last executing test programs: 17m26.293781535s ago: executing program 32 (id=3595): r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'ip6gretap0\x00', 0x0}) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xe9, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000480)=[{0x0, 0xdd12}, {0x0, 0x10}], 0x2}, 0x20040051) 17m23.561921242s ago: executing program 33 (id=3645): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x8, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000130000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)=r1}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r2}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000100)) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0x12, 0x4, &(0x7f0000001300)=ANY=[@ANYBLOB="18000000010000000000000000000000711215000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1e, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f0000000300)=@bpf_lsm={0xd, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="460a00000000000061112800000000001800000000000000000000000000000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x1b, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000580)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000200)='fdb_delete\x00', r3}, 0x10) ioctl$SIOCSIFHWADDR(0xffffffffffffffff, 0x8924, &(0x7f0000000000)={'bridge_slave_0\x00', @random="010000201000"}) 17m19.272663691s ago: executing program 34 (id=3716): bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x8020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000240)=@base={0x9, 0x8, 0x4, 0x4009, 0xa, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={0x0}, 0x18) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000d7f4000000000000001811", @ANYRES32, @ANYBLOB="0000000000000000b7080000010000807b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x5, 0x4, 0xfff, 0x7, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000000001811", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c30000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000200)={&(0x7f0000000180)="bc631b1753d62905eca4ce603a1d973391455268d000328dc0475c82940e61e350e40f73d9cd6c87184e391a7043ac7e0467a47bf3e2e6bbd16e57726dfba938fef7f58584ff9f9ef6ff15d2de4ec4a59316649ee2b7cd2613237aac", 0x0, &(0x7f0000000580), &(0x7f0000000080)="6869addf1b19bf162b97685d5e2c", 0x2}, 0x38) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000001b40)='sched_switch\x00', r1}, 0x10) perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r2, 0x8914, &(0x7f0000000040)={'sit0\x00', @local}) 17m18.397182423s ago: executing program 35 (id=3729): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r3}, 0x18) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r4, 0x29, 0x40, &(0x7f00000005c0)=@raw={'raw\x00', 0x3c1, 0x3, 0x4e0, 0x0, 0x18c, 0x203, 0x320, 0x19030000, 0x410, 0x2e0, 0x2e0, 0x410, 0x2e0, 0x3, 0x0, {[{{@uncond, 0x300, 0x2d8, 0x320, 0x0, {}, [@common=@unspec=@bpf0={{0x230}, {0x13, [{0x20, 0x0, 0x8}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0xe}, {0x0, 0x0, 0x0, 0x3}, {0x0, 0x0, 0x3}, {0x2, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x1}, {0x0, 0x0, 0x8}, {}, {0x16}, {0x0, 0xff}, {}, {0x7}, {0x0, 0x0, 0x0, 0x4}, {0x0, 0x4, 0x0, 0x101}, {}, {0x0, 0x0, 0x5}, {}, {0x0, 0x0, 0x0, 0x9}, {0xfffc, 0x0, 0x0, 0x6}, {}, {0xfffe}, {}, {}, {}, {0xfffe, 0xfb}, {}, {0x7a04}, {}, {}, {0x20, 0x6}, {}, {}, {}, {0x0, 0x0, 0x0, 0x800}, {}, {0xb8c, 0x0, 0x0, 0xf00}, {0x0, 0x1, 0x0, 0x3}, {0x3}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {0x0, 0xfd}, {}, {}, {0x0, 0x0, 0x0, 0xfffffffd}, {}, {0x0, 0xb}, {0x4, 0x2}]}}]}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0x2, 'syz0\x00', {0x8001}}}}, {{@uncond, 0x0, 0xa8, 0xf0}, @common=@unspec=@IDLETIMER={0x48, 'IDLETIMER\x00', 0x0, {0xb, 'syz0\x00', {0x6c8}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x540) 17m12.866728839s ago: executing program 36 (id=3806): mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x1be) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x101091, 0x0) mount$bind(&(0x7f0000000080)='./file0/file0\x00', &(0x7f00000001c0)='./file0/file0\x00', 0x0, 0x31001, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) open_tree(0xffffffffffffffff, &(0x7f0000000640)='\x00', 0x89901) 12m58.151724813s ago: executing program 9 (id=7764): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000050b6850000002d00000095"], &(0x7f0000000200)='GPL\x00', 0x9, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) r0 = io_uring_setup(0x1694, &(0x7f0000000080)={0x0, 0x0, 0x1000}) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) r1 = open(&(0x7f0000000040)='./bus\x00', 0x143142, 0x80) ftruncate(r1, 0x2007ffb) 12m57.996538635s ago: executing program 9 (id=7767): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008800000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={0x0, r2}, 0x18) r3 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="2e00000038000511d25a80698c63940d0124fc602f6e35400c000200001ec00037153e370a00018025581d00d1bd", 0x2e}], 0x1, 0x0, 0x0, 0x39c}, 0x0) 12m57.68269943s ago: executing program 9 (id=7770): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_clone(0x640c7000, 0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r1}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0a00000001010000ff7f0000cc00000000000000", @ANYRES32, @ANYBLOB="000000000000000000b412130000040000000000000000", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="000000000300"/28], 0x50) 12m55.257113125s ago: executing program 9 (id=7802): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x40000, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r3}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r4}, 0x10) sendmsg$tipc(r2, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r2, &(0x7f0000000f80)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000500)="b364", 0x2}], 0x1}, 0x8c00) recvmsg(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000009c0)=""/211, 0xd3}], 0x1}, 0x61) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000780)='mm_page_free\x00', r6}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000200)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") open(&(0x7f0000000000)='./bus\x00', 0x1050c1, 0x170) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r8}, 0x10) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f0000000680)={[{@nolazytime}, {@lazytime}, {@journal_path={'journal_path', 0x3d, './bus'}}, {@bsdgroups}, {@lazytime}, {@noload}]}, 0x3, 0x45c, &(0x7f0000002400)="$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") r9 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000006c0), 0x48200, 0x0) ioctl$TIOCVHANGUP(r9, 0x5437, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r10 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r10, &(0x7f0000000040)={0x0, 0x18, &(0x7f00000009c0)=[{&(0x7f0000000140)="d800000018007b29e00212ba0d8105040a601800fe0f040b067c55a1bc000900b80006990600000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04fb95cae8c9010000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad8ffd5e1cace81ccd40dd601edef3d93452a92307ff0ff0e97031e9f05e9f16e9cb500"/216, 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x0) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000002b40), r11) bpf$MAP_CREATE(0x0, &(0x7f0000003940)=ANY=[@ANYBLOB="2100000000000000000000000000100000040000", @ANYRES32, @ANYBLOB="018000"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000002"], 0x48) pipe(&(0x7f0000000100)={0xffffffffffffffff}) sendmmsg$unix(r12, 0x0, 0x0, 0x20000040) ioctl$KDSKBLED(r12, 0x4b65, 0x9) 12m54.84480147s ago: executing program 9 (id=7809): r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e0000000400000008000000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2, 0x0, 0xffffffffffffffff}, 0x2e) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) 12m54.689590163s ago: executing program 9 (id=7816): r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x2e) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) 12m54.687574213s ago: executing program 37 (id=7816): r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1, 0x0, 0xffffffffffffffff}, 0x2e) write$selinux_attr(r0, &(0x7f0000000100)='system_u:object_r:hugetlbfs_t:s0\x00', 0x1d) 12m40.171378661s ago: executing program 0 (id=8076): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xa, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r0}, 0x10) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r2 = fcntl$dupfd(r1, 0x406, r1) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000000)=0xc92b) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040), 0x200002, 0x0) socket$packet(0x11, 0x3, 0x300) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000140)={0x6, 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xb68, 0x0, &(0x7f0000000000)='%', 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) 12m40.026346063s ago: executing program 0 (id=8083): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="9000000010000305000000000000000000000700", @ANYRES32=0x0, @ANYBLOB="996e06004d4c0700540012800800010068737200480002800500030008000000050003000500000005000300fd00", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=r1], 0x90}}, 0x0) 12m39.995102794s ago: executing program 0 (id=8085): syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000080)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x18, 0xb, 0x0, &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000240), 0x200100, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), &(0x7f00000000c0)='%pI4 \x00'}, 0x20) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r2 = getpid() bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000380)=ANY=[@ANYBLOB="823f177971d68486da7e2fa50a56cb3851c6369a0899660da0e65ac9bb7229f4bafacea74a28530a78bff084b36353aace54922e73afa06c1ec9ce11c48724fc938aa37dbd8957cbdb8d725bb37530f5d1047acbb45307fb03ffa3bcb2e20f4895c212f23ae880295db92bfc443ac07e22edc9d449d6fff1d38508729f4ac8c226af8e322ca09218c96c1e1c15105b9aceb459eaecefc867ad32185f67643b748478ebbd7878d6403d0eb8d32bfcc26c46d6af51c8420d7980b5bec374b9389408901b9bebf2b66dcfe1d2ed6db9d2d09c167ca479b1a5dd580794dc51", @ANYRES32, @ANYBLOB="0000000000000000b7020000ffff0c63b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b700000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) rmdir(0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000340)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffd, @void, @value}, 0x94) io_submit(0x0, 0x28, &(0x7f0000000f40)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8, r0, &(0x7f0000000c40)="08a863fcdcfad78e404db183824090e14de9c0c7888dca117c69a8c88dc2118a3865e50e4e81884dd7ca8c28157bced599a5fd568cf6ac884b3dcb84404bed3400e58f2a1fe71177b9af80a397946dfb4f2c2683555ee3d1497a2bf7f348b9fa6091070d50080f4e6f1044dc005711f05f6f4e5f122e1df4559531d69de2819ff069451cfe887e3b4b5ce52fbf45f83adb51fa052a38d648bd5da0918fb9068bc347ae2810ae83c6a719d86be5d964e70153746e8f2e8e4ff55c7838693307c9766f4e1d48423f5d8b7df3fee9", 0x0, 0xc6, 0x0, 0x2, r0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x8, 0x3, 0xffffffffffffffff, &(0x7f00000002c0)="a4e74164326f613608a2cd05f94e20", 0x0, 0x80000000, 0x0, 0x2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x2, 0xe2, r0, &(0x7f00000007c0)="ff895664c40a7625956e9b0c4ba1286489f934c3abb58b2c344a5fc597710ff6e03accf281b672bfbd64059b6cb23480c5f286eaf18c3bbcb0e8925be52765c152aa29c38d835690d77c6e4ca80a93d7a0b98288d6a35bb326f829fe1292b33472a0086017582851c7205cbf99831b2b170e1f010f713a278086b69f49eaf5946912c14a", 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x6, 0x100, r4, &(0x7f0000000980)="c814a5c7d4d40201490815ea922ce0d3ae7fc212c0ec77e8d2ad33d3616b852a1521999603743bbe3697692503c8f47b99ec5335d5442b6b9095d2d616b7eee758abba1961111c9bdb5fb750524ae8f663473f00c26d94f4f3c442d95de7122771441c2210d90797", 0x0, 0xa, 0x0, 0x1, r0}, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x6, 0x95b, r5, &(0x7f0000000bc0)="152e585005c31c07d4e936d5a4bb7f1ba81322109ae526858777735db3b371cd60b7114981424e61f86e6c52787b5fb080d11b69cf3b32b303e0000e4b97", 0x0, 0x7af8, 0x0, 0x3, r0}, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x5, 0xb, r1, &(0x7f0000000d80)="52ceb006eb84e5949f9c019e6c579d2896b1ee10e55415c04c41552a41446d16ec6a4b280d9d5781f96b63dabc868f9e00f709dfb985f3e1a6cbca03c6b448df0dfacd9fd3d0b205a8445d9e013c6bcf4c1108aa3a8851b81a90406fdfc6b811abb1348b050e17db4f569aac14ba59e95726a199a97caed5b6dbd38e7ac8a9b4d12086c3f6ef34d7f69ad2d8f93ef49596845d02ff", 0x0, 0x5}, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x5, 0x5, r1, &(0x7f0000000e80)="1b3a63a6c4b8674c4c75bc672cc0b221b384e7263ab512c038e06e55a45f589750ff2e7ee3d1af9fa80952ce1fa186cfcfa74d11a2bbfe3db0dcd5cf9bf99113028869778eec2e4dc9cb303d60cf1eeacdb7161300cf2cf990bf4eddebb065690d714f", 0x0, 0x9, 0x0, 0x2}]) keyctl$session_to_parent(0x12) 12m39.039774118s ago: executing program 0 (id=8096): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x14, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x40000, 0x0, 0x0, 0x0, 0x3a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r2}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000140)='kmem_cache_free\x00', r3}, 0x10) sendmsg$tipc(r1, &(0x7f0000000e40)={0x0, 0x0, 0x0}, 0x0) sendmsg$inet(r1, &(0x7f0000000f80)={0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f0000000500)="b364", 0x2}], 0x1}, 0x8c00) recvmsg(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000009c0)=""/211, 0xd3}], 0x1}, 0x61) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000800)={0x11, 0x7, &(0x7f0000000300)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000780)='mm_page_free\x00', r5}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000200)={[{@init_itable_val}, {@jqfmt_vfsold}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x6a}}, {@user_xattr}, {@errors_remount}, {@quota}]}, 0x3, 0x42f, &(0x7f0000000940)="$eJzs289rHFUcAPDvzCat/WViqT+aVo1WMfgjadJae/CiKHhQEPRQjzFJS+y2kSaCLUGjSD1Kwbt4FPwLPOlF1JPgVe9SKJJLq6eV2Z1Jdje7aZJustX9fGCS92be8t53Z97ue/N2AuhZw9mfJGJ/RPweEQO1bGOB4dq/W8uLU38vL04lUam89VdSLXdzeXGqKFq8bl+R6YtIP0viSIt65y9fOT9ZLs9cyvNjCxfeH5u/fOW52QuT52bOzVycOH365InxF05NPN+ROLO4bg59NHf08GvvXHtj6sy1d3/+Ninib4qjQ4bXO/hkpdLh6rrrQF066etiQ9iUUq2bRn+1/w9EKVZP3kC8+mlXGwdsq0qlUnmg/eGlCvA/lkS3WwB0R/FFn81/i22Hhh53hRsv1SZAWdy38q12pC/SvEx/0/y2k4Yj4szSP19lW2zPfQgAgAbfZ+OfZ1uN/9Kovy90b76GMhgR90XEwYg4FRGHIuL+iGrZByPioU3W37xIsnb8k17fUmAblI3/XszXthrHf8XoLwZLee5ANf7+5OxseeZ4/p6MRP/uLD++Th0/vPLbF+2O1Y//si2rvxgL5u243re78TXTkwuTdxJzvRufRAz1tYo/WVkJSCLicEQMbbGO2ae/Odru2O3jX0cH1pkqX0c8VTv/S9EUfyFZf31y7J4ozxwfK66KtX759eqb7eq/o/g7IDv/e1te/yvxDyb167Xzm6/j6h+ft53TbPX635W83bDvw8mFhUvjEbuS12uNrt8/0VRuYrV8Fv/Isdb9/2CsvhNHIiK7iB+OiEci4tG87Y9FxOMRcWyd+H96+Yn3th7/9srin97U+V9N7IrmPa0TpfM/ftdQ6eBm4s/O/8lqaiTfs5HPv420a2tXMwAAAPz3pBGxP5J0dCWdpqOjtd/wH4q9aXlufuGZs3MfXJyuPSMwGP1pcadroO5+6Hg+rS/yE035E/l94y9Le6r50am58nS3g4cet69N/8/8Wep264Bt53kt6F36P/Qu/R96l/4PvatF/9/TjXYAO6/V9//HXWgHsPOa+r9lP+gh5v/Qu/R/6F36P/Sk+T1x+4fkJSTWJCK9K5ohsU2Jbn8yAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAdMa/AQAA//9QOObV") open(&(0x7f0000000000)='./bus\x00', 0x1050c1, 0x170) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000001140)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r8 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000006c0), 0x48200, 0x0) ioctl$TIOCVHANGUP(r8, 0x5437, 0x0) r9 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r9, &(0x7f0000000040)={0x0, 0x18, &(0x7f00000009c0)=[{&(0x7f0000000140)="d800000018007b29e00212ba0d8105040a601800fe0f040b067c55a1bc000900b80006990600000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4b11602b2a10c11ce1b14d6d930dfe1d9d322fe04fb95cae8c9010000730d7a5025ccca262f3d40fad95667e04adcdf634c1f215ce3bb9ad8ffd5e1cace81ccd40dd601edef3d93452a92307ff0ff0e97031e9f05e9f16e9cb500"/216, 0xd8}], 0x1, 0x0, 0x0, 0x2663}, 0x0) 12m38.740424232s ago: executing program 0 (id=8107): r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000140)=ANY=[@ANYBLOB="9000000010000305000000000000000000000700", @ANYRES32=0x0, @ANYBLOB="996e06004d4c0700540012800800010068737200480002800500030008000000050003000500000005000300fd00000008", @ANYRES32, @ANYBLOB='\b\x00', @ANYRES32=r1], 0x90}}, 0x0) 12m37.898012864s ago: executing program 0 (id=8114): openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) fchdir(r2) open(&(0x7f0000000280)='.\x00', 0x0, 0x8) close_range(r0, 0xffffffffffffffff, 0x0) 12m37.897781154s ago: executing program 38 (id=8114): openat$selinux_load(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(0xffffffffffffffff, 0x8933, &(0x7f0000000000)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$ENABLE_STATS(0x20, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x0) fchdir(r2) open(&(0x7f0000000280)='.\x00', 0x0, 0x8) close_range(r0, 0xffffffffffffffff, 0x0) 8m33.404373233s ago: executing program 7 (id=12604): perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x65, 0xfc, 0x5, 0x0, 0x0, 0x7, 0x89008, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc46, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x8, 0x7ffffefc, 0x3, 0x1, 0x0, 0x0, 0x0, 0x100, 0x0, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x9) openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='kfree\x00', 0xffffffffffffffff, 0x0, 0xfffffffffffffffd}, 0x18) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000a80)={{r0}, &(0x7f0000000a00), &(0x7f0000000a40)='%-5lx \x00'}, 0x20) 8m33.382078463s ago: executing program 7 (id=12605): r0 = bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f00000004c0)=@base={0x1b, 0x0, 0x0, 0x2000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000006000000e7ffffff0000010018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000e0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000820000009500000000000000"], 0x0, 0x40000000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r4}, 0x10) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000001000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a01080000000000000000020000000900020073797a2a0000000008000440000000000900010073797a3000000000080003400000000a14000000110001"], 0x64}}, 0x0) sendmsg$IPSET_CMD_TYPE(r1, &(0x7f00000003c0)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, 0xd, 0x6, 0x201, 0x0, 0x0, {0x1, 0x0, 0x6}, [@IPSET_ATTR_FAMILY={0x5, 0x5, 0x3}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_TYPENAME={0x10, 0x3, 'bitmap:port\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x5}]}, 0x3c}}, 0x10) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000400)={r3, 0x2, 0x6, 0x91}) ioctl$VT_SETMODE(r5, 0x5602, &(0x7f0000000540)={0x8, 0x5, 0x7, 0x4}) sendmsg$NFT_BATCH(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000280)=ANY=[], 0x74}}, 0x20000000) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020722500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r6}, 0x10) fchdir(0xffffffffffffffff) 8m33.316713184s ago: executing program 7 (id=12606): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000007c0)={&(0x7f0000000040)='sys_enter\x00', r0}, 0x18) fdatasync(0xffffffffffffffff) 8m33.316337524s ago: executing program 7 (id=12607): r0 = socket$netlink(0x10, 0x3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000440)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010700000000000000a6670000000800c300000000000800c4"], 0x2c}}, 0x20004004) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000ac0)='./file0/../file0\x00', 0x40) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_vlan\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="59cf000000000000000008000000140001"], 0x28}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) close_range(r6, r4, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000000), 0x800, 0x280) r10 = syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNADD(r10, 0x400448c8, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x9, 0x1, 0x16bf, 0x5505, 0xc3b8, 0x1, 0x0, 'syz1\x00'}) fadvise64(r9, 0xa, 0x8, 0x3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="4e014846a4edb55c9d5d8a9cc434442743702aee9dad7158da80fb680101d4867f840cdaf8e12dfe4d52afc6bb7b515b56171a212222096f5ec3a12f3f71d4b66c6b0cecc6120cf704ea46e491308efdf3eeac248763f8cf2a58d9c6931bc48cc7c46a3cdc35d1650245ef950dac48b191be034d0668f8a11d7d1ff1bff0a2e2628bc36ea21a1b84c94fa8e3d9e85b20d52067bc8337f4b63bd5adb0cff01b6b4712d9641fe55f06fc5f5fa3a3ef43e0", @ANYRESHEX=r0, @ANYRES64=r5], 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r11 = getpgrp(0x0) syz_open_procfs(r11, &(0x7f0000000100)='net/netstat\x00') r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f00000000c0)='page_pool_state_release\x00', r12, 0x0, 0xffffffffffffffff}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r13 = gettid() sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000005f00)=ANY=[@ANYBLOB="2800000010000100"/20, @ANYRES32=r13], 0x28}}, 0x0) 8m33.316061124s ago: executing program 7 (id=12608): r0 = socket$packet(0x11, 0x0, 0x300) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x7, &(0x7f0000000080)=0xfffffffe, 0x4) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000100)=0x9, 0x4) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r1}, 0x10) setxattr$trusted_overlay_upper(0x0, &(0x7f00000001c0), 0x0, 0x841, 0x1) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x16, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000020000000f100000000000007a0000000000000095f305e49b243c69"], &(0x7f0000003ff6)='GPL\x00', 0x9, 0xba, &(0x7f000000cf3d)=""/186, 0x0, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000000), 0x10, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x3a) rseq(&(0x7f0000000300), 0x20, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f00000003c0)={0x0, 0x3938700}, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'hsr0\x00'}) r2 = fsopen(&(0x7f0000000400)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000000240)=',-\x10*\x00', &(0x7f0000000380), 0x0) fsconfig$FSCONFIG_SET_FD(r2, 0x5, &(0x7f00000005c0)='\x00H\xeb', 0x0, r2) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="0900000004000000e27f000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x391, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) openat$cgroup_ro(0xffffffffffffff9c, 0x0, 0x100002, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) write$cgroup_int(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_SET_STRING(r2, 0x1, &(0x7f0000000000)='syzkaller\x00', &(0x7f0000001140)='\xf1\x95\xb3>-\x8c\xd4\r\x01\xfa\xe2{eED\x0e\xaaPV\x11\xff\xb6j\xd4~6\x82^\x9b b', 0x0) close(r2) 8m33.131843206s ago: executing program 7 (id=12609): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x3, 0x0, &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x29, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000080)="da", 0x1}], 0x1, &(0x7f0000000040)=ANY=[], 0xd0}}, {{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)="b8", 0x1}], 0x1}}], 0x2, 0x0) close(r2) 8m33.066070047s ago: executing program 39 (id=12609): r0 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x3, 0x0, &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r0, 0x40042408, r1) r2 = socket$kcm(0x29, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000780)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f0000000080)="da", 0x1}], 0x1, &(0x7f0000000040)=ANY=[], 0xd0}}, {{0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000001c0)="b8", 0x1}], 0x1}}], 0x2, 0x0) close(r2) 8m13.603932066s ago: executing program 3 (id=12805): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e8500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) openat2$dir(0xffffffffffffff9c, 0x0, &(0x7f0000000180)={0x430002, 0x4, 0x25}, 0x18) r2 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) r5 = socket$rds(0x15, 0x5, 0x0) bind$rds(r5, &(0x7f0000000040)={0x2, 0x0, @loopback}, 0x10) sendmsg$rds(r5, &(0x7f0000001600)={&(0x7f0000000000)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000200)=[@rdma_args={0x48, 0x114, 0x1, {{}, {0x0, 0x2c}, &(0x7f00000006c0)=[{&(0x7f0000000100)=""/44, 0x2c}], 0x1}}, @rdma_args={0x48, 0x114, 0x1, {{}, {0x0}, &(0x7f00000004c0)=[{&(0x7f0000000080)=""/28, 0x1c}], 0x1}}], 0x90}, 0x0) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b702000014000000b7030000000000008500000083000000bf09000000009f99fb000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b7000000000000009500000000000000"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, @void, @value}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r6, 0x0, 0x1}, 0x18) r8 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r8, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000380)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000000000900020073797a3100000080050005000200000011000300686173683a69702c706f7274"], 0x4c}}, 0x2) sendmsg$IPSET_CMD_ADD(r4, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000240)={0x0, 0x50}, 0x1, 0x0, 0x0, 0x10000082}, 0x80) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYRES64=r7, @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000a40000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) syz_mount_image$ext4(&(0x7f0000000880)='ext2\x00', &(0x7f0000000000)='./file1\x00', 0x21000e, &(0x7f0000000380), 0xde, 0x52d, &(0x7f0000001500)="$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") r10 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x141042, 0x0) r11 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x42, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r10, 0x40305829, &(0x7f0000000300)={0x17c04, r2, 0x4ea, 0x10001, 0x0, 0x8}) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x6, 0x1d, &(0x7f00000008c0)=@raw=[@func={0x85, 0x0, 0x1, 0x0, 