last executing test programs: 9m6.443602922s ago: executing program 3 (id=5647): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e00000004000000080000000c"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xd, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000e00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x40008d0}, 0x40) sendmsg$NFT_BATCH(r2, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x5}}, [@NFT_MSG_NEWSETELEM={0x38, 0xc, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x6}, [@NFTA_SET_ELEM_LIST_SET={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_ELEM_LIST_ELEMENTS={0xc, 0x3, 0x0, 0x1, [{0x8, 0x0, 0x0, 0x1, [@NFTA_SET_ELEM_KEY={0x4}]}]}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x7}}}, 0x60}, 0x1, 0x0, 0x0, 0x24000840}, 0x40) 9m6.429166362s ago: executing program 3 (id=5648): r0 = perf_event_open(&(0x7f0000001000)={0x2, 0x80, 0x50, 0x1, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x8000, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000340), &(0x7f0000000480)='./file0\x00', 0x58000, &(0x7f0000003b40)=ANY=[@ANYRES32=0x0, @ANYRESDEC, @ANYRES16=r0, @ANYBLOB="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", @ANYBLOB="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", @ANYRES64], 0x8, 0x2eb, &(0x7f00000004c0)="$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") madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) setsockopt$inet_int(0xffffffffffffffff, 0x0, 0x13, 0x0, 0x0) syz_clone3(&(0x7f00000004c0)={0x120000, 0x0, &(0x7f0000000100), 0x0, {0x25}, 0x0, 0x0, 0x0, &(0x7f0000000240)}, 0x58) fsconfig$FSCONFIG_SET_STRING(0xffffffffffffffff, 0x1, 0x0, &(0x7f0000000140)='io#harset3\xf2\xc1\x87\xd3d\xf0\xff\x8f\xa4JO\xc5}+\'qW\xd7\xc8\xd3\x17\t\nq?\xb9Z]TT\xedmU\n+bK\x11\xa5\x81(?\xdb\x8d<\xd1V\xb8Jd_\xe5^<\xad@\xa3\x06\x14\x1c\xc6\x0f\xb1\xbbB&\xde9;\vY*\xb9\xc3\xfe\x05\xec\x8a\xf8\v\xc7\v\xb8\xf1\xb1\x9e\xca\xca\xa2\xe90\xb4\xa1m\xac\xd9\x8c@fv\xdd\xe70\xe3=\\\xaf/.\x8au\x1e\x9aV\x93/gO\x80\xe1\xe0\xe4\xb8\x91\xa1\x9a\xd6z\xb9\xc2\xcc\x1emd&\x8a\x03', 0x0) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f0000000540)=ANY=[], 0x90) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000000680)={0x0, &(0x7f0000000580)}) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r1, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x48, &(0x7f0000000200)=[@in6={0xa, 0x4e21, 0x7ff, @private1, 0xeb3}, @in6={0xa, 0x4e24, 0x3, @remote, 0x3}, @in={0x2, 0x4e21, @loopback}]}, &(0x7f0000000180)=0x10) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x1d, &(0x7f0000000000)={0x1, [0x0]}, &(0x7f0000000080)=0x8) r4 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x20002) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000040)={0x53, 0xfffffffe, 0x6, 0x0, @buffer={0x2, 0x41001, &(0x7f00000000c0)=""/81}, &(0x7f0000000380)="259374c96ee3", 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$CAN_RAW_RECV_OWN_MSGS(r5, 0x65, 0x4, &(0x7f0000000280), &(0x7f00000002c0)=0x4) setsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(r2, 0x84, 0x1f, &(0x7f0000000000)={r3, @in={{0x2, 0x4e24, @empty}}, 0x100, 0x600}, 0x90) r6 = socket$netlink(0x10, 0x3, 0x10) openat(r5, &(0x7f0000000300)='./file0\x00', 0x80, 0x44) bind$netlink(r6, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) setsockopt$sock_int(r6, 0x1, 0x8, &(0x7f0000000000), 0x4) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0x4, &(0x7f0000000640)=0x1802, 0x4) r7 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0xfd, &(0x7f00000004c0)=[{&(0x7f0000000380)="2e00000010008188e6b62aa73772cc9f1ba1f848110000005e140602000000000e000a001000000002900000121f", 0x2e}], 0x1}, 0x40) r8 = socket(0x26, 0x3, 0x4) r9 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f00000003c0)={'bond_slave_0\x00', 0x0}) sendmsg$nl_route_sched(r8, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000180)=@newqdisc={0x44, 0x24, 0x3fe3aa0262d8c583, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0xffff, 0xffff}, {0x0, 0xc}}, [@qdisc_kind_options=@q_fq_pie={{0xb}, {0x14, 0x8002, [@TCA_FQ_PIE_MEMORY_LIMIT={0x8, 0x8, 0x1d92}, @TCA_FQ_PIE_ECN_PROB={0x8, 0x9, 0x43}]}}]}, 0x44}}, 0x0) sendmsg$kcm(r7, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000040)="2e00000010008188040f80ec59acbc0413a1f848110000005e140602000000000e000a000f00000002800000121f", 0x2e}], 0x1}, 0x8084) 9m5.540921938s ago: executing program 3 (id=5650): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0100000004000000080000000b"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000f4751f2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000000400000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000300000095"], &(0x7f0000000240)='GPL\x00', 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1, 0x0, 0x100}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a00000709000100"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f00000002c0)={{0x14, 0x10, 0x1, 0x0, 0x0, {0x1}}, [@NFT_MSG_NEWSET={0x70, 0x9, 0xa, 0x401, 0x0, 0x0, {0xa, 0x0, 0x4}, [@NFTA_SET_NAME={0x9, 0x2, 'syz1\x00'}, @NFTA_SET_ID={0x8, 0xa, 0x1, 0x0, 0xfffffffc}, @NFTA_SET_TABLE={0x9, 0x1, 'syz1\x00'}, @NFTA_SET_KEY_LEN={0x8, 0x5, 0x1, 0x0, 0xd}, @NFTA_SET_EXPRESSIONS={0x2c, 0x12, 0x0, 0x1, [{0x14, 0x1, 0x0, 0x1, @last={{0x9}, @val={0x4}}}, {0x14, 0x1, 0x0, 0x1, @counter={{0xc}, @val={0x4}}}]}, @NFTA_SET_FLAGS={0x8, 0x3, 0x1, 0x0, 0x130}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x1}}}, 0x98}, 0x1, 0x0, 0x0, 0x4044050}, 0x40) 9m5.539863418s ago: executing program 3 (id=5652): pipe(&(0x7f00000004c0)={0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x401) ioctl$BLKBSZGET(r0, 0x80081270, &(0x7f0000000000)) unshare(0x2040400) r1 = socket$pptp(0x18, 0x1, 0x2) r2 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x50) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000800)=ANY=[@ANYBLOB="18ffffffff000000000000000000000018110000f4de0ce73128d842df7f0471f0e8779c667b5eb8efd2642794f7cefce6e9a46eeb", @ANYRES32=r2, @ANYRESOCT=r2], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000640)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x480000000000000b, 0x954b, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext={0x76, 0x1ef7}, 0x11efa, 0x4, 0x98, 0x0, 0x2, 0xfffff271, 0xfffd, 0x0, 0x0, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x20702, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0xca58c30f81b6079f}) r6 = socket(0x400000000010, 0x3, 0x0) r7 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r6, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000027c0)=@newqdisc={0x58, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r8, {0x0, 0xfff1}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_fq={{0x7}, {0x2c, 0x2, [@TCA_FQ_PLIMIT={0x8, 0x1, 0x4}, @TCA_FQ_RATE_ENABLE={0x8}, @TCA_FQ_QUANTUM={0x8, 0x3, 0x73c}, @TCA_FQ_RATE_ENABLE={0x8, 0x5, 0x1}, @TCA_FQ_RATE_ENABLE={0x8}]}}]}, 0x58}}, 0x0) r9 = socket$unix(0x1, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r11 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r11, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@gettclass={0x24, 0x2a, 0x129, 0x70bd29, 0x20000, {0x0, 0x0, 0x0, r10, {0xffe0, 0xfff2}, {0xffff, 0xe}, {0x8, 0xe}}}, 0x24}}, 0x40004) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'macsec0\x00', 0x0}) sendmsg$nl_route_sched(r4, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000480)=@newtfilter={0x24, 0x11, 0x1, 0x70bd28, 0x2000, {0x0, 0x0, 0x74, r12, {0xfffd, 0x10}, {0x10, 0xfff1}, {0xfff2, 0x3}}}, 0x24}, 0x1, 0xf0ffffffffffff, 0x0, 0x14004804}, 0x840) r13 = dup(r1) connect$inet(r13, &(0x7f0000000540)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000040)={0x4, &(0x7f0000000080)=[{0x25, 0x2, 0x2, 0xffffffff}, {0x46, 0x2, 0x9, 0xfffffff7}, {0xc, 0x9, 0xff, 0x5}, {0x6, 0x2, 0x4, 0x4}]}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB="1b00000000000000000000000080000000000000", @ANYRES32, @ANYRES32, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00ae3b619bd895ff632a48fcc6000000000000000000000000000000000000000000000040000000e0fd3cd400d5cebe5ef71d8266e873ca4c1a9815f7489d9eaf68713ecb50a1d2e4f120d9d97f8f213df3304dda48a4a1b19a99f6a3b9d5aee298d3c14a1b06d4f7503d87554ca2fdf8fc20aa68953a07f7118bf0f8f2cf1f911ec5a79c1b951c0d02b0cfe32eabb64e0908a93568ae8feeea83b63774d04d281e92031f9768748c180c377c0e49ef4e6a99f5ac31cb73c5c9db20749a9e5c5321486039dcc32e041a202503f636f07b92c72106f6547218c90000"], 0x50) r14 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0x7, &(0x7f00000003c0)=ANY=[@ANYBLOB="18000018110000", @ANYBLOB="1eaab08ed2eca5864debfdcbfde1cf42723148f55b56f38ac575c5073a4751bc8e761a4f93117e43423bc4c0d83c962b39e0d49585b2e7951884191c", @ANYRES16=r11], &(0x7f0000000180)='GPL\x00', 0x9, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r14, 0x0, 0x6}, 0x18) r15 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f00000001c0)={'fscrypt:', @desc1}, &(0x7f0000000080)={0x0, "69dcaf20127e9a854528f45826cb35be51ca73845d177dd8dba7221daeccfda56b75cfe286fdd14cb5b10c5900214fec2236da7d88ea0f0700000000000800", 0x3f}, 0x48, 0xfffffffffffffffe) keyctl$search(0xa, r15, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0) 9m5.003589151s ago: executing program 3 (id=5661): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$TIOCGSID(r0, 0x5429, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0xd, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0xfffffffc, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000000)='kfree\x00', r2}, 0x18) mkdir(&(0x7f0000001a80)='./file0\x00', 0x18b) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0x0, r3, 0x0, 0x31, &(0x7f0000000000)='//sys\x00\x00\x00\x00\x00\x00\x80\x004\x00\x00s/\x92ync_\x93\x96\xff\x92\xaf\x00Se\xf44.\x00'/49}, 0x30) r4 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000080)={'veth1_vlan\x00', 0x0}) r6 = socket(0x400000000010, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@getchain={0x24, 0x11, 0x1, 0x70bd2a, 0x2000001, {0x0, 0x0, 0x0, r5, {0x7, 0xa}, {0xd, 0xffe0}, {0x8, 0x9}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048054) mount$bpf(0x200000000000, &(0x7f0000000200)='./file0\x00', 0x0, 0x206002, 0x0) syz_mount_image$iso9660(&(0x7f0000000380), &(0x7f00000003c0)='./file0\x00', 0x0, &(0x7f0000000400), 0x1, 0x34e, &(0x7f0000000440)="$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") 9m4.818852452s ago: executing program 3 (id=5665): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x304000, 0x800, 0x0, 0x3}, 0x20) (fail_nth: 5) 8m49.711654122s ago: executing program 32 (id=5665): r0 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r0, 0x11b, 0x4, &(0x7f0000000080)={0x0, 0x304000, 0x800, 0x0, 0x3}, 0x20) (fail_nth: 5) 4m26.073522011s ago: executing program 2 (id=9330): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000300)=ANY=[@ANYBLOB="180100000000001c000000000000ea04850000007b00"], &(0x7f0000000100)='GPL\x00', 0x8, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) get_robust_list(0x0, &(0x7f00000005c0)=0x0, &(0x7f0000000600)) 4m26.028371251s ago: executing program 2 (id=9332): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1e00000002000000d0efde19363d252c00000000", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES64, @ANYRES32, @ANYBLOB="06000000020004000000000000000000000000000000000002000000"], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, &(0x7f0000000400), &(0x7f00000002c0)}, 0x20) timer_create(0xfffffffffffffffd, 0x0, &(0x7f00000000c0)=0x0) syz_read_part_table(0x4078, &(0x7f0000004080)="$eJzs079KwlEUB/CjQ0EtFj3A3SKQ+vknySkqGhrMwamxwkIQg7RwaelteqQeoOcwMIP4lYMFBfH5TOfe7z2Xs5zVl6eDiCjs3A1648gpRsRkWu0XIwoRUZ8lhfzT4XWvf37R7b91FfMxCyvNuX94nBVLi/+5uRZxmiJiZfS8cfST6fgnlrfOPh4nU5/3+3tODlupfdxKWaNR7VSq6V0t1bKvO7Ism5P8tvVS52qc7ru3w97NIO1u18qpfTlKlb1yqjSb9b8eDwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeGUHDgQAAAAAgPxfG6GqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqqoKO3AgAAAAAADk/9oIVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVVdiBYwEAAAAAYf7WSXRuAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADAqAAAAP//CaUg2w==") timer_settime(0x0, 