] Tainted: [W]=WARN
[  379.894041][T23459] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  379.894057][T23459] Call Trace:
[  379.894066][T23459]  <TASK>
[  379.894076][T23459]  __dump_stack+0x1d/0x30
[  379.894101][T23459]  dump_stack_lvl+0xe8/0x140
[  379.894120][T23459]  dump_stack+0x15/0x1b
[  379.894139][T23459]  should_fail_ex+0x265/0x280
[  379.894175][T23459]  should_fail+0xb/0x20
[  379.894261][T23459]  should_fail_usercopy+0x1a/0x20
[  379.894279][T23459]  strncpy_from_user+0x25/0x230
[  379.894310][T23459]  ? kmem_cache_alloc_noprof+0x186/0x310
[  379.894398][T23459]  ? getname_flags+0x80/0x3b0
[  379.894436][T23459]  getname_flags+0xae/0x3b0
[  379.894472][T23459]  __se_sys_move_mount+0x16d/0x440
[  379.894506][T23459]  __x64_sys_move_mount+0x67/0x80
[  379.894597][T23459]  x64_sys_call+0x1f00/0x2fb0
[  379.894681][T23459]  do_syscall_64+0xd0/0x1a0
[  379.894708][T23459]  ? clear_bhb_loop+0x25/0x80
[  379.894735][T23459]  ? clear_bhb_loop+0x25/0x80
[  379.894757][T23459]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  379.894783][T23459] RIP: 0033:0x7feaedfce969
[  379.894879][T23459] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  379.894902][T23459] RSP: 002b:00007feaec637038 EFLAGS: 00000246 ORIG_RAX: 00000000000001ad
[  379.894925][T23459] RAX: ffffffffffffffda RBX: 00007feaee1f5fa0 RCX: 00007feaedfce969
[  379.894944][T23459] RDX: 0000000000000003 RSI: 0000200000000080 RDI: 0000000000000003
[  379.894956][T23459] RBP: 00007feaec637090 R08: 0000000000000153 R09: 0000000000000000
[  379.894967][T23459] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  379.894978][T23459] R13: 0000000000000000 R14: 00007feaee1f5fa0 R15: 00007fff07bc0078
[  379.895019][T23459]  </TASK>
[  380.207416][T23460] @: renamed from vlan0 (while UP)
[  380.257824][T23483] sg_write: data in/out 512/1 bytes for SCSI command 0xb7-- guessing data in;
[  380.257824][T23483]    program syz.4.6628 not setting count and/or reply_len properly
[  380.297570][T23485] usb usb2: Requested nonsensical USBDEVFS_URB_SHORT_NOT_OK.
[  380.305193][T23485] vhci_hcd: default hub control req: 6011 v8001 i0001 l0
[  380.462334][T23512] __nla_validate_parse: 36 callbacks suppressed
[  380.462385][T23512] netlink: 188 bytes leftover after parsing attributes in process `syz.2.6639'.
[  380.504781][T23514] FAULT_INJECTION: forcing a failure.