0x1}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}}, @snprintf={{}, {}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x26}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}}, @jmp={0x5, 0x0, 0x9, 0xb, 0x2, 0xffffffffffffffe0, 0xb1d35fd738ccdca0}, @call={0x85, 0x0, 0x0, 0x9f}, @ringbuf_query={{0x18, 0x1, 0x1, 0x0, r11}}], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x200000, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r12, 0x0, 0xe, 0x0, &(0x7f00000000c0)="fe1fe9beacda84df94785c3c464c", 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x50) socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001480)) 8m13.036872485s ago: executing program 3 (id=12814): r0 = socket$pppl2tp(0x18, 0x1, 0x1) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x5, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r3, 0x0, 0x5}, 0x18) sync() bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000840)=ANY=[], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00'}, 0x10) socket$can_bcm(0x1d, 0x2, 0x2) perf_event_open(&(0x7f0000000380)={0x0, 0xa9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20f2, 0x80000, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5, 0x2ae}, 0x100304, 0xc8, 0x0, 0x2, 0x1, 0xc}, 0x0, 0xb, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r5) recvmsg$unix(r4, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r6, &(0x7f0000000500)=ANY=[@ANYBLOB="8fedcb7907031175f37538e486dd630080fc00082c00db5b686158bbcfe8875a060300001123000000000000000000000000ac1414aa3b200007"], 0xfdef) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(&(0x7f0000000000), 0xffffffffffffffff) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r7 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000040000009c0000000b"], 0x50) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000280)='kmem_cache_free\x00', r8, 0x0, 0x6}, 0x18) lchown(&(0x7f00000003c0)='./file0\x00', 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r9}, 0x10) connect$pppl2tp(r0, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x3, r1, {0x2, 0x0, @multicast2}, 0x2}}, 0x2e) socket$pppl2tp(0x18, 0x1, 0x1) close_range(r1, 0xffffffffffffffff, 0x0) 8m12.905900597s ago: executing program 3 (id=12820): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0xb, 0x0, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x60, '\x00', 0x0, @fallback=0x1c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = fsopen(&(0x7f0000000400)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000240)=',-\x10*\x00', &(0x7f0000000380), 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000005c0)='\x00H\xeb', 0x0, r1) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000000)='syzkaller\x00', &(0x7f0000001140)='\xf1\x95\xb3>-\x8c\xd4\r\x01\xfa\xe2{eED\x0e\xaaPV\x11\xff\xb6j\xd4~6\x82^\x9b b', 0x0) fsconfig$FSCONFIG_SET_BINARY(r1, 0x2, &(0x7f00000002c0)='\x00\x00\x00\xe0\x00\x00\x00\x00\x00', &(0x7f00000004c0)="ad", 0x1) close(r1) 8m12.794062198s ago: executing program 3 (id=12822): r0 = socket$netlink(0x10, 0x3, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101097, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000440)='./file0/file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(&(0x7f0000000380)='./file0\x00', &(0x7f0000000300)='./file0\x00', 0x0, 0x2125099, 0x0) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000380), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_VENDOR(r2, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000001740)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010700000000000000a6670000000800c300000000000800c4"], 0x2c}}, 0x20004004) r3 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r3, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000ac0)='./file0/../file0\x00', 0x40) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000001c0)={'veth1_vlan\x00', 0x0}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_GET_DEST(r7, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="59cf000000000000000008000000140001"], 0x28}, 0x1, 0x0, 0x0, 0x4000004}, 0x0) close_range(r6, r4, 0x0) r9 = syz_open_dev$loop(&(0x7f0000000000), 0x800, 0x280) r10 = syz_init_net_socket$bt_hidp(0x1f, 0x3, 0x6) ioctl$sock_bt_hidp_HIDPCONNADD(r10, 0x400448c8, &(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff, 0x2, 0x0, 0x0, 0x9, 0x1, 0x16bf, 0x5505, 0xc3b8, 0x1, 0x0, 'syz1\x00'}) fadvise64(r9, 0xa, 0x8, 0x3) sendmsg$IPVS_CMD_FLUSH(r3, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000180)={&(0x7f00000007c0)=ANY=[@ANYBLOB="4e014846a4edb55c9d5d8a9cc434442743702aee9dad7158da80fb680101d4867f840cdaf8e12dfe4d52afc6bb7b515b56171a212222096f5ec3a12f3f71d4b66c6b0cecc6120cf704ea46e491308efdf3eeac248763f8cf2a58d9c6931bc48cc7c46a3cdc35d1650245ef950dac48b191be034d0668f8a11d7d1ff1bff0a2e2628bc36ea21a1b84c94fa8e3d9e85b20d52067bc8337f4b63bd5adb0cff01b6b4712d9641fe55f06fc5f5fa3a3ef43e0", @ANYRESHEX=r0, @ANYRES64=r5], 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x4000000) r11 = getpgrp(0x0) syz_open_procfs(r11, &(0x7f0000000100)='net/netstat\x00') r12 = bpf$PROG_LOAD(0x5, &(0x7f0000001280)={0x11, 0xc, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000000000000000000000000000850000007d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f00000000c0)='page_pool_state_release\x00', r12, 0x0, 0xffffffffffffffff}, 0x18) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="1800000002000000000000000000000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r13 = gettid() sendmsg$nl_route(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000005f00)=ANY=[@ANYBLOB="2800000010000100"/20, @ANYRES32=r13], 0x28}}, 0x0) 8m12.70443927s ago: executing program 3 (id=12823): bpf$PROG_LOAD(0x5, &(0x7f0000001a40)={0x11, 0xc, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="24000000200001032cbd7000ffdbdf2502000000000000"], 0x24}, 0x1, 0x0, 0x0, 0x240480d4}, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[], 0x28}}, 0x0) 8m12.485386192s ago: executing program 3 (id=12824): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b000000"], 0x50) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000340)={'netdevsim0\x00', &(0x7f0000000400)=@ethtool_flash={0x33, 0xea5, '.\x00'}}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = fsmount(0xffffffffffffffff, 0x0, 0x6) symlinkat(&(0x7f0000000400)='./file0/../file0\x00', r2, &(0x7f00000003c0)='./file0\x00') move_mount(0xffffffffffffffff, &(0x7f0000000280)='./file1\x00', r2, &(0x7f00000002c0)='./file0\x00', 0x12) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES8=r0], &(0x7f0000000580)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_read_part_table(0x60d, &(0x7f0000002200)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r4, 0x0, 0xf}, 0x18) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/image_size', 0x20202, 0x0) sendfile(r7, r7, 0x0, 0xc3) sendmsg$OSF_MSG_REMOVE(r7, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000d00)={0x4bc, 0x1, 0x5, 0x301, 0x0, 0x0, {0x1, 0x0, 0x5}, [{{0x254, 0x1, {{0x0, 0x8001}, 0x1, 0x6, 0xfffc, 0x6, 0x17, 'syz0\x00', "665bd9f62ac0f48b76529c3f0a4f21ec12875e4e08afe101dbbe6fb6b4327ca0", "74f8dd0c7b6ba316f003d6d38190a8441293b01d326f4d245f3e432793ace290", [{0x6, 0x83, {0x2, 0x1}}, {0x2, 0x7, {0x1, 0x1}}, {0x4, 0x0, {0x2, 0x4}}, {0x7, 0x8, {0x1, 0x515f}}, {0x4, 0x5, {0x3, 0x28b}}, {0xc69c, 0x7fff, {0x2, 0x2}}, {0x80, 0x0, {0x0, 0x2}}, {0x8, 0x7, {0x2, 0xc95}}, {0x9, 0x7, {0x1, 0x2}}, {0x101, 0x6, {0x3, 0x2}}, {0x4, 0x589, {0x0, 0x7}}, {0x7f, 0x7f, {0x3, 0x6ae}}, {0xfff, 0x8001, {0x2}}, {0xc, 0x9, {0x0, 0x400}}, {0x7, 0x2, {0x3, 0x8}}, {0x1, 0x966, {0x3, 0x400}}, {0xb2, 0x1, {0x1, 0xf3}}, {0x6, 0x6, {0x2, 0x3}}, {0x1, 0x82, {0x2, 0xf3c2}}, {0x5, 0x0, {0x1, 0x3ff}}, {0x8, 0xfffa, {0x2, 0x34000}}, {0x81, 0x8000, {0x3, 0xedf}}, {0x51, 0x7b5, {0x0, 0x6}}, {0x1, 0x7f, {0x0, 0x7}}, {0x8, 0x1, {0x0, 0x1095}}, {0x9, 0x9, {0x2, 0x10a0}}, {0x5, 0x8a2d, {0x0, 0x8}}, {0x3, 0x3, {0x2, 0x800}}, {0x6, 0x1, {0x3, 0x7}}, {0x2d07, 0x58, {0x3, 0x6}}, {0x2, 0xb7b, {0x1, 0x7ff}}, {0x9, 0x7, {0x2, 0x7aec}}, {0x7ff, 0xfffa, {0x1, 0x9}}, {0x0, 0xff, {0x2, 0x2}}, {0xa1, 0x800, {0x2, 0x3}}, {0x9, 0x0, {0x0, 0x9}}, {0x0, 0xc, {0x2, 0x7a}}, {0x8000, 0x4, {0x2, 0x9f91}}, {0x9, 0xb7, {0x0, 0x6}}, {0x80, 0x8, {0x1, 0xd}}]}}}, {{0x254, 0x1, {{0x2, 0x1}, 0x1, 0x7, 0x1, 0x8001, 0xffff, 'syz0\x00', "c9e9747f38109523a7e9d422d6d73ca4066669e9043337758228b6f65e261a17", "6df68d82a9d78c1f99d40814e8b379b1ba4ecbad2beb2a75b1abba4f16c8bb3f", [{0xc5d2, 0x8, {0x1, 0x3}}, {0x9, 0x600, {0x0, 0x4}}, {0x0, 0x6, {0x1}}, {0x7ff, 0x4, {0x0, 0x9}}, {0x3, 0x1, {0x3, 0x5}}, {0x2, 0x9, {0x4, 0x100}}, {0x2, 0xb, {0x0, 0x3}}, {0x8, 0x2, {0x3, 0x6}}, {0xfffe, 0x8001, {0x1, 0x6}}, {0x8001, 0x0, {0x1}}, {0x101, 0x3, {0x2}}, {0x6, 0x6, {0x2, 0x6}}, {0xc, 0x2400, {0x3, 0x9}}, {0xf, 0x800, {0x0, 0xffff}}, {0x8000, 0xe46, {0x1}}, {0x39f, 0x8001, {0x1, 0x2}}, {0x6, 0x9, {0x2, 0x5}}, {0x6, 0x8001, {0x2, 0xffff8000}}, {0x2, 0x40, {0x2, 0x5a81}}, {0x5856, 0x3, {0x3, 0x5a0}}, {0x4, 0x1, {0x1, 0x2}}, {0x1, 0x4, {0x1, 0xe}}, {0x8, 0x8001, {0x0, 0x3}}, {0xd, 0xd9cc, {0x0, 0x7}}, {0xcf1, 0xf176, {0x1, 0x80}}, {0x1, 0x3, {0x0, 0x143}}, {0x2, 0x80, {0x1, 0x8}}, {0x7, 0x0, {0x3, 0x8}}, {0x8, 0x7f, {0x3, 0xc}}, {0x81, 0x3, {0x3}}, {0x3, 0xff, {0x1, 0xa1e00000}}, {0xce, 0x3ff, {0x3, 0x2}}, {0xa3, 0xfffa, {0x1, 0x3}}, {0x8, 0x0, {0x3, 0x3}}, {0xe, 0xfffb, {0x2, 0x10}}, {0x7fff, 0x2f7b, {0x3, 0x8000}}, {0x8, 0x14e2, {0x3, 0xb}}, {0x81, 0xffff, {0x0, 0x8}}, {0x27, 0xadb1, {0x1, 0x2}}, {0x3800, 0x5, {0x1, 0x3bec}}]}}}]}, 0x4bc}, 0x1, 0x0, 0x0, 0x4040044}, 0x40000) bind$can_j1939(r5, &(0x7f0000000300)={0x1d, r6, 0x1, {0x2, 0xf0, 0x2}, 0x2}, 0x18) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r8 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r8, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1200, 0x30, 0x3) 8m12.446220803s ago: executing program 40 (id=12824): r0 = bpf$MAP_CREATE(0x1900000000000000, &(0x7f0000000640)=ANY=[@ANYBLOB="1b000000"], 0x50) r1 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r1, 0x8946, &(0x7f0000000340)={'netdevsim0\x00', &(0x7f0000000400)=@ethtool_flash={0x33, 0xea5, '.\x00'}}) bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000080)='GPL\x00', 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = fsmount(0xffffffffffffffff, 0x0, 0x6) symlinkat(&(0x7f0000000400)='./file0/../file0\x00', r2, &(0x7f00000003c0)='./file0\x00') move_mount(0xffffffffffffffff, &(0x7f0000000280)='./file1\x00', r2, &(0x7f00000002c0)='./file0\x00', 0x12) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYRES8=r0], &(0x7f0000000580)='syzkaller\x00', 0x1, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) syz_read_part_table(0x60d, &(0x7f0000002200)="$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") mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="180000000000000000000000a9000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000002d00000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r4, 0x0, 0xf}, 0x18) madvise(&(0x7f0000000000/0x3000)=nil, 0x7fffffffffffffff, 0x15) r5 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000040)={'vcan0\x00', 0x0}) r7 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/image_size', 0x20202, 0x0) sendfile(r7, r7, 0x0, 0xc3) sendmsg$OSF_MSG_REMOVE(r7, &(0x7f0000000680)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000600)={&(0x7f0000000d00)={0x4bc, 0x1, 0x5, 0x301, 0x0, 0x0, {0x1, 0x0, 0x5}, [{{0x254, 0x1, {{0x0, 0x8001}, 0x1, 0x6, 0xfffc, 0x6, 0x17, 'syz0\x00', "665bd9f62ac0f48b76529c3f0a4f21ec12875e4e08afe101dbbe6fb6b4327ca0", "74f8dd0c7b6ba316f003d6d38190a8441293b01d326f4d245f3e432793ace290", [{0x6, 0x83, {0x2, 0x1}}, {0x2, 0x7, {0x1, 0x1}}, {0x4, 0x0, {0x2, 0x4}}, {0x7, 0x8, {0x1, 0x515f}}, {0x4, 0x5, {0x3, 0x28b}}, {0xc69c, 0x7fff, {0x2, 0x2}}, {0x80, 0x0, {0x0, 0x2}}, {0x8, 0x7, {0x2, 0xc95}}, {0x9, 0x7, {0x1, 0x2}}, {0x101, 0x6, {0x3, 0x2}}, {0x4, 0x589, {0x0, 0x7}}, {0x7f, 0x7f, {0x3, 0x6ae}}, {0xfff, 0x8001, {0x2}}, {0xc, 0x9, {0x0, 0x400}}, {0x7, 0x2, {0x3, 0x8}}, {0x1, 0x966, {0x3, 0x400}}, {0xb2, 0x1, {0x1, 0xf3}}, {0x6, 0x6, {0x2, 0x3}}, {0x1, 0x82, {0x2, 0xf3c2}}, {0x5, 0x0, {0x1, 0x3ff}}, {0x8, 0xfffa, {0x2, 0x34000}}, {0x81, 0x8000, {0x3, 0xedf}}, {0x51, 0x7b5, {0x0, 0x6}}, {0x1, 0x7f, {0x0, 0x7}}, {0x8, 0x1, {0x0, 0x1095}}, {0x9, 0x9, {0x2, 0x10a0}}, {0x5, 0x8a2d, {0x0, 0x8}}, {0x3, 0x3, {0x2, 0x800}}, {0x6, 0x1, {0x3, 0x7}}, {0x2d07, 0x58, {0x3, 0x6}}, {0x2, 0xb7b, {0x1, 0x7ff}}, {0x9, 0x7, {0x2, 0x7aec}}, {0x7ff, 0xfffa, {0x1, 0x9}}, {0x0, 0xff, {0x2, 0x2}}, {0xa1, 0x800, {0x2, 0x3}}, {0x9, 0x0, {0x0, 0x9}}, {0x0, 0xc, {0x2, 0x7a}}, {0x8000, 0x4, {0x2, 0x9f91}}, {0x9, 0xb7, {0x0, 0x6}}, {0x80, 0x8, {0x1, 0xd}}]}}}, {{0x254, 0x1, {{0x2, 0x1}, 0x1, 0x7, 0x1, 0x8001, 0xffff, 'syz0\x00', "c9e9747f38109523a7e9d422d6d73ca4066669e9043337758228b6f65e261a17", "6df68d82a9d78c1f99d40814e8b379b1ba4ecbad2beb2a75b1abba4f16c8bb3f", [{0xc5d2, 0x8, {0x1, 0x3}}, {0x9, 0x600, {0x0, 0x4}}, {0x0, 0x6, {0x1}}, {0x7ff, 0x4, {0x0, 0x9}}, {0x3, 0x1, {0x3, 0x5}}, {0x2, 0x9, {0x4, 0x100}}, {0x2, 0xb, {0x0, 0x3}}, {0x8, 0x2, {0x3, 0x6}}, {0xfffe, 0x8001, {0x1, 0x6}}, {0x8001, 0x0, {0x1}}, {0x101, 0x3, {0x2}}, {0x6, 0x6, {0x2, 0x6}}, {0xc, 0x2400, {0x3, 0x9}}, {0xf, 0x800, {0x0, 0xffff}}, {0x8000, 0xe46, {0x1}}, {0x39f, 0x8001, {0x1, 0x2}}, {0x6, 0x9, {0x2, 0x5}}, {0x6, 0x8001, {0x2, 0xffff8000}}, {0x2, 0x40, {0x2, 0x5a81}}, {0x5856, 0x3, {0x3, 0x5a0}}, {0x4, 0x1, {0x1, 0x2}}, {0x1, 0x4, {0x1, 0xe}}, {0x8, 0x8001, {0x0, 0x3}}, {0xd, 0xd9cc, {0x0, 0x7}}, {0xcf1, 0xf176, {0x1, 0x80}}, {0x1, 0x3, {0x0, 0x143}}, {0x2, 0x80, {0x1, 0x8}}, {0x7, 0x0, {0x3, 0x8}}, {0x8, 0x7f, {0x3, 0xc}}, {0x81, 0x3, {0x3}}, {0x3, 0xff, {0x1, 0xa1e00000}}, {0xce, 0x3ff, {0x3, 0x2}}, {0xa3, 0xfffa, {0x1, 0x3}}, {0x8, 0x0, {0x3, 0x3}}, {0xe, 0xfffb, {0x2, 0x10}}, {0x7fff, 0x2f7b, {0x3, 0x8000}}, {0x8, 0x14e2, {0x3, 0xb}}, {0x81, 0xffff, {0x0, 0x8}}, {0x27, 0xadb1, {0x1, 0x2}}, {0x3800, 0x5, {0x1, 0x3bec}}]}}}]}, 0x4bc}, 0x1, 0x0, 0x0, 0x4040044}, 0x40000) bind$can_j1939(r5, &(0x7f0000000300)={0x1d, r6, 0x1, {0x2, 0xf0, 0x2}, 0x2}, 0x18) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r8 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) pwritev2(r8, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1200, 0x30, 0x3) 6m32.539903347s ago: executing program 2 (id=14873): r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x20000000000000f4, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000021b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) creat(&(0x7f0000000440)='./file0\x00', 0x162) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r1, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) r2 = syz_io_uring_setup(0xd2, &(0x7f0000000340)={0x0, 0x6299, 0x80, 0x80000, 0x334}, &(0x7f0000000280)=0x0, &(0x7f0000000080)=0x0) sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={0x0}, 0x4, 0x700000000000000}, 0x0) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={0x0, 0x58}}, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x30, 0x0, 0x0, 0x4}]}, 0x10) syz_io_uring_submit(r3, r4, &(0x7f0000000200)=@IORING_OP_MADVISE={0x19, 0x7b, 0x0, 0x0, 0x0, &(0x7f0000011000/0x4000)=nil, 0x4000, 0xc}) io_uring_enter(r2, 0x47bc, 0x0, 0x0, 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x0) iopl(0x3) r5 = syz_pidfd_open(0x0, 0x0) process_mrelease(r5, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000980)={0x3, 0xc, &(0x7f0000000a40)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32, @ANYBLOB="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"], 0x0, 0x8a, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={0x0}, 0x18) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdbf1, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r6}, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f0000000400), 0xffffffffffffffff) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000200)='cgroup.stat\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, 0x0, 0x0) ioctl$TCSETSW2(r0, 0x5453, 0x0) 6m32.499190348s ago: executing program 2 (id=14874): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008800000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000680)='./file0\x00', 0x0, &(0x7f0000000280)={[{@errors_remount}, {@nodelalloc}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@journal_dev}, {@barrier_val={'barrier', 0x3d, 0x7f}}, {@quota}]}, 0x3, 0x44d, &(0x7f0000000a40)="$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") chdir(&(0x7f0000000080)='./file0\x00') setxattr$incfs_id(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=@newqdisc={0x7c, 0x10, 0x1, 0xfffffffe, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0x4}}, [@TCA_RATE={0x6, 0x5, {0x9}}, @TCA_STAB={0x50, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x1000, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}, {{0x1c, 0x1, {0xa0, 0x9, 0x9, 0x0, 0x2, 0x0, 0x5eb, 0x3}}, {0xa, 0x2, [0x5, 0x2, 0x6a65]}}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4040088}, 0x4000c00) bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) (async) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008800000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (async) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000680)='./file0\x00', 0x0, &(0x7f0000000280)={[{@errors_remount}, {@nodelalloc}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x2e}}, {@journal_dev}, {@barrier_val={'barrier', 0x3d, 0x7f}}, {@quota}]}, 0x3, 0x44d, &(0x7f0000000a40)="$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") (async) chdir(&(0x7f0000000080)='./file0\x00') (async) setxattr$incfs_id(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0), 0x0, 0x0, 0x0) (async) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) (async) socket$netlink(0x10, 0x3, 0x0) (async) sendmsg$nl_route_sched(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000700)=@newqdisc={0x7c, 0x10, 0x1, 0xfffffffe, 0x25dfdbff, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0x4}}, [@TCA_RATE={0x6, 0x5, {0x9}}, @TCA_STAB={0x50, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x1000, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}, {{0x1c, 0x1, {0xa0, 0x9, 0x9, 0x0, 0x2, 0x0, 0x5eb, 0x3}}, {0xa, 0x2, [0x5, 0x2, 0x6a65]}}]}]}, 0x7c}, 0x1, 0x0, 0x0, 0x4040088}, 0x4000c00) (async) 6m32.405971789s ago: executing program 2 (id=14875): r0 = socket$packet(0x11, 0x3, 0x300) ioperm(0x7, 0x1ff, 0x6) r1 = open(&(0x7f0000000000)='./file0\x00', 0x80140, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000080)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x18, 0x1, 0x0, 0x1, @osf={{0x8}, @val={0xc, 0x2, 0x0, 0x1, [@NFTA_OSF_DREG={0x8, 0x1, 0x1, 0x0, 0x4}]}}}, {0x24, 0x1, 0x0, 0x1, @meta={{0x9}, @val={0x14, 0x2, 0x0, 0x1, [@NFTA_META_KEY={0x8, 0x2, 0x1, 0x0, 0xc}, @NFTA_META_SREG={0x8, 0x3, 0x1, 0x0, 0x17}]}}}]}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}]}], {0x14}}, 0x94}}, 0x0) close_range(r1, 0xffffffffffffffff, 0x0) futex(&(0x7f00000040c0), 0x6, 0x0, 0x0, 0x0, 0x0) r3 = add_key$keyring(&(0x7f0000000280), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) r4 = add_key$keyring(&(0x7f0000000200), &(0x7f0000000240)={'syz', 0x3}, 0x0, 0x0, r3) add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x3}, 0x0, 0x0, r4) keyctl$KEYCTL_MOVE(0x1e, r4, r4, r3, 0x0) timer_create(0x5, &(0x7f00000001c0)={0x0, 0x3e, 0x1, @thr={&(0x7f0000000240)="2c8b281bb71490960976c2c6549f54f09c680fb1f7f5a440cb98ba7de0b0757517f56a5225bd064b72f3d367e242d45d206e177462131cd282eae3b7daf669a97fd4f4d6b755c6e20fc4cf83661cf32d1733ca80d42e249aa5046ace8eabe00a3dc3fb0107e05bf31b2478d5ae8281f62522cfdccb8b427531b8e7726a6e2f3d375fe7a18b513afbb40d8434342fec5cacfa564e165d6a", &(0x7f0000000180)}}, &(0x7f0000000300)) ioctl$KDFONTOP_SET(r1, 0x4b72, &(0x7f0000000140)={0x0, 0x0, 0x15, 0x1, 0x85, &(0x7f00000004c0)="e06481923d0d6fa6beb016457ba02ddc30cc6526be1438ef0073a7e94272a4cc64c3f2b7fd75addc99485c83bcce8c18c3272270fb6d9879bffd1096ad4024f67bde89b7b774021379c275f9e213232a255d9685deeb16448b1fb3a36d9ef1cc2bcd396f61574b8f310935abab44bea39748bf7c9e5e2d9e0d0a952c4591694447a6113722fcceb4a283e066037343e0446951e3fa5965bbe4039c06548af8ac8b44ceac0e1e04e9baece679ab0ca76d72e8d52417d3dfca8536539f7bb85e5c8b189cbcd2659c69435d67438c761052625a7324242dc2bc007c749b5634ba451805d13c3e30ebde8a9afd431ce7c77f392a19236a30cfd29b573927ff0390348c0a17aea4bd24e0c7efcbbe269dd1030d52b75e7820170de270c248a7962fde9c3405a65be78bd4022c465b5efdb2b89682a19501f22ce67052cb7daab861373843b2138db88adab846650da1519b692089490cf2d4097548b5b2a8b060a431ac1736b37277ad01c1d7e05fc8d828da4bded4228fd3bf5a770bf49bfe590d09ee0031ed07f64942be8d5b74e661565d14622e339c88458c08d0a980ab755c0b1f7362d2b6faebbbce189a43b7ff71af457335bc6b292acc49e763f41fa7848fc6f8b7db6096e9d41701c7904fe00d2fc76f19219ea037ed994a9d8052b1e130629b369cbcf51607d75553e7e331f3319db16a940b50f5dbb190c926dd5d2a69c53d1996eb73699e8421553167804498da600a442672e71c0dd413ce7d524de1e3f24c9f784007501298ec3a27390712849c28b42fd98e1bb0d45ca424826bcc14c0a5cdaf9d706bc83b018c0515ad91a995b7e96af36e3929bf881c2d75f37ccda21c8619617bc8255ffb2d49de3dd4fe113df4c8ab67ae7468c022d26da58c9e3e95d1973caf59a3d38eb06a8a71d03111702d5a9f700940cf2408b40a57d23c9e19e5a79e9bbf4e7eca8c94ce9f8168b6f840bdcc3f76da82bc07e2a8cc9d7d7fe39614b7b85cd67e930e38dd4a1cd8867455398e34f7dfac2d0c22b92555d6d8a73c1d6c55da717ab1a1f495922599b37e31f622b1fa0b735ba771dbdd7f756b5e78b20f3aafc89709743384ca9d529b62306aca3deed4d7c0d0e9c6dcd0b1771cdca9c2db2b797418a0448da4af3b561771cc3bfd07cd8733436ee27f201856d866e41ab718b5ad17788ceb01a5f62ee410fd7e6f0cc20263008f9549399bc0435ba68fd33629f47eafbaff7800cf840094a7316e5e38e7a7a2c478bdd90803b798dc537f69dbbac31f1f84263b0e3fd496c3c42320ab6e503869cbc1aa14e424fee5e57a294fa5dcc55a5074785b85aa0bbab113e37401277aec38004b999f6a6bb86bcd004ebbe284df0a83187b51a2726ad4122f67ca1a916845e7381c09737c4c83d0f3843a20146e79173ab7040b43c463f85eaa1bfa5c1650a1b2"}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x4) futex(&(0x7f00000040c0)=0x1, 0x6, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000fbe000)={0x1, &(0x7f0000000480)=[{0x28, 0x0, 0xfc, 0xfffff038}]}, 0x10) 6m32.405623899s ago: executing program 2 (id=14876): mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000440)='./file0/../file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(&(0x7f0000000400)='./file0/file0\x00', &(0x7f0000000380)='./file0\x00', 0x0, 0x3125899, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000640)='\x00', 0x89901) move_mount(r0, &(0x7f0000000140)='.\x00', 0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x0) umount2(&(0x7f00000001c0)='./file0/../file0\x00', 0x3) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f00000004c0)='.