0x236bd4336e4642df, &(0x7f0000000300)={{0x0, 0x3938700}, {0x0, 0xe4c}}, 0x0) timer_settime(r1, 0x0, &(0x7f0000000200)={{}, {0x77359400}}, &(0x7f00000001c0)) 4m25.487163294s ago: executing program 2 (id=9341): r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'veth0\x00', 0x0}) socket$netlink(0x10, 0x3, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000181100", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703"], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x6, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) ioctl$BTRFS_IOC_START_SYNC(0xffffffffffffffff, 0x80089418, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r3, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x62181) r4 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000018c0), 0xa8c01) write$sndseq(r4, &(0x7f0000000080)=[{0x1e, 0x0, 0x8, 0xfd, @tick=0x8, {0x0, 0x1}, {}, @result}], 0x1c) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r5}, 0x10) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f00000004c0)={r1, 0x3, 0x6}, 0x10) r6 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$packet_add_memb(r0, 0x107, 0x1, &(0x7f0000000100)={r1, 0x1, 0x6}, 0x10) sendmsg$nl_route_sched(r6, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000440)=@getchain={0x24, 0x11, 0x1, 0xfffffffe, 0x2000001, {0x0, 0x0, 0x0, r1, {0x7, 0xa}, {0xd, 0xc}, {0x8}}}, 0x24}, 0x1, 0x0, 0x0, 0x4000000}, 0x20048054) 4m25.324182905s ago: executing program 2 (id=9345): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000180)=0x100000001, 0x4) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x1}}, 0x80001}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000002c0), 0x3) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000380)='cpuacct.usage_sys\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f000000e0c0), 0x10010) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x1, &(0x7f00000003c0)=@gcm_256={{0x304}, "b54b55c9b691706d", "b5421a989404d5c952ba74f879bed1a5bfadabb985e5681803932ccc7beb0f83", "cba83b41", "ef3c6c588e3360e2"}, 0x38) sendfile(r0, r1, &(0x7f0000000100)=0x1010, 0x10001) socket$nl_generic(0x10, 0x3, 0x10) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000140)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000005000000b703000000000000850000007b00000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f00000004c0)='tlb_flush\x00', r2}, 0x10) syz_mount_image$msdos(&(0x7f00000001c0), &(0x7f0000000040)='./file0\x00', 0x100c404, &(0x7f0000000880)={[{@fat=@dmask={'dmask', 0x3d, 0x401}}, {@fat=@flush}, {@fat=@uid}, {@fat=@uid={'uid', 0x3d, 0xee00}}, {@nodots}, {@nodots}, {@fat=@gid={'gid', 0x3d, 0xee00}}, {@nodots}, {@nodots}, {@dots}, {@nodots}, {@nodots}, {@nodots}, {}, {@nodots}, {@fat=@sys_immutable}, {@nodots}, {@fat=@showexec}, {@fat=@flush}, {@fat=@umask={'umask', 0x3d, 0x7}}, {@nodots}, {@dots}]}, 0x1, 0x1f5, &(0x7f0000000600)="$eJzs3cFqE1EUANCbmCYTcdGdIAgjLnRV1C+oSAUxIFSy0J2gK7NqN6mb9jP8Bf/LD5CuspEncSadmKYxBDKj7Tmb3pn7Xt+7M2SSTW5SFL7f/RpZ1or2fuzHpBW70Y6ZswAArpNJSvEjFZreCwBQjzXe/3/WvCUAYMvevnv/+vlgcHCY51nE+dl4OB4Wf4v8y1eDgyf5b7vVrPPxeHjrIv80X/zsMM3vxO0y/6yYn1+kuxEx7Mbjh0V+mnvxZpD/Ob8XH7dcOwAAAAAAAAAAAAAAAAAAAAAANOV+5DNL+/vs7S3m+2W+OJrrD7TQv6cT9zrlYdUeKJ3WURQAAAAAAAAAAAAAAAAAAAD8Z45Pvnz+MBp9OqqCXkTMn+ksGXN10Cr/8VqDmw/asdn0flnmBou2yku03QL7y2/uOkF0/pW7s2mQ17BWf+XlTWkaLH8VzNpiXDm9GxGrV390uOnmJyml0bcHR8cnkVYOrp4RvVqfSAAAAAAAAAAAAAAAAAAAcHPNfev7kqyJDQEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAA6rf/58Gl8+sDE4j4k78dfBsrZ3IGq0VAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACA6+tXAAAA//85ziI4") r3 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000840)='memory.events.local\x00', 0x275a, 0x0) write$binfmt_script(r3, &(0x7f0000000040), 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r3, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r4 = socket$inet_tcp(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f0000000040)={0x2, 0x4e21, @local}, 0x47) setsockopt$inet_tcp_int(r4, 0x6, 0x210000000013, &(0x7f00000000c0)=0x100000001, 0x4) connect$inet(r4, &(0x7f0000000180)={0x2, 0x4e21, @local}, 0x10) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$tmpfs(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x84022, &(0x7f0000000280)={[{@nr_inodes}]}) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r4, 0x6, 0x16, &(0x7f0000000340)=[@sack_perm, @window={0x3, 0x6, 0x7}, @mss={0x2, 0x7}, @window={0x3, 0x0, 0x4}, @window={0x3, 0x8, 0x6}, @timestamp, @window={0x3, 0xfffe}, @sack_perm], 0x200000000000005e) setsockopt$inet_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f00000001c0), 0x4) sendto$inet(r4, &(0x7f0000000100)="fd0a0fc6dd4887c6048236609465f2e31c82c5f6be73b435a314bd11a3ccedb8ec4c8219ed81f552d8a12b9b15cdca91b058fbff98d619438ad5aaebb6ed6b54", 0xfffffffffffffe4f, 0x404c801, 0x0, 0x0) 4m24.837478008s ago: executing program 2 (id=9349): bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x0, 0x1ffffffffffffdf4, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df850000002d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020097b1af8ff00000000bfa100000000000007010000b8ffffffb702000000000000b703000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r0 = getpid() r1 = syz_pidfd_open(r0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r2 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r2}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r3 = eventfd2(0x0, 0x0) readv(r3, &(0x7f0000000500)=[{&(0x7f0000000000)=""/92, 0x5c}], 0x1) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000004000000b703000000000000850000007200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x26, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='sched_switch\x00', r4}, 0x10) fsetxattr$trusted_overlay_opaque(r1, &(0x7f00000000c0), 0x0, 0x0, 0x2) r5 = openat$tun(0xffffffffffffff9c, 0x0, 0x2400, 0x0) ioctl$TUNSETIFF(r5, 0x400454ca, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="070000000400000008020000d9"], 0x50) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000200)) ioctl$USBDEVFS_IOCTL(0xffffffffffffffff, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) capset(&(0x7f0000000380)={0x20080522}, &(0x7f0000000040)={0x200000, 0x40200003, 0x0, 0x6, 0x7}) setrlimit(0x40000000000008, &(0x7f0000000080)={0x0, 0x6}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000000780)=[{{&(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="ac1414aaffffffff0000000010000000000000000000000007"], 0x30}}], 0x1, 0x4000804) 4m24.671869199s ago: executing program 2 (id=9353): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0700000004000000800000000400000028"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000700000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='kmem_cache_free\x00', r1}, 0x18) socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) writev(r2, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}], 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) link(&(0x7f0000000680)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', 0x0) 4m24.641479939s ago: executing program 33 (id=9353): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0700000004000000800000000400000028"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000700000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='kmem_cache_free\x00', r1}, 0x18) socket$can_raw(0x1d, 0x3, 0x1) r2 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) writev(r2, &(0x7f00000025c0)=[{&(0x7f0000000240)='4', 0x1}], 0x1) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) link(&(0x7f0000000680)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/../file0\x00', 0x0) 17.420767476s ago: executing program 1 (id=13549): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000280), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000140)) r2 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000001ec0)={0x0, 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_PORT_GET(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)={0x3c, r4, 0x1, 0x70bd27, 0x10000, {0x49}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x73}}}]}, 0x3c}}, 0x24004000) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 17.371655306s ago: executing program 1 (id=13550): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x42, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x1c0) mknodat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1/file2\x00', 0x81c0, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000340)='./file1/file2\x00', 0x60400, 0xd4) fcntl$notify(r2, 0x402, 0x8000003b) renameat2(0xffffffffffffff9c, &(0x7f0000000480)='./file1/file2\x00', 0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x2) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000001000000850000"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r4 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f0000000000)='kmem_cache_free\x00', r3}, 0x18) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) ioctl$sock_ipv4_tunnel_SIOCDELTUNNEL(r1, 0x89f2, &(0x7f0000000440)={'ip_vti0\x00', &(0x7f0000000500)={'ip_vti0\x00', 0x0, 0x8, 0x80, 0x4, 0x9, {{0xc, 0x4, 0x2, 0x9, 0x30, 0x68, 0x0, 0x89, 0x4, 0x0, @rand_addr=0x64010102, @dev={0xac, 0x14, 0x14, 0x31}, {[@end, @timestamp={0x44, 0x18, 0xd0, 0x0, 0x2, [0x1f0, 0x7fff, 0x0, 0x2, 0x6]}]}}}}}) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000007940)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x33f}, 0x1, 0x0, 0x0, 0xc0d0}, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="ffffffff00"/28], 0x50) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xf, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000100000000000100000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000014000000b703000000f700008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000010000008500000084000000b70000000000000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r6}, 0x10) r7 = socket$inet_udp(0x2, 0x2, 0x0) r8 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r8, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, r7, {0x2, 0x0, @multicast1}, 0xa, 0x0, 0xfffd}}, 0x26) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=ANY=[@ANYRES64=r4], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) getsockopt$inet_mreqn(r1, 0x0, 0x20, &(0x7f00000005c0)={@multicast2, @multicast1}, &(0x7f0000000700)=0xffffffffffffff94) r9 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r9, 0x8933, &(0x7f0000000000)={'veth0_vlan\x00', 0x0}) sendmsg$nl_route_sched(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)=@getchain={0x24, 0x11, 0x43d, 0x0, 0x0, {0x0, 0x0, 0x0, r10, {}, {0xf}}}, 0x24}, 0x1, 0x0, 0x0, 0x8080}, 0x0) r11 = socket$packet(0x11, 0x3, 0x300) r12 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r12, 0x8933, &(0x7f00000004c0)={'syz_tun\x00', 0x0}) bind$packet(r11, &(0x7f0000000000)={0x11, 0x4, r13, 0x1, 0xfe, 0x6, @remote}, 0x14) setsockopt$SO_RDS_TRANSPORT(r1, 0x114, 0x8, &(0x7f0000000300)=0x2, 0x4) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r1, 0x89f0, &(0x7f00000006c0)={'ip6tnl0\x00', &(0x7f0000000640)={'syztnl2\x00', 0x0, 0x2, 0x7, 0x8, 0x9, 0x41, @empty, @mcast1, 0x700, 0x10, 0x10001}}) 16.76047877s ago: executing program 1 (id=13561): syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3010046, &(0x7f0000000e00), 0x1, 0x553, &(0x7f0000001080)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x14c) fallocate(r2, 0x0, 0xbf5, 0x2000402) fsetxattr$security_ima(r2, &(0x7f0000000040), &(0x7f0000000740)=ANY=[], 0x6b, 0x0) 16.64143877s ago: executing program 1 (id=13565): syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r0 = socket(0x10, 