[  380.504781][T23514] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  380.518168][T23514] CPU: 0 UID: 0 PID: 23514 Comm: syz.1.6640 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  380.518204][T23514] Tainted: [W]=WARN
[  380.518211][T23514] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  380.518252][T23514] Call Trace:
[  380.518279][T23514]  <TASK>
[  380.518288][T23514]  __dump_stack+0x1d/0x30
[  380.518353][T23514]  dump_stack_lvl+0xe8/0x140
[  380.518391][T23514]  dump_stack+0x15/0x1b
[  380.518412][T23514]  should_fail_ex+0x265/0x280
[  380.518473][T23514]  should_fail+0xb/0x20
[  380.518518][T23514]  should_fail_usercopy+0x1a/0x20
[  380.518541][T23514]  _copy_from_iter+0xcf/0xdd0
[  380.518571][T23514]  hci_sock_sendmsg+0x36d/0x900
[  380.518647][T23514]  ? __pfx_hci_sock_sendmsg+0x10/0x10
[  380.518740][T23514]  __sock_sendmsg+0x142/0x180
[  380.518766][T23514]  sock_write_iter+0x165/0x1b0
[  380.518876][T23514]  aio_write+0x2e2/0x410
[  380.518926][T23514]  io_submit_one+0xac8/0x11b0
[  380.518958][T23514]  __se_sys_io_submit+0xfb/0x280
[  380.519047][T23514]  __x64_sys_io_submit+0x43/0x50
[  380.519069][T23514]  x64_sys_call+0xfc4/0x2fb0
[  380.519089][T23514]  do_syscall_64+0xd0/0x1a0
[  380.519111][T23514]  ? clear_bhb_loop+0x25/0x80
[  380.519185][T23514]  ? clear_bhb_loop+0x25/0x80
[  380.519207][T23514]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  380.519231][T23514] RIP: 0033:0x7fd57aa8e969
[  380.519303][T23514] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  380.519382][T23514] RSP: 002b:00007fd5790f7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1
[  380.519466][T23514] RAX: ffffffffffffffda RBX: 00007fd57acb5fa0 RCX: 00007fd57aa8e969
[  380.519483][T23514] RDX: 0000200000000340 RSI: 0000000000000001 RDI: 00007fd57b7f1000
[  380.519498][T23514] RBP: 00007fd5790f7090 R08: 0000000000000000 R09: 0000000000000000
[  380.519514][T23514] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  380.519551][T23514] R13: 0000000000000000 R14: 00007fd57acb5fa0 R15: 00007fffd76dfb48
[  380.519575][T23514]  </TASK>
[  380.734376][T23519] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6642'.
[  380.819467][T23530] FAULT_INJECTION: forcing a failure.
[  380.819467][T23530] name failslab, interval 1, probability 0, space 0, times 0
[  380.832257][T23530] CPU: 1 UID: 0 PID: 23530 Comm: syz.6.6646 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  380.832326][T23530] Tainted: [W]=WARN
[  380.832335][T23530] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  380.832383][T23530] Call Trace:
[  380.832391][T23530]  <TASK>
[  380.832400][T23530]  __dump_stack+0x1d/0x30
[  380.832427][T23530]  dump_stack_lvl+0xe8/0x140
[  380.832505][T23530]  dump_stack+0x15/0x1b
[  380.832526][T23530]  should_fail_ex+0x265/0x280
[  380.832566][T23530]  should_failslab+0x8c/0xb0
[  380.832646][T23530]  __kmalloc_node_track_caller_noprof+0xa4/0x410
[  380.832674][T23530]  ? sidtab_sid2str_get+0xa0/0x130
[  380.832712][T23530]  kmemdup_noprof+0x2b/0x70
[  380.832736][T23530]  sidtab_sid2str_get+0xa0/0x130
[  380.832838][T23530]  security_sid_to_context_core+0x1eb/0x2e0
[  380.832876][T23530]  security_sid_to_context+0x27/0x40
[  380.832933][T23530]  selinux_lsmprop_to_secctx+0x67/0xf0
[  380.832971][T23530]  security_lsmprop_to_secctx+0x43/0x80
[  380.832998][T23530]  audit_log_task_context+0x77/0x190