\x00', 0x40000004) pause() r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000020000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x5296deb2b7b9f7ae, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) close(r1) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000000800000006"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='kmem_cache_free\x00', r5}, 0x10) r6 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$sock_int(r6, 0x1, 0x3c, &(0x7f0000000040)=0x1, 0xfff0) setsockopt$inet_tcp_TCP_REPAIR(r6, 0x6, 0x13, &(0x7f00000000c0)=0x1, 0x4) connect$inet(r6, &(0x7f00000006c0)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x2}}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) sendmmsg$inet(r6, &(0x7f0000003780)=[{{0x0, 0x0, &(0x7f0000001340)=[{&(0x7f0000001280)='<', 0x1}], 0x1}}, {{0x0, 0x0, &(0x7f0000001600)=[{&(0x7f0000001500)='&', 0x1}], 0x1}}], 0x2, 0x24004441) r7 = ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r7) 6m31.518469251s ago: executing program 2 (id=14909): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000280)='netlink_extack\x00', r0}, 0x10) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={0x0}}, 0x0) 6m28.411862806s ago: executing program 2 (id=14962): r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'ip6gretap0\x00', 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000180)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) sendfile(r3, r4, 0x0, 0x7ffff000) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYRES64=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x60, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) r6 = socket(0x10, 0x3, 0x0) connect$netlink(r6, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) sendmsg$nl_route_sched(r6, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x18, 0x32, 0x829, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) syz_clone3(&(0x7f0000000400)={0x1000, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000300), {0x40}, &(0x7f0000000600)=""/4096, 0x1000, &(0x7f0000001600)=""/231, &(0x7f0000000380)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff], 0x6}, 0x58) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)=@delchain={0x520, 0x65, 0x2, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x8}, {0x0, 0x9}, {0x6}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4}}, @filter_kind_options=@f_route={{0xa}, {0x4}}, @TCA_RATE={0x6, 0x5, {0x6, 0x22}}, @filter_kind_options=@f_route={{0xa}, {0x4cc, 0x2, [@TCA_ROUTE4_FROM={0x8}, @TCA_ROUTE4_IIF={0x8}, @TCA_ROUTE4_ACT={0x3e0, 0x6, [@m_bpf={0xdc, 0x16, 0x0, 0x0, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x2248, 0x3, 0x10000000, 0x9, 0xf85}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x2, 0x0, 0x40000000, 0x4, 0xfff}}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x6}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{0xe, 0x8f, 0x1, 0x1}, {0x3, 0xd, 0x4, 0xffff}, {0x2ee, 0x7, 0x9}, {0x2, 0x40, 0x3, 0xffffffff}, {0x3, 0x94, 0xc, 0x20000}, {0x6, 0x4, 0xb3, 0x1}, {0x3, 0x51, 0x4, 0x8}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x1, 0x9, 0x0, 0x8000, 0x6}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}, @m_skbmod={0x50, 0x6, 0x0, 0x0, {{0xb}, {0x4}, {0x23, 0x6, "e7da3c8403fae38a6104e8deccdff1af0e8969df3c0c229b39997b18486861"}, {0xc, 0x7, {0x0, 0xeb1aa48f20ecc78b}}, {0xc, 0x8, {0x3}}}}, @m_skbmod={0x38, 0x12, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x4}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_sample={0x12c, 0x0, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0xffffffff}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0xf3}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x7fffffff, 0x1, 0x10000000, 0x132, 0x3}}]}, {0xd5, 0x6, "5585e4978312153aa42f30e46602bd87be41196cb887f6a445019260145eacfc789e0591173e540ea96ddc89cde1312b24d81cd9cf9ddc2ac817e49647559a92bc68922da07ae74d412c68df8f1a425986d1e0fe379e9b66ed2aca073af3aad4e36109274822fbfa834d7a02b3e1fc01841581700abff25ebcfeb38bbb3ee3e0d75898ec65a1ca67c2f06a3b2b9f5eb067c4e21e0deedcf47e3db9cda23dca15b3e34e43e7d7cc1b9201d0e6d45497b608b28ca549f62ba829bfb392018f5c37ab8e7cc7f5221d33e148c986556da3dba5"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_ctinfo={0xc8, 0x4, 0x0, 0x0, {{0xb}, {0x4}, {0x9a, 0x6, "b44ebc8afbd2b83e8b5f7f3f7d0f9ec133319134ef3defd0e955c2de28a772eff360adf52781f6dd085cc36ec32f2fd717bf6376b7017fcf2c0d0b598e9ea4ab39c2de02997138177e36932b52ff37b506fcea3b7b6c60b4cc622b24ba03ba4191037d499b7d606770aff5b44285d9dc306ba939b169e30cc5732d7474a7eca83e8296f0b261eb3c36c6818ab676368e47f34f380c89"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x21bc45d1731da350}}}}, @m_nat={0x84, 0x9, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x63, 0x7fffffff, 0x0, 0x7fffffff, 0x10001}, @rand_addr=0x64010100, @remote, 0x0, 0x1}}]}, {0x31, 0x6, "fe35d39943ce91b09dd1f3de669aa5f77dd8fda92b8ff94b4d8703845cfc57e688cc3c24fe5cf2725c4c2562ec"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2}}}}]}, @TCA_ROUTE4_ACT={0xcc, 0x6, [@m_vlan={0xc8, 0x13, 0x0, 0x0, {{0x9}, {0xc, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}]}, {0x91, 0x6, "4536d5ba67cb41f3417191a0b4758169ba997e9dbec50e599419b7f290f4ee70efc0bdcb1d84cd2098b9c95fa81553821d25bbee1244fda18d438c3a5d696ee14197d17ea59071f0fd93760930ba453b3e23095f617d12282ec3f8190afeb1ac2e8d254fdac5b6ea11185f9256c3bab37a15cafe5f112d56723f0fb5c49b6449e58fc91a26d527012f701a9cfe"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3}}}}]}, @TCA_ROUTE4_POLICE={0xc, 0x5, [@TCA_POLICE_AVRATE={0x8, 0x4, 0xb}]}]}}]}, 0x520}, 0x1, 0x0, 0x0, 0x81}, 0x8000) r7 = socket(0x10, 0x803, 0x0) sendto(r7, &(0x7f0000000740)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) recvmmsg(r7, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x3a1}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000000080)={0x24, r8, 0x62c21a4ade68aba1, 0x0, 0x0, {{0x32}, {@val={0x8, 0x117, 0x7f}, @val={0x8, 0x3, r10}, @void}}}, 0x24}, 0x1, 0x0, 0x0, 0x4050}, 0x0) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xe9, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000300)=ANY=[], 0x10}], 0x1}, 0x20040051) socket$nl_xfrm(0x10, 0x3, 0x6) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 6m28.379903827s ago: executing program 41 (id=14962): r0 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f00000005c0)={'ip6gretap0\x00', 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) r3 = openat$cgroup_int(r2, &(0x7f0000000240)='cgroup.clone_children\x00', 0x2, 0x0) r4 = openat$cgroup_ro(r2, &(0x7f0000000180)='hugetlb.2MB.rsvd.usage_in_bytes\x00', 0x275a, 0x0) sendfile(r3, r4, 0x0, 0x7ffff000) r5 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x11, 0x4, &(0x7f00000003c0)=ANY=[@ANYRES64=r0], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x60, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffd, @void, @value}, 0x94) r6 = socket(0x10, 0x3, 0x0) connect$netlink(r6, &(0x7f00000014c0)=@proc={0x10, 0x0, 0x1}, 0xc) sendmsg$nl_route_sched(r6, &(0x7f0000000080)={&(0x7f0000000000), 0xc, &(0x7f0000000040)={&(0x7f0000001540)=@newtaction={0x18, 0x32, 0x829, 0x0, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) syz_clone3(&(0x7f0000000400)={0x1000, &(0x7f0000000140), &(0x7f00000001c0), &(0x7f0000000300), {0x40}, &(0x7f0000000600)=""/4096, 0x1000, &(0x7f0000001600)=""/231, &(0x7f0000000380)=[0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff], 0x6}, 0x58) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000001fc0)=@delchain={0x520, 0x65, 0x2, 0x70bd28, 0x25dfdbfc, {0x0, 0x0, 0x0, 0x0, {0x2, 0x8}, {0x0, 0x9}, {0x6}}, [@filter_kind_options=@f_bpf={{0x8}, {0x4}}, @filter_kind_options=@f_route={{0xa}, {0x4}}, @TCA_RATE={0x6, 0x5, {0x6, 0x22}}, @filter_kind_options=@f_route={{0xa}, {0x4cc, 0x2, [@TCA_ROUTE4_FROM={0x8}, @TCA_ROUTE4_IIF={0x8}, @TCA_ROUTE4_ACT={0x3e0, 0x6, [@m_bpf={0xdc, 0x16, 0x0, 0x0, {{0x8}, {0xb4, 0x2, 0x0, 0x1, [@TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x2248, 0x3, 0x10000000, 0x9, 0xf85}}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x2, 0x0, 0x40000000, 0x4, 0xfff}}, @TCA_ACT_BPF_NAME={0xc, 0x6, './file0\x00'}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x5}, @TCA_ACT_BPF_FD={0x8}, @TCA_ACT_BPF_OPS_LEN={0x6, 0x3, 0x6}, @TCA_ACT_BPF_OPS={0x3c, 0x4, [{0xe, 0x8f, 0x1, 0x1}, {0x3, 0xd, 0x4, 0xffff}, {0x2ee, 0x7, 0x9}, {0x2, 0x40, 0x3, 0xffffffff}, {0x3, 0x94, 0xc, 0x20000}, {0x6, 0x4, 0xb3, 0x1}, {0x3, 0x51, 0x4, 0x8}]}, @TCA_ACT_BPF_PARMS={0x18, 0x2, {0x1, 0x9, 0x0, 0x8000, 0x6}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x1, 0x3}}}}, @m_skbmod={0x50, 0x6, 0x0, 0x0, {{0xb}, {0x4}, {0x23, 0x6, "e7da3c8403fae38a6104e8deccdff1af0e8969df3c0c229b39997b18486861"}, {0xc, 0x7, {0x0, 0xeb1aa48f20ecc78b}}, {0xc, 0x8, {0x3}}}}, @m_skbmod={0x38, 0x12, 0x0, 0x0, {{0xb}, {0xc, 0x2, 0x0, 0x1, [@TCA_SKBMOD_ETYPE={0x6, 0x5, 0x4}]}, {0x4}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x1, 0x1}}}}, @m_sample={0x12c, 0x0, 0x0, 0x0, {{0xb}, {0x2c, 0x2, 0x0, 0x1, [@TCA_SAMPLE_PSAMPLE_GROUP={0x8, 0x5, 0xffffffff}, @TCA_SAMPLE_TRUNC_SIZE={0x8, 0x4, 0xf3}, @TCA_SAMPLE_PARMS={0x18, 0x2, {0x7fffffff, 0x1, 0x10000000, 0x132, 0x3}}]}, {0xd5, 0x6, "5585e4978312153aa42f30e46602bd87be41196cb887f6a445019260145eacfc789e0591173e540ea96ddc89cde1312b24d81cd9cf9ddc2ac817e49647559a92bc68922da07ae74d412c68df8f1a425986d1e0fe379e9b66ed2aca073af3aad4e36109274822fbfa834d7a02b3e1fc01841581700abff25ebcfeb38bbb3ee3e0d75898ec65a1ca67c2f06a3b2b9f5eb067c4e21e0deedcf47e3db9cda23dca15b3e34e43e7d7cc1b9201d0e6d45497b608b28ca549f62ba829bfb392018f5c37ab8e7cc7f5221d33e148c986556da3dba5"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x2, 0x3}}}}, @m_ctinfo={0xc8, 0x4, 0x0, 0x0, {{0xb}, {0x4}, {0x9a, 0x6, "b44ebc8afbd2b83e8b5f7f3f7d0f9ec133319134ef3defd0e955c2de28a772eff360adf52781f6dd085cc36ec32f2fd717bf6376b7017fcf2c0d0b598e9ea4ab39c2de02997138177e36932b52ff37b506fcea3b7b6c60b4cc622b24ba03ba4191037d499b7d606770aff5b44285d9dc306ba939b169e30cc5732d7474a7eca83e8296f0b261eb3c36c6818ab676368e47f34f380c89"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2, 0x21bc45d1731da350}}}}, @m_nat={0x84, 0x9, 0x0, 0x0, {{0x8}, {0x2c, 0x2, 0x0, 0x1, [@TCA_NAT_PARMS={0x28, 0x1, {{0x63, 0x7fffffff, 0x0, 0x7fffffff, 0x10001}, @rand_addr=0x64010100, @remote, 0x0, 0x1}}]}, {0x31, 0x6, "fe35d39943ce91b09dd1f3de669aa5f77dd8fda92b8ff94b4d8703845cfc57e688cc3c24fe5cf2725c4c2562ec"}, {0xc, 0x7, {0x0, 0x1}}, {0xc, 0x8, {0x2}}}}]}, @TCA_ROUTE4_ACT={0xcc, 0x6, [@m_vlan={0xc8, 0x13, 0x0, 0x0, {{0x9}, {0xc, 0x2, 0x0, 0x1, [@TCA_VLAN_PUSH_VLAN_PROTOCOL={0x6, 0x4, 0x88a8}]}, {0x91, 0x6, "4536d5ba67cb41f3417191a0b4758169ba997e9dbec50e599419b7f290f4ee70efc0bdcb1d84cd2098b9c95fa81553821d25bbee1244fda18d438c3a5d696ee14197d17ea59071f0fd93760930ba453b3e23095f617d12282ec3f8190afeb1ac2e8d254fdac5b6ea11185f9256c3bab37a15cafe5f112d56723f0fb5c49b6449e58fc91a26d527012f701a9cfe"}, {0xc, 0x7, {0x1, 0x1}}, {0xc, 0x8, {0x3}}}}]}, @TCA_ROUTE4_POLICE={0xc, 0x5, [@TCA_POLICE_AVRATE={0x8, 0x4, 0xb}]}]}}]}, 0x520}, 0x1, 0x0, 0x0, 0x81}, 0x8000) r7 = socket(0x10, 0x803, 0x0) sendto(r7, &(0x7f0000000740)="120000001200e7ef00", 0x9, 0x0, 0x0, 0x0) recvmmsg(r7, &(0x7f00000037c0)=[{{&(0x7f00000004c0)=@ethernet={0x0, @random}, 0xfdf4, &(0x7f0000000380)=[{&(0x7f0000000140)=""/100, 0x3a1}, {&(0x7f0000000280)=""/85, 0x7c}, {&(0x7f0000000fc0)=""/4096, 0x197}, {&(0x7f0000000400)=""/106, 0x645}, {&(0x7f0000000980)=""/73, 0x1b}, {&(0x7f0000000200)=""/77, 0x14}, {&(0x7f00000007c0)=""/154, 0x21}, {&(0x7f00000001c0)=""/17, 0x1d8}], 0x21, &(0x7f0000000600)=""/191, 0x41}}], 0x4000000000003b4, 0x0, &(0x7f0000003700)={0x77359400}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r5}, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f00000004c0), 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r9, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000001b40)={&(0x7f0000000080)={0x24, r8, 0x62c21a4ade68aba1, 0x0, 0x0, {{0x32}, {@val={0x8, 0x117, 0x7f}, @val={0x8, 0x3, r10}, @void}}}, 0x24}, 0x1, 0x0, 0x0, 0x4050}, 0x0) bind$packet(r0, &(0x7f0000000180)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @remote}, 0x14) setsockopt$packet_int(r0, 0x107, 0xf, &(0x7f0000000000)=0xe9, 0x4) sendmsg$netlink(r0, &(0x7f0000002ac0)={0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000300)=ANY=[], 0x10}], 0x1}, 0x20040051) socket$nl_xfrm(0x10, 0x3, 0x6) r11 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r11, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x4, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) 6.430677417s ago: executing program 1 (id=22698): bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x200100, 0x0) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f0000000180)={{0x1, 0xffffffffffffffff}, &(0x7f0000000080), 0x0}, 0x20) prlimit64(0x0, 0xe, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f00000001c0)=0x8) r2 = getpid() bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000380)=ANY=[@ANYBLOB="823f177971d68486da7e2fa50a56cb3851c6369a0899660da0e65ac9bb7229f4bafacea74a28530a78bff084b36353aace54922e73afa06c1ec9ce11c48724fc938aa37dbd8957cbdb8d725bb37530f5d1047acbb45307fb03ffa3bcb2e20f4895c212f23ae880295db92bfc443ac07e22edc9d449d6fff1d38508729f4ac8c226af8e322ca09218c96c1e1c15105b9aceb459eaecefc867ad32185f67643b748478ebbd7878d6403d0eb8d32bfcc26c46d6af51c8420d7980b5bec374b9389408901b9bebf2b66dcfe1d2ed6db9d2d09c167ca479b1a5dd580794dc51", @ANYRES32, @ANYBLOB="0000000000000000b7020000ffff0c63b7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b700000000000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) rmdir(0x0) sched_setscheduler(r2, 0x2, &(0x7f0000000340)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x6770c000) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000a00)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ffd, @void, @value}, 0x94) io_setup(0x1, &(0x7f00000012c0)=0x0) io_submit(r6, 0x7, &(0x7f0000000f40)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x8, r0, &(0x7f0000000c40)="08a863fcdcfad78e404db183824090e14de9c0c7888dca117c69a8c88dc2118a3865e50e4e81884dd7ca8c28157bced599a5fd568cf6ac884b3dcb84404bed3400e58f2a1fe71177b9af80a397946dfb4f2c2683555ee3d1497a2bf7f348b9fa6091070d50080f4e6f1044dc005711f05f6f4e5f122e1df4559531d69de2819ff069451cfe887e3b4b5ce52fbf45f83adb51fa052a38d648bd5da0918fb9068bc347ae2810ae83c6a719d86be5d964e70153746e8f2e8e4ff55c7838693307c9766f4e1d48423f5d8b7df3fee9", 0xcd, 0xc6, 0x0, 0x2, r0}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x8, 0x3, 0xffffffffffffffff, 0x0, 0x0, 0x80000000, 0x0, 0x2}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x2, 0xe2, r0, &(0x7f00000007c0)="ff895664c40a7625956e9b0c4ba1286489f934c3abb58b2c344a5fc597710ff6e03accf281b672bfbd64059b6cb23480c5f286eaf18c3bbcb0e8925be52765c152aa29c38d835690d77c6e4ca80a93d7a0b98288d6a35bb326f829fe1292b33472a0086017582851c7205cbf99831b2b170e1f010f713a278086b69f49eaf5946912c14a", 0x84, 0x0, 0x0, 0x0, r0}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x6, 0x100, r4, &(0x7f0000000980)="c814a5c7d4d40201490815ea922ce0d3ae7fc212c0ec77e8d2ad33d3616b852a1521999603743bbe3697692503c8f47b99ec5335d5442b6b9095d2d616b7eee758abba1961111c9bdb5fb750524ae8f663473f00c26d94f4f3c442d95de7122771441c2210d90797", 0x68, 0xa, 0x0, 0x1, r0}, &(0x7f0000000d40)={0x0, 0x0, 0x0, 0x6, 0x95b, r5, &(0x7f0000000bc0)="152e585005c31c07d4e936d5a4bb7f1ba81322109ae526858777735db3b371cd60b7114981424e61f86e6c52787b5fb080d11b69cf3b32b303e0000e4b97", 0x3e, 0x7af8, 0x0, 0x3, r0}, &(0x7f0000000e40)={0x0, 0x0, 0x0, 0x5, 0xb, r1, &(0x7f0000000d80)="52ceb006eb84e5949f9c019e6c579d2896b1ee10e55415c04c41552a41446d16ec6a4b280d9d5781f96b63dabc868f9e00f709dfb985f3e1a6cbca03c6b448df0dfacd9fd3d0b205a8445d9e013c6bcf4c1108aa3a8851b81a90406fdfc6b811abb1348b050e17db4f569aac14ba59e95726a199a97caed5b6dbd38e7ac8a9b4d12086c3f6ef34d7f69ad2d8f93ef49596845d02ff", 0x95, 0x5}, &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x5, 0x5, r1, &(0x7f0000000e80)="1b3a63a6c4b8674c4c75bc672cc0b221b384e7263ab512c038e06e55a45f589750ff2e7ee3d1af9fa80952ce1fa186cfcfa74d11a2bbfe3db0dcd5cf9bf99113028869778eec2e4dc9cb30", 0x4b, 0x9, 0x0, 0x2}]) keyctl$session_to_parent(0x12) 4.330547437s ago: executing program 1 (id=22729): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000800850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x9a, &(0x7f00000000c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0e86dd600101000064110000000000000000000000000000000000ff02000000000000000000000000000100004e220064", @ANYRESOCT=0x0], 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffd}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xc) getpriority(0x1, r2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/timer_list\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r3, 0x200}], 0x1, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000023896) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x1f1e}, 0x0, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6, 0x0, 0xffffffffffffffff}, 0x13) r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) fcntl$setlease(r7, 0x400, 0x1) fremovexattr(r7, &(0x7f0000000040)=@known='system.posix_acl_default\x00') r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r10, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="0700000000000000000005000000180001801400020073797a5f74756e0000000000000000000800038004000380080005"], 0x3c}}, 0x0) r12 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r12) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) 3.431879701s ago: executing program 1 (id=22748): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000800850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x9a, &(0x7f00000000c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0e86dd600101000064110000000000000000000000000000000000ff02000000000000000000000000000100004e220064", @ANYRESOCT=0x0], 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffd}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xc) getpriority(0x1, r2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/timer_list\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r3, 0x200}], 0x1, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000023896) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x1f1e}, 0x0, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r5, 0x0, 0xffffffffffffffff}, 0x13) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) fcntl$setlease(r6, 0x400, 0x1) fremovexattr(r6, &(0x7f0000000040)=@known='system.posix_acl_default\x00') 2.951864168s ago: executing program 5 (id=22753): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x3}, 0x18) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) getpeername$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001600)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf0200000000000000010000f8ffffffbfa400000000000007040000f0ffffffb70220000800000018230000", @ANYRES32=r3, @ANYBLOB="0093000000004d632c922bf4d5256900000095002baaebe95e4872cc4361192599c8fe0bb3f5132a839113"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4a, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000680)='kfree\x00', r4}, 0x18) write$selinux_validatetrans(0xffffffffffffffff, 0x0, 0x79) sendmsg$rds(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@rdma_args={0x48, 0x114, 0x1, {{0x3, 0x2}, {&(0x7f00000000c0)=""/160, 0xa0}, &(0x7f0000000340)=[{&(0x7f00000014c0)=""/104, 0x68}], 0x1, 0x60, 0xfffffffefffffffe}}], 0x48, 0x8004}, 0x0) 2.814359059s ago: executing program 5 (id=22756): pwritev2(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000001600), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001640)={0x1c, r3, 0x1}, 0x1c}}, 0x0) 2.701184791s ago: executing program 5 (id=22757): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x4052, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_emit_ethernet(0xbe, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) keyctl$clear(0x3, 0xfffffffffffffffd) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2400000020000103000000000000000002000000000000001a0000000500110001"], 0x24}, 0x1, 0x0, 0x0, 0x4050}, 0x4000050) 2.522426804s ago: executing program 4 (id=22760): pwritev2(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000080)="ff", 0xabfb}], 0x1, 0x5405, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000080), &(0x7f0000000280)=@udp}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$tipc(&(0x7f0000001600), 0xffffffffffffffff) sendmsg$TIPC_CMD_SHOW_PORTS(r2, &(0x7f00000016c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001640)={0x1c, r3, 0x1}, 0x1c}}, 0x0) 2.513263934s ago: executing program 1 (id=22761): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x30410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30c3a0e4, 0x1, @perf_bp={0x0, 0xb}, 0x11d08, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x40011, 0x0, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x19, 0x0) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380), 0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000007ff90000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)=ANY=[@ANYBLOB="c4000000", @ANYRES16=r0, @ANYBLOB="01000000000000000000010000002c000280060002004e2000000800090010000000060002004e2100"], 0xc4}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) r3 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r3}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = getpid() r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r6, 0x1, 0x70bd26, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r4}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) 2.348426486s ago: executing program 4 (id=22764): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020722500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000080850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = timerfd_create(0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x61, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={0x0}, 0x18) socket$nl_generic(0x10, 0x3, 0x10) ioperm(0x3, 0x7, 0x7) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x38}, 0x1, 0x300}, 0x0) r3 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) ptrace(0x10, r3) ptrace$getregset(0x4204, r3, 0x201, &(0x7f0000000100)={0x0}) timerfd_gettime(r1, &(0x7f0000000040)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) symlinkat(0x0, 0xffffffffffffffff, 0x0) 2.09351408s ago: executing program 4 (id=22765): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0}, 0x18) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000010850000008600000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, 0x0, 0x0) write$RDMA_USER_CM_CMD_QUERY(r2, &(0x7f00000000c0)={0x13, 0x10, 0x8, {0x0, 0xffffffffffffffff, 0x1}}, 0x18) 2.017712981s ago: executing program 4 (id=22768): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, 0x0, 0x1, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setscheduler(r2, 0x2, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_emit_ethernet(0xbe, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200) sendmsg$nl_xfrm(r6, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000640)=ANY=[@ANYBLOB="d0010000100010000000000000000000fc0100000000000000000000000000010000000000000000000007ffe000000100000000000000040000e0600000000015a8aa35cbd3c2bbcee7de53e79b0d7047c64be56148caa3946f6b2bf80901fb90707428355c4cccc0894c6dd02fea2cae7f4fed55c268c0b81909d8ec7ef09f8bf074759ce0e6fc363be820bf83b270f52f1d10442bbaf1f92b1ecd9e637e190902394a826b90474e51bfd8f8", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="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"], 0x1d0}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2400000020000103000000000000000002000000000000001a0000000500110001"], 0x24}, 0x1, 0x0, 0x0, 0x4050}, 0x4000050) 1.786684504s ago: executing program 5 (id=22770): symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000100)='./file0\x00') unshare(0x22000200) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000600)=@newtfilter={0x54, 0x2c, 0xd27, 0x70bd2d, 0x25dfdc00, {0x0, 0x0, 0x0, r4, {0x0, 0x3}, {}, {0x3, 0x3}}, [@filter_kind_options=@f_flower={{0xb}, {0x24, 0x2, [@TCA_FLOWER_KEY_ETH_SRC={0xa, 0x6, @link_local}, @TCA_FLOWER_INDEV={0x14, 0x2, 'bridge_slave_0\x00'}]}}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r6}, 0x10) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0, 0x3) 1.575580967s ago: executing program 1 (id=22771): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000800850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x9a, &(0x7f00000000c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0e86dd600101000064110000000000000000000000000000000000ff02000000000000000000000000000100004e220064", @ANYRESOCT=0x0], 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffd}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xc) getpriority(0x1, r2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/timer_list\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r3, 0x200}], 0x1, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000023896) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x1f1e}, 0x0, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6, 0x0, 0xffffffffffffffff}, 0x13) r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) fcntl$setlease(r7, 0x400, 0x1) fremovexattr(r7, &(0x7f0000000040)=@known='system.posix_acl_default\x00') r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="0700000000000000000005000000180001801400020073797a5f74756e0000000000000000000800038004000380080005"], 0x3c}}, 0x0) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r11) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, @void, @value}, 0x94) 1.43081441s ago: executing program 5 (id=22775): mkdirat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x0) chdir(&(0x7f0000000280)='./file0\x00') creat(&(0x7f0000000300)='./bus\x00', 0x15d) r0 = open(&(0x7f00000000c0)='./bus\x00', 0x14103e, 0x0) r1 = open(&(0x7f0000000000)='./file0\x00', 0x143042, 0xfe) ftruncate(r1, 0x2008002) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) getpid() sched_setaffinity(0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) prctl$PR_SET_NAME(0xf, &(0x7f0000000680)='+}[@\x00[$oB\xfa=\xee\xc4F\xba\xed\x97') r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000a80)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x18) sendfile(r0, r1, 0x0, 0x80000001) 1.270596361s ago: executing program 6 (id=22778): socket$inet_tcp(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x21, '\x00', 0x0, @fallback=0x36, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f00000006c0)='kmem_cache_free\x00', r0, 0x0, 0x2000}, 0x18) mlock2(&(0x7f0000dfb000/0x1000)=nil, 0x1000, 0x1) mlock2(&(0x7f0000e22000/0x1000)=nil, 0x1000, 0x0) mlock2(&(0x7f0000c00000/0x400000)=nil, 0x400000, 0x0) 1.208862682s ago: executing program 6 (id=22779): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000480)={0x6, 0x3, &(0x7f0000000680)=ANY=[], &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0xf5ffffff, &(0x7f0000000000)='%', 0x0, 0xd01, 0xbe02, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000002c0)=ANY=[@ANYBLOB="14000000100001000000000000dfff000000000a20000000000a01020000000000000000010000000900010073797a30000000006c000000160a0101000b000000000000010000000900020073797a30000000000900010073797a30000000004000038008000140000000002c0003801400010067656e65766530000000000000000000140001006c6f0000000000000000000000000000080002"], 0xb4}}, 0x0) 1.066180195s ago: executing program 6 (id=22780): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000016000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x2000002, 0x4052, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYRES32, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = socket$nl_route(0x10, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r2 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r2, 0x2, &(0x7f0000000200)=0x7) bpf$PROG_LOAD(0x5, 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r3, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r4, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r3, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_emit_ethernet(0xbe, 0x0, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000240)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020700000000000002030207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000100850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x19, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='sched_switch\x00', r5}, 0x10) keyctl$clear(0x3, 0xfffffffffffffffd) unlinkat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x200) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000200)=ANY=[@ANYBLOB="2400000020000103000000000000000002000000000000001a0000000500110001"], 0x24}, 0x1, 0x0, 0x0, 0x4050}, 0x4000050) 629.195961ms ago: executing program 8 (id=22781): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x64, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x200}, @IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}]}, 0x64}}, 0x0) 477.017383ms ago: executing program 1 (id=22782): symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000100)='./file0\x00') unshare(0x22000200) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000600)=@newtfilter={0x54, 0x2c, 0xd27, 0x70bd2d, 0x25dfdc00, {0x0, 0x0, 0x0, r4, {0x0, 0x3}, {}, {0x3, 0x3}}, [@filter_kind_options=@f_flower={{0xb}, {0x24, 0x2, [@TCA_FLOWER_KEY_ETH_SRC={0xa, 0x6, @link_local}, @TCA_FLOWER_INDEV={0x14, 0x2, 'bridge_slave_0\x00'}]}}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x10000, &(0x7f00000001c0)={[{@nodioread_nolock}, {@nodiscard}, {@bh}, {@max_batch_time={'max_batch_time', 0x3d, 0x8c9}}, {@nodiscard}, {@inlinecrypt}, {@i_version}]}, 0x6, 0x5fc, &(0x7f0000000600)="$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") pipe2(&(0x7f00000003c0), 0x4080) 448.717843ms ago: executing program 4 (id=22783): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000680)={0x18, 0x5, &(0x7f0000000400)=ANY=[], &(0x7f0000000640)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000440)={&(0x7f00000003c0)='kfree\x00', r0}, 0x10) r1 = inotify_init1(0x0) inotify_add_watch(r1, &(0x7f0000000400)='.