0x80003, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x281442, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB="24d804b95543ae8d30d39b70bd17ce4dfeeeffa4ab23bd135dba7e488a5ed3424a96c54298831a828d0e8c3d474bc1dab0928e0588663c542ead414bbf5721afd06f86c3a8d5ae6ab2bebfd648840a470156da0706814b44f78a63fce4eb4b63babe7dff8410728d06b63c68d9f61a7fa344aac2592d0f8e0a8deb65b58032191ae637f6e9d5003d23b821f6b5b75238af36487d19c900018728883f63ce2c7bf5e138a3568e49b81103837212f1948243349aef86e99144fed647834d27b2a4f27c2a6a9b032dee892dbb9ada5c", @ANYBLOB="9ddf3eee0e5f0bb7c1f1403ba29cc9"], 0x0, 0x4000002, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_usb_connect(0x2, 0x0, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x28, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="02070900040000002dbd7000ffdbdf2502000b"], 0x20}}, 0x4040014) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVdn:Dd', 0x0) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x8) ioctl$TCSETSW2(0xffffffffffffffff, 0x5453, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000380)=ANY=[@ANYRES16=0x0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3, 0x0, 0xff}, 0x18) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0xffffffffffff8001}, 0x18) syz_mount_image$ext4(&(0x7f0000000b80)='ext3\x00', &(0x7f0000000bc0)='./file0\x00', 0x1a00404, &(0x7f0000000600)={[{@dioread_nolock}, {@nomblk_io_submit}, {@dioread_lock}, {@nodiscard}, {@resuid={'resuid', 0x3d, 0xffffffffffffffff}}]}, 0x0, 0xbac, &(0x7f00000017c0)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r5, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) lseek(r5, 0x5, 0x4) r6 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0x4, &(0x7f0000000080)=0x100, 0x4) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x100000, 0xfff, 0x0, 0x3, 0x8, 0x20005, 0x8, 0x0, 0x0, 0x0, 0x64f1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00'}, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'veth0_macvtap\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0xc}, {0xffff, 0xffff}, {0xfff3}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0xf, "00000000000000000001000f0e00"}}}]}, 0x48}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00'}) 16.548044011s ago: executing program 4 (id=13568): socket(0x2, 0x80805, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8458, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'netdevsim0\x00'}) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={0x0, 0x8}, 0x4010, 0x0, 0x0, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x10) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x41d9fda7) 16.389724462s ago: executing program 5 (id=13575): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000007c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000500)='kfree\x00', r1, 0x0, 0xffff}, 0x18) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000640)='./file0\x00') listxattr(&(0x7f0000003040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0x0, 0x0) 16.368666312s ago: executing program 4 (id=13576): syz_mount_image$ext4(&(0x7f0000000380)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x3010046, &(0x7f0000000e00), 0x1, 0x553, &(0x7f0000001080)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x2}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0, r1}, 0x18) r2 = creat(&(0x7f0000000000)='./file1\x00', 0x14c) fallocate(r2, 0x0, 0xbf5, 0x2000402) fsetxattr$security_ima(r2, &(0x7f0000000040), &(0x7f0000000740)=ANY=[], 0x6b, 0x0) 16.336664523s ago: executing program 5 (id=13578): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0], 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) fsopen(&(0x7f0000000000)='hfs\x00', 0x0) 16.267865863s ago: executing program 5 (id=13580): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000002c0)={0x11, 0x4, &(0x7f00000002c0)=ANY=[], &(0x7f0000000180)='syzkaller\x00', 0x20000000, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd64}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000000)='block_plug\x00', r1}, 0x10) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) 15.966188744s ago: executing program 5 (id=13583): r0 = socket$kcm(0x10, 0x2, 0x0) recvmsg$kcm(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x20) sendmsg$inet(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000680)="5cdf4273002488e800000012006bab9a3fe3d86e17aa0a076b876c1d0048007ea60864160af36504001d0038504a4c0444008fcd416477c66479e0001d001931a0e69ee517d34460bc06000000a705251e6182949a3651f60a84c9f4d49380", 0x5f}], 0x1, 0x0, 0x0, 0x1f00c00e}, 0xc015) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="1b00000000000000000000000000010100000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x48) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a00000018010000646c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b701000000000000850000006d00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) sendmsg$NFT_BATCH(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000880)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a3c000000120a09000000000000000000020000000900020073794f310000000008000440080000000900010073797a3000000000080003400000000114000000110001"], 0x64}, 0x1, 0x0, 0x0, 0x814}, 0x0) r4 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r5 = socket$kcm(0x2, 0x3, 0x2) ioctl$SIOCSIFHWADDR(r5, 0x8914, &(0x7f0000000040)={'syzkaller1\x00', @multicast}) bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="0700000004000000200100000102"], 0x50) r6 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000003480)={0x6, 0x13, &(0x7f0000000280)=ANY=[@ANYRESDEC=r4, @ANYRES32=r1, @ANYBLOB="0000000000004000b702000014000000b703000000000000850000a9e605c10000950000000000000018010000", @ANYRES32=r1, @ANYBLOB="000000000000000018650000080000000000000001000000bf91000000000000b7020000010000008500000085000000b7000000000000009500000000000000"], &(0x7f0000000340)='syzkaller\x00', 0x1, 0x7f, &(0x7f00000004c0)=""/127, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x5, 0x2}, 0x8, 0x10, &(0x7f0000000540)={0x2, 0x2, 0x800006, 0x1}, 0x10, 0x0, 0x0, 0x8, &(0x7f0000000580)=[r1, r1], &(0x7f0000000440)=[{0x0, 0x2, 0xb, 0x8}, {0x3, 0x3, 0xa, 0xb}, {0x4, 0x2, 0xd, 0xa}, {0x5, 0x3, 0xc, 0x4}, {0x4, 0x3, 0xe, 0x8}, {0x1, 0x4, 0x6, 0x4}, {0x4, 0x3, 0xb, 0x1}, {0x2, 0x2, 0x6, 0x7}], 0x10, 0x4}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000003540)={0x11, 0x8, &(0x7f0000000080)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x2d, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r6, 0x0, 0x0, 0x0, 0x0, 0x80000001}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r7}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000007"], 0x48) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc9ffb}]}) r8 = perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2000, 0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffff00000001, 0x1ff}, 0x0, 0x3, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) perf_event_open(&(0x7f0000000040)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x307, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x7, 0x0, 0x7, 0x4, 0x400008, 0x8000, 0x0, 0x0, 0x0, 0x20000}, 0x0, 0x0, r8, 0x3) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x1, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r9}, 0x18) r10 = open(&(0x7f0000000000)='./file0\x00', 0x62840, 0x0) fcntl$setlease(r10, 0x400, 0x0) fcntl$setlease(r10, 0x400, 0x2) syz_emit_ethernet(0xd2, &(0x7f00000001c0)=ANY=[@ANYBLOB="0180c20000002059249b379086dd60108114009c110000000000ee0000000000000000000000ff02000000000000000000000000000140"], 0x0) write$tun(r4, &(0x7f0000000640)=ANY=[@ANYRES8=r3, @ANYRES32=r6, @ANYRESDEC=r6, @ANYRESOCT=r0], 0xfce) sendmsg$NFT_MSG_GETOBJ(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000400)=ANY=[@ANYBLOB="34000000150a03f5"], 0x34}, 0x1, 0x0, 0x0, 0x66df5cfbe53006d1}, 0x0) 15.912459745s ago: executing program 4 (id=13585): r0 = socket(0x10, 0x3, 0x6) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000080)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x3, [], "63d038"}, @datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "de"}]}}, 0x0, 0x36}, 0x28) r1 = socket(0xa, 0x2, 0x0) ioctl$sock_SIOCBRDELBR(r1, 0x89a2, &(0x7f0000000000)='bridge0\x00') ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f0000000040)) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000100)={'caif0\x00', &(0x7f00000000c0)=@ethtool_stats={0x1d, 0x1, [0x2]}}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/prev\x00') r3 = syz_open_dev$MSR(&(0x7f00000001c0), 0x8, 0x0) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nfc(&(0x7f0000000100), r5) ioctl$IOCTL_GET_NCIDEV_IDX(r4, 0x0, &(0x7f00000000c0)=0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000002c0), 0x420000, 0x0) sendmsg$NFC_CMD_DEV_UP(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)={0x1c, r6, 0x1, 0x70bd26, 0x25dfdbfc, {}, [@NFC_ATTR_DEVICE_INDEX={0x8, 0x1, r7}]}, 0x1c}}, 0x0) close(r4) read$msr(r3, &(0x7f0000000200)=""/191, 0xbf) write$P9_RWRITE(r2, &(0x7f0000000140)={0xb, 0x77, 0x2, 0xf30}, 0xb) select(0x0, 0x0, 0x0, 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x8, &(0x7f0000000000)=[{0x401, 0xfc, 0x2, 0x371364dd}, {0x8, 0x86, 0x1, 0x8}, {0x2, 0x2, 0x0, 0x5}, {0x0, 0x68, 0x7}, {0x3e, 0x10, 0xd, 0x7bf}, {0x401, 0x9, 0x1, 0x86}, {0xa, 0x1, 0x1, 0x401}, {0xfffb, 0x1, 0x3, 0x9}]}) 15.137424399s ago: executing program 0 (id=13586): socket(0x2, 0x80805, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x28, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8458, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'netdevsim0\x00'}) prctl$PR_SET_SECCOMP(0x16, 0x2, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_bp={0x0, 0x8}, 0x4010, 0x0, 0x0, 0x0, 0x3, 0x1000, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000004c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0}, 0x50) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00'}, 0x10) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) ptrace$pokeuser(0x6, r1, 0x388, 0x41d9fda7) 15.105296709s ago: executing program 0 (id=13587): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x3, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x9}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0700000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000700000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='kmem_cache_free\x00', r1}, 0x18) chroot(&(0x7f0000000000)='./file0\x00') 15.06171852s ago: executing program 0 (id=13588): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0xfffffffffffffdd0, 0x0, 0x41000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000fce000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x48ae40, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setitimer(0x0, 0x0, 0x0) 14.963699771s ago: executing program 0 (id=13589): syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), 0xffffffffffffffff) r0 = socket(0x10, 0x80003, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) socket$netlink(0x10, 0x3, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x281442, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x11, 0xc, &(0x7f0000000780)=ANY=[@ANYBLOB, @ANYBLOB="9ddf3eee0e5f0bb7c1f1403ba29cc9"], 0x0, 0x4000002, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback=0x2b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_usb_connect(0x2, 0x0, 0x0, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000100)={0x28, 0x0, &(0x7f0000000240)={&(0x7f0000000440)=ANY=[@ANYBLOB="02070900040000002dbd7000ffdbdf2502000b"], 0x20}}, 0x4040014) request_key(&(0x7f0000000040)='asymmetric\x00', &(0x7f0000001ffb)={'syz', 0x1}, &(0x7f0000001fee)='R\x10rust\xe3c*sgrVdn:Dd', 0x0) setsockopt$inet6_IPV6_RTHDR(0xffffffffffffffff, 0x29, 0x39, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x8) bpf$MAP_CREATE(0x0, 0x0, 0x48) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000380)=ANY=[@ANYRES16=0x0], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x12, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='sched_switch\x00', r3, 0x0, 0xff}, 0x18) r4 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000280)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0xfffffffc, {0x6, 