[  380.833040][T23530]  audit_log_task+0xf4/0x250
[  380.833137][T23530]  audit_seccomp+0x61/0x100
[  380.833170][T23530]  ? __seccomp_filter+0x68c/0x10d0
[  380.833197][T23530]  __seccomp_filter+0x69d/0x10d0
[  380.833224][T23530]  ? __pfx_proc_fail_nth_write+0x10/0x10
[  380.833265][T23530]  ? vfs_write+0x75e/0x8d0
[  380.833295][T23530]  ? __rcu_read_unlock+0x4f/0x70
[  380.833370][T23530]  ? __fget_files+0x184/0x1c0
[  380.833407][T23530]  __secure_computing+0x82/0x150
[  380.833432][T23530]  syscall_trace_enter+0xcf/0x1e0
[  380.833467][T23530]  do_syscall_64+0xaa/0x1a0
[  380.833494][T23530]  ? clear_bhb_loop+0x25/0x80
[  380.833521][T23530]  ? clear_bhb_loop+0x25/0x80
[  380.833548][T23530]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  380.833575][T23530] RIP: 0033:0x7fec2965e969
[  380.833604][T23530] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  380.833627][T23530] RSP: 002b:00007fec27cc7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000e8
[  380.833649][T23530] RAX: ffffffffffffffda RBX: 00007fec29885fa0 RCX: 00007fec2965e969
[  380.833665][T23530] RDX: 0000000000000001 RSI: 00002000000000c0 RDI: 0000000000000005
[  380.833681][T23530] RBP: 00007fec27cc7090 R08: 0000000000000000 R09: 0000000000000000
[  380.833730][T23530] R10: 0000000000000002 R11: 0000000000000246 R12: 0000000000000001
[  380.833801][T23530] R13: 0000000000000000 R14: 00007fec29885fa0 R15: 00007ffd76a676b8
[  380.833823][T23530]  </TASK>
[  381.180397][T23548] FAULT_INJECTION: forcing a failure.
[  381.180397][T23548] name failslab, interval 1, probability 0, space 0, times 0
[  381.180492][T23544] FAULT_INJECTION: forcing a failure.
[  381.180492][T23544] name fail_usercopy, interval 1, probability 0, space 0, times 0
[  381.193193][T23548] CPU: 1 UID: 0 PID: 23548 Comm: syz.4.6655 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  381.193241][T23548] Tainted: [W]=WARN
[  381.193250][T23548] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  381.193267][T23548] Call Trace:
[  381.193277][T23548]  <TASK>
[  381.193288][T23548]  __dump_stack+0x1d/0x30
[  381.193316][T23548]  dump_stack_lvl+0xe8/0x140
[  381.193407][T23548]  dump_stack+0x15/0x1b
[  381.193429][T23548]  should_fail_ex+0x265/0x280
[  381.193534][T23548]  should_failslab+0x8c/0xb0
[  381.193572][T23548]  kmem_cache_alloc_noprof+0x50/0x310
[  381.193615][T23548]  ? skb_clone+0x151/0x1f0
[  381.193703][T23548]  skb_clone+0x151/0x1f0
[  381.193728][T23548]  __netlink_deliver_tap+0x2c9/0x500
[  381.193785][T23548]  netlink_unicast+0x64c/0x670
[  381.193823][T23548]  netlink_sendmsg+0x58b/0x6b0
[  381.193867][T23548]  ? __pfx_netlink_sendmsg+0x10/0x10
[  381.193909][T23548]  __sock_sendmsg+0x142/0x180
[  381.194022][T23548]  __sys_sendto+0x268/0x330
[  381.194073][T23548]  __x64_sys_sendto+0x76/0x90
[  381.194112][T23548]  x64_sys_call+0x2eb6/0x2fb0
[  381.194140][T23548]  do_syscall_64+0xd0/0x1a0
[  381.194238][T23548]  ? clear_bhb_loop+0x25/0x80
[  381.194265][T23548]  ? clear_bhb_loop+0x25/0x80
[  381.194293][T23548]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  381.194320][T23548] RIP: 0033:0x7f821801e969
[  381.194341][T23548] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  381.194432][T23548] RSP: 002b:00007f8216687038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[  381.194456][T23548] RAX: ffffffffffffffda RBX: 00007f8218245fa0 RCX: 00007f821801e969