\x00', 0xa00000a1) io_uring_enter(0xffffffffffffffff, 0x47bc, 0x0, 0x21, 0x0, 0x0) close(r1) 435.839883ms ago: executing program 8 (id=22784): bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32=0x0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f66f63bb850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x10, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000340)={&(0x7f0000000300)='kfree\x00', r0}, 0x10) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000340)=@gcm_128={{0x304}, "a6341a1a379332f5", "38d33cb95d66a1781f31bf07fd2ae874", "62266bd8", "d1b29b99d21d88a2"}, 0x28) write$binfmt_script(r1, &(0x7f0000000780)={'#! ', './file0'}, 0xb) 384.634644ms ago: executing program 5 (id=22785): symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000100)='./file0\x00') unshare(0x22000200) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000600)=@newtfilter={0x54, 0x2c, 0xd27, 0x70bd2d, 0x25dfdc00, {0x0, 0x0, 0x0, r4, {0x0, 0x3}, {}, {0x3, 0x3}}, [@filter_kind_options=@f_flower={{0xb}, {0x24, 0x2, [@TCA_FLOWER_KEY_ETH_SRC={0xa, 0x6, @link_local}, @TCA_FLOWER_INDEV={0x14, 0x2, 'bridge_slave_0\x00'}]}}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000001200)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) utimes(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r6}, 0x10) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x10000, &(0x7f00000001c0)={[{@nodioread_nolock}, {@nodiscard}, {@bh}, {@max_batch_time={'max_batch_time', 0x3d, 0x8c9}}, {@nodiscard}, {@inlinecrypt}, {@i_version}]}, 0x6, 0x5fc, &(0x7f0000000600)="$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") pipe2(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4080) close(r7) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r9 = socket(0x400000000010, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000000ac0)=@newtfilter={0x64, 0x2c, 0xd27, 0x70bd25, 0x8000, {0x0, 0x0, 0x0, r10, {0x0, 0x7}, {}, {0x7, 0x2}}, [@filter_kind_options=@f_flower={{0xb}, {0x34, 0x2, [@TCA_FLOWER_ACT={0x30, 0x3, [@m_xt={0x2c, 0x1, 0x0, 0x0, {{0x7}, {0x4}, {0x4}, {0xc, 0x7, {0x1, 0x1}}, {0xc}}}]}]}}]}, 0x64}, 0x1, 0x0, 0x0, 0x80}, 0x800) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0, 0x3) 371.661375ms ago: executing program 4 (id=22786): symlink(&(0x7f0000000000)='.\x00', &(0x7f0000000100)='./file0\x00') unshare(0x22000200) r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x0, 0x2}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8, 0x2, {0x0, 0x3}}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r2, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000600)=@newtfilter={0x54, 0x2c, 0xd27, 0x70bd2d, 0x25dfdc00, {0x0, 0x0, 0x0, r4, {0x0, 0x3}, {}, {0x3, 0x3}}, [@filter_kind_options=@f_flower={{0xb}, {0x24, 0x2, [@TCA_FLOWER_KEY_ETH_SRC={0xa, 0x6, @link_local}, @TCA_FLOWER_INDEV={0x14, 0x2, 'bridge_slave_0\x00'}]}}]}, 0x54}, 0x1, 0x0, 0x0, 0x10}, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r5}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r6}, 0x10) setxattr$security_capability(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x0, 0x0, 0x3) 362.565495ms ago: executing program 8 (id=22787): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="0700000000000000000005000000180001801400020073797a5f74756e00000000000000000008000380040003800800"], 0x3c}}, 0x0) 307.947335ms ago: executing program 8 (id=22788): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x11, 0x13, &(0x7f0000000080)=ANY=[@ANYBLOB="18080000000001000000000000000000851000000600000018000000", @ANYRES32, @ANYBLOB="00000000000100006608000000000000180000000000000000000000000000009500000000000000360a020000000000180100002020782500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b50a000000000000850000000600000095"], &(0x7f0000000000)='GPL\x00', 0xa, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000a80)='kfree\x00', r0, 0x0, 0xfffffffffffffffd}, 0x18) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10010, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0x4}, 0x0, 0xc8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_CREATE(r1, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x64, 0x2, 0x6, 0x5, 0x0, 0x0, {}, [@IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_DATA={0x14, 0x7, 0x0, 0x1, [@IPSET_ATTR_TIMEOUT={0x8, 0x6, 0x1, 0x0, 0x200}, @IPSET_ATTR_MAXELEM={0x8}]}, @IPSET_ATTR_TYPENAME={0x16, 0x3, 'hash:net,port,net\x00'}, @IPSET_ATTR_FAMILY={0x5, 0x5, 0x2}, @IPSET_ATTR_REVISION={0x5}]}, 0x64}}, 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x10) unshare(0x24020400) poll(&(0x7f0000000000), 0x20000000000000b5, 0x9) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000003c0)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x10001, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000000)=@framed={{}, [@ringbuf_query={{0x18, 0x1, 0x1, 0x0, r4}}]}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f00000001c0)='kfree\x00', r5, 0x0, 0x4}, 0x18) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r6, 0x29, 0x40, &(0x7f0000000700)=@raw={'raw\x00', 0x3c1, 0x3, 0x4e8, 0x0, 0x940c, 0x3002, 0x2e0, 0x2c0, 0x418, 0x3d8, 0x3d8, 0x418, 0x3d8, 0x3, 0x0, {[{{@ipv6={@ipv4={'\x00', '\xff\xff', @loopback}, @local, [0xff, 0xffffffff, 0x0, 0xff000000], [0xffffff00, 0xff000000], 'erspan0\x00', 'wlan0\x00', {}, {0xff}, 0x2b, 0x3, 0x3}, 0x0, 0x298, 0x2e0, 0x0, {}, [@common=@inet=@recent0={{0xf8}, {0x0, 0x2, 0x1, 0x0, 'syz0\x00'}}, @common=@inet=@recent0={{0xf8}, {0x0, 0x0, 0x2, 0x0, 'syz0\x00'}}]}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@loopback, 'virt_wifi0\x00'}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0, [0x0, 0x0, 0xff000000, 0xff], [0xffffff00, 0xffffff00, 0xff000000, 0xffffffff], 'team_slave_1\x00', 'veth1_virt_wifi\x00', {0xff}, {}, 0x886215f4d37bb4bb, 0x90, 0x1, 0x69}, 0x0, 0xd0, 0x138, 0x0, {}, [@inet=@rpfilter={{0x28}}]}, @unspec=@CT1={0x68, 'CT\x00', 0x1, {0x0, 0x0, 0x0, 0x0, '\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x548) r7 = creat(&(0x7f0000000080)='./file0\x00', 0xc7) close(r7) r8 = socket$tipc(0x1e, 0x5, 0x0) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r7}, 0x2c, {'wfdno', 0x3d, r8}}) bpf$PROG_LOAD(0x5, &(0x7f0000000840)={0x17, 0x19, &(0x7f0000000740)=@framed={{0x18, 0x5}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r3}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, r2}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x8}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x2}}]}, 0x0, 0x101, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kfree\x00', r9, 0x0, 0x1}, 0x18) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f00000000000000000a000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) 196.361247ms ago: executing program 6 (id=22789): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000180000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b7030000000000f0850000002d00000095"], &(0x7f00000003c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f00000004c0)='kfree\x00', r2}, 0xe) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000300)={0xa, 0x0, 0x0, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000340)=@gcm_128={{0x304}, "a6341a1a379332f5", "38d33cb95d66a1781f31bf07fd2ae874", "62266bd8", "d1b29b99d21d88a2"}, 0x28) write$binfmt_script(r1, &(0x7f0000000780)={'#! ', './file0'}, 0xb) close_range(r0, r1, 0x0) 129.885368ms ago: executing program 8 (id=22790): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0xb}, 0x100002, 0x0, 0xfffffffc, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x3}, 0x18) r2 = socket$rds(0x15, 0x5, 0x0) bind$rds(r2, &(0x7f0000000840)={0x2, 0x0, @loopback}, 0x10) getpeername$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x0) r3 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x50) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000016c0)={0x11, 0x10, &(0x7f0000001600)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bf0200000000000000010000f8ffffffbfa400000000000007040000f0ffffffb70220000800000018230000", @ANYRES32=r3, @ANYBLOB="0093000000004d632c922bf4d5256900000095002baaebe95e4872cc4361192599c8fe0bb3f5132a839113"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x4a, '\x00', 0x0, @fallback=0x2f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x76, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000980)={&(0x7f0000000680)='kfree\x00', r4}, 0x18) write$selinux_validatetrans(0xffffffffffffffff, 0x0, 0x79) sendmsg$rds(r2, &(0x7f0000000300)={&(0x7f0000000040)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f00000006c0)=[@rdma_args={0x48, 0x114, 0x1, {{0x3, 0x2}, {&(0x7f00000000c0)=""/160, 0xa0}, &(0x7f0000000340)=[{&(0x7f00000014c0)=""/104, 0x68}], 0x1, 0x60, 0xfffffffefffffffe}}], 0x48, 0x8004}, 0x0) 80.115108ms ago: executing program 6 (id=22791): r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) fcntl$setlease(r0, 0x400, 0x1) fremovexattr(r0, &(0x7f0000000040)=@known='system.posix_acl_default\x00') 3.7842ms ago: executing program 6 (id=22792): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000800850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) syz_emit_ethernet(0x9a, &(0x7f00000000c0)=ANY=[@ANYBLOB="0180c2000000aaaaaaaaaa0e86dd600101000064110000000000000000000000000000000000ff02000000000000000000000000000100004e220064", @ANYRESOCT=0x0], 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffd}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000200)={0x0}, &(0x7f0000000280)=0xc) getpriority(0x1, r2) r3 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000180), 0x2, 0x0) r4 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000240)='/proc/timer_list\x00', 0x0, 0x0) ppoll(&(0x7f0000000080)=[{r3, 0x200}], 0x1, 0x0, 0x0, 0x0) sendfile(r3, r4, 0x0, 0x20000023896) r5 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x41, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x800000000003}, 0x1100, 0x5dd8, 0x0, 0x3, 0x0, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x1f1e}, 0x0, 0xffffffffffffffff, r4, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000400)={0x5, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="1804000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b100000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x18, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, @fallback=0x32, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r6, 0x0, 0xffffffffffffffff}, 0x13) r7 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./bus\x00', 0x289c2, 0x1) fcntl$setlease(r7, 0x400, 0x1) fremovexattr(r7, &(0x7f0000000040)=@known='system.posix_acl_default\x00') r8 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x50) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r9}, 0x10) r10 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKMODES_SET(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000680)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="0700000000000000000005000000180001801400020073797a5f74756e0000000000000000000800038004000380080005"], 0x3c}}, 0x0) r11 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000003c0)={0x5, 0x3, &(0x7f0000000500)=ANY=[@ANYBLOB="1800000000001200000000000000000095"], &(0x7f0000000c00)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x1, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r11) r12 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r12, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, @void, @value}, 0x94) 0s ago: executing program 8 (id=22793): perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x30410, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x30c3a0e4, 0x1, @perf_bp={0x0, 0xb}, 0x11d08, 0x2, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) syz_clone(0x40011, 0x0, 0x0, 0x0, 0x0, 0x0) rt_tgsigqueueinfo(0x0, 0x0, 0x19, 0x0) r0 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000380), 0xffffffffffffffff) write(0xffffffffffffffff, 0x0, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0b00000007000000010001000800000001000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="0000000000000000000000000000000000000000000000007ff90000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000002c7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$IPVS_CMD_FLUSH(0xffffffffffffffff, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000100)=ANY=[@ANYBLOB="c4000000", @ANYRES16=r0, @ANYBLOB="01000000000000000000010000002c000280060002004e2000000800090010000000060002004e2100"], 0xc4}}, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x8, 0x3, &(0x7f00000001c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x10) bind$netlink(0xffffffffffffffff, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0x8, &(0x7f0000000000), 0x4) socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000040)) bpf$MAP_CREATE(0x0, &(0x7f0000000580)=@base={0x6, 0x4, 0x8, 0x8, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = getpid() r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r4, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r5, 0x1, 0x70bd26, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) kernel console output (not intermixed with test programs): family 0 port 6081 - 0 [ 1261.366273][T28930] vhci_hcd: connection closed [ 1261.371203][T28814] netdevsim netdevsim5 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1261.384668][T28814] netdevsim netdevsim5 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1261.393439][T28814] netdevsim netdevsim5 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1261.403813][T21062] vhci_hcd: stop threads [ 1261.408161][T21062] vhci_hcd: release socket [ 1261.412812][T21062] vhci_hcd: disconnect device [ 1261.545404][T28949] FAULT_INJECTION: forcing a failure. [ 1261.545404][T28949] name failslab, interval 1, probability 0, space 0, times 0 [ 1261.558184][T28949] CPU: 1 UID: 0 PID: 28949 Comm: syz.8.21279 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1261.558217][T28949] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1261.558297][T28949] Call Trace: [ 1261.558303][T28949] [ 1261.558309][T28949] __dump_stack+0x1d/0x30 [ 1261.558352][T28949] dump_stack_lvl+0xe8/0x140 [ 1261.558423][T28949] dump_stack+0x15/0x1b [ 1261.558440][T28949] should_fail_ex+0x265/0x280 [ 1261.558508][T28949] should_failslab+0x8c/0xb0 [ 1261.558542][T28949] __kmalloc_node_noprof+0xa9/0x410 [ 1261.558561][T28949] ? qdisc_alloc+0x65/0x440 [ 1261.558583][T28949] qdisc_alloc+0x65/0x440 [ 1261.558666][T28949] ? nla_strcmp+0xc3/0xe0 [ 1261.558758][T28949] qdisc_create+0xc0/0x970 [ 1261.558776][T28949] tc_modify_qdisc+0xdc7/0x1310 [ 1261.558800][T28949] ? __pfx_tc_modify_qdisc+0x10/0x10 [ 1261.558876][T28949] rtnetlink_rcv_msg+0x657/0x6d0 [ 1261.558896][T28949] netlink_rcv_skb+0x123/0x220 [ 1261.558927][T28949] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 1261.558945][T28949] rtnetlink_rcv+0x1c/0x30 [ 1261.558957][T28949] netlink_unicast+0x5a1/0x670 [ 1261.559053][T28949] netlink_sendmsg+0x58b/0x6b0 [ 1261.559066][T28949] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1261.559077][T28949] __sock_sendmsg+0x145/0x180 [ 1261.559092][T28949] ____sys_sendmsg+0x31e/0x4e0 [ 1261.559105][T28949] ___sys_sendmsg+0x17b/0x1d0 [ 1261.559172][T28949] __x64_sys_sendmsg+0xd4/0x160 [ 1261.559185][T28949] x64_sys_call+0x2999/0x2fb0 [ 1261.559197][T28949] do_syscall_64+0xd0/0x1a0 [ 1261.559211][T28949] ? clear_bhb_loop+0x40/0x90 [ 1261.559309][T28949] ? clear_bhb_loop+0x40/0x90 [ 1261.559321][T28949] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1261.559333][T28949] RIP: 0033:0x7f3bd432e969 [ 1261.559343][T28949] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1261.559354][T28949] RSP: 002b:00007f3bd2997038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1261.559380][T28949] RAX: ffffffffffffffda RBX: 00007f3bd4555fa0 RCX: 00007f3bd432e969 [ 1261.559387][T28949] RDX: 0000000000044080 RSI: 0000200000000040 RDI: 0000000000000003 [ 1261.559394][T28949] RBP: 00007f3bd2997090 R08: 0000000000000000 R09: 0000000000000000 [ 1261.559401][T28949] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1261.559408][T28949] R13: 0000000000000000 R14: 00007f3bd4555fa0 R15: 00007fffbdba3cc8 [ 1261.559446][T28949] [ 1261.840480][T28953] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1261.872884][T28953] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1261.939782][T28960] netlink: 8 bytes leftover after parsing attributes in process `syz.4.21284'. [ 1261.961642][T28953] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1261.997533][T28964] FAULT_INJECTION: forcing a failure. [ 1261.997533][T28964] name failslab, interval 1, probability 0, space 0, times 0 [ 1262.010346][T28964] CPU: 1 UID: 0 PID: 28964 Comm: syz.1.21286 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1262.010376][T28964] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1262.010389][T28964] Call Trace: [ 1262.010397][T28964] [ 1262.010411][T28964] __dump_stack+0x1d/0x30 [ 1262.010438][T28964] dump_stack_lvl+0xe8/0x140 [ 1262.010457][T28964] dump_stack+0x15/0x1b [ 1262.010474][T28964] should_fail_ex+0x265/0x280 [ 1262.010509][T28964] should_failslab+0x8c/0xb0 [ 1262.010566][T28964] kmem_cache_alloc_noprof+0x50/0x310 [ 1262.010653][T28964] ? skb_clone+0x151/0x1f0 [ 1262.010678][T28964] skb_clone+0x151/0x1f0 [ 1262.010751][T28964] nfnetlink_rcv+0x305/0x1690 [ 1262.010779][T28964] ? __kfree_skb+0x109/0x150 [ 1262.010861][T28964] ? nlmon_xmit+0x4f/0x60 [ 1262.010882][T28964] ? nlmon_xmit+0x4f/0x60 [ 1262.010949][T28964] ? dev_hard_start_xmit+0x39e/0x3d0 [ 1262.010977][T28964] ? __dev_queue_xmit+0x11c0/0x1fb0 [ 1262.011002][T28964] ? __dev_queue_xmit+0x182/0x1fb0 [ 1262.011099][T28964] ? ref_tracker_free+0x37d/0x3e0 [ 1262.011149][T28964] netlink_unicast+0x5a1/0x670 [ 1262.011193][T28964] netlink_sendmsg+0x58b/0x6b0 [ 1262.011220][T28964] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1262.011304][T28964] __sock_sendmsg+0x145/0x180 [ 1262.011337][T28964] ____sys_sendmsg+0x31e/0x4e0 [ 1262.011361][T28964] ___sys_sendmsg+0x17b/0x1d0 [ 1262.011392][T28964] __x64_sys_sendmsg+0xd4/0x160 [ 1262.011489][T28964] x64_sys_call+0x2999/0x2fb0 [ 1262.011511][T28964] do_syscall_64+0xd0/0x1a0 [ 1262.011537][T28964] ? clear_bhb_loop+0x40/0x90 [ 1262.011564][T28964] ? clear_bhb_loop+0x40/0x90 [ 1262.011621][T28964] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1262.011648][T28964] RIP: 0033:0x7fa868e9e969 [ 1262.011699][T28964] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1262.011721][T28964] RSP: 002b:00007fa867507038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1262.011747][T28964] RAX: ffffffffffffffda RBX: 00007fa8690c5fa0 RCX: 00007fa868e9e969 [ 1262.011763][T28964] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 1262.011780][T28964] RBP: 00007fa867507090 R08: 0000000000000000 R09: 0000000000000000 [ 1262.011796][T28964] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1262.011872][T28964] R13: 0000000000000000 R14: 00007fa8690c5fa0 R15: 00007ffd00328668 [ 1262.011895][T28964] [ 1262.017622][T28962] netlink: 8 bytes leftover after parsing attributes in process `syz.4.21285'. [ 1262.284372][T28953] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1262.341448][T28982] netlink: 8 bytes leftover after parsing attributes in process `syz.5.21295'. [ 1262.412987][T28953] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1262.428004][T28953] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1262.451198][T28953] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1262.463042][T28953] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1262.584766][T28999] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1262.605704][T29003] netlink: 8 bytes leftover after parsing attributes in process `syz.8.21303'. [ 1262.639209][T29005] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1262.647760][T29005] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1262.666662][T29005] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1262.677204][T29005] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1262.690040][T29009] xt_hashlimit: max too large, truncated to 1048576 [ 1262.707950][T29009] Cannot find set identified by id 0 to match [ 1262.709478][T29005] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1262.789474][T29018] resource: Trying to free nonexistent resource <0x00000000000002e8-0x00000000000002ef> [ 1262.859711][T29024] nfs4: Bad value for 'source' [ 1262.869885][ T29] kauditd_printk_skb: 535 callbacks suppressed [ 1262.869903][ T29] audit: type=1400 audit(1747797284.592:46599): avc: denied { mount } for pid=29023 comm="syz.6.21310" name="/" dev="hugetlbfs" ino=238837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 1262.931181][ T29] audit: type=1326 audit(1747797284.652:46600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29027 comm="syz.8.21313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1262.955120][ T29] audit: type=1326 audit(1747797284.652:46601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29027 comm="syz.8.21313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1262.979066][ T29] audit: type=1326 audit(1747797284.652:46602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29027 comm="syz.8.21313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1263.003004][ T29] audit: type=1326 audit(1747797284.652:46603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29027 comm="syz.8.21313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1263.026783][ T29] audit: type=1326 audit(1747797284.652:46604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29027 comm="syz.8.21313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1263.050715][ T29] audit: type=1326 audit(1747797284.652:46605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29027 comm="syz.8.21313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1263.074521][ T29] audit: type=1326 audit(1747797284.652:46606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29027 comm="syz.8.21313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1263.098473][ T29] audit: type=1326 audit(1747797284.652:46607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29027 comm="syz.8.21313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1263.122284][ T29] audit: type=1326 audit(1747797284.652:46608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29027 comm="syz.8.21313" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1263.549304][T29078] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(7) [ 1263.555874][T29078] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 1263.564165][T29078] vhci_hcd vhci_hcd.0: Device attached [ 1263.574831][T29079] vhci_hcd: connection closed [ 1263.575057][T21075] vhci_hcd: stop threads [ 1263.584279][T21075] vhci_hcd: release socket [ 1263.588767][T21075] vhci_hcd: disconnect device [ 1263.643746][T29082] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1263.691951][T29082] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1263.741798][T29082] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1263.801644][T29082] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1264.436033][T28999] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1264.468851][T29108] xt_hashlimit: max too large, truncated to 1048576 [ 1264.711473][T29141] FAULT_INJECTION: forcing a failure. [ 1264.711473][T29141] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1264.724818][T29141] CPU: 1 UID: 0 PID: 29141 Comm: syz.4.21362 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1264.724853][T29141] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1264.724868][T29141] Call Trace: [ 1264.724876][T29141] [ 1264.724886][T29141] __dump_stack+0x1d/0x30 [ 1264.724911][T29141] dump_stack_lvl+0xe8/0x140 [ 1264.724934][T29141] dump_stack+0x15/0x1b [ 1264.724983][T29141] should_fail_ex+0x265/0x280 [ 1264.725025][T29141] should_fail+0xb/0x20 [ 1264.725131][T29141] should_fail_usercopy+0x1a/0x20 [ 1264.725191][T29141] strncpy_from_user+0x25/0x230 [ 1264.725239][T29141] ? kmem_cache_alloc_noprof+0x186/0x310 [ 1264.725324][T29141] ? getname_flags+0x80/0x3b0 [ 1264.725355][T29141] getname_flags+0xae/0x3b0 [ 1264.725390][T29141] __x64_sys_symlinkat+0x40/0x70 [ 1264.725463][T29141] x64_sys_call+0x1558/0x2fb0 [ 1264.725487][T29141] do_syscall_64+0xd0/0x1a0 [ 1264.725510][T29141] ? clear_bhb_loop+0x40/0x90 [ 1264.725532][T29141] ? clear_bhb_loop+0x40/0x90 [ 1264.725567][T29141] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1264.725592][T29141] RIP: 0033:0x7f8ee89be969 [ 1264.725610][T29141] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1264.725688][T29141] RSP: 