0x0, 0x8100, 0x0, {0x1, 0x10}, {0xd}, {0xe, 0x10}}, [@TCA_RATE={0x6}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x11, {0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x400c800}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000080)='sched_switch\x00', 0xffffffffffffffff, 0x0, 0xffffffffffff8001}, 0x18) syz_mount_image$ext4(&(0x7f0000000b80)='ext3\x00', &(0x7f0000000bc0)='./file0\x00', 0x1a00404, &(0x7f0000000600)={[{@dioread_nolock}, {@nomblk_io_submit}, {@dioread_lock}, {@nodiscard}, {@resuid={'resuid', 0x3d, 0xffffffffffffffff}}]}, 0x0, 0xbac, &(0x7f00000017c0)="$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") r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file2\x00', 0x42, 0x0) pwrite64(r5, &(0x7f00000000c0)='a', 0x200000c1, 0x9000) lseek(r5, 0x5, 0x4) r6 = socket$netlink(0x10, 0x3, 0xf) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r6, 0x10e, 0x4, &(0x7f0000000080)=0x100, 0x4) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x26, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x17, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0x8, 0x6}, 0x100000, 0xfff, 0x0, 0x3, 0x8, 0x20005, 0x8, 0x0, 0x0, 0x0, 0x64f1}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000005c0)='sched_switch\x00'}, 0x10) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'veth0_macvtap\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000080)=@newqdisc={0x48, 0x24, 0x4ee4e6a52ff56541, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0xc}, {0xffff, 0xffff}, {0xfff3}}, [@qdisc_kind_options=@q_prio={{0x9}, {0x18, 0x2, {0xf, "00000000000000000001000f0e00"}}}]}, 0x48}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wlan1\x00'}) 14.963371891s ago: executing program 6 (id=13590): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) fsopen(&(0x7f0000000000)='hfs\x00', 0x0) 14.892807691s ago: executing program 6 (id=13591): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x3, 0x0, &(0x7f0000000040)='syzkaller\x00', 0x2, 0x0, 0x0, 0x0, 0x9}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0700000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000700000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='kmem_cache_free\x00', r1}, 0x18) chroot(&(0x7f0000000000)='./file0\x00') 14.858308191s ago: executing program 6 (id=13592): r0 = socket$kcm(0xa, 0x2, 0x0) sendmsg$sock(r0, &(0x7f0000000400)={&(0x7f0000000580)=@in6={0x2, 0x4e22, 0x0, @dev}, 0x80, 0x0}, 0x0) 14.602322973s ago: executing program 4 (id=13593): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) dup(r0) (async) r1 = dup(r0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(r1, 0x84, 0x66, &(0x7f0000000200)={0x0, 0xc0}, &(0x7f0000000300)=0x8) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000400)={r2, 0x47a}, 0x8) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000073797a3100000000050005000a00000012000300686173683a6e65742c706f7274000000000000000000"], 0x4c}}, 0x2) (async) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000000)=ANY=[@ANYBLOB="4c00000002060108000034e40000000000000000050001000600000005000400000073797a3100000000050005000a00000012000300686173683a6e65742c706f7274000000000000000000"], 0x4c}}, 0x2) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000007b00000000000000000000850000007b"], &(0x7f0000000140)='syzkaller\x00', 0x3, 0xe2, 0x0, 0x0, 0x63, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8d5}, 0x94) (async) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000007b00000000000000000000850000007b"], &(0x7f0000000140)='syzkaller\x00', 0x3, 0xe2, 0x0, 0x0, 0x63, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8d5}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000480)={&(0x7f0000000080)='netlink_extack\x00', r3}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000a40), 0xffffffffffffffff) (async) r4 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000a40), 0xffffffffffffffff) r5 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000fcdbdf25120000001800018014000200766574683000000000000000080000000800090000000000080007"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x2004c0a0) (async) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000000)=ANY=[@ANYBLOB='<\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="010000000000fcdbdf25120000001800018014000200766574683000000000000000080000000800090000000000080007"], 0x3c}, 0x1, 0x0, 0x0, 0x400c000}, 0x2004c0a0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x6, @loopback, 0x3}], 0x1c) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={0x0}, 0x18) r6 = socket(0x11, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) (async) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) setsockopt$packet_int(r6, 0x107, 0xf, 0x0, 0x0) (async) setsockopt$packet_int(r6, 0x107, 0xf, 0x0, 0x0) sendmsg$netlink(r6, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000002480)}, 0x0) prlimit64(0x0, 0x7, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r7 = getpid() sched_setscheduler(r7, 0x2, &(0x7f0000000200)=0x7) (async) sched_setscheduler(r7, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r8, &(0x7f000057eff8)=@abs, 0x6e) (async) connect$unix(r8, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r9, &(0x7f0000000000), 0x0, 0x40040) recvmmsg(r8, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003000000850000000600000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r10}, 0x10) syz_clone(0x48020000, 0x0, 0x0, 0x0, 0x0, 0x0) 14.282412004s ago: executing program 6 (id=13594): pwritev2(0xffffffffffffffff, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x76200}], 0x1, 0x7c00, 0x0, 0x3) r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f00000002c0)='/sys/power/resume', 0x143a82, 0x8) r1 = dup(r0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x8000fffffffc) 10.853524705s ago: executing program 4 (id=13595): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f00000008c0)=ANY=[@ANYBLOB="54000000000801010000ffffe00000000a000000050003002f00000006000240000000002400"], 0x54}, 0x1, 0x0, 0x0, 0x4004}, 0x28040000) 9.809315982s ago: executing program 5 (id=13596): r0 = socket(0x10, 0x80002, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r1, &(0x7f0000000340)={0xa, 0x5, 0x5, @ipv4={'\x00', '\xff\xff', @remote}, 0xfffffffe}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r1, 0x6, 0x1f, &(0x7f00000000c0), 0x4) setsockopt$inet6_tcp_TLS_TX(r1, 0x11a, 0x1, &(0x7f0000000480)=@gcm_256={{0x303}, "000200", "e123c5876ff425b1ebe250a8486be34705f4f827ae60ecb65e528248d5552bff", "7e25837b", "15d0db2c77179e1a"}, 0x38) write$binfmt_script(r1, &(0x7f0000000500)={'#! ', './file0'}, 0xb) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="05000000040000"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x14, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020646c2100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000c300000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r3, 0x0, 0x200000081}, 0x18) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000e, 0x20c44fb6edc09a38, 0xffffffffffffffff, 0x0) close_range(r0, r1, 0x0) 8.533941169s ago: executing program 0 (id=13597): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000140)='\xe9\x1fq\x89Y\x1e\x923aK\x00', 0x10, &(0x7f0000000040), 0xfc, 0x56f, &(0x7f0000000700)="$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") r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000200)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002000000000000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sys_enter\x00', r0}, 0x18) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r2 = fcntl$dupfd(r1, 0x406, r1) r3 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) openat$selinux_validatetrans(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYRESDEC=r3], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x49, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) mq_open(&(0x7f0000000140)='$@\x00', 0x1, 0x0, 0x0) 8.36911936s ago: executing program 1 (id=13598): bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000440)={0x6, 0x3, &(0x7f0000000680)=ANY=[], 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0700000004"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x8, &(0x7f00000007c0)=ANY=[@ANYBLOB="1800000000000000000000000700000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000000000850000001b000000b70000000000000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000300)='kmem_cache_free\x00', r1}, 0x18) chroot(&(0x7f0000000000)='./file0\x00') 8.155861481s ago: executing program 6 (id=13599): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000181100"/20, @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x19, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000070000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000a5df"], 0x0, 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @cgroup_sockopt=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20}, 0x94) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1e000000000000000500000006"], 0x48) bpf$MAP_LOOKUP_ELEM(0x2, &(0x7f0000001740)={r0, 0x0, &(0x7f0000001700)=""/53}, 0x20) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000008c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0xfffffffffffffdd0, 0x0, 0x41000}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x6, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x18) r2 = socket$unix(0x1, 0x1, 0x0) connect$unix(r2, &(0x7f0000fce000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x48ae40, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$PROG_LOAD(0x5, &(0x7f0000000980)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) setitimer(0x0, 0x0, 0x0) 6.774760689s ago: executing program 4 (id=13600): bpf$PROG_LOAD(0x5, &(0x7f0000008000)={0x15, 0x3, &(0x7f0000000100)=ANY=[@ANYBLOB="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"], &(0x7f0000003ff6)='syzkaller\x00', 0x1, 0xc3, &(0x7f00000002c0)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_reuseport}, 0x48) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x1, 0x34, 0x0, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000000)=0x100000001, 0x4) connect$inet6(r0, &(0x7f0000000200)={0xa, 0x0, 0x2, @loopback}, 0x1c) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f00000000c0), 0x4) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x9, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r1 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r1, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000100)=0x1, 0x4) connect$inet6(r4, &(0x7f00000001c0)={0xa, 0x4000, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$inet6_tcp_TCP_MD5SIG(r4, 0x6, 0xe, &(0x7f0000000280)={@in6={{0xa, 0x4e23, 0x4, @dev={0xfe, 0x80, '\x00', 0x2d}}}, 0x0, 0x0, 0x38, 0x0, "0f424a2bc651a9f11381328af8daf6f4bd2827984afeb6b627cea1ba22d1af57aa193c5024c9e8b22a8796a538ed893952a1aa555418ba1b4d0bc0712c028ec32a9bc2fb29b52d39e8626bc90abcc02a"}, 0xd8) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000240)='tunl0\x00', 0x10) setsockopt$inet6_tcp_TCP_REPAIR(r4, 0x6, 0x13, &(0x7f0000000000), 0x4) sendmmsg$inet6(r4, &(0x7f00000038c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x8000) connect$unix(r2, &(0x7f000057eff8)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000ddffffff850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000300)='sched_switch\x00', r5}, 0x10) syz_clone(0x638c1100, 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) setsockopt$inet6_tcp_TLS_TX(r0, 0x11a, 0x2, &(0x7f0000000680)=@gcm_128={{0x303}, "000037d7009400", "c0b6c5b29ca2b838d41ac2fc7ddf972d", "e9be1eae", "bb10000000000001"}, 0x28) 5.283102239s ago: executing program 1 (id=13601): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x20000000, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x17, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000100)='GPL\x00', 0x3, 0x0, 0x0, 0x40f00, 0x42, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r1}, 0x10) fsopen(&(0x7f0000000000)='hfs\x00', 0x0) 2.817681263s ago: executing program 5 (id=13602): r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/26) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x6a) write$binfmt_elf32(r2, &(0x7f0000000a80)={{0x7f, 0x45, 0x4c, 0x46, 0xfd, 0x7, 0xff, 0x84, 0x7ff7, 0x3, 0x6, 0x3, 0xa4, 0x38, 0xaa, 0x7, 0xba7, 0x20, 0x4d, 0x8426, 0x4}, [{0x3, 0x7, 0x8, 0x7ff, 0xc3, 0x200, 0x2, 0xd}]}, 0x58) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x10000, 0x401, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) open$dir(&(0x7f0000000000)='./file0\x00', 0x40, 0x0) r3 = inotify_init1(0x80000) r4 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), r1) sendmsg$NL802154_CMD_SET_LBT_MODE(r1, &(0x7f0000000240)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x40, r4, 0x20, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_LBT_MODE={0x5, 0x13, 0x1}]}, 0x40}, 0x1, 0x0, 0x0, 0x77c99e433d757fe0}, 0xf4) inotify_add_watch(r3, &(0x7f0000000080)='.