[  381.194472][T23548] RDX: 0000000000000078 RSI: 0000200000000000 RDI: 0000000000000003
[  381.194488][T23548] RBP: 00007f8216687090 R08: 0000000000000000 R09: 0000000000000000
[  381.194504][T23548] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  381.194520][T23548] R13: 0000000000000000 R14: 00007f8218245fa0 R15: 00007ffd84e26d78
[  381.194592][T23548]  </TASK>
[  381.224514][T23551] IPVS: Error connecting to the multicast addr
[  381.225006][T23544] CPU: 0 UID: 0 PID: 23544 Comm: syz.0.6651 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  381.225045][T23544] Tainted: [W]=WARN
[  381.225097][T23544] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  381.225188][T23544] Call Trace:
[  381.225196][T23544]  <TASK>
[  381.225205][T23544]  __dump_stack+0x1d/0x30
[  381.225234][T23544]  dump_stack_lvl+0xe8/0x140
[  381.225259][T23544]  dump_stack+0x15/0x1b
[  381.225281][T23544]  should_fail_ex+0x265/0x280
[  381.225323][T23544]  should_fail+0xb/0x20
[  381.225366][T23544]  should_fail_usercopy+0x1a/0x20
[  381.225390][T23544]  _copy_from_iter+0xcf/0xdd0
[  381.225418][T23544]  ? __build_skb_around+0x1a0/0x200
[  381.225459][T23544]  ? __alloc_skb+0x223/0x320
[  381.225499][T23544]  netlink_sendmsg+0x471/0x6b0
[  381.225658][T23544]  ? __pfx_netlink_sendmsg+0x10/0x10
[  381.225701][T23544]  __sock_sendmsg+0x142/0x180
[  381.225734][T23544]  ____sys_sendmsg+0x31e/0x4e0
[  381.225882][T23544]  ___sys_sendmsg+0x17b/0x1d0
[  381.225924][T23544]  __x64_sys_sendmsg+0xd4/0x160
[  381.225954][T23544]  x64_sys_call+0x2999/0x2fb0
[  381.226052][T23544]  do_syscall_64+0xd0/0x1a0
[  381.226136][T23544]  ? clear_bhb_loop+0x25/0x80
[  381.226192][T23544]  ? clear_bhb_loop+0x25/0x80
[  381.226244][T23544]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  381.226293][T23544] RIP: 0033:0x7feaedfce969
[  381.226313][T23544] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[  381.226337][T23544] RSP: 002b:00007feaec637038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[  381.226362][T23544] RAX: ffffffffffffffda RBX: 00007feaee1f5fa0 RCX: 00007feaedfce969
[  381.226381][T23544] RDX: 0000000000000000 RSI: 00002000000012c0 RDI: 0000000000000003
[  381.226397][T23544] RBP: 00007feaec637090 R08: 0000000000000000 R09: 0000000000000000
[  381.226414][T23544] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[  381.226430][T23544] R13: 0000000000000000 R14: 00007feaee1f5fa0 R15: 00007fff07bc0078
[  381.226471][T23544]  </TASK>
[  381.656649][T23568] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=23568 comm=syz.4.6662
[  382.173978][T23600] netlink: 188 bytes leftover after parsing attributes in process `syz.0.6675'.
[  382.227781][T23607] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6678'.
[  382.237023][T23607] netlink: 32 bytes leftover after parsing attributes in process `syz.6.6678'.
[  382.246059][T23607] netlink: 28 bytes leftover after parsing attributes in process `syz.6.6678'.
[  382.255197][T23607] netlink: 32 bytes leftover after parsing attributes in process `syz.6.6678'.
[  382.406367][T23626] netlink: 'syz.0.6686': attribute type 4 has an invalid length.
[  382.438288][T23630] netlink: 188 bytes leftover after parsing attributes in process `syz.0.6688'.
[  382.561553][T23632] netlink: 2028 bytes leftover after parsing attributes in process `syz.4.6689'.
[  382.570998][T23632] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6689'.