002b:00007f8ee7027038 EFLAGS: 00000246 ORIG_RAX: 000000000000010a [ 1264.725708][T29141] RAX: ffffffffffffffda RBX: 00007f8ee8be5fa0 RCX: 00007f8ee89be969 [ 1264.725721][T29141] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: 0000000000000000 [ 1264.725734][T29141] RBP: 00007f8ee7027090 R08: 0000000000000000 R09: 0000000000000000 [ 1264.725749][T29141] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1264.725763][T29141] R13: 0000000000000000 R14: 00007f8ee8be5fa0 R15: 00007ffe4baaf1d8 [ 1264.725823][T29141] [ 1264.947053][T29145] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(6) [ 1264.953579][T29145] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 1264.961830][T29145] vhci_hcd vhci_hcd.0: Device attached [ 1264.967766][T29146] vhci_hcd: connection closed [ 1264.967887][T21062] vhci_hcd: stop threads [ 1264.976825][T21062] vhci_hcd: release socket [ 1264.981304][T21062] vhci_hcd: disconnect device [ 1265.015123][T28999] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1265.064200][T28999] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1265.115623][T28999] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1265.127053][T28999] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1265.138059][T28999] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1265.149973][T28999] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1265.685928][T29178] 9pnet_fd: Insufficient options for proto=fd [ 1265.847370][T29188] __nla_validate_parse: 19 callbacks suppressed [ 1265.847389][T29188] netlink: 56 bytes leftover after parsing attributes in process `syz.4.21380'. [ 1266.003263][T29192] netlink: 8 bytes leftover after parsing attributes in process `syz.4.21382'. [ 1266.441277][T29206] 9pnet_fd: Insufficient options for proto=fd [ 1266.503997][T29212] netlink: 56 bytes leftover after parsing attributes in process `syz.4.21391'. [ 1266.586142][T29224] netlink: 24 bytes leftover after parsing attributes in process `syz.1.21397'. [ 1266.601722][T29226] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1266.652093][T29226] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1266.702318][T29226] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1266.810288][T29082] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1266.821500][T29082] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1266.831272][T29226] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1266.844074][T29082] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1266.857184][T29082] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1267.030330][T29239] 9pnet_fd: Insufficient options for proto=fd [ 1267.368363][T29249] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1267.377010][T29249] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1267.397621][T29249] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1267.419265][T29249] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1267.420886][T29253] xt_hashlimit: max too large, truncated to 1048576 [ 1267.447920][T29253] Cannot find set identified by id 0 to match [ 1267.468764][T29249] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1267.470602][T29256] IPv6: sit1: Disabled Multicast RS [ 1267.477505][T29249] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1267.491673][T29259] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(6) [ 1267.498284][T29259] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 1267.506686][T29259] vhci_hcd vhci_hcd.0: Device attached [ 1267.526219][T29260] vhci_hcd: connection closed [ 1267.526443][T21087] vhci_hcd: stop threads [ 1267.535507][T21087] vhci_hcd: release socket [ 1267.540036][T21087] vhci_hcd: disconnect device [ 1267.648727][T29267] 9pnet_fd: Insufficient options for proto=fd [ 1267.684709][T29272] xt_hashlimit: max too large, truncated to 1048576 [ 1267.700441][T29272] Cannot find set identified by id 0 to match [ 1267.900570][ T29] kauditd_printk_skb: 397 callbacks suppressed [ 1267.900592][ T29] audit: type=1400 audit(1747797289.572:47006): avc: denied { execmem } for pid=29297 comm="syz.1.21425" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=process permissive=1 [ 1267.955844][T29301] netlink: 'syz.8.21426': attribute type 1 has an invalid length. [ 1267.964453][ T29] audit: type=1400 audit(1747797289.682:47007): avc: denied { create } for pid=29300 comm="syz.8.21426" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_xfrm_socket permissive=1 [ 1268.203606][T29306] 9pnet_fd: Insufficient options for proto=fd [ 1268.350229][ T29] audit: type=1400 audit(1747797290.052:47008): avc: denied { create } for pid=29307 comm="syz.4.21428" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1268.463224][ T29] audit: type=1326 audit(1747797290.182:47009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29309 comm="syz.4.21429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1268.489135][ T29] audit: type=1326 audit(1747797290.182:47010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29309 comm="syz.4.21429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1268.513097][ T29] audit: type=1326 audit(1747797290.182:47011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29309 comm="syz.4.21429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=154 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1268.536870][ T29] audit: type=1326 audit(1747797290.202:47012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29309 comm="syz.4.21429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1268.560702][ T29] audit: type=1326 audit(1747797290.202:47013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29309 comm="syz.4.21429" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1268.621435][ T29] audit: type=1326 audit(1747797290.342:47014): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29316 comm="syz.4.21433" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1268.645212][ T29] audit: type=1326 audit(1747797290.342:47015): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29316 comm="syz.4.21433" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1268.786305][T29330] syzkaller1: entered promiscuous mode [ 1268.791899][T29330] syzkaller1: entered allmulticast mode [ 1268.825880][T29328] 9pnet_fd: Insufficient options for proto=fd [ 1269.034851][T29355] netlink: 'syz.8.21451': attribute type 1 has an invalid length. [ 1269.274988][T29370] syzkaller1: entered promiscuous mode [ 1269.280592][T29370] syzkaller1: entered allmulticast mode [ 1269.292453][T29368] 9pnet_fd: Insufficient options for proto=fd [ 1269.554332][T29376] SELinux: policydb version 17152 does not match my version range 15-34 [ 1269.563347][T29376] SELinux: failed to load policy [ 1269.757086][T29392] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(5) [ 1269.763765][T29392] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 1269.771943][T29392] vhci_hcd vhci_hcd.0: Device attached [ 1269.780147][T29393] vhci_hcd: connection closed [ 1269.781071][T21062] vhci_hcd: stop threads [ 1269.790163][T21062] vhci_hcd: release socket [ 1269.795337][T21062] vhci_hcd: disconnect device [ 1269.853494][T29396] 9pnet_fd: Insufficient options for proto=fd [ 1269.917647][T29413] FAULT_INJECTION: forcing a failure. [ 1269.917647][T29413] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1269.930929][T29413] CPU: 1 UID: 0 PID: 29413 Comm: syz.1.21476 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1269.931010][T29413] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1269.931024][T29413] Call Trace: [ 1269.931095][T29413] [ 1269.931104][T29413] __dump_stack+0x1d/0x30 [ 1269.931129][T29413] dump_stack_lvl+0xe8/0x140 [ 1269.931165][T29413] dump_stack+0x15/0x1b [ 1269.931185][T29413] should_fail_ex+0x265/0x280 [ 1269.931218][T29413] should_fail+0xb/0x20 [ 1269.931249][T29413] should_fail_usercopy+0x1a/0x20 [ 1269.931342][T29413] _copy_from_iter+0xcf/0xdd0 [ 1269.931365][T29413] ? __build_skb_around+0x1a0/0x200 [ 1269.931398][T29413] ? __alloc_skb+0x223/0x320 [ 1269.931504][T29413] netlink_sendmsg+0x471/0x6b0 [ 1269.931529][T29413] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1269.931549][T29413] __sock_sendmsg+0x145/0x180 [ 1269.931578][T29413] ____sys_sendmsg+0x31e/0x4e0 [ 1269.931604][T29413] ___sys_sendmsg+0x17b/0x1d0 [ 1269.931677][T29413] __x64_sys_sendmsg+0xd4/0x160 [ 1269.931704][T29413] x64_sys_call+0x2999/0x2fb0 [ 1269.931728][T29413] do_syscall_64+0xd0/0x1a0 [ 1269.931755][T29413] ? clear_bhb_loop+0x40/0x90 [ 1269.931832][T29413] ? clear_bhb_loop+0x40/0x90 [ 1269.931858][T29413] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1269.931891][T29413] RIP: 0033:0x7fa868e9e969 [ 1269.931909][T29413] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1269.931927][T29413] RSP: 002b:00007fa867507038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1269.932000][T29413] RAX: ffffffffffffffda RBX: 00007fa8690c5fa0 RCX: 00007fa868e9e969 [ 1269.932016][T29413] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 1269.932032][T29413] RBP: 00007fa867507090 R08: 0000000000000000 R09: 0000000000000000 [ 1269.932092][T29413] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1269.932104][T29413] R13: 0000000000000000 R14: 00007fa8690c5fa0 R15: 00007ffd00328668 [ 1269.932122][T29413] [ 1269.941079][T29417] xt_hashlimit: max too large, truncated to 1048576 [ 1270.046933][T29423] xt_hashlimit: max too large, truncated to 1048576 [ 1270.050077][T29417] Cannot find set identified by id 0 to match [ 1270.062978][T29423] Cannot find set identified by id 0 to match [ 1270.193222][T29433] netlink: 'syz.8.21484': attribute type 1 has an invalid length. [ 1270.249696][T29435] 9pnet_fd: Insufficient options for proto=fd [ 1270.354526][T29451] xt_hashlimit: max too large, truncated to 1048576 [ 1270.753455][T29501] serio: Serial port ptm0 [ 1270.765239][T29226] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1270.776040][T29226] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1270.787126][T29226] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1270.797934][T29226] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1270.855843][T29510] __nla_validate_parse: 42 callbacks suppressed [ 1270.855860][T29510] netlink: 20 bytes leftover after parsing attributes in process `syz.6.21517'. [ 1270.924564][T29520] netlink: 8 bytes leftover after parsing attributes in process `syz.1.21522'. [ 1270.968344][T29523] syzkaller1: entered promiscuous mode [ 1270.974019][T29523] syzkaller1: entered allmulticast mode [ 1270.975067][T29525] netlink: 8 bytes leftover after parsing attributes in process `syz.6.21524'. [ 1271.192733][T29548] netlink: 8 bytes leftover after parsing attributes in process `syz.8.21534'. [ 1271.235928][T29551] netlink: 'syz.4.21537': attribute type 1 has an invalid length. [ 1271.265591][T29556] syzkaller1: entered promiscuous mode [ 1271.271505][T29556] syzkaller1: entered allmulticast mode [ 1271.316249][T29561] vhci_hcd vhci_hcd.0: pdev(8) rhport(0) sockfd(4) [ 1271.322812][T29561] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 1271.331437][T29561] vhci_hcd vhci_hcd.0: Device attached [ 1271.339117][T29562] vhci_hcd: connection closed [ 1271.339267][T21075] vhci_hcd: stop threads [ 1271.348391][T21075] vhci_hcd: release socket [ 1271.349908][T29565] netlink: 8 bytes leftover after parsing attributes in process `syz.1.21541'. [ 1271.352931][T21075] vhci_hcd: disconnect device [ 1271.488177][T29575] netlink: 8 bytes leftover after parsing attributes in process `syz.1.21546'. [ 1271.778079][T29595] netlink: 20 bytes leftover after parsing attributes in process `syz.5.21555'. [ 1271.852945][T29599] netlink: 8 bytes leftover after parsing attributes in process `syz.8.21557'. [ 1271.966436][T29611] FAULT_INJECTION: forcing a failure. [ 1271.966436][T29611] name failslab, interval 1, probability 0, space 0, times 0 [ 1271.969894][T29609] block device autoloading is deprecated and will be removed. [ 1271.979503][T29611] CPU: 1 UID: 0 PID: 29611 Comm: syz.6.21563 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1271.979543][T29611] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1271.979559][T29611] Call Trace: [ 1271.979565][T29611] [ 1271.979575][T29611] __dump_stack+0x1d/0x30 [ 1271.979604][T29611] dump_stack_lvl+0xe8/0x140 [ 1271.979628][T29611] dump_stack+0x15/0x1b [ 1271.979729][T29611] should_fail_ex+0x265/0x280 [ 1271.979764][T29611] ? sctp_auth_asoc_copy_shkeys+0xfa/0x330 [ 1271.979794][T29611] should_failslab+0x8c/0xb0 [ 1271.979887][T29611] __kmalloc_cache_noprof+0x4c/0x320 [ 1271.979913][T29611] sctp_auth_asoc_copy_shkeys+0xfa/0x330 [ 1271.980018][T29611] sctp_association_new+0xde5/0x1200 [ 1271.980043][T29611] sctp_connect_new_asoc+0x1a8/0x3a0 [ 1271.980077][T29611] sctp_sendmsg+0xf10/0x18d0 [ 1271.980178][T29611] ? selinux_socket_sendmsg+0x81/0x1b0 [ 1271.980207][T29611] ? __pfx_sctp_sendmsg+0x10/0x10 [ 1271.980276][T29611] inet_sendmsg+0xc2/0xd0 [ 1271.980309][T29611] __sock_sendmsg+0x102/0x180 [ 1271.980339][T29611] ____sys_sendmsg+0x345/0x4e0 [ 1271.980430][T29611] ___sys_sendmsg+0x17b/0x1d0 [ 1271.980527][T29611] __sys_sendmmsg+0x178/0x300 [ 1271.980691][T29611] __x64_sys_sendmmsg+0x57/0x70 [ 1271.980714][T29611] x64_sys_call+0x2f2f/0x2fb0 [ 1271.980795][T29611] do_syscall_64+0xd0/0x1a0 [ 1271.980821][T29611] ? clear_bhb_loop+0x40/0x90 [ 1271.980883][T29611] ? clear_bhb_loop+0x40/0x90 [ 1271.980943][T29611] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1271.980967][T29611] RIP: 0033:0x7f58e7c3e969 [ 1271.980984][T29611] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1271.981004][T29611] RSP: 002b:00007f58e62a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 1271.981027][T29611] RAX: ffffffffffffffda RBX: 00007f58e7e65fa0 RCX: 00007f58e7c3e969 [ 1271.981043][T29611] RDX: 0000000000000001 RSI: 0000200000005c00 RDI: 0000000000000003 [ 1271.981058][T29611] RBP: 00007f58e62a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1271.981071][T29611] R10: 0000000000048000 R11: 0000000000000246 R12: 0000000000000001 [ 1271.981086][T29611] R13: 0000000000000000 R14: 00007f58e7e65fa0 R15: 00007ffc184d5428 [ 1271.981112][T29611] [ 1272.057607][T29616] x_tables: duplicate underflow at hook 1 [ 1272.238707][T29620] netlink: 8 bytes leftover after parsing attributes in process `syz.4.21566'. [ 1272.305432][T29630] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1272.339964][T29630] xt_hashlimit: max too large, truncated to 1048576 [ 1272.375376][T29636] openvswitch: netlink: Message has 6 unknown bytes. [ 1272.438292][T29646] vhci_hcd vhci_hcd.0: pdev(8) rhport(0) sockfd(4) [ 1272.444865][T29646] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 1272.453265][T29646] vhci_hcd vhci_hcd.0: Device attached [ 1272.463755][T29648] vhci_hcd: connection closed [ 1272.464087][T21062] vhci_hcd: stop threads [ 1272.473518][T21062] vhci_hcd: release socket [ 1272.478133][T21062] vhci_hcd: disconnect device [ 1272.994701][ T29] kauditd_printk_skb: 670 callbacks suppressed [ 1272.994721][ T29] audit: type=1326 audit(1747797294.712:47682): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29659 comm="syz.5.21581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcdb7e3e969 code=0x7ffc0000 [ 1273.150040][ T29] audit: type=1326 audit(1747797294.752:47683): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29659 comm="syz.5.21581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcdb7e3e969 code=0x7ffc0000 [ 1273.173998][ T29] audit: type=1326 audit(1747797294.752:47684): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29659 comm="syz.5.21581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=154 compat=0 ip=0x7fcdb7e3e969 code=0x7ffc0000 [ 1273.197719][ T29] audit: type=1326 audit(1747797294.752:47685): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29659 comm="syz.5.21581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcdb7e3e969 code=0x7ffc0000 [ 1273.221471][ T29] audit: type=1326 audit(1747797294.752:47686): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29659 comm="syz.5.21581" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcdb7e3e969 code=0x7ffc0000 [ 1273.388336][ T29] audit: type=1400 audit(1747797295.102:47687): avc: denied { write } for pid=29674 comm="syz.1.21589" name="ptp0" dev="devtmpfs" ino=246 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1273.411868][ T29] audit: type=1400 audit(1747797295.102:47688): avc: denied { ioctl } for pid=29674 comm="syz.1.21589" path="/dev/ptp0" dev="devtmpfs" ino=246 ioctlcmd=0x3d04 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 1273.438944][ T29] audit: type=1400 audit(1747797295.162:47689): avc: denied { setopt } for pid=29673 comm="syz.8.21588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1273.512239][ T29] audit: type=1400 audit(1747797295.202:47690): avc: denied { write } for pid=29673 comm="syz.8.21588" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 1273.557286][ T29] audit: type=1326 audit(1747797295.272:47691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=29687 comm="syz.6.21593" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f58e7c3e969 code=0x7ffc0000 [ 1273.603286][T29680] 9pnet_fd: Insufficient options for proto=fd [ 1273.662893][T29692] openvswitch: netlink: Message has 6 unknown bytes. [ 1274.502196][T29721] syzkaller1: entered promiscuous mode [ 1274.507746][T29721] syzkaller1: entered allmulticast mode [ 1274.869534][T29736] veth1_to_team: entered promiscuous mode [ 1274.882621][T29736] team0: Port device team_slave_1 removed [ 1275.080513][T29749] syzkaller1: entered promiscuous mode [ 1275.086037][T29749] syzkaller1: entered allmulticast mode [ 1275.550892][T29767] netlink: 'syz.4.21626': attribute type 1 has an invalid length. [ 1275.926482][T29798] __nla_validate_parse: 19 callbacks suppressed [ 1275.926571][T29798] netlink: 8 bytes leftover after parsing attributes in process `syz.8.21640'. [ 1276.069099][T29814] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1276.080347][T29814] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1276.109544][T29814] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1276.142470][T29814] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1276.768563][T29827] netlink: 44 bytes leftover after parsing attributes in process `syz.4.21649'. [ 1276.780335][T29814] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1276.802141][T29814] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 1276.945977][T29832] syzkaller1: entered promiscuous mode [ 1276.951646][T29832] syzkaller1: entered allmulticast mode [ 1277.632256][T29856] netlink: 44 bytes leftover after parsing attributes in process `syz.8.21660'. [ 1277.954812][T29875] openvswitch: netlink: Message has 6 unknown bytes. [ 1278.207264][T29883] FAULT_INJECTION: forcing a failure. [ 1278.207264][T29883] name failslab, interval 1, probability 0, space 0, times 0 [ 1278.220242][T29883] CPU: 1 UID: 0 PID: 29883 Comm: syz.4.21669 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1278.220309][T29883] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1278.220323][T29883] Call Trace: [ 1278.220330][T29883] [ 1278.220337][T29883] __dump_stack+0x1d/0x30 [ 1278.220360][T29883] dump_stack_lvl+0xe8/0x140 [ 1278.220384][T29883] dump_stack+0x15/0x1b [ 1278.220444][T29883] should_fail_ex+0x265/0x280 [ 1278.220479][T29883] should_failslab+0x8c/0xb0 [ 1278.220573][T29883] kmem_cache_alloc_node_noprof+0x57/0x320 [ 1278.220650][T29883] ? __alloc_skb+0x101/0x320 [ 1278.220684][T29883] __alloc_skb+0x101/0x320 [ 1278.220714][T29883] netlink_alloc_large_skb+0xba/0xf0 [ 1278.220807][T29883] netlink_sendmsg+0x3cf/0x6b0 [ 1278.220861][T29883] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1278.220883][T29883] __sock_sendmsg+0x145/0x180 [ 1278.220920][T29883] ____sys_sendmsg+0x31e/0x4e0 [ 1278.220948][T29883] ___sys_sendmsg+0x17b/0x1d0 [ 1278.220984][T29883] __x64_sys_sendmsg+0xd4/0x160 [ 1278.221011][T29883] x64_sys_call+0x2999/0x2fb0 [ 1278.221095][T29883] do_syscall_64+0xd0/0x1a0 [ 1278.221140][T29883] ? clear_bhb_loop+0x40/0x90 [ 1278.221165][T29883] ? clear_bhb_loop+0x40/0x90 [ 1278.221191][T29883] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1278.221308][T29883] RIP: 0033:0x7f8ee89be969 [ 1278.221344][T29883] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1278.221365][T29883] RSP: 002b:00007f8ee7006038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1278.221415][T29883] RAX: ffffffffffffffda RBX: 00007f8ee8be6080 RCX: 00007f8ee89be969 [ 1278.221430][T29883] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000009 [ 1278.221446][T29883] RBP: 00007f8ee7006090 R08: 0000000000000000 R09: 0000000000000000 [ 1278.221460][T29883] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1278.221475][T29883] R13: 0000000000000000 R14: 00007f8ee8be6080 R15: 00007ffe4baaf1d8 [ 1278.221496][T29883] [ 1278.481478][ T29] kauditd_printk_skb: 205 callbacks suppressed [ 1278.481493][ T29] audit: type=1400 audit(1747797300.202:47897): avc: denied { tracepoint } for pid=29886 comm="syz.5.21671" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 1278.534155][T29887] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1278.592242][ T29] audit: type=1400 audit(1747797300.302:47898): avc: denied { write } for pid=29891 comm="syz.8.21673" name="anycast6" dev="proc" ino=4026533399 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_net_t tclass=file permissive=1 [ 1278.625243][T29887] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1278.651025][ T29] audit: type=1400 audit(1747797300.372:47899): avc: denied { getattr } for pid=29893 comm="syz.8.21674" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 1278.652758][T29896] netlink: 44 bytes leftover after parsing attributes in process `syz.1.21675'. [ 1278.689748][T29894] 9pnet_fd: Insufficient options for proto=fd [ 1278.697345][T29894] binfmt_misc: register: failed to install interpreter file ./file2 [ 1278.731620][T29887] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1278.791869][T29887] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1278.820700][ T29] audit: type=1400 audit(1747797300.532:47900): avc: denied { create } for pid=29908 comm="syz.8.21681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1278.820970][T29909] SELinux: syz.8.21681 (29909) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1278.840979][ T29] audit: type=1400 audit(1747797300.532:47901): avc: denied { bind } for pid=29908 comm="syz.8.21681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1278.875083][ T29] audit: type=1400 audit(1747797300.532:47902): avc: denied { setopt } for pid=29908 comm="syz.8.21681" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1278.895575][ T29] audit: type=1400 audit(1747797300.532:47903): avc: denied { write } for pid=29908 comm="syz.8.21681" path="socket:[242730]" dev="sockfs" ino=242730 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 [ 1278.933598][ T29] audit: type=1400 audit(1747797300.602:47904): avc: denied { watch watch_reads } for pid=29908 comm="syz.8.21681" path="/108" dev="tmpfs" ino=560 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 1278.963907][T29887] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1279.003811][T29887] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1279.041530][T29887] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1279.070639][T29887] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1279.079084][ T29] audit: type=1400 audit(1747797300.792:47905): avc: denied { connect } for pid=29921 comm="syz.6.21685" lport=60 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 1279.102657][T29924] FAULT_INJECTION: forcing a failure. [ 1279.102657][T29924] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1279.115981][T29924] CPU: 1 UID: 0 PID: 29924 Comm: syz.4.21686 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1279.116081][T29924] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1279.116094][T29924] Call Trace: [ 1279.116101][T29924] [ 1279.116109][T29924] __dump_stack+0x1d/0x30 [ 1279.116132][T29924] dump_stack_lvl+0xe8/0x140 [ 1279.116172][T29924] dump_stack+0x15/0x1b [ 1279.116189][T29924] should_fail_ex+0x265/0x280 [ 1279.116226][T29924] should_fail+0xb/0x20 [ 1279.116258][T29924] should_fail_usercopy+0x1a/0x20 [ 1279.116354][T29924] _copy_from_iter+0xcf/0xdd0 [ 1279.116375][T29924] ? __build_skb_around+0x1a0/0x200 [ 1279.116407][T29924] ? __alloc_skb+0x223/0x320 [ 1279.116507][T29924] netlink_sendmsg+0x471/0x6b0 [ 1279.116532][T29924] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1279.116554][T29924] __sock_sendmsg+0x145/0x180 [ 1279.116584][T29924] ____sys_sendmsg+0x31e/0x4e0 [ 1279.116647][T29924] ___sys_sendmsg+0x17b/0x1d0 [ 1279.116710][T29924] __x64_sys_sendmsg+0xd4/0x160 [ 1279.116735][T29924] x64_sys_call+0x2999/0x2fb0 [ 1279.116825][T29924] do_syscall_64+0xd0/0x1a0 [ 1279.116852][T29924] ? clear_bhb_loop+0x40/0x90 [ 1279.116878][T29924] ? clear_bhb_loop+0x40/0x90 [ 1279.116903][T29924] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1279.116966][T29924] RIP: 0033:0x7f8ee89be969 [ 1279.116985][T29924] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1279.117005][T29924] RSP: 002b:00007f8ee7027038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1279.117040][T29924] RAX: ffffffffffffffda RBX: 00007f8ee8be5fa0 RCX: 00007f8ee89be969 [ 1279.117053][T29924] RDX: 0000000000000000 RSI: 0000200000000040 RDI: 0000000000000003 [ 1279.117066][T29924] RBP: 00007f8ee7027090 R08: 0000000000000000 R09: 0000000000000000 [ 1279.117147][T29924] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1279.117162][T29924] R13: 0000000000000000 R14: 00007f8ee8be5fa0 R15: 00007ffe4baaf1d8 [ 1279.117182][T29924] [ 1279.320693][T29914] netdevsim netdevsim8 