\x00', 0x2000775) r5 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r5, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000280)='mm_page_free\x00', r6, 0x0, 0x800000000000002}, 0x18) kexec_load(0x0, 0x1, &(0x7f0000000140)=[{0x0, 0x3e00, 0x116094000, 0x41000000}], 0x0) r7 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r7, 0x0, 0x60, &(0x7f0000000480)={'filter\x00', 0x104, 0x4, 0x3c0, 0x0, 0xe8, 0x1f0, 0x2d8, 0x2d8, 0x2d8, 0x4, 0x0, {[{{@arp={@remote, @broadcast, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'dvmrp0\x00', 'macvlan0\x00'}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28}}, {{@arp={@loopback, @multicast2, 0x0, 0x0, 0x0, 0x0, {@mac=@local}, {}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 'pim6reg0\x00', 'veth0\x00'}, 0xc0, 0x108}, @unspec=@LED={0x48, 'LED\x00', 0x0, {'syz1\x00'}}}, {{@uncond, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xe8}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x410) close(r2) execve(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) r8 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/sys/net/ipv4/vs/drop_entry\x00', 0x2, 0x0) r9 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r9, 0x10e, 0xc, &(0x7f0000000100)={0x2ffc, 0x4000006, 0xfffffefc, 0x6}, 0x10) sendmsg$nl_generic(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)=ANY=[@ANYBLOB="1c000000160001f47efde4be701161000a000000040000800400", @ANYRES32=r9], 0x1c}}, 0x804) write$cgroup_int(r8, &(0x7f0000000040)=0x3, 0x12) connect$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000340)={0x2, 0x0, @loopback}, 0x10) sendto$inet(0xffffffffffffffff, 0x0, 0xfff4, 0x0, 0x0, 0x0) 2.287860316s ago: executing program 6 (id=13603): mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x2, 0x4c831, 0xffffffffffffffff, 0x0) syz_genetlink_get_family_id$smc(&(0x7f0000000280), 0xffffffffffffffff) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000004000000ff0f000007"], 0x48) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) capset(&(0x7f0000000080)={0x20071026}, &(0x7f0000000140)) syz_open_dev$tty1(0xc, 0x4, 0x1) syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) 0s ago: executing program 0 (id=13604): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec850000006d000000850000000700000095"], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={0x0}, 0x18) prctl$PR_SET_MM_MAP(0x23, 0xe, &(0x7f0000000080)={&(0x7f0000ff0000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ff8000/0x4000)=nil, &(0x7f0000ff8000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f0000ffa000/0x2000)=nil, 0x0}, 0x68) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) r1 = io_uring_setup(0x71b5, &(0x7f0000000040)={0x0, 0x9272, 0xc000, 0x1, 0xae}) io_uring_enter(r1, 0x2219, 0x7721, 0x16, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8054}, 0x4af584f715520309) io_uring_enter(r1, 0xf00, 0x2, 0x17, 0x0, 0x0) kernel console output (not intermixed with test programs): T19508] [ 892.820323][T19508] __dump_stack+0x1d/0x30 [ 892.820353][T19508] dump_stack_lvl+0xe8/0x140 [ 892.820381][T19508] dump_stack+0x15/0x1b [ 892.820406][T19508] should_fail_ex+0x265/0x280 [ 892.820433][T19508] should_failslab+0x8c/0xb0 [ 892.820484][T19508] kmem_cache_alloc_noprof+0x50/0x480 [ 892.820524][T19508] ? __anon_vma_prepare+0xcd/0x2f0 [ 892.820555][T19508] __anon_vma_prepare+0xcd/0x2f0 [ 892.820582][T19508] handle_mm_fault+0x1d1b/0x2be0 [ 892.820614][T19508] ? mt_find+0x208/0x320 [ 892.820691][T19508] do_user_addr_fault+0x3fe/0x1080 [ 892.820756][T19508] exc_page_fault+0x62/0xa0 [ 892.820796][T19508] asm_exc_page_fault+0x26/0x30 [ 892.820824][T19508] RIP: 0010:__put_user_4+0xd/0x20 [ 892.820849][T19508] Code: 66 89 01 31 c9 0f 01 ca c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 90 48 89 cb 48 c1 fb 3f 48 09 d9 0f 01 cb <89> 01 31 c9 0f 01 ca c3 cc cc cc cc 90 90 90 90 90 90 90 90 90 90 [ 892.820873][T19508] RSP: 0018:ffffc900017fbc98 EFLAGS: 00050202 [ 892.820959][T19508] RAX: 0000000000000000 RBX: 0000000000000000 RCX: 0000200000000840 [ 892.821032][T19508] RDX: 00000000000008c7 RSI: 0000000000000201 RDI: ffffffff844e9966 [ 892.821049][T19508] RBP: 0000000000000000 R08: 0001ffff8684802f R09: 0000000000000000 [ 892.821066][T19508] R10: 000000000000894b R11: ffffffff853ef920 R12: ffffffff85c48190 [ 892.821084][T19508] R13: ffffffff85c48190 R14: 0000200000000840 R15: ffff88810c4f1692 [ 892.821101][T19508] ? __pfx_smc_release_cb+0x10/0x10 [ 892.821124][T19508] ? release_sock+0x116/0x150 [ 892.821233][T19508] smc_ioctl+0x4a8/0x4e0 [ 892.821335][T19508] sock_do_ioctl+0x73/0x220 [ 892.821439][T19508] sock_ioctl+0x41b/0x610 [ 892.821464][T19508] ? __pfx_sock_ioctl+0x10/0x10 [ 892.821535][T19508] do_vfs_ioctl+0xa79/0xe10 [ 892.821558][T19508] ? selinux_file_ioctl+0x1bd/0x3a0 [ 892.821599][T19508] ? __fget_files+0x184/0x1c0 [ 892.821664][T19508] __se_sys_ioctl+0x82/0x140 [ 892.821693][T19508] __x64_sys_ioctl+0x43/0x50 [ 892.821719][T19508] x64_sys_call+0x1816/0x3000 [ 892.821756][T19508] do_syscall_64+0xd2/0x200 [ 892.821774][T19508] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 892.821854][T19508] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 892.821924][T19508] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 892.821954][T19508] RIP: 0033:0x7f01346fefc9 [ 892.822036][T19508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 892.822060][T19508] RSP: 002b:00007f013315f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 892.822084][T19508] RAX: ffffffffffffffda RBX: 00007f0134955fa0 RCX: 00007f01346fefc9 [ 892.822101][T19508] RDX: 0000200000000840 RSI: 000000000000541b RDI: 0000000000000003 [ 892.822123][T19508] RBP: 00007f013315f090 R08: 0000000000000000 R09: 0000000000000000 [ 892.822140][T19508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 892.822156][T19508] R13: 00007f0134956038 R14: 00007f0134955fa0 R15: 00007ffcc2c2c188 [ 892.822178][T19508] [ 893.170589][T19500] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 893.251857][T19500] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 893.320356][T19500] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 893.418860][T20294] netdevsim netdevsim5 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 893.418957][T20294] netdevsim netdevsim5 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 893.423001][T20294] netdevsim netdevsim5 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 893.428027][T20294] netdevsim netdevsim5 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 894.216541][T19598] FAULT_INJECTION: forcing a failure. [ 894.216541][T19598] name failslab, interval 1, probability 0, space 0, times 0 [ 894.229372][T19598] CPU: 0 UID: 0 PID: 19598 Comm: syz.1.12437 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 894.229479][T19598] Tainted: [W]=WARN [ 894.229487][T19598] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 894.229500][T19598] Call Trace: [ 894.229507][T19598] [ 894.229516][T19598] __dump_stack+0x1d/0x30 [ 894.229546][T19598] dump_stack_lvl+0xe8/0x140 [ 894.229579][T19598] dump_stack+0x15/0x1b [ 894.229601][T19598] should_fail_ex+0x265/0x280 [ 894.229627][T19598] should_failslab+0x8c/0xb0 [ 894.229709][T19598] kmem_cache_alloc_noprof+0x50/0x480 [ 894.229782][T19598] ? skb_clone+0x151/0x1f0 [ 894.229810][T19598] skb_clone+0x151/0x1f0 [ 894.229934][T19598] __netlink_deliver_tap+0x2c9/0x500 [ 894.229985][T19598] netlink_unicast+0x66b/0x690 [ 894.230029][T19598] netlink_sendmsg+0x58b/0x6b0 [ 894.230124][T19598] ? __pfx_netlink_sendmsg+0x10/0x10 [ 894.230145][T19598] __sock_sendmsg+0x145/0x180 [ 894.230179][T19598] ____sys_sendmsg+0x31e/0x4e0 [ 894.230230][T19598] ___sys_sendmsg+0x17b/0x1d0 [ 894.230315][T19598] __x64_sys_sendmsg+0xd4/0x160 [ 894.230423][T19598] x64_sys_call+0x191e/0x3000 [ 894.230460][T19598] do_syscall_64+0xd2/0x200 [ 894.230485][T19598] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 894.230592][T19598] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 894.230637][T19598] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 894.230667][T19598] RIP: 0033:0x7ff3697befc9 [ 894.230742][T19598] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 894.230761][T19598] RSP: 002b:00007ff368227038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 894.230814][T19598] RAX: ffffffffffffffda RBX: 00007ff369a15fa0 RCX: 00007ff3697befc9 [ 894.230831][T19598] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000007 [ 894.230846][T19598] RBP: 00007ff368227090 R08: 0000000000000000 R09: 0000000000000000 [ 894.230858][T19598] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 894.230870][T19598] R13: 00007ff369a16038 R14: 00007ff369a15fa0 R15: 00007ffd86621e18 [ 894.230964][T19598] [ 894.447102][T19603] __nla_validate_parse: 2 callbacks suppressed [ 894.447118][T19603] netlink: 12 bytes leftover after parsing attributes in process `syz.4.12438'. [ 894.484413][ T29] kauditd_printk_skb: 99 callbacks suppressed [ 894.484432][ T29] audit: type=1326 audit(894.526:281449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19593 comm="syz.4.12438" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 894.514027][ T29] audit: type=1326 audit(894.526:281450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19593 comm="syz.4.12438" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 894.537305][ T29] audit: type=1326 audit(894.526:281451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19593 comm="syz.4.12438" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 894.560505][ T29] audit: type=1326 audit(894.526:281452): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19593 comm="syz.4.12438" exe="/root/syz-executor" sig=0 arch=c000003e syscall=288 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 894.583694][ T29] audit: type=1326 audit(894.526:281453): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19593 comm="syz.4.12438" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 894.606929][ T29] audit: type=1326 audit(894.526:281454): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19593 comm="syz.4.12438" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 894.630155][ T29] audit: type=1326 audit(894.526:281455): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19593 comm="syz.4.12438" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 894.653377][ T29] audit: type=1326 audit(894.526:281456): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19593 comm="syz.4.12438" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 894.676723][ T29] audit: type=1326 audit(894.526:281457): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19593 comm="syz.4.12438" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 894.699903][ T29] audit: type=1326 audit(894.526:281458): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19593 comm="syz.4.12438" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 894.727901][T19613] netlink: 12 bytes leftover after parsing attributes in process `syz.1.12443'. [ 