[  382.645455][T23654] lo speed is unknown, defaulting to 1000
[  382.651977][T23654] lo speed is unknown, defaulting to 1000
[  382.658216][T23654] lo speed is unknown, defaulting to 1000
[  382.666295][T23654] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98
[  382.680975][T23654] lo speed is unknown, defaulting to 1000
[  382.694101][T23654] lo speed is unknown, defaulting to 1000
[  382.702108][T23659] xt_CT: You must specify a L4 protocol and not use inversions on it
[  382.718212][T23654] lo speed is unknown, defaulting to 1000
[  382.724490][T23654] lo speed is unknown, defaulting to 1000
[  382.730901][T23660] lo speed is unknown, defaulting to 1000
[  382.737114][T23654] lo speed is unknown, defaulting to 1000
[  383.026872][T23677] ==================================================================
[  383.035013][T23677] BUG: KCSAN: data-race in _copy_from_iter / _copy_from_iter
[  383.042407][T23677] 
[  383.044741][T23677] write to 0xffff888105485000 of 4096 bytes by task 23676 on cpu 0:
[  383.052724][T23677]  _copy_from_iter+0x130/0xdd0
[  383.057497][T23677]  copy_page_from_iter+0x15a/0x290
[  383.062645][T23677]  process_vm_rw+0x659/0x950
[  383.067257][T23677]  __x64_sys_process_vm_writev+0x78/0x90
[  383.072914][T23677]  x64_sys_call+0xe80/0x2fb0
[  383.077518][T23677]  do_syscall_64+0xd0/0x1a0
[  383.082039][T23677]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  383.088027][T23677] 
[  383.090354][T23677] write to 0xffff888105485000 of 4096 bytes by task 23677 on cpu 1:
[  383.098338][T23677]  _copy_from_iter+0x130/0xdd0
[  383.103110][T23677]  copy_page_from_iter+0x15a/0x290
[  383.108240][T23677]  process_vm_rw+0x659/0x950
[  383.112834][T23677]  __x64_sys_process_vm_writev+0x78/0x90
[  383.118492][T23677]  x64_sys_call+0xe80/0x2fb0
[  383.123100][T23677]  do_syscall_64+0xd0/0x1a0
[  383.127627][T23677]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[  383.133545][T23677] 
[  383.135881][T23677] Reported by Kernel Concurrency Sanitizer on:
[  383.142043][T23677] CPU: 1 UID: 0 PID: 23677 Comm: syz.1.6705 Tainted: G        W           6.15.0-rc5-syzkaller-00043-gd76bb1ebb558 #0 PREEMPT(voluntary) 
[  383.156122][T23677] Tainted: [W]=WARN
[  383.159933][T23677] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 04/19/2025
[  383.169998][T23677] ==================================================================
[  383.194182][   T29] kauditd_printk_skb: 495 callbacks suppressed
[  383.194202][   T29] audit: type=1326 audit(1746707190.548:30236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  383.223585][   T29] audit: type=1326 audit(1746707190.548:30237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  383.247569][   T29] audit: type=1326 audit(1746707190.608:30238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  383.250182][T23676] block device autoloading is deprecated and will be removed.
[  383.270709][   T29] audit: type=1326 audit(1746707190.608:30239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  383.280118][T23676] bio_check_eod: 24050 callbacks suppressed
[  383.280135][T23676] +}[@: attempt to access beyond end of device
[  383.280135][T23676] loop0: rw=2048, sector=0, nr_sectors = 8 limit=0
[  383.301269][   T29] audit: type=1326 audit(1746707190.608:30240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  383.301312][   T29] audit: type=1326 audit(1746707190.608:30241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  383.368882][   T29] audit: type=1326 audit(1746707190.728:30242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  383.392599][   T29] audit: type=1326 audit(1746707190.728:30243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  383.416138][   T29] audit: type=1326 audit(1746707190.728:30244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=88 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000
[  383.439399][   T29] audit: type=1326 audit(1746707190.728:30245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23675 comm="+}[@" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fd57aa8e969 code=0x7ffc0000