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1279.379112][T29914] netdevsim netdevsim8 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1279.421967][T29914] netdevsim netdevsim8 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1279.478748][ T29] audit: type=1400 audit(1747797301.192:47906): avc: denied { mounton } for pid=29948 comm="syz-executor" path="/" dev="sda1" ino=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:root_t tclass=dir permissive=1 [ 1279.513235][T29914] netdevsim netdevsim8 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1279.539736][T29953] FAULT_INJECTION: forcing a failure. [ 1279.539736][T29953] name failslab, interval 1, probability 0, space 0, times 0 [ 1279.552498][T29953] CPU: 1 UID: 0 PID: 29953 Comm: syz.4.21698 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1279.552567][T29953] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1279.552579][T29953] Call Trace: [ 1279.552587][T29953] [ 1279.552595][T29953] __dump_stack+0x1d/0x30 [ 1279.552617][T29953] dump_stack_lvl+0xe8/0x140 [ 1279.552641][T29953] dump_stack+0x15/0x1b [ 1279.552659][T29953] should_fail_ex+0x265/0x280 [ 1279.552816][T29953] should_failslab+0x8c/0xb0 [ 1279.552848][T29953] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 1279.552873][T29953] ? sidtab_sid2str_get+0xa0/0x130 [ 1279.552910][T29953] kmemdup_noprof+0x2b/0x70 [ 1279.552963][T29953] sidtab_sid2str_get+0xa0/0x130 [ 1279.553052][T29953] security_sid_to_context_core+0x1eb/0x2e0 [ 1279.553090][T29953] security_sid_to_context+0x27/0x40 [ 1279.553199][T29953] selinux_lsmprop_to_secctx+0x67/0xf0 [ 1279.553236][T29953] security_lsmprop_to_secctx+0x43/0x80 [ 1279.553337][T29953] audit_log_task_context+0x77/0x190 [ 1279.553378][T29953] audit_log_task+0xf4/0x250 [ 1279.553407][T29953] audit_seccomp+0x61/0x100 [ 1279.553528][T29953] ? __seccomp_filter+0x68c/0x10d0 [ 1279.553562][T29953] __seccomp_filter+0x69d/0x10d0 [ 1279.553584][T29953] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 1279.553624][T29953] ? vfs_write+0x75e/0x8d0 [ 1279.553656][T29953] ? __rcu_read_unlock+0x4f/0x70 [ 1279.553684][T29953] ? __fget_files+0x184/0x1c0 [ 1279.553718][T29953] __secure_computing+0x82/0x150 [ 1279.553775][T29953] syscall_trace_enter+0xcf/0x1e0 [ 1279.553806][T29953] do_syscall_64+0xaa/0x1a0 [ 1279.553835][T29953] ? clear_bhb_loop+0x40/0x90 [ 1279.553856][T29953] ? clear_bhb_loop+0x40/0x90 [ 1279.553933][T29953] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1279.553960][T29953] RIP: 0033:0x7f8ee89be969 [ 1279.553980][T29953] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1279.553999][T29953] RSP: 002b:00007f8ee7027038 EFLAGS: 00000246 ORIG_RAX: 0000000000000052 [ 1279.554054][T29953] RAX: ffffffffffffffda RBX: 00007f8ee8be5fa0 RCX: 00007f8ee89be969 [ 1279.554070][T29953] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 1279.554086][T29953] RBP: 00007f8ee7027090 R08: 0000000000000000 R09: 0000000000000000 [ 1279.554099][T29953] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1279.554112][T29953] R13: 0000000000000000 R14: 00007f8ee8be5fa0 R15: 00007ffe4baaf1d8 [ 1279.554130][T29953] [ 1279.875398][T29914] netdevsim netdevsim8 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1279.887298][T29914] netdevsim netdevsim8 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1279.899135][T29914] netdevsim netdevsim8 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1279.931897][T29914] netdevsim netdevsim8 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1280.031976][T29969] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1280.084943][T29969] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1280.132081][T29969] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1280.188432][T29948] chnl_net:caif_netlink_parms(): no params data found [ 1280.229009][T29969] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1280.310746][T21099] bridge_slave_1: left allmulticast mode [ 1280.316527][T21099] bridge_slave_1: left promiscuous mode [ 1280.322324][T21099] bridge0: port 2(bridge_slave_1) entered disabled state [ 1280.336194][T21099] bridge_slave_0: left allmulticast mode [ 1280.342375][T21099] bridge_slave_0: left promiscuous mode [ 1280.348238][T21099] bridge0: port 1(bridge_slave_0) entered disabled state [ 1280.485189][T21099] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1280.502957][T21099] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1280.515934][T21099] bond0 (unregistering): Released all slaves [ 1280.529411][T29969] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1280.555514][T29969] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1280.606609][T29969] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1280.617628][T29948] bridge0: port 1(bridge_slave_0) entered blocking state [ 1280.624821][T29948] bridge0: port 1(bridge_slave_0) entered disabled state [ 1280.632242][T29948] bridge_slave_0: entered allmulticast mode [ 1280.638906][T29948] bridge_slave_0: entered promiscuous mode [ 1280.649037][T29969] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1280.673187][T21099] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1280.681106][T21099] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1280.705795][T21042] smc: removing ib device syz0 [ 1280.712499][T21099] team0 (unregistering): Port device team_slave_1 removed [ 1280.722268][T21099] team0 (unregistering): Port device team_slave_0 removed [ 1280.752381][T29948] bridge0: port 2(bridge_slave_1) entered blocking state [ 1280.759581][T29948] bridge0: port 2(bridge_slave_1) entered disabled state [ 1280.766879][T29948] bridge_slave_1: entered allmulticast mode [ 1280.774426][T29948] bridge_slave_1: entered promiscuous mode [ 1280.813771][T29948] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1280.829217][T29948] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1280.874026][T30031] FAULT_INJECTION: forcing a failure. [ 1280.874026][T30031] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1280.887282][T30031] CPU: 1 UID: 0 PID: 30031 Comm: syz.5.21721 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1280.887317][T30031] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1280.887363][T30031] Call Trace: [ 1280.887370][T30031] [ 1280.887378][T30031] __dump_stack+0x1d/0x30 [ 1280.887403][T30031] dump_stack_lvl+0xe8/0x140 [ 1280.887451][T30031] dump_stack+0x15/0x1b [ 1280.887517][T30031] should_fail_ex+0x265/0x280 [ 1280.887554][T30031] should_fail+0xb/0x20 [ 1280.887607][T30031] should_fail_usercopy+0x1a/0x20 [ 1280.887631][T30031] _copy_to_user+0x20/0xa0 [ 1280.887658][T30031] simple_read_from_buffer+0xb5/0x130 [ 1280.887684][T30031] proc_fail_nth_read+0x100/0x140 [ 1280.887820][T30031] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1280.887850][T30031] vfs_read+0x1a0/0x6f0 [ 1280.887877][T30031] ? __rcu_read_unlock+0x4f/0x70 [ 1280.887909][T30031] ? __fget_files+0x184/0x1c0 [ 1280.887944][T30031] ksys_read+0xda/0x1a0 [ 1280.887975][T30031] __x64_sys_read+0x40/0x50 [ 1280.888005][T30031] x64_sys_call+0x2d77/0x2fb0 [ 1280.888105][T30031] do_syscall_64+0xd0/0x1a0 [ 1280.888142][T30031] ? clear_bhb_loop+0x40/0x90 [ 1280.888167][T30031] ? clear_bhb_loop+0x40/0x90 [ 1280.888192][T30031] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1280.888293][T30031] RIP: 0033:0x7fcdb7e3d37c [ 1280.888311][T30031] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1280.888332][T30031] RSP: 002b:00007fcdb64a7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1280.888355][T30031] RAX: ffffffffffffffda RBX: 00007fcdb8065fa0 RCX: 00007fcdb7e3d37c [ 1280.888371][T30031] RDX: 000000000000000f RSI: 00007fcdb64a70a0 RDI: 0000000000000006 [ 1280.888386][T30031] RBP: 00007fcdb64a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1280.888467][T30031] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1280.888483][T30031] R13: 0000000000000000 R14: 00007fcdb8065fa0 R15: 00007ffe45cb3578 [ 1280.888503][T30031] [ 1281.097057][T29948] team0: Port device team_slave_0 added [ 1281.104371][T29948] team0: Port device team_slave_1 added [ 1281.125062][T30037] __nla_validate_parse: 21 callbacks suppressed [ 1281.125081][T30037] netlink: 8 bytes leftover after parsing attributes in process `syz.1.21723'. [ 1281.158550][T29948] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1281.165601][T29948] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1281.191783][T29948] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1281.225112][T30042] netlink: 8 bytes leftover after parsing attributes in process `syz.1.21723'. [ 1281.284859][T29948] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1281.291894][T29948] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1281.318006][T29948] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1281.378823][T30049] netlink: 44 bytes leftover after parsing attributes in process `syz.5.21727'. [ 1281.419575][T29948] hsr_slave_0: entered promiscuous mode [ 1281.426859][T29948] hsr_slave_1: entered promiscuous mode [ 1281.437613][T29948] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1281.454828][T29948] Cannot create hsr debugfs directory [ 1281.489385][T30053] netlink: 8 bytes leftover after parsing attributes in process `syz.5.21729'. [ 1281.518617][T30055] netlink: 8 bytes leftover after parsing attributes in process `syz.4.21730'. [ 1281.612188][T30058] bridge_slave_0: left allmulticast mode [ 1281.617933][T30058] bridge_slave_0: left promiscuous mode [ 1281.623681][T30058] bridge0: port 1(bridge_slave_0) entered disabled state [ 1281.670397][T30066] netlink: 8 bytes leftover after parsing attributes in process `syz.4.21734'. [ 1281.673221][T30058] bridge_slave_1: left allmulticast mode [ 1281.685130][T30058] bridge_slave_1: left promiscuous mode [ 1281.690261][T30066] netlink: 12 bytes leftover after parsing attributes in process `syz.4.21734'. [ 1281.690855][T30058] bridge0: port 2(bridge_slave_1) entered disabled state [ 1281.712438][T30058] bond0: (slave bond_slave_0): Releasing backup interface [ 1281.726485][T30058] bond0: (slave bond_slave_1): Releasing backup interface [ 1281.739440][T30058] team0: Port device team_slave_0 removed [ 1281.749167][T30058] team0: Port device team_slave_1 removed [ 1281.756384][T30058] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1281.764216][T30058] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1281.773864][T30058] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1281.781393][T30058] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1281.799730][T30062] netlink: 'syz.5.21732': attribute type 1 has an invalid length. [ 1281.882045][T30078] netlink: 44 bytes leftover after parsing attributes in process `syz.1.21739'. [ 1282.032114][T30086] lo: entered promiscuous mode [ 1282.036958][T30086] lo: entered allmulticast mode [ 1282.481327][T30087] netlink: 8 bytes leftover after parsing attributes in process `syz.1.21742'. [ 1282.499541][T30089] netlink: 8 bytes leftover after parsing attributes in process `syz.8.21744'. [ 1282.700078][T30099] netdevsim netdevsim8 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1282.708530][T30099] netdevsim netdevsim8 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1282.717027][T30099] netdevsim netdevsim8 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1282.725510][T30099] netdevsim netdevsim8 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 1282.769150][T30097] bridge_slave_0: left allmulticast mode [ 1282.774984][T30097] bridge_slave_0: left promiscuous mode [ 1282.780673][T30097] bridge0: port 1(bridge_slave_0) entered disabled state [ 1282.793526][T30097] bridge_slave_1: left promiscuous mode [ 1282.799404][T30097] bridge0: port 2(bridge_slave_1) entered disabled state [ 1282.811186][T30097] bond0: (slave bond_slave_0): Releasing backup interface [ 1282.820354][T30097] bond0: (slave bond_slave_1): Releasing backup interface [ 1282.831239][T30097] team0: Port device team_slave_0 removed [ 1282.839094][T30097] team0: Port device team_slave_1 removed [ 1282.845727][T30097] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1282.853296][T30097] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1282.863583][T30097] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1282.871512][T30097] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1282.882580][T30112] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(4) [ 1282.889332][T30112] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 1282.897527][T30112] vhci_hcd vhci_hcd.0: Device attached [ 1282.904096][T30113] vhci_hcd: connection closed [ 1282.904236][T21083] vhci_hcd: stop threads [ 1282.913414][T21083] vhci_hcd: release socket [ 1282.917862][T21083] vhci_hcd: disconnect device [ 1282.941065][T30116] netlink: 'syz.5.21754': attribute type 1 has an invalid length. [ 1283.108413][T29948] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 1283.117905][T29948] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 1283.127402][T29948] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 1283.139303][T29948] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 1283.180152][T29948] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1283.196427][T29948] 8021q: adding VLAN 0 to HW filter on device team0 [ 1283.207967][T21099] bridge0: port 1(bridge_slave_0) entered blocking state [ 1283.215278][T21099] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1283.241784][T29948] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 1283.252504][T29948] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1283.267105][T21099] bridge0: port 2(bridge_slave_1) entered blocking state [ 1283.274265][T21099] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1283.346244][T29948] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1283.495485][T29948] veth0_vlan: entered promiscuous mode [ 1283.507274][ T29] kauditd_printk_skb: 44 callbacks suppressed [ 1283.507293][ T29] audit: type=1326 audit(1747797305.222:47950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30174 comm="syz.4.21771" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1283.541797][T29948] veth1_vlan: entered promiscuous mode [ 1283.541927][ T29] audit: type=1326 audit(1747797305.222:47951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30174 comm="syz.4.21771" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1283.563026][T29948] veth0_macvtap: entered promiscuous mode [ 1283.571435][ T29] audit: type=1326 audit(1747797305.222:47952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30174 comm="syz.4.21771" exe="/root/syz-executor" sig=0 arch=c000003e syscall=154 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1283.582209][T29948] veth1_macvtap: entered promiscuous mode [ 1283.601078][ T29] audit: type=1326 audit(1747797305.222:47953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30174 comm="syz.4.21771" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1283.616929][T29948] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1283.647070][T29948] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1283.657846][T29948] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1283.667047][T29948] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1283.676179][T29948] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1283.685034][T29948] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1283.709437][ T29] audit: type=1400 audit(1747797305.422:47954): avc: denied { mounton } for pid=29948 comm="syz-executor" path="/root/syzkaller.5GWZTn/syz-tmp" dev="sda1" ino=2131 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=dir permissive=1 [ 1283.734319][ T29] audit: type=1400 audit(1747797305.422:47955): avc: denied { mount } for pid=29948 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 1283.756839][ T29] audit: type=1400 audit(1747797305.422:47956): avc: denied { mount } for pid=29948 comm="syz-executor" name="/" dev="proc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:proc_t tclass=filesystem permissive=1 [ 1283.779132][ T29] audit: type=1400 audit(1747797305.422:47957): avc: denied { mounton } for pid=29948 comm="syz-executor" path="/root/syzkaller.5GWZTn/syz-tmp/newroot/sys/kernel/debug" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=dir permissive=1 [ 1283.806214][ T29] audit: type=1400 audit(1747797305.422:47958): avc: denied { mounton } for pid=29948 comm="syz-executor" path="/root/syzkaller.5GWZTn/syz-tmp/newroot/proc/sys/fs/binfmt_misc" dev="proc" ino=244421 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:sysctl_fs_t tclass=dir permissive=1 [ 1283.834268][ T29] audit: type=1400 audit(1747797305.422:47959): avc: denied { unmount } for pid=29948 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 1284.044873][T30205] netlink: 'syz.6.21783': attribute type 1 has an invalid length. [ 1284.114904][T30213] openvswitch: netlink: Message has 6 unknown bytes. [ 1285.231866][T30285] SELinux: syz.8.21814 (30285) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1285.299483][T30297] FAULT_INJECTION: forcing a failure. [ 1285.299483][T30297] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1285.312748][T30297] CPU: 0 UID: 0 PID: 30297 Comm: syz.8.21820 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1285.312777][T30297] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1285.312789][T30297] Call Trace: [ 1285.312796][T30297] [ 1285.312862][T30297] __dump_stack+0x1d/0x30 [ 1285.312885][T30297] dump_stack_lvl+0xe8/0x140 [ 1285.312993][T30297] dump_stack+0x15/0x1b [ 1285.313010][T30297] should_fail_ex+0x265/0x280 [ 1285.313041][T30297] should_fail+0xb/0x20 [ 1285.313069][T30297] should_fail_usercopy+0x1a/0x20 [ 1285.313169][T30297] _copy_from_iter+0xcf/0xdd0 [ 1285.313197][T30297] ? __build_skb_around+0x1a0/0x200 [ 1285.313227][T30297] ? __alloc_skb+0x223/0x320 [ 1285.313327][T30297] netlink_sendmsg+0x471/0x6b0 [ 1285.313350][T30297] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1285.313369][T30297] __sock_sendmsg+0x145/0x180 [ 1285.313395][T30297] ____sys_sendmsg+0x31e/0x4e0 [ 1285.313428][T30297] ___sys_sendmsg+0x17b/0x1d0 [ 1285.313474][T30297] __x64_sys_sendmsg+0xd4/0x160 [ 1285.313598][T30297] x64_sys_call+0x2999/0x2fb0 [ 1285.313618][T30297] do_syscall_64+0xd0/0x1a0 [ 1285.313641][T30297] ? clear_bhb_loop+0x40/0x90 [ 1285.313662][T30297] ? clear_bhb_loop+0x40/0x90 [ 1285.313683][T30297] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1285.313755][T30297] RIP: 0033:0x7f3bd432e969 [ 1285.313771][T30297] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1285.313814][T30297] RSP: 002b:00007f3bd2997038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1285.313834][T30297] RAX: ffffffffffffffda RBX: 00007f3bd4555fa0 RCX: 00007f3bd432e969 [ 1285.313846][T30297] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000003 [ 1285.313858][T30297] RBP: 00007f3bd2997090 R08: 0000000000000000 R09: 0000000000000000 [ 1285.313949][T30297] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1285.313961][T30297] R13: 0000000000000000 R14: 00007f3bd4555fa0 R15: 00007fffbdba3cc8 [ 1285.313984][T30297] [ 1285.545999][T30305] SELinux: syz.1.21823 (30305) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1285.588965][T30312] SELinux: syz.4.21827 (30312) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1285.978809][T30341] syz.5.21839: attempt to access beyond end of device [ 1285.978809][T30341] md33: rw=2048, sector=0, nr_sectors = 8 limit=0 [ 1286.176079][T30355] openvswitch: netlink: Message has 6 unknown bytes. [ 1286.198558][T30356] openvswitch: netlink: Message has 6 unknown bytes. [ 1286.485457][T30359] openvswitch: netlink: Message has 6 unknown bytes. [ 1286.817567][T30369] __nla_validate_parse: 34 callbacks suppressed [ 1286.817582][T30369] netlink: 44 bytes leftover after parsing attributes in process `syz.4.21851'. [ 1287.352769][T30391] syzkaller1: entered promiscuous mode [ 1287.358301][T30391] syzkaller1: entered allmulticast mode [ 1287.368988][T30393] netlink: 44 bytes leftover after parsing attributes in process `syz.1.21862'. [ 1287.460913][T30401] FAULT_INJECTION: forcing a failure. [ 1287.460913][T30401] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.473652][T30401] CPU: 0 UID: 0 PID: 30401 Comm: syz.5.21866 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1287.473685][T30401] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1287.473699][T30401] Call Trace: [ 1287.473707][T30401] [ 1287.473852][T30401] __dump_stack+0x1d/0x30 [ 1287.473946][T30401] dump_stack_lvl+0xe8/0x140 [ 1287.474033][T30401] dump_stack+0x15/0x1b [ 1287.474054][T30401] should_fail_ex+0x265/0x280 [ 1287.474092][T30401] should_failslab+0x8c/0xb0 [ 1287.474123][T30401] kmem_cache_alloc_noprof+0x50/0x310 [ 1287.474211][T30401] ? skb_clone+0x151/0x1f0 [ 1287.474296][T30401] skb_clone+0x151/0x1f0 [ 1287.474323][T30401] __netlink_deliver_tap+0x2c9/0x500 [ 1287.474349][T30401] netlink_unicast+0x64c/0x670 [ 1287.474400][T30401] netlink_sendmsg+0x58b/0x6b0 [ 1287.474495][T30401] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1287.474518][T30401] __sock_sendmsg+0x145/0x180 [ 1287.474547][T30401] ____sys_sendmsg+0x31e/0x4e0 [ 1287.474575][T30401] ___sys_sendmsg+0x17b/0x1d0 [ 1287.474688][T30401] __x64_sys_sendmsg+0xd4/0x160 [ 1287.474717][T30401] x64_sys_call+0x2999/0x2fb0 [ 1287.474743][T30401] do_syscall_64+0xd0/0x1a0 [ 1287.474890][T30401] ? clear_bhb_loop+0x40/0x90 [ 1287.474928][T30401] ? clear_bhb_loop+0x40/0x90 [ 1287.475020][T30401] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1287.475047][T30401] RIP: 0033:0x7fcdb7e3e969 [ 1287.475075][T30401] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1287.475096][T30401] RSP: 002b:00007fcdb64a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1287.475120][T30401] RAX: ffffffffffffffda RBX: 00007fcdb8065fa0 RCX: 00007fcdb7e3e969 [ 1287.475135][T30401] RDX: 0000000000000000 RSI: 0000200000000100 RDI: 0000000000000003 [ 1287.475150][T30401] RBP: 00007fcdb64a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1287.475165][T30401] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1287.475180][T30401] R13: 0000000000000000 R14: 00007fcdb8065fa0 R15: 00007ffe45cb3578 [ 1287.475264][T30401] [ 1287.504979][T30378] netlink: 16 bytes leftover after parsing attributes in process `syz.8.21855'. [ 1287.816946][T30424] FAULT_INJECTION: forcing a failure. [ 1287.816946][T30424] name failslab, interval 1, probability 0, space 0, times 0 [ 1287.825367][T30426] netlink: 44 bytes leftover after parsing attributes in process `syz.4.21874'. [ 1287.829644][T30424] CPU: 1 UID: 0 PID: 30424 Comm: syz.1.21873 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1287.829751][T30424] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1287.829765][T30424] Call Trace: [ 1287.829771][T30424] [ 1287.829779][T30424] __dump_stack+0x1d/0x30 [ 1287.829803][T30424] dump_stack_lvl+0xe8/0x140 [ 1287.829825][T30424] dump_stack+0x15/0x1b [ 1287.829843][T30424] should_fail_ex+0x265/0x280 [ 1287.829946][T30424] should_failslab+0x8c/0xb0 [ 1287.829977][T30424] kmem_cache_alloc_node_noprof+0x57/0x320 [ 1287.830029][T30424] ? __alloc_skb+0x101/0x320 [ 1287.830069][T30424] __alloc_skb+0x101/0x320 [ 1287.830108][T30424] __ip6_append_data+0x192b/0x23b0 [ 1287.830173][T30424] ? __pfx_raw6_getfrag+0x10/0x10 [ 1287.830199][T30424] ? xfrm_lookup_with_ifid+0x10c2/0x1360 [ 1287.830232][T30424] ip6_append_data+0x13b/0x250 [ 1287.830258][T30424] ? __pfx_raw6_getfrag+0x10/0x10 [ 1287.830339][T30424] rawv6_sendmsg+0xdab/0xf60 [ 1287.830372][T30424] ? __pfx_rawv6_sendmsg+0x10/0x10 [ 1287.830396][T30424] inet_sendmsg+0xc2/0xd0 [ 1287.830429][T30424] __sock_sendmsg+0x102/0x180 [ 1287.830504][T30424] ____sys_sendmsg+0x31e/0x4e0 [ 1287.830529][T30424] ___sys_sendmsg+0x17b/0x1d0 [ 1287.830566][T30424] __x64_sys_sendmsg+0xd4/0x160 [ 1287.830634][T30424] x64_sys_call+0x2999/0x2fb0 [ 1287.830802][T30424] do_syscall_64+0xd0/0x1a0 [ 1287.830933][T30424] ? clear_bhb_loop+0x40/0x90 [ 1287.830956][T30424] ? clear_bhb_loop+0x40/0x90 [ 1287.830980][T30424] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1287.831049][T30424] RIP: 0033:0x7fa868e9e969 [ 1287.831067][T30424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1287.831122][T30424] RSP: 002b:00007fa867507038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1287.831145][T30424] RAX: ffffffffffffffda RBX: 00007fa8690c5fa0 RCX: 00007fa868e9e969 [ 1287.831169][T30424] RDX: 0000000000044004 RSI: 00002000000000c0 RDI: 0000000000000003 [ 1287.831199][T30424] RBP: 00007fa867507090 R08: 0000000000000000 R09: 0000000000000000 [ 1287.831213][T30424] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1287.831227][T30424] R13: 0000000000000000 R14: 00007fa8690c5fa0 R15: 00007ffd00328668 [ 1287.831246][T30424] [ 1288.067335][T30438] netlink: 8 bytes leftover after parsing attributes in process `syz.6.21879'. [ 1288.132967][T30451] futex_wake_op: syz.4.21882 tries to shift op by -1; fix this program [ 1288.276970][T30469] netlink: 'syz.8.21890': attribute type 1 has an invalid length. [ 1288.362845][T30474] netlink: 44 bytes leftover after parsing attributes in process `syz.6.21892'. [ 1288.664216][T30493] SELinux: syz.4.21900 (30493) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1288.702854][T30497] SELinux: syz.4.21902 (30497) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1288.895244][T30503] bridge0: port 1(bridge_slave_0) entered disabled state [ 1288.923340][T30503] bridge_slave_0 (unregistering): left allmulticast mode [ 1288.930699][T30503] bridge_slave_0 (unregistering): left promiscuous mode [ 1288.937692][T30503] bridge0: port 1(bridge_slave_0) entered disabled state [ 1289.026885][T30507] openvswitch: netlink: Message has 6 unknown bytes. [ 1289.236188][T30517] rdma_op ffff88811c260180 conn xmit_rdma 0000000000000000 [ 1289.281999][ T29] kauditd_printk_skb: 154 callbacks suppressed [ 1289.282020][ T29] audit: type=1400 audit(1747797310.932:48114): avc: denied { validate_trans } for pid=30516 comm="syz.4.21910" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:security_t tclass=security permissive=1 [ 1289.616432][T30555] tipc: Started in network mode [ 1289.621477][T30555] tipc: Node identity 7f000001, cluster identity 4711 [ 1289.628600][T30555] tipc: Enabled bearer , priority 10 [ 1289.751498][ T29] audit: type=1326 audit(1747797311.432:48115): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30564 comm="syz.8.21929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1289.775384][ T29] audit: type=1326 audit(1747797311.432:48116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30564 comm="syz.8.21929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1289.799205][ T29] audit: type=1326 audit(1747797311.432:48117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30564 comm="syz.8.21929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1289.822990][ T29] audit: type=1326 audit(1747797311.432:48118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30564 comm="syz.8.21929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1289.846760][ T29] audit: type=1326 audit(1747797311.432:48119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30564 comm="syz.8.21929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1289.870463][ T29] audit: type=1326 audit(1747797311.432:48120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30564 comm="syz.8.21929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1289.894383][ T29] audit: type=1326 audit(1747797311.432:48121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30564 comm="syz.8.21929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1289.918262][ T29] audit: type=1326 audit(1747797311.442:48122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30564 comm="syz.8.21929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1289.941963][ T29] audit: type=1326 audit(1747797311.442:48123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30564 comm="syz.8.21929" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1290.116925][T30583] FAULT_INJECTION: forcing a failure. [ 1290.116925][T30583] name failslab, interval 1, probability 0, space 0, times 0 [ 1290.129683][T30583] CPU: 0 UID: 0 PID: 30583 Comm: syz.1.21934 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1290.129719][T30583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1290.129734][T30583] Call Trace: [ 1290.129741][T30583] [ 1290.129830][T30583] __dump_stack+0x1d/0x30 [ 1290.129870][T30583] dump_stack_lvl+0xe8/0x140 [ 1290.129953][T30583] dump_stack+0x15/0x1b [ 1290.129972][T30583] should_fail_ex+0x265/0x280 [ 1290.130004][T30583] should_failslab+0x8c/0xb0 [ 1290.130081][T30583] __kmalloc_noprof+0xa5/0x3e0 [ 1290.130133][T30583] ? genl_family_rcv_msg_attrs_parse+0x75/0x190 [ 1290.130175][T30583] genl_family_rcv_msg_attrs_parse+0x75/0x190 [ 1290.130244][T30583] ? nlmon_xmit+0x4f/0x60 [ 1290.130270][T30583] genl_family_rcv_msg_doit+0x48/0x1b0 [ 1290.130303][T30583] ? genl_get_cmd+0x639/0x660 [ 1290.130397][T30583] genl_rcv_msg+0x422/0x460 [ 1290.130426][T30583] ? __pfx_tipc_nl_bearer_enable+0x10/0x10 [ 1290.130452][T30583] netlink_rcv_skb+0x123/0x220 [ 1290.130502][T30583] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1290.130538][T30583] genl_rcv+0x28/0x40 [ 1290.130594][T30583] netlink_unicast+0x5a1/0x670 [ 1290.130631][T30583] netlink_sendmsg+0x58b/0x6b0 [ 1290.130656][T30583] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1290.130681][T30583] __sock_sendmsg+0x145/0x180 [ 1290.130714][T30583] ____sys_sendmsg+0x31e/0x4e0 [ 1290.130785][T30583] ___sys_sendmsg+0x17b/0x1d0 [ 1290.130820][T30583] __x64_sys_sendmsg+0xd4/0x160 [ 1290.130850][T30583] x64_sys_call+0x2999/0x2fb0 [ 1290.130923][T30583] do_syscall_64+0xd0/0x1a0 [ 1290.130952][T30583] ? clear_bhb_loop+0x40/0x90 [ 1290.131033][T30583] ? clear_bhb_loop+0x40/0x90 [ 1290.131129][T30583] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1290.131154][T30583] RIP: 0033:0x7fa868e9e969 [ 1290.131173][T30583] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1290.131195][T30583] RSP: 002b:00007fa867507038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1290.131222][T30583] RAX: ffffffffffffffda RBX: 00007fa8690c5fa0 RCX: 00007fa868e9e969 [ 1290.131238][T30583] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000003 [ 1290.131254][T30583] RBP: 00007fa867507090 R08: 0000000000000000 R09: 0000000000000000 [ 1290.131271][T30583] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1290.131286][T30583] R13: 0000000000000000 R14: 00007fa8690c5fa0 R15: 00007ffd00328668 [ 1290.131308][T30583] [ 1290.576373][T30603] openvswitch: netlink: Message has 6 unknown bytes. [ 1290.620278][ T7715] tipc: Node number set to 2130706433 [ 1291.295748][T30645] vhci_hcd vhci_hcd.0: pdev(8) rhport(0) sockfd(4) [ 1291.302364][T30645] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 1291.310623][T30645] vhci_hcd vhci_hcd.0: Device attached [ 1291.346423][T30646] vhci_hcd: connection closed [ 1291.346640][T21062] vhci_hcd: stop threads [ 1291.355720][T21062] vhci_hcd: release socket [ 1291.360155][T21062] vhci_hcd: disconnect device [ 1291.438515][T30661] FAULT_INJECTION: forcing a failure. [ 1291.438515][T30661] name failslab, interval 1, probability 0, space 0, times 0 [ 1291.451308][T30661] CPU: 1 UID: 0 PID: 30661 Comm: syz.6.21969 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1291.451425][T30661] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1291.451441][T30661] Call Trace: [ 1291.451450][T30661] [ 1291.451459][T30661] __dump_stack+0x1d/0x30 [ 1291.451486][T30661] dump_stack_lvl+0xe8/0x140 [ 1291.451511][T30661] dump_stack+0x15/0x1b [ 1291.451534][T30661] should_fail_ex+0x265/0x280 [ 1291.451624][T30661] should_failslab+0x8c/0xb0 [ 1291.451732][T30661] kmem_cache_alloc_node_noprof+0x57/0x320 [ 1291.451756][T30661] ? __alloc_skb+0x101/0x320 [ 1291.451794][T30661] __alloc_skb+0x101/0x320 [ 1291.451843][T30661] netlink_ack+0xfd/0x500 [ 1291.451940][T30661] netlink_rcv_skb+0x192/0x220 [ 1291.451981][T30661] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 1291.452016][T30661] nfnetlink_rcv+0x16b/0x1690 [ 1291.452046][T30661] ? __kfree_skb+0x109/0x150 [ 1291.452074][T30661] ? nlmon_xmit+0x4f/0x60 [ 1291.452099][T30661] ? consume_skb+0x49/0x150 [ 1291.452159][T30661] ? nlmon_xmit+0x4f/0x60 [ 1291.452184][T30661] ? dev_hard_start_xmit+0x39e/0x3d0 [ 1291.452210][T30661] ? __dev_queue_xmit+0x11c0/0x1fb0 [ 1291.452229][T30661] ? __dev_queue_xmit+0x182/0x1fb0 [ 1291.452286][T30661] ? save_fpregs_to_fpstate+0x100/0x160 [ 1291.452359][T30661] ? ref_tracker_free+0x37d/0x3e0 [ 1291.452393][T30661] ? __netlink_deliver_tap+0x4dc/0x500 [ 1291.452416][T30661] netlink_unicast+0x5a1/0x670 [ 1291.452520][T30661] netlink_sendmsg+0x58b/0x6b0 [ 1291.452544][T30661] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1291.452642][T30661] __sock_sendmsg+0x145/0x180 [ 1291.452761][T30661] ____sys_sendmsg+0x31e/0x4e0 [ 1291.452790][T30661] ___sys_sendmsg+0x17b/0x1d0 [ 1291.452826][T30661] __x64_sys_sendmsg+0xd4/0x160 [ 1291.452899][T30661] x64_sys_call+0x2999/0x2fb0 [ 1291.452926][T30661] do_syscall_64+0xd0/0x1a0 [ 1291.452953][T30661] ? clear_bhb_loop+0x40/0x90 [ 1291.452985][T30661] ? clear_bhb_loop+0x40/0x90 [ 1291.453012][T30661] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1291.453104][T30661] RIP: 0033:0x7fcc80c3e969 [ 1291.453122][T30661] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1291.453140][T30661] RSP: 002b:00007fcc7f2a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1291.453160][T30661] RAX: ffffffffffffffda RBX: 00007fcc80e65fa0 RCX: 00007fcc80c3e969 [ 1291.453173][T30661] RDX: 0000000000000000 RSI: 00002000000001c0 RDI: 0000000000000003 [ 1291.453213][T30661] RBP: 00007fcc7f2a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1291.453229][T30661] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1291.453245][T30661] R13: 0000000000000000 R14: 00007fcc80e65fa0 R15: 00007ffe37ba0038 [ 1291.453266][T30661] [ 1291.819691][T30670] netlink: 72 bytes leftover after parsing attributes in process `syz.6.21973'. [ 1291.870741][T30678] openvswitch: netlink: Message has 6 unknown bytes. [ 1291.877914][T30680] FAULT_INJECTION: forcing a failure. [ 1291.877914][T30680] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1291.891118][T30680] CPU: 1 UID: 0 PID: 30680 Comm:  Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1291.891148][T30680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1291.891168][T30680] Call Trace: [ 1291.891175][T30680] [ 1291.891184][T30680] __dump_stack+0x1d/0x30 [ 1291.891208][T30680] dump_stack_lvl+0xe8/0x140 [ 1291.891250][T30680] dump_stack+0x15/0x1b [ 1291.891266][T30680] should_fail_ex+0x265/0x280 [ 1291.891298][T30680] should_fail+0xb/0x20 [ 1291.891326][T30680] should_fail_usercopy+0x1a/0x20 [ 1291.891346][T30680] _copy_from_user+0x1c/0xb0 [ 1291.891446][T30680] ___sys_sendmsg+0xc1/0x1d0 [ 1291.891476][T30680] __x64_sys_sendmsg+0xd4/0x160 [ 1291.891499][T30680] x64_sys_call+0x2999/0x2fb0 [ 1291.891519][T30680] do_syscall_64+0xd0/0x1a0 [ 1291.891619][T30680] ? clear_bhb_loop+0x40/0x90 [ 1291.891640][T30680] ? clear_bhb_loop+0x40/0x90 [ 1291.891660][T30680] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1291.891691][T30680] RIP: 0033:0x7fcdb7e3e969 [ 1291.891716][T30680] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1291.891733][T30680] RSP: 002b:00007fcdb64a7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1291.891753][T30680] RAX: ffffffffffffffda RBX: 00007fcdb8065fa0 RCX: 00007fcdb7e3e969 [ 1291.891838][T30680] RDX: 0000000000000000 RSI: 0000200000000140 RDI: 0000000000000003 [ 1291.891850][T30680] RBP: 00007fcdb64a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1291.891862][T30680] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1291.891874][T30680] R13: 0000000000000000 R14: 00007fcdb8065fa0 R15: 00007ffe45cb3578 [ 1291.891969][T30680] [ 1292.200512][T30691] tmpfs: Bad value for 'mpol' [ 1292.243913][T30698] FAULT_INJECTION: forcing a failure. [ 1292.243913][T30698] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1292.257076][T30698] CPU: 1 UID: 0 PID: 30698 Comm: syz.5.21984 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1292.257110][T30698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1292.257201][T30698] Call Trace: [ 1292.257211][T30698] [ 1292.257220][T30698] __dump_stack+0x1d/0x30 [ 1292.257291][T30698] dump_stack_lvl+0xe8/0x140 [ 1292.257311][T30698] dump_stack+0x15/0x1b [ 1292.257327][T30698] should_fail_ex+0x265/0x280 [ 1292.257359][T30698] should_fail+0xb/0x20 [ 1292.257386][T30698] should_fail_usercopy+0x1a/0x20 [ 1292.257500][T30698] _copy_from_user+0x1c/0xb0 [ 1292.257523][T30698] bpf_test_init+0xdf/0x160 [ 1292.257610][T30698] bpf_prog_test_run_xdp+0x274/0x8f0 [ 1292.257641][T30698] ? kstrtouint+0x76/0xc0 [ 1292.257729][T30698] ? __rcu_read_unlock+0x4f/0x70 [ 1292.257754][T30698] ? __pfx_bpf_prog_test_run_xdp+0x10/0x10 [ 1292.257904][T30698] bpf_prog_test_run+0x207/0x390 [ 1292.257936][T30698] __sys_bpf+0x3dc/0x790 [ 1292.258043][T30698] __x64_sys_bpf+0x41/0x50 [ 1292.258068][T30698] x64_sys_call+0x2478/0x2fb0 [ 1292.258089][T30698] do_syscall_64+0xd0/0x1a0 [ 1292.258122][T30698] ? clear_bhb_loop+0x40/0x90 [ 1292.258146][T30698] ? clear_bhb_loop+0x40/0x90 [ 1292.258166][T30698] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1292.258187][T30698] RIP: 0033:0x7fcdb7e3e969 [ 1292.258202][T30698] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1292.258276][T30698] RSP: 002b:00007fcdb64a7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 1292.258366][T30698] RAX: ffffffffffffffda RBX: 00007fcdb8065fa0 RCX: 00007fcdb7e3e969 [ 1292.258379][T30698] RDX: 0000000000000048 RSI: 0000200000000600 RDI: 000000000000000a [ 1292.258391][T30698] RBP: 00007fcdb64a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1292.258403][T30698] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1292.258415][T30698] R13: 0000000000000000 R14: 00007fcdb8065fa0 R15: 00007ffe45cb3578 [ 1292.258432][T30698] [ 1293.089864][T30707] openvswitch: netlink: Message has 6 unknown bytes. [ 1293.099265][T30703] lo speed is unknown, defaulting to 1000 [ 1293.117500][T30703] lo speed is unknown, defaulting to 1000 [ 1293.146693][T30703] lo speed is unknown, defaulting to 1000 [ 1293.288701][T30703] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 1293.318729][T30723] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(5) [ 1293.325300][T30723] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 1293.333480][T30723] vhci_hcd vhci_hcd.0: Device attached [ 1293.355676][T30724] vhci_hcd: connection closed [ 1293.355860][T21099] vhci_hcd: stop threads [ 1293.364977][T21099] vhci_hcd: release socket [ 1293.369433][T21099] vhci_hcd: disconnect device [ 1293.847515][T30703] lo speed is unknown, defaulting to 1000 [ 1293.853939][T30703] lo speed is unknown, defaulting to 1000 [ 1293.860210][T30703] lo speed is unknown, defaulting to 1000 [ 1293.866859][T30703] lo speed is unknown, defaulting to 1000 [ 1293.875074][T30703] lo speed is unknown, defaulting to 1000 [ 1293.881367][T30703] lo speed is unknown, defaulting to 1000 [ 1293.887765][T30703] lo speed is unknown, defaulting to 1000 [ 1293.896643][T30703] lo speed is unknown, defaulting to 1000 [ 1293.902867][T30703] lo speed is unknown, defaulting to 1000 [ 1293.908973][T30703] lo speed is unknown, defaulting to 1000 [ 1293.917167][T30703] lo speed is unknown, defaulting to 1000 [ 1293.932172][T30703] lo speed is unknown, defaulting to 1000 [ 1293.938479][T30703] lo speed is unknown, defaulting to 1000 [ 1293.944816][T30703] lo speed is unknown, defaulting to 1000 [ 1293.972483][T30741] netlink: 'syz.6.22000': attribute type 1 has an invalid length. [ 1294.674876][T30772] FAULT_INJECTION: forcing a failure. [ 1294.674876][T30772] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1294.688003][T30772] CPU: 1 UID: 0 PID: 30772 Comm: syz.1.22012 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1294.688105][T30772] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1294.688115][T30772] Call Trace: [ 1294.688120][T30772] [ 1294.688126][T30772] __dump_stack+0x1d/0x30 [ 1294.688173][T30772] dump_stack_lvl+0xe8/0x140 [ 1294.688191][T30772] dump_stack+0x15/0x1b [ 1294.688205][T30772] should_fail_ex+0x265/0x280 [ 1294.688233][T30772] should_fail+0xb/0x20 [ 1294.688255][T30772] should_fail_usercopy+0x1a/0x20 [ 1294.688316][T30772] _copy_to_user+0x20/0xa0 [ 1294.688337][T30772] simple_read_from_buffer+0xb5/0x130 [ 1294.688360][T30772] proc_fail_nth_read+0x100/0x140 [ 1294.688454][T30772] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 1294.688473][T30772] vfs_read+0x1a0/0x6f0 [ 1294.688511][T30772] ? __rcu_read_unlock+0x4f/0x70 [ 1294.688532][T30772] ? __rcu_read_unlock+0x4f/0x70 [ 1294.688557][T30772] ? __fget_files+0x184/0x1c0 [ 1294.688587][T30772] ksys_read+0xda/0x1a0 [ 1294.688637][T30772] __x64_sys_read+0x40/0x50 [ 1294.688701][T30772] x64_sys_call+0x2d77/0x2fb0 [ 1294.688727][T30772] do_syscall_64+0xd0/0x1a0 [ 1294.688771][T30772] ? clear_bhb_loop+0x40/0x90 [ 1294.688794][T30772] ? clear_bhb_loop+0x40/0x90 [ 1294.688848][T30772] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1294.688872][T30772] RIP: 0033:0x7fa868e9d37c [ 1294.688916][T30772] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 1294.688943][T30772] RSP: 002b:00007fa867507030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 1294.688965][T30772] RAX: ffffffffffffffda RBX: 00007fa8690c5fa0 RCX: 00007fa868e9d37c [ 1294.689037][T30772] RDX: 000000000000000f RSI: 00007fa8675070a0 RDI: 0000000000000006 [ 1294.689051][T30772] RBP: 00007fa867507090 R08: 0000000000000000 R09: 0000000000000000 [ 1294.689065][T30772] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1294.689078][T30772] R13: 0000000000000000 R14: 00007fa8690c5fa0 R15: 00007ffd00328668 [ 1294.689098][T30772] [ 1294.947789][ T29] kauditd_printk_skb: 107 callbacks suppressed [ 1294.947805][ T29] audit: type=1400 audit(1747797316.662:48229): avc: denied { name_bind } for pid=30773 comm="syz.1.22013" src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 1295.008186][ T29] audit: type=1400 audit(1747797316.662:48230): avc: denied { node_bind } for pid=30773 comm="syz.1.22013" saddr=::1 src=20003 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 1295.030718][ T29] audit: type=1326 audit(1747797316.662:48231): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30773 comm="syz.1.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1295.033827][T30776] syzkaller1: entered promiscuous mode [ 1295.054408][ T29] audit: type=1326 audit(1747797316.662:48232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30773 comm="syz.1.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1295.054475][ T29] audit: type=1326 audit(1747797316.662:48233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30773 comm="syz.1.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=66 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1295.054503][ T29] audit: type=1326 audit(1747797316.662:48234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30773 comm="syz.1.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1295.060274][T30776] syzkaller1: entered allmulticast mode [ 1295.083814][ T29] audit: type=1326 audit(1747797316.662:48235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30773 comm="syz.1.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1295.160625][ T29] audit: type=1326 audit(1747797316.662:48236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30773 comm="syz.1.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1295.184573][ T29] audit: type=1326 audit(1747797316.662:48237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30773 comm="syz.1.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1295.208327][ T29] audit: type=1326 audit(1747797316.662:48238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=30773 comm="syz.1.22013" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1295.369042][T30798] openvswitch: netlink: Message has 6 unknown bytes. [ 1295.710823][T30813] lo speed is unknown, defaulting to 1000 [ 1295.864915][T30813] netlink: 80 bytes leftover after parsing attributes in process `syz.1.22023'. [ 1296.651904][T30829] syzkaller1: entered promiscuous mode [ 1296.657709][T30829] syzkaller1: entered allmulticast mode [ 1296.755979][T30835] netlink: 112 bytes leftover after parsing attributes in process `syz.5.22034'. [ 1296.916866][T30843] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1296.973266][T30843] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1297.097851][T30843] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1297.143942][T30843] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1297.218326][T30843] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1297.235292][T30843] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1297.249326][T30843] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1297.263750][T30843] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1298.507350][T30938] FAULT_INJECTION: forcing a failure. [ 1298.507350][T30938] name failslab, interval 1, probability 0, space 0, times 0 [ 1298.520229][T30938] CPU: 0 UID: 0 PID: 30938 Comm: syz.6.22078 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1298.520260][T30938] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1298.520321][T30938] Call Trace: [ 1298.520383][T30938] [ 1298.520393][T30938] __dump_stack+0x1d/0x30 [ 1298.520419][T30938] dump_stack_lvl+0xe8/0x140 [ 1298.520442][T30938] dump_stack+0x15/0x1b [ 1298.520464][T30938] should_fail_ex+0x265/0x280 [ 1298.520503][T30938] should_failslab+0x8c/0xb0 [ 1298.520618][T30938] __kvmalloc_node_noprof+0x126/0x4d0 [ 1298.520646][T30938] ? vmemdup_user+0x26/0xd0 [ 1298.520669][T30938] ? should_fail_usercopy+0x1a/0x20 [ 1298.520708][T30938] vmemdup_user+0x26/0xd0 [ 1298.520738][T30938] path_setxattrat+0x1b6/0x310 [ 1298.520873][T30938] __x64_sys_lsetxattr+0x71/0x90 [ 1298.520908][T30938] x64_sys_call+0x1e36/0x2fb0 [ 1298.520932][T30938] do_syscall_64+0xd0/0x1a0 [ 1298.521070][T30938] ? clear_bhb_loop+0x40/0x90 [ 1298.521091][T30938] ? clear_bhb_loop+0x40/0x90 [ 1298.521111][T30938] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1298.521199][T30938] RIP: 0033:0x7fcc80c3e969 [ 1298.521213][T30938] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 1298.521229][T30938] RSP: 002b:00007fcc7f2a7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bd [ 1298.521306][T30938] RAX: ffffffffffffffda RBX: 00007fcc80e65fa0 RCX: 00007fcc80c3e969 [ 1298.521317][T30938] RDX: 00002000000006c0 RSI: 00002000000000c0 RDI: 0000200000000080 [ 1298.521329][T30938] RBP: 00007fcc7f2a7090 R08: 0000000000000000 R09: 0000000000000000 [ 1298.521341][T30938] R10: 0000000000000018 R11: 0000000000000246 R12: 0000000000000001 [ 1298.521352][T30938] R13: 0000000000000000 R14: 00007fcc80e65fa0 R15: 00007ffe37ba0038 [ 1298.521367][T30938] [ 1298.837247][T30952] vhci_hcd vhci_hcd.0: pdev(8) rhport(0) sockfd(5) [ 1298.843833][T30952] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 1298.852140][T30952] vhci_hcd vhci_hcd.0: Device attached [ 1298.882667][T30954] vhci_hcd: connection closed [ 1298.887377][T21083] vhci_hcd: stop threads [ 1298.896389][T21083] vhci_hcd: release socket [ 1298.900898][T21083] vhci_hcd: disconnect device [ 1298.984429][T30961] vhci_hcd vhci_hcd.0: pdev(6) rhport(0) sockfd(5) [ 1298.990993][T30961] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 1298.999172][T30961] vhci_hcd vhci_hcd.0: Device attached [ 1299.006149][T30962] vhci_hcd: connection closed [ 1299.006320][T21083] vhci_hcd: stop threads [ 1299.015447][T21083] vhci_hcd: release socket [ 1299.020223][T21083] vhci_hcd: disconnect device [ 1299.337892][T30969] rdma_op ffff888124da3d80 conn xmit_rdma 0000000000000000 [ 1299.689759][T30993] netlink: 12 bytes leftover after parsing attributes in process `syz.8.22101'. [ 1300.024435][T31005] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(5) [ 1300.031010][T31005] vhci_hcd vhci_hcd.0: devid(0) speed(6) speed_str(super-speed-plus) [ 1300.039235][T31005] vhci_hcd vhci_hcd.0: Device attached [ 1300.057524][T31006] vhci_hcd: connection closed [ 1300.057768][T21042] vhci_hcd: stop threads [ 1300.065937][T31018] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=31018 comm=syz.8.22111 [ 1300.066887][T21042] vhci_hcd: release socket [ 1300.066898][T21042] vhci_hcd: disconnect device [ 1300.089942][ T29] kauditd_printk_skb: 90 callbacks suppressed [ 1300.089957][ T29] audit: type=1400 audit(1747797321.812:48329): avc: denied { audit_write } for pid=31017 comm="syz.8.22111" capability=29 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 1300.118778][ T29] audit: type=1107 audit(1747797321.842:48330): pid=31017 uid=0 auid=4294967295 ses=4294967295 subj=root:sysadm_r:sysadm_t msg='' [ 1300.683031][ T29] audit: type=1326 audit(1747797322.402:48331): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31030 comm="syz.4.22114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1300.706957][ T29] audit: type=1326 audit(1747797322.402:48332): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31030 comm="syz.4.22114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1300.770933][ T29] audit: type=1326 audit(1747797322.452:48333): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31030 comm="syz.4.22114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=154 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1300.794839][ T29] audit: type=1326 audit(1747797322.452:48334): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31030 comm="syz.4.22114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1300.818773][ T29] audit: type=1326 audit(1747797322.452:48335): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31030 comm="syz.4.22114" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1300.843221][ T29] audit: type=1400 audit(1747797322.522:48336): avc: denied { create } for pid=31033 comm="syz.5.22115" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1300.863394][ T29] audit: type=1400 audit(1747797322.542:48337): avc: denied { read } for pid=31033 comm="syz.5.22115" path="socket:[247365]" dev="sockfs" ino=247365 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=phonet_socket permissive=1 [ 1301.484996][T31047] rdma_op ffff888124da2180 conn xmit_rdma 0000000000000000 [ 1301.521651][T31053] rdma_op ffff8881322ed580 conn xmit_rdma 0000000000000000 [ 1301.596759][ T29] audit: type=1326 audit(1747797323.312:48338): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31060 comm="syz.1.22126" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1301.618407][T31061] syzkaller1: entered promiscuous mode [ 1301.626014][T31061] syzkaller1: entered allmulticast mode [ 1301.655822][T31065] openvswitch: netlink: Message has 6 unknown bytes. [ 1301.685050][T31067] syzkaller1: entered promiscuous mode [ 1301.690730][T31067] syzkaller1: entered allmulticast mode [ 1301.835540][T31071] netlink: 'syz.5.22132': attribute type 1 has an invalid length. [ 1302.549875][T31094] openvswitch: netlink: Message has 6 unknown bytes. [ 1302.630256][T31098] SELinux: syz.1.22142 (31098) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 1303.168574][T31103] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1303.241954][T31103] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1303.249092][T31119] openvswitch: netlink: Message has 6 unknown bytes. [ 1303.286133][T31124] syzkaller1: entered promiscuous mode [ 1303.291764][T31124] syzkaller1: entered allmulticast