894.779967][T19615] tipc: Started in network mode [ 894.784923][T19615] tipc: Node identity 164a94236a33, cluster identity 4711 [ 894.792426][T19615] tipc: Enabled bearer , priority 0 [ 894.803030][T19615] syzkaller0: entered promiscuous mode [ 894.808632][T19615] syzkaller0: entered allmulticast mode [ 894.830345][T19620] tipc: Resetting bearer [ 894.838586][T19620] tipc: Disabling bearer [ 894.893326][T19631] netlink: 161700 bytes leftover after parsing attributes in process `syz.5.12451'. [ 895.140640][T19646] netlink: 28 bytes leftover after parsing attributes in process `syz.1.12456'. [ 895.140668][T19646] netlink: 28 bytes leftover after parsing attributes in process `syz.1.12456'. [ 895.182031][T19643] hub 2-0:1.0: USB hub found [ 895.182431][T19643] hub 2-0:1.0: 8 ports detected [ 895.582388][T19670] netlink: 12 bytes leftover after parsing attributes in process `syz.1.12465'. [ 895.804072][T19675] netlink: 8 bytes leftover after parsing attributes in process `syz.0.12467'. [ 895.990697][T19707] netlink: 161700 bytes leftover after parsing attributes in process `syz.1.12481'. [ 896.135840][T19713] netlink: 12 bytes leftover after parsing attributes in process `syz.5.12483'. [ 896.503364][T19734] netlink: 'syz.5.12491': attribute type 3 has an invalid length. [ 896.503391][T19734] netlink: 24 bytes leftover after parsing attributes in process `syz.5.12491'. [ 896.503569][T19734] IPVS: Error connecting to the multicast addr [ 896.942593][T19750] hub 2-0:1.0: USB hub found [ 896.949954][T19750] hub 2-0:1.0: 8 ports detected [ 897.308041][T19776] hub 2-0:1.0: USB hub found [ 897.312818][T19776] hub 2-0:1.0: 8 ports detected [ 898.331247][T19835] FAULT_INJECTION: forcing a failure. [ 898.331247][T19835] name failslab, interval 1, probability 0, space 0, times 0 [ 898.343944][T19835] CPU: 1 UID: 0 PID: 19835 Comm: syz.0.12533 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 898.344030][T19835] Tainted: [W]=WARN [ 898.344044][T19835] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 898.344062][T19835] Call Trace: [ 898.344072][T19835] [ 898.344084][T19835] __dump_stack+0x1d/0x30 [ 898.344116][T19835] dump_stack_lvl+0xe8/0x140 [ 898.344206][T19835] dump_stack+0x15/0x1b [ 898.344232][T19835] should_fail_ex+0x265/0x280 [ 898.344255][T19835] should_failslab+0x8c/0xb0 [ 898.344294][T19835] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 898.344415][T19835] ? __alloc_skb+0x101/0x320 [ 898.344450][T19835] __alloc_skb+0x101/0x320 [ 898.344488][T19835] netlink_alloc_large_skb+0xbf/0xf0 [ 898.344572][T19835] netlink_sendmsg+0x3cf/0x6b0 [ 898.344601][T19835] ? __pfx_netlink_sendmsg+0x10/0x10 [ 898.344629][T19835] __sock_sendmsg+0x145/0x180 [ 898.344693][T19835] ____sys_sendmsg+0x31e/0x4e0 [ 898.344731][T19835] ___sys_sendmsg+0x17b/0x1d0 [ 898.344793][T19835] __x64_sys_sendmsg+0xd4/0x160 [ 898.344860][T19835] x64_sys_call+0x191e/0x3000 [ 898.344886][T19835] do_syscall_64+0xd2/0x200 [ 898.344912][T19835] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 898.344950][T19835] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 898.345027][T19835] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 898.345064][T19835] RIP: 0033:0x7f03d11befc9 [ 898.345086][T19835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 898.345111][T19835] RSP: 002b:00007f03cfc1f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 898.345136][T19835] RAX: ffffffffffffffda RBX: 00007f03d1415fa0 RCX: 00007f03d11befc9 [ 898.345182][T19835] RDX: 0000000004004110 RSI: 000020000000c2c0 RDI: 0000000000000006 [ 898.345196][T19835] RBP: 00007f03cfc1f090 R08: 0000000000000000 R09: 0000000000000000 [ 898.345208][T19835] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 898.345220][T19835] R13: 00007f03d1416038 R14: 00007f03d1415fa0 R15: 00007fff3d5e2558 [ 898.345245][T19835] [ 899.022491][T19873] program syz.4.12549 is using a deprecated SCSI ioctl, please convert it to SG_IO [ 899.260753][T19883] netlink: 'syz.5.12551': attribute type 13 has an invalid length. [ 899.268867][T19883] netlink: 'syz.5.12551': attribute type 27 has an invalid length. [ 899.312004][T19892] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 899.312141][T19892] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 899.587316][T19901] hub 2-0:1.0: USB hub found [ 899.587391][T19901] hub 2-0:1.0: 8 ports detected [ 899.769747][ T29] kauditd_printk_skb: 365 callbacks suppressed [ 899.769766][ T29] audit: type=1400 audit(899.819:281822): avc: denied { watch watch_reads } for pid=19912 comm="syz.6.12564" path="/106" dev="tmpfs" ino=569 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 900.112892][T19926] __nla_validate_parse: 3 callbacks suppressed [ 900.112908][T19926] netlink: 40 bytes leftover after parsing attributes in process `syz.5.12568'. [ 900.432779][ T29] audit: type=1400 audit(900.479:281823): avc: denied { bind } for pid=19936 comm="syz.0.12571" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 900.452106][ T29] audit: type=1400 audit(900.479:281824): avc: denied { name_bind } for pid=19936 comm="syz.0.12571" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unreserved_port_t tclass=sctp_socket permissive=1 [ 900.473679][ T29] audit: type=1400 audit(900.479:281825): avc: denied { node_bind } for pid=19936 comm="syz.0.12571" src=20004 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=sctp_socket permissive=1 [ 900.502899][T19937] FAULT_INJECTION: forcing a failure. [ 900.502899][T19937] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 900.516140][T19937] CPU: 0 UID: 0 PID: 19937 Comm: syz.0.12571 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 900.516173][T19937] Tainted: [W]=WARN [ 900.516180][T19937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 900.516194][T19937] Call Trace: [ 900.516201][T19937] [ 900.516212][T19937] __dump_stack+0x1d/0x30 [ 900.516243][T19937] dump_stack_lvl+0xe8/0x140 [ 900.516271][T19937] dump_stack+0x15/0x1b [ 900.516328][T19937] should_fail_ex+0x265/0x280 [ 900.516349][T19937] should_fail+0xb/0x20 [ 900.516367][T19937] should_fail_usercopy+0x1a/0x20 [ 900.516394][T19937] _copy_from_user+0x1c/0xb0 [ 900.516502][T19937] __copy_msghdr+0x244/0x300 [ 900.516555][T19937] ___sys_sendmsg+0x109/0x1d0 [ 900.516632][T19937] __x64_sys_sendmsg+0xd4/0x160 [ 900.516660][T19937] x64_sys_call+0x191e/0x3000 [ 900.516692][T19937] do_syscall_64+0xd2/0x200 [ 900.516718][T19937] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 900.516757][T19937] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 900.516800][T19937] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 900.516871][T19937] RIP: 0033:0x7f03d11befc9 [ 900.516907][T19937] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 900.516931][T19937] RSP: 002b:00007f03cfc1f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 900.517005][T19937] RAX: ffffffffffffffda RBX: 00007f03d1415fa0 RCX: 00007f03d11befc9 [ 900.517022][T19937] RDX: 0000000004048043 RSI: 0000200000000800 RDI: 0000000000000006 [ 900.517039][T19937] RBP: 00007f03cfc1f090 R08: 0000000000000000 R09: 0000000000000000 [ 900.517055][T19937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 900.517070][T19937] R13: 00007f03d1416038 R14: 00007f03d1415fa0 R15: 00007fff3d5e2558 [ 900.517160][T19937] [ 900.874927][ T29] audit: type=1400 audit(900.929:281826): avc: denied { ioctl } for pid=19939 comm="syz.6.12573" path="socket:[146020]" dev="sockfs" ino=146020 ioctlcmd=0x8914 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 900.930498][T19942] hub 2-0:1.0: USB hub found [ 900.932825][ T29] audit: type=1400 audit(900.959:281827): avc: denied { sys_module } for pid=19939 comm="syz.6.12573" capability=16 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability permissive=1 [ 900.938405][T19942] hub 2-0:1.0: 8 ports detected [ 900.956428][ T29] audit: type=1400 audit(900.969:281828): avc: denied { block_suspend } for pid=19939 comm="syz.6.12573" capability=36 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 901.062589][ T29] audit: type=1400 audit(901.079:281829): avc: denied { map } for pid=19940 comm="syz.0.12572" path="socket:[144894]" dev="sockfs" ino=144894 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 901.078092][T19953] hub 2-0:1.0: USB hub found [ 901.086070][ T29] audit: type=1400 audit(901.079:281830): avc: denied { read accept } for pid=19940 comm="syz.0.12572" path="socket:[144894]" dev="sockfs" ino=144894 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 901.093651][T19956] netlink: 12 bytes leftover after parsing attributes in process `syz.5.12579'. [ 901.114798][ T29] audit: type=1400 audit(901.089:281831): avc: denied { relabelfrom } for pid=19940 comm="syz.0.12572" name="NETLINK" dev="sockfs" ino=144895 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_route_socket permissive=1 [ 901.150049][T19953] hub 2-0:1.0: 8 ports detected [ 901.180827][T19959] lo speed is unknown, defaulting to 1000 [ 901.283996][T19971] hub 2-0:1.0: USB hub found [ 901.308069][T19971] hub 2-0:1.0: 8 ports detected [ 901.338411][T19976] netlink: 'syz.5.12583': attribute type 16 has an invalid length. [ 901.346599][T19976] netlink: 'syz.5.12583': attribute type 17 has an invalid length. [ 901.386303][T19976] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 902.045047][T20052] netlink: 12 bytes leftover after parsing attributes in process `syz.4.12595'. [ 902.108093][T20064] blktrace: Concurrent blktraces are not allowed on sg0 [ 902.131580][T11219] IPVS: starting estimator thread 0... [ 902.180975][T20076] netlink: 'syz.6.12600': attribute type 12 has an invalid length. [ 902.224301][T20069] IPVS: using max 2352 ests per chain, 117600 per kthread [ 902.448400][T20102] netlink: 'syz.1.12603': attribute type 1 has an invalid length. [ 902.456342][T20102] netlink: 224 bytes leftover after parsing attributes in process `syz.1.12603'. [ 902.625303][T20123] hub 2-0:1.0: USB hub found [ 902.635073][T20123] hub 2-0:1.0: 8 ports detected [ 902.688522][T20139] netlink: 12 bytes leftover after parsing attributes in process `syz.4.12607'. [ 903.119967][T20188] netlink: 16 bytes leftover after parsing attributes in process `syz.6.12616'. [ 903.402846][T20194] netlink: 24 bytes leftover after parsing attributes in process `syz.1.12618'. [ 903.424985][T20194] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=20194 comm=syz.1.12618 [ 903.439581][T20194] netlink: 'syz.1.12618': attribute type 1 has an invalid length. [ 903.638609][T20206] netlink: 'syz.1.12624': attribute type 1 has an invalid length. [ 903.848345][T20220] netlink: 28 bytes leftover after parsing attributes in process `syz.0.12628'. [ 903.932351][T20224] netlink: 12 bytes leftover after parsing attributes in process `syz.1.12629'. [ 904.076929][T20223] lo speed is unknown, defaulting to 1000 [ 904.482394][T20234] netlink: 56 bytes leftover after parsing attributes in process `syz.0.12633'. [ 904.839474][T15303] netdevsim netdevsim1 netdevsim0: set [0, 0] type 1 family 0 port 8472 - 0 [ 904.928024][T15303] netdevsim netdevsim1 netdevsim1: set [0, 0] type 1 family 0 port 8472 - 0 [ 904.950769][T15303] netdevsim netdevsim1 netdevsim2: set [0, 0] type 1 family 0 port 8472 - 0 [ 904.959588][T15303] netdevsim netdevsim1 netdevsim3: set [0, 0] type 1 family 0 port 8472 - 0 [ 904.969184][ T29] kauditd_printk_skb: 367 callbacks suppressed [ 904.969200][ T29] audit: type=1326 audit(905.011:282199): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20249 comm="syz.5.12639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 904.998815][ T29] audit: type=1326 audit(905.011:282200): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20249 comm="syz.5.12639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 905.022383][ T29] audit: type=1326 audit(905.071:282201): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20249 comm="syz.5.12639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 905.045772][ T29] audit: type=1326 audit(905.071:282202): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20249 comm="syz.5.12639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 905.069028][ T29] audit: type=1326 audit(905.071:282203): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20249 comm="syz.5.12639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 905.112904][T20252] __nla_validate_parse: 2 callbacks suppressed [ 905.112919][T20252] netlink: 12 bytes leftover after parsing attributes in process `syz.5.12642'. [ 905.160377][ T29] audit: type=1326 audit(905.071:282204): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20249 comm="syz.5.12639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 905.183734][ T29] audit: type=1326 audit(905.071:282205): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20249 comm="syz.5.12639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 905.206948][ T29] audit: type=1326 audit(905.071:282206): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20249 comm="syz.5.12639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 905.230145][ T29] audit: type=1326 audit(905.071:282207): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20249 comm="syz.5.12639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 905.253468][ T29] audit: type=1326 audit(905.071:282208): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20249 comm="syz.5.12639" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 905.282707][T20256] netlink: 12 bytes leftover after parsing attributes in process `syz.5.12643'. [ 905.408257][T20273] netlink: 12 bytes leftover after parsing attributes in process `syz.6.12647'. [ 905.426528][T20269] bond1: entered promiscuous mode [ 905.431690][T20269] bond1: entered allmulticast mode [ 905.440504][T20269] 8021q: adding VLAN 0 to HW filter on device bond1 [ 905.459690][T20269] bond1 (unregistering): Released all slaves [ 905.479897][T20282] xt_hashlimit: max too large, truncated to 1048576 [ 905.488574][T20282] xt_CONNSECMARK: only valid in 'mangle' or 'security' table, not 'raw' [ 905.554755][T20289] netlink: 12 bytes leftover after parsing attributes in process `syz.0.12654'. [ 905.720121][T20309] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 905.727985][T20306] ref_ctr increment failed for inode: 0xb8b offset: 0x5 ref_ctr_offset: 0x1000 of mm: 0xffff8881422e4ac0 [ 906.099420][T20330] netlink: 12 bytes leftover after parsing attributes in process `syz.0.12666'. [ 906.269817][T20345] netlink: 12 bytes leftover after parsing attributes in process `syz.4.12662'. [ 906.297831][T20347] ref_ctr increment failed for inode: 0xba0 offset: 0x5 ref_ctr_offset: 0x1000 of mm: 0xffff8881422e3f40 [ 906.315074][T20349] ref_ctr increment failed for inode: 0x316 offset: 0x5 ref_ctr_offset: 0x1000 of mm: 0xffff88810005e780 [ 906.453307][T20357] netlink: 'syz.1.12675': attribute type 1 has an invalid length. [ 906.496013][T20363] netlink: 12 bytes leftover after parsing attributes in process `syz.0.12678'. [ 906.525396][T20365] netlink: 4 bytes leftover after parsing attributes in process `syz.0.12679'. [ 906.534530][T20365] netlink: 348 bytes leftover after parsing attributes in process `syz.0.12679'. [ 906.543881][T20365] netlink: 4 bytes leftover after parsing attributes in process `syz.0.12679'. [ 906.658741][T20374] SELinux: security_context_str_to_sid (öù|ó¬ðZ³®…²Bb°UŽú£èõ) failed with errno=-22 [ 906.678891][T20373] bridge0: entered promiscuous mode [ 906.685124][T20373] macvtap1: entered allmulticast mode [ 906.690711][T20373] bridge0: entered allmulticast mode [ 906.697898][T20373] batman_adv: batadv0: Adding interface: macvtap1 [ 906.704724][T20373] batman_adv: batadv0: The MTU of interface macvtap1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 906.732426][T20373] batman_adv: batadv0: Interface activated: macvtap1 [ 906.859489][T20382] ref_ctr increment failed for inode: 0x2d8 offset: 0x5 ref_ctr_offset: 0x1000 of mm: 0xffff8881422e1140 [ 907.508231][T20414] ref_ctr increment failed for inode: 0xbc5 offset: 0x5 ref_ctr_offset: 0x1000 of mm: 0xffff8881422e2e00 [ 907.651490][T20424] hub 2-0:1.0: USB hub found [ 907.656279][T20424] hub 2-0:1.0: 8 ports detected [ 907.755234][T20444] netlink: 'syz.0.12707': attribute type 16 has an invalid length. [ 907.763348][T20444] netlink: 'syz.0.12707': attribute type 17 has an invalid length. [ 907.784519][T20444] 8021q: adding VLAN 0 to HW filter on device $Hÿ [ 907.798812][T20444] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 907.841319][T20449] lo speed is unknown, defaulting to 1000 [ 908.302880][T20510] ref_ctr increment failed for inode: 0x2fc offset: 0x5 ref_ctr_offset: 0x1000 of mm: 0xffff88810005b980 [ 908.460238][T20532] hub 2-0:1.0: USB hub found [ 908.466075][T20532] hub 2-0:1.0: 8 ports detected [ 908.897398][T20605] ref_ctr increment failed for inode: 0x35c offset: 0x5 ref_ctr_offset: 0x1000 of mm: 0xffff8881422e3980 [ 908.950443][T20603] lo speed is unknown, defaulting to 1000 [ 909.411716][T20662] hub 2-0:1.0: USB hub found [ 909.416660][T20662] hub 2-0:1.0: 8 ports detected [ 909.429274][T20663] hub 2-0:1.0: USB hub found [ 909.434687][T20663] hub 2-0:1.0: 8 ports detected [ 909.466149][T20665] ref_ctr increment failed for inode: 0x301 offset: 0x5 ref_ctr_offset: 0x1000 of mm: 0xffff88810005b980 [ 909.485852][T20670] netlink: 'syz.4.12747': attribute type 1 has an invalid length. [ 909.797397][T20691] bridge0: entered promiscuous mode [ 909.802760][T20691] macsec1: entered promiscuous mode [ 909.809738][T20691] bridge0: port 1(macsec1) entered blocking state [ 909.816247][T20691] bridge0: port 1(macsec1) entered disabled state [ 909.823354][T20691] macsec1: entered allmulticast mode [ 909.828898][T20691] bridge0: entered allmulticast mode [ 909.837913][T20691] macsec1: left allmulticast mode [ 909.843118][T20691] bridge0: left allmulticast mode [ 909.849666][T20691] bridge0: left promiscuous mode [ 910.277959][ T29] kauditd_printk_skb: 479 callbacks suppressed [ 910.277980][ T29] audit: type=1400 audit(910.324:282688): avc: denied { getopt } for pid=20707 comm="syz.1.12761" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 910.363770][ T29] audit: type=1326 audit(910.404:282689): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20709 comm="syz.1.12762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 910.387274][ T29] audit: type=1326 audit(910.404:282690): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20709 comm="syz.1.12762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 910.410580][ T29] audit: type=1326 audit(910.404:282691): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20709 comm="syz.1.12762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 910.433853][ T29] audit: type=1326 audit(910.404:282692): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20709 comm="syz.1.12762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 910.457203][ T29] audit: type=1326 audit(910.404:282693): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20709 comm="syz.1.12762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 910.480400][ T29] audit: type=1326 audit(910.404:282694): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20709 comm="syz.1.12762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 910.503591][ T29] audit: type=1326 audit(910.404:282695): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20709 comm="syz.1.12762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 910.526786][ T29] audit: type=1326 audit(910.404:282696): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20709 comm="syz.1.12762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 910.550488][ T29] audit: type=1326 audit(910.414:282697): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=20709 comm="syz.1.12762" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 910.812229][T20719] __nla_validate_parse: 16 callbacks suppressed [ 910.812243][T20719] netlink: 24 bytes leftover after parsing attributes in process `syz.4.12765'. [ 910.834094][T20721] xt_hashlimit: size too large, truncated to 1048576 [ 910.840858][T20721] xt_hashlimit: max too large, truncated to 1048576 [ 910.932558][T20722] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=20722 comm=syz.4.12765 [ 910.960161][T20721] Cannot find add_set index 0 as target [ 911.150616][T20740] netlink: 24 bytes leftover after parsing attributes in process `syz.5.12773'. [ 911.306411][T20758] FAULT_INJECTION: forcing a failure. [ 911.306411][T20758] name failslab, interval 1, probability 0, space 0, times 0 [ 911.319162][T20758] CPU: 0 UID: 0 PID: 20758 Comm: syz.1.12779 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 911.319205][T20758] Tainted: [W]=WARN [ 911.319216][T20758] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 911.319229][T20758] Call Trace: [ 911.319236][T20758] [ 911.319273][T20758] __dump_stack+0x1d/0x30 [ 911.319296][T20758] dump_stack_lvl+0xe8/0x140 [ 911.319315][T20758] dump_stack+0x15/0x1b [ 911.319351][T20758] should_fail_ex+0x265/0x280 [ 911.319369][T20758] should_failslab+0x8c/0xb0 [ 911.319396][T20758] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 911.319450][T20758] ? __alloc_skb+0x101/0x320 [ 911.319565][T20758] __alloc_skb+0x101/0x320 [ 911.319594][T20758] netlink_alloc_large_skb+0xbf/0xf0 [ 911.319623][T20758] netlink_sendmsg+0x3cf/0x6b0 [ 911.319665][T20758] ? __pfx_netlink_sendmsg+0x10/0x10 [ 911.319683][T20758] __sock_sendmsg+0x145/0x180 [ 911.319706][T20758] ____sys_sendmsg+0x31e/0x4e0 [ 911.319740][T20758] ___sys_sendmsg+0x17b/0x1d0 [ 911.319868][T20758] __x64_sys_sendmsg+0xd4/0x160 [ 911.319918][T20758] x64_sys_call+0x191e/0x3000 [ 911.319940][T20758] do_syscall_64+0xd2/0x200 [ 911.319966][T20758] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 911.320006][T20758] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 911.320036][T20758] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 911.320055][T20758] RIP: 0033:0x7ff3697befc9 [ 911.320070][T20758] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 911.320090][T20758] RSP: 002b:00007ff368227038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 911.320108][T20758] RAX: ffffffffffffffda RBX: 00007ff369a15fa0 RCX: 00007ff3697befc9 [ 911.320120][T20758] RDX: 0000000000000000 RSI: 0000200000000340 RDI: 0000000000000003 [ 911.320172][T20758] RBP: 00007ff368227090 R08: 0000000000000000 R09: 0000000000000000 [ 911.320184][T20758] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 911.320195][T20758] R13: 00007ff369a16038 R14: 00007ff369a15fa0 R15: 00007ffd86621e18 [ 911.320214][T20758] [ 911.583587][T20764] lo speed is unknown, defaulting to 1000 [ 911.681037][T20771] netlink: 'syz.4.12784': attribute type 1 has an invalid length. [ 911.803375][T20783] macvtap0: refused to change device tx_queue_len [ 911.892290][T15303] Bluetooth: hci0: Frame reassembly failed (-84) [ 912.296023][T20813] netlink: 24 bytes leftover after parsing attributes in process `syz.4.12800'. [ 912.315203][T20813] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=20813 comm=syz.4.12800 [ 912.330400][T20813] netlink: 'syz.4.12800': attribute type 1 has an invalid length. [ 912.369651][T20816] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 912.399492][T20816] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 912.449751][T20816] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 912.520745][T20816] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 912.609241][T15303] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 912.622912][T15303] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 912.640256][T13343] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 912.653375][T15303] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 912.816399][T20843] netlink: 24 bytes leftover after parsing attributes in process `syz.5.12811'. [ 912.862832][T20843] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=20843 comm=syz.5.12811 [ 912.879012][T20843] netlink: 'syz.5.12811': attribute type 1 has an invalid length. [ 912.955811][T20861] netlink: 'syz.6.12814': attribute type 16 has an invalid length. [ 912.964142][T20861] netlink: 'syz.6.12814': attribute type 17 has an invalid length. [ 913.044912][T20861] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 913.490363][T20916] netlink: 'syz.5.12831': attribute type 29 has an invalid length. [ 913.499361][T20916] netlink: 'syz.5.12831': attribute type 29 has an invalid length. [ 913.543489][T20930] netlink: 'syz.1.12834': attribute type 1 has an invalid length. [ 913.618550][T20952] netlink: 12 bytes leftover after parsing attributes in process `syz.1.12838'. [ 913.627881][T20952] netlink: 16 bytes leftover after parsing attributes in process `syz.1.12838'. [ 913.896200][ T3594] Bluetooth: hci0: command 0x1003 tx timeout [ 913.902287][ T3291] Bluetooth: hci0: Opcode 0x1003 failed: -110 [ 914.074910][T21005] netlink: 12 bytes leftover after parsing attributes in process `syz.4.12846'. [ 914.879077][T21091] hub 2-0:1.0: USB hub found [ 914.883926][T21091] hub 2-0:1.0: 8 ports detected [ 914.931410][T21095] netlink: 12 bytes leftover after parsing attributes in process `syz.1.12858'. [ 914.960640][T21097] ref_ctr increment failed for inode: 0x43c offset: 0x5 ref_ctr_offset: 0x1000 of mm: 0xffff8881422e78c0 [ 915.101847][T21100] netlink: 68 bytes leftover after parsing attributes in process `syz.4.12860'. [ 915.219232][T21106] gretap0: entered promiscuous mode [ 915.337450][T21106] vlan2: entered promiscuous mode [ 915.380819][ T29] kauditd_printk_skb: 392 callbacks suppressed [ 915.380835][ T29] audit: type=1326 audit(915.436:283090): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21111 comm="syz.1.12865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 915.470882][T21117] netlink: 'syz.5.12864': attribute type 1 has an invalid length. [ 915.492634][ T29] audit: type=1326 audit(915.476:283091): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21111 comm="syz.1.12865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 915.515996][ T29] audit: type=1326 audit(915.476:283092): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21111 comm="syz.1.12865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 915.539238][ T29] audit: type=1326 audit(915.476:283093): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21111 comm="syz.1.12865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 915.562426][ T29] audit: type=1326 audit(915.476:283094): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21111 comm="syz.1.12865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 915.585688][ T29] audit: type=1326 audit(915.476:283095): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21111 comm="syz.1.12865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 915.608838][ T29] audit: type=1326 audit(915.487:283096): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21111 comm="syz.1.12865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 915.632203][ T29] audit: type=1326 audit(915.487:283097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21111 comm="syz.1.12865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 915.655468][ T29] audit: type=1326 audit(915.487:283098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21111 comm="syz.1.12865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 915.678663][ T29] audit: type=1326 audit(915.487:283099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21111 comm="syz.1.12865" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 915.738001][T11219] IPVS: starting estimator thread 0... [ 915.789024][T21122] hub 2-0:1.0: USB hub found [ 915.800814][T21122] hub 2-0:1.0: 8 ports detected [ 915.835530][T21114] IPVS: using max 2352 ests per chain, 117600 per kthread [ 915.886384][T21133] block device autoloading is deprecated and will be removed. [ 915.983673][T21135] netlink: 161700 bytes leftover after parsing attributes in process `syz.0.12874'. [ 916.014822][T21143] bond1: option lacp_rate: mode dependency failed, not supported in mode balance-rr(0) [ 916.060675][T21143] bond1 (unregistering): Released all slaves [ 916.085251][T21150] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=21150 comm=syz.5.12878 [ 916.085278][T21150] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=21150 comm=syz.5.12878 [ 916.147534][T21147] lo speed is unknown, defaulting to 1000 [ 916.783711][T21158] netlink: 3 bytes leftover after parsing attributes in process `syz.5.12881'. [ 916.793120][T21158] !60ªX¹¦À: renamed from caif0 [ 916.802971][T21158] !60ªX¹¦À: entered allmulticast mode [ 916.808631][T21158] A link change request failed with some changes committed already. Interface !60ªX¹¦À may have been left with an inconsistent configuration, please check. [ 916.957897][T21166] hub 2-0:1.0: USB hub found [ 916.972378][T21166] hub 2-0:1.0: 8 ports detected [ 917.063861][T21180] netlink: 4 bytes leftover after parsing attributes in process `syz.6.12889'. [ 917.191551][T21188] netlink: 161700 bytes leftover after parsing attributes in process `syz.6.12892'. [ 917.348722][T21191] FAULT_INJECTION: forcing a failure. [ 917.348722][T21191] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 917.348849][T21191] CPU: 1 UID: 0 PID: 21191 Comm: syz.0.12893 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 917.348897][T21191] Tainted: [W]=WARN [ 917.348906][T21191] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 917.348933][T21191] Call Trace: [ 917.348944][T21191] [ 917.348955][T21191] __dump_stack+0x1d/0x30 [ 917.349003][T21191] dump_stack_lvl+0xe8/0x140 [ 917.349033][T21191] dump_stack+0x15/0x1b [ 917.349092][T21191] should_fail_ex+0x265/0x280 [ 917.349120][T21191] should_fail+0xb/0x20 [ 917.349214][T21191] should_fail_usercopy+0x1a/0x20 [ 917.349242][T21191] fpu__restore_sig+0x12d/0xaa0 [ 917.349319][T21191] ? should_fail_ex+0xdb/0x280 [ 917.349452][T21191] __ia32_sys_rt_sigreturn+0x29f/0x350 [ 917.349509][T21191] x64_sys_call+0x2d4b/0x3000 [ 917.349539][T21191] do_syscall_64+0xd2/0x200 [ 917.349566][T21191] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 917.349621][T21191] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 917.349665][T21191] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 917.349695][T21191] RIP: 0033:0x7f03d11befc7 [ 917.349716][T21191] Code: ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 <0f> 05 48 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 [ 917.349740][T21191] RSP: 002b:00007f03cfc1f038 EFLAGS: 00000246 [ 917.349814][T21191] RAX: 0000000000000001 RBX: 00007f03d1415fa0 RCX: 00007f03d11befc9 [ 917.349831][T21191] RDX: 000000000000000b RSI: 0000200000000400 RDI: 0000000000000004 [ 917.349848][T21191] RBP: 00007f03cfc1f090 R08: 0000000000000000 R09: 0000000000000000 [ 917.349864][T21191] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 917.349893][T21191] R13: 00007f03d1416038 R14: 00007f03d1415fa0 R15: 00007fff3d5e2558 [ 917.349919][T21191] [ 917.933538][T21208] lo speed is unknown, defaulting to 1000 [ 918.801525][T21217] FAULT_INJECTION: forcing a failure. [ 918.801525][T21217] name failslab, interval 1, probability 0, space 0, times 0 [ 918.814373][T21217] CPU: 0 UID: 0 PID: 21217 Comm: syz.1.12902 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 918.814473][T21217] Tainted: [W]=WARN [ 918.814480][T21217] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 918.814493][T21217] Call Trace: [ 918.814500][T21217] [ 918.814535][T21217] __dump_stack+0x1d/0x30 [ 918.814560][T21217] dump_stack_lvl+0xe8/0x140 [ 918.814632][T21217] dump_stack+0x15/0x1b [ 918.814656][T21217] should_fail_ex+0x265/0x280 [ 918.814684][T21217] should_failslab+0x8c/0xb0 [ 918.814779][T21217] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 918.814863][T21217] ? __d_alloc+0x3d/0x340 [ 918.814908][T21217] __d_alloc+0x3d/0x340 [ 918.814945][T21217] ? from_vfsgid+0x70/0xa0 [ 918.814986][T21217] d_alloc_pseudo+0x1e/0x80 [ 918.815024][T21217] alloc_file_pseudo+0x71/0x160 [ 918.815091][T21217] hugetlb_file_setup+0x2a6/0x3d0 [ 918.815181][T21217] ksys_mmap_pgoff+0x157/0x310 [ 918.815210][T21217] x64_sys_call+0x14a3/0x3000 [ 918.815240][T21217] do_syscall_64+0xd2/0x200 [ 918.815338][T21217] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 918.815376][T21217] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 918.815479][T21217] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 918.815508][T21217] RIP: 0033:0x7ff3697befc9 [ 918.815529][T21217] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 918.815546][T21217] RSP: 002b:00007ff368227038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 918.815566][T21217] RAX: ffffffffffffffda RBX: 00007ff369a15fa0 RCX: 00007ff3697befc9 [ 918.815578][T21217] RDX: 000000000300000c RSI: 0000000000c00000 RDI: 0000200000400000 [ 918.815591][T21217] RBP: 00007ff368227090 R08: ffffffffffffffff R09: 0000000000000000 [ 918.815670][T21217] R10: 0000000000050032 R11: 0000000000000246 R12: 0000000000000001 [ 918.815682][T21217] R13: 00007ff369a16038 R14: 00007ff369a15fa0 R15: 00007ffd86621e18 [ 918.815713][T21217] [ 919.255202][T21235] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 919.291147][T21235] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 919.301487][T15298] netdevsim netdevsim0 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 919.324662][T21235] netdevsim netdevsim1 netdevsim3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 919.335135][T21235] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 919.359062][T15298] netdevsim netdevsim0 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 919.376978][T21220] lo speed is unknown, defaulting to 1000 [ 919.407225][T21235] netdevsim netdevsim1 netdevsim2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 919.417586][T21235] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 919.478160][T15298] netdevsim netdevsim0 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 919.510342][T21244] semctl(GETNCNT/GETZCNT) is since 3.16 Single Unix Specification compliant. [ 919.510342][T21244] The task syz.5.12907 (21244) triggered the difference, watch for misbehavior. [ 919.554752][T21235] netdevsim netdevsim1 netdevsim1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 919.565224][T21235] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 919.592393][T15298] netdevsim netdevsim0 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 919.637792][T21235] netdevsim netdevsim1 netdevsim0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 919.648156][T21235] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 919.775667][T21220] chnl_net:caif_netlink_parms(): no params data found [ 919.845030][T20297] netdevsim netdevsim1 eth0: set [0, 0] type 1 family 0 port 8472 - 0 [ 919.853340][T20297] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.866277][T20297] netdevsim netdevsim1 eth1: set [0, 0] type 1 family 0 port 8472 - 0 [ 919.874601][T20297] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.912326][T20297] netdevsim netdevsim1 eth2: set [0, 0] type 1 family 0 port 8472 - 0 [ 919.920725][T20297] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 919.929095][T21220] bridge0: port 1(bridge_slave_0) entered blocking state [ 919.936338][T21220] bridge0: port 1(bridge_slave_0) entered disabled state [ 920.012987][T21220] bridge_slave_0: entered allmulticast mode [ 920.025241][T21220] bridge_slave_0: entered promiscuous mode [ 920.040947][T20297] netdevsim netdevsim1 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 920.049253][T20297] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 920.060963][T21220] bridge0: port 2(bridge_slave_1) entered blocking state [ 920.068184][T21220] bridge0: port 2(bridge_slave_1) entered disabled state [ 920.093272][T21220] bridge_slave_1: entered allmulticast mode [ 920.108345][T21220] bridge_slave_1: entered promiscuous mode [ 920.143678][T21220] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 920.161970][T21253] netlink: 24 bytes leftover after