mode [ 1303.305159][T31103] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1303.354575][T31103] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1303.456137][T31103] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1303.476276][T31103] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1303.503163][T31103] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1303.560617][T31103] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1303.959512][T31150] openvswitch: netlink: Message has 6 unknown bytes. [ 1304.182824][T31168] rdma_op ffff8881322ef180 conn xmit_rdma 0000000000000000 [ 1304.191209][T31164] syzkaller1: entered promiscuous mode [ 1304.196744][T31164] syzkaller1: entered allmulticast mode [ 1304.240053][T31171] syzkaller1: entered promiscuous mode [ 1304.245659][T31171] syzkaller1: entered allmulticast mode [ 1304.438635][T31191] syzkaller1: entered promiscuous mode [ 1304.444354][T31191] syzkaller1: entered allmulticast mode [ 1304.688286][T31197] lo speed is unknown, defaulting to 1000 [ 1305.386450][T31213] netlink: 'syz.8.22190': attribute type 1 has an invalid length. [ 1305.442958][T31222] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1306.391995][T31247] syzkaller1: entered promiscuous mode [ 1306.405660][T31247] syzkaller1: entered allmulticast mode [ 1306.488395][T31255] netlink: 'syz.4.22207': attribute type 1 has an invalid length. [ 1306.505792][T31257] netlink: 8 bytes leftover after parsing attributes in process `syz.1.22208'. [ 1306.540484][ T10] page_pool_release_retry() stalled pool shutdown: id 815, 1 inflight 60 sec [ 1307.224440][T31284] netlink: 8 bytes leftover after parsing attributes in process `syz.6.22220'. [ 1307.268236][T31288] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1307.323396][T31288] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1307.394158][T31288] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1307.446085][T31288] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1307.508757][T31288] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1307.522575][T31288] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1307.533689][T31310] netlink: 8 bytes leftover after parsing attributes in process `syz.4.22232'. [ 1307.536518][T31288] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1307.573504][T31288] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1307.582012][T31312] netlink: 'syz.1.22233': attribute type 1 has an invalid length. [ 1308.787881][T31341] netlink: 4 bytes leftover after parsing attributes in process `syz.6.22244'. [ 1308.974546][T31354] netlink: 'syz.8.22251': attribute type 1 has an invalid length. [ 1309.178647][T31368] netlink: 4 bytes leftover after parsing attributes in process `syz.4.22256'. [ 1309.757543][T31376] openvswitch: netlink: Message has 6 unknown bytes. [ 1310.805051][ T29] kauditd_printk_skb: 253 callbacks suppressed [ 1310.805071][ T29] audit: type=1326 audit(1747797332.522:48592): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31389 comm="syz.6.22265" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fcc80c3e969 code=0x0 [ 1310.874064][T31402] openvswitch: netlink: Message has 6 unknown bytes. [ 1310.886732][T31404] netlink: 'syz.4.22270': attribute type 1 has an invalid length. [ 1312.322780][T31434] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1312.358710][T31438] openvswitch: netlink: Message has 6 unknown bytes. [ 1312.466485][T31451] rdma_op ffff888130c34580 conn xmit_rdma 0000000000000000 [ 1313.532501][T31470] openvswitch: netlink: Message has 6 unknown bytes. [ 1313.887244][T31481] netdevsim netdevsim4 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1313.921184][ T29] audit: type=1326 audit(1747797335.642:48593): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31490 comm="syz.1.22304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1313.944947][ T29] audit: type=1326 audit(1747797335.642:48594): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31490 comm="syz.1.22304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1314.003741][T31481] netdevsim netdevsim4 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1314.064254][ T29] audit: type=1326 audit(1747797335.692:48595): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31490 comm="syz.1.22304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=88 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1314.088041][ T29] audit: type=1326 audit(1747797335.692:48596): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31490 comm="syz.1.22304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1314.111864][ T29] audit: type=1326 audit(1747797335.692:48597): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31490 comm="syz.1.22304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1314.135631][ T29] audit: type=1326 audit(1747797335.712:48598): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31490 comm="syz.1.22304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1314.159382][ T29] audit: type=1326 audit(1747797335.712:48599): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31490 comm="syz.1.22304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1314.183204][ T29] audit: type=1326 audit(1747797335.712:48600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31490 comm="syz.1.22304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1314.206948][ T29] audit: type=1326 audit(1747797335.722:48601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31490 comm="syz.1.22304" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1314.277210][T31481] netdevsim netdevsim4 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1314.353453][T31481] netdevsim netdevsim4 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1314.488497][T31481] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1314.513874][T31481] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1314.593466][T31481] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1314.625499][T31481] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1316.072316][ T29] kauditd_printk_skb: 27 callbacks suppressed [ 1316.072333][ T29] audit: type=1326 audit(1747797337.092:48629): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31516 comm="syz.4.22314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1316.316073][ T29] audit: type=1326 audit(1747797337.982:48630): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31516 comm="syz.4.22314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1316.339964][ T29] audit: type=1326 audit(1747797337.982:48631): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31516 comm="syz.4.22314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1316.364118][ T29] audit: type=1326 audit(1747797337.982:48632): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31516 comm="syz.4.22314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1316.388038][ T29] audit: type=1326 audit(1747797337.982:48633): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31516 comm="syz.4.22314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1316.411811][ T29] audit: type=1326 audit(1747797337.982:48634): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31516 comm="syz.4.22314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1316.436099][ T29] audit: type=1326 audit(1747797337.992:48635): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31516 comm="syz.4.22314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1316.459968][ T29] audit: type=1326 audit(1747797338.002:48636): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31516 comm="syz.4.22314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1316.483863][ T29] audit: type=1326 audit(1747797338.002:48637): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31516 comm="syz.4.22314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1316.507616][ T29] audit: type=1326 audit(1747797338.012:48638): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31516 comm="syz.4.22314" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1316.630576][T31528] openvswitch: netlink: Message has 6 unknown bytes. [ 1316.755017][T31531] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1316.958014][T31491] netlink: 16 bytes leftover after parsing attributes in process `syz.1.22304'. [ 1317.603906][T31563] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1318.391756][T31593] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1318.462761][T31593] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1318.581499][T31593] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1318.632895][T31593] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1318.719990][T31593] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1318.740040][T31593] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1318.759854][T31593] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1318.795455][T31593] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1318.946878][T31622] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1319.810006][T31670] netlink: 'syz.6.22372': attribute type 1 has an invalid length. [ 1320.343456][T31685] netlink: 'syz.1.22377': attribute type 1 has an invalid length. [ 1321.761896][T31777] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1321.833518][T31777] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1321.910403][T31777] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1321.965734][ T29] kauditd_printk_skb: 86 callbacks suppressed [ 1321.965752][ T29] audit: type=1326 audit(1747797343.682:48725): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31795 comm="syz.4.22428" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f8ee89be969 code=0x0 [ 1322.013477][T31777] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1322.083215][T31777] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1322.108160][T31777] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1322.138229][T31777] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1322.210716][T31777] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1322.894900][T31864] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1322.971845][T31870] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1322.986386][T31864] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1322.999602][T31873] netlink: 12 bytes leftover after parsing attributes in process `syz.5.22458'. [ 1323.044921][T31870] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1323.084148][T31864] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1323.597029][T31870] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1323.620869][T31864] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1323.780473][T31870] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1323.948455][T31864] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1323.963380][T31864] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1323.975866][T31864] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1323.987999][T31864] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1324.631058][T31904] netlink: 12 bytes leftover after parsing attributes in process `syz.6.22470'. [ 1325.239073][T31934] netdevsim netdevsim5 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1325.293900][T31934] netdevsim netdevsim5 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1325.372443][T31934] netdevsim netdevsim5 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1325.471892][T31934] netdevsim netdevsim5 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1325.547242][T31934] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1325.560063][T31934] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1325.574935][T31934] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1325.589683][T31934] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1326.482949][ T29] audit: type=1326 audit(1747797348.202:48726): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31980 comm="syz.4.22502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1326.506891][ T29] audit: type=1326 audit(1747797348.202:48727): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31980 comm="syz.4.22502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=66 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1326.530644][ T29] audit: type=1326 audit(1747797348.202:48728): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31980 comm="syz.4.22502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1326.587101][ T29] audit: type=1326 audit(1747797348.272:48729): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31980 comm="syz.4.22502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1326.610916][ T29] audit: type=1326 audit(1747797348.272:48730): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31980 comm="syz.4.22502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1326.634777][ T29] audit: type=1326 audit(1747797348.272:48731): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31980 comm="syz.4.22502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1326.658544][ T29] audit: type=1326 audit(1747797348.272:48732): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31980 comm="syz.4.22502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1326.682266][ T29] audit: type=1326 audit(1747797348.282:48733): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31980 comm="syz.4.22502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1326.705941][ T29] audit: type=1326 audit(1747797348.282:48734): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31980 comm="syz.4.22502" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f8ee89be969 code=0x7ffc0000 [ 1326.743045][T31989] syzkaller1: entered promiscuous mode [ 1326.748577][T31989] syzkaller1: entered allmulticast mode [ 1327.129405][ T29] kauditd_printk_skb: 45 callbacks suppressed [ 1327.129424][ T29] audit: type=1326 audit(1747797348.842:48780): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32017 comm="syz.6.22515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc80c3e969 code=0x7ffc0000 [ 1327.176462][ T29] audit: type=1326 audit(1747797348.842:48781): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32017 comm="syz.6.22515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc80c3e969 code=0x7ffc0000 [ 1327.200261][ T29] audit: type=1326 audit(1747797348.842:48782): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32017 comm="syz.6.22515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7fcc80c3e969 code=0x7ffc0000 [ 1327.223879][ T29] audit: type=1326 audit(1747797348.842:48783): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32017 comm="syz.6.22515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc80c3e969 code=0x7ffc0000 [ 1327.247595][ T29] audit: type=1326 audit(1747797348.852:48784): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32017 comm="syz.6.22515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=140 compat=0 ip=0x7fcc80c3e969 code=0x7ffc0000 [ 1327.271282][ T29] audit: type=1326 audit(1747797348.852:48785): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32017 comm="syz.6.22515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc80c3e969 code=0x7ffc0000 [ 1327.294993][ T29] audit: type=1326 audit(1747797348.852:48786): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32017 comm="syz.6.22515" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcc80c3e969 code=0x7ffc0000 [ 1327.324363][T32025] rdma_op ffff88813331ad80 conn xmit_rdma 0000000000000000 [ 1327.354359][T31870] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1327.375889][T31870] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1327.393663][ T29] audit: type=1326 audit(1747797349.112:48787): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32026 comm="syz.5.22521" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcdb7e3e969 code=0x7ffc0000 [ 1327.422893][T31870] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1327.450233][ T29] audit: type=1326 audit(1747797349.112:48788): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32026 comm="syz.5.22521" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7fcdb7e3e969 code=0x7ffc0000 [ 1327.474624][ T29] audit: type=1326 audit(1747797349.112:48789): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32026 comm="syz.5.22521" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcdb7e3e969 code=0x7ffc0000 [ 1327.522010][T31870] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1328.172028][T32060] rdma_op ffff8881322ec580 conn xmit_rdma 0000000000000000 [ 1329.579957][T32143] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1329.824869][T32143] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1329.973813][T32143] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1330.032809][T32143] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1331.454400][T32143] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1331.484866][T32143] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1331.498110][T32143] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1331.524205][T32143] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1331.655295][T32237] netlink: 'syz.1.22608': attribute type 1 has an invalid length. [ 1332.309840][ T29] kauditd_printk_skb: 41 callbacks suppressed [ 1332.309857][ T29] audit: type=1326 audit(1747797354.022:48831): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32280 comm="syz.8.22629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1332.347012][ T29] audit: type=1326 audit(1747797354.062:48832): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32280 comm="syz.8.22629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1332.371069][ T29] audit: type=1326 audit(1747797354.062:48833): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32280 comm="syz.8.22629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1332.394964][ T29] audit: type=1326 audit(1747797354.062:48834): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32280 comm="syz.8.22629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1332.418736][ T29] audit: type=1326 audit(1747797354.062:48835): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32280 comm="syz.8.22629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=140 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1332.442801][ T29] audit: type=1326 audit(1747797354.062:48836): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32280 comm="syz.8.22629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1332.466893][ T29] audit: type=1326 audit(1747797354.062:48837): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32280 comm="syz.8.22629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1332.490867][ T29] audit: type=1326 audit(1747797354.062:48838): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32280 comm="syz.8.22629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1332.514824][ T29] audit: type=1326 audit(1747797354.062:48839): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32280 comm="syz.8.22629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1332.538625][ T29] audit: type=1326 audit(1747797354.062:48840): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32280 comm="syz.8.22629" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f3bd432e969 code=0x7ffc0000 [ 1332.735545][T32300] netlink: 16 bytes leftover after parsing attributes in process `syz.4.22637'. [ 1333.061743][T32316] syzkaller1: entered promiscuous mode [ 1333.067439][T32316] syzkaller1: entered allmulticast mode [ 1333.188989][T32328] netlink: 16 bytes leftover after parsing attributes in process `syz.6.22649'. [ 1334.101904][T32379] rdma_op ffff888117267980 conn xmit_rdma 0000000000000000 [ 1335.282102][T32414] rdma_op ffff888157b52580 conn xmit_rdma 0000000000000000 [ 1336.093754][T32448] rdma_op ffff8881259c2d80 conn xmit_rdma 0000000000000000 [ 1336.679355][T32466] netlink: 8 bytes leftover after parsing attributes in process `syz.6.22702'. [ 1337.030363][T32477] rdma_op ffff888117265d80 conn xmit_rdma 0000000000000000 [ 1337.429193][T32495] rdma_op ffff888117264580 conn xmit_rdma 0000000000000000 [ 1338.015486][T32507] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1338.107892][T32512] netlink: 8 bytes leftover after parsing attributes in process `syz.5.22723'. [ 1338.174635][T32514] rdma_op ffff888118b89180 conn xmit_rdma 0000000000000000 [ 1338.284914][ T29] kauditd_printk_skb: 68 callbacks suppressed [ 1338.284933][ T29] audit: type=1326 audit(1747797360.002:48909): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32524 comm="syz.1.22729" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1338.371430][ T29] audit: type=1326 audit(1747797360.042:48910): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32524 comm="syz.1.22729" exe="/root/syz-executor" sig=0 arch=c000003e syscall=55 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1338.395139][ T29] audit: type=1326 audit(1747797360.042:48911): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32524 comm="syz.1.22729" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1338.419000][ T29] audit: type=1326 audit(1747797360.042:48912): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32524 comm="syz.1.22729" exe="/root/syz-executor" sig=0 arch=c000003e syscall=140 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1338.442707][ T29] audit: type=1326 audit(1747797360.042:48913): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32524 comm="syz.1.22729" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1338.466743][ T29] audit: type=1326 audit(1747797360.042:48914): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32524 comm="syz.1.22729" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1338.490558][ T29] audit: type=1326 audit(1747797360.042:48915): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32524 comm="syz.1.22729" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1338.514400][ T29] audit: type=1326 audit(1747797360.042:48916): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32524 comm="syz.1.22729" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1338.538293][ T29] audit: type=1326 audit(1747797360.052:48917): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32524 comm="syz.1.22729" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1338.562039][ T29] audit: type=1326 audit(1747797360.052:48918): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32524 comm="syz.1.22729" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa868e9e969 code=0x7ffc0000 [ 1338.714619][T32549] netlink: 8 bytes leftover after parsing attributes in process `syz.8.22738'. [ 1338.822218][T32554] rdma_op ffff888117264580 conn xmit_rdma 0000000000000000 [ 1339.026656][T32563] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1339.685483][T32593] rdma_op ffff888117264580 conn xmit_rdma 0000000000000000 [ 1340.448251][T32618] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1340.512395][T32618] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1340.562176][T32618] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1340.662309][T32618] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1340.728994][T32618] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 1340.770784][T32618] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 1340.836644][T32618] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 1340.861798][T32618] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 1341.198757][T32655] netlink: 8 bytes leftover after parsing attributes in process `syz.6.22776'. [ 1342.384890][T32682] xt_CT: You must specify a L4 protocol and not use inversions on it [ 1342.484802][T32694] rdma_op ffff88811c235180 conn xmit_rdma 0000000000000000 [ 1342.674444][T32707] ================================================================== [ 1342.682578][T32707] BUG: KCSAN: data-race in hrtimer_interrupt / print_cpu [ 1342.689721][T32707] [ 1342.692061][T32707] read-write to 0xffff888237c1ae58 of 2 bytes by interrupt on cpu 0: [ 1342.700233][T32707] hrtimer_interrupt+0x315/0x460 [ 1342.705203][T32707] __sysvec_apic_timer_interrupt+0x5c/0x1d0 [ 1342.711135][T32707] sysvec_apic_timer_interrupt+0x6f/0x80 [ 1342.716799][T32707] asm_sysvec_apic_timer_interrupt+0x1a/0x20 [ 1342.722811][T32707] __tsan_read8+0x1d/0x190 [ 1342.727256][T32707] __traceiter_sys_enter+0x3d/0x80 [ 1342.732401][T32707] trace_sys_enter+0x86/0x110 [ 1342.737111][T32707] syscall_trace_enter+0x13e/0x1e0 [ 1342.742251][T32707] do_syscall_64+0xaa/0x1a0 [ 1342.746786][T32707] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1342.752705][T32707] [ 1342.755041][T32707] read to 0xffff888237c1ae58 of 2 bytes by task 32707 on cpu 1: [ 1342.762692][T32707] print_cpu+0x37c/0x680 [ 1342.766955][T32707] timer_list_show+0x107/0x170 [ 1342.771746][T32707] seq_read_iter+0x627/0x940 [ 1342.776366][T32707] proc_reg_read_iter+0x10d/0x180 [ 1342.781423][T32707] copy_splice_read+0x3c1/0x5f0 [ 1342.786296][T32707] splice_direct_to_actor+0x26f/0x680 [ 1342.791696][T32707] do_splice_direct+0xda/0x150 [ 1342.796478][T32707] do_sendfile+0x380/0x640 [ 1342.800924][T32707] __x64_sys_sendfile64+0x105/0x150 [ 1342.806173][T32707] x64_sys_call+0xb39/0x2fb0 [ 1342.810799][T32707] do_syscall_64+0xd0/0x1a0 [ 1342.815332][T32707] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1342.821340][T32707] [ 1342.823677][T32707] value changed: 0x7f57 -> 0x7f58 [ 1342.828714][T32707] [ 1342.831053][T32707] Reported by Kernel Concurrency Sanitizer on: [ 1342.837225][T32707] CPU: 1 UID: 0 PID: 32707 Comm: syz.6.22792 Not tainted 6.15.0-rc7-syzkaller-00002-gb36ddb9210e6 #0 PREEMPT(voluntary) [ 1342.849837][T32707] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 1342.859915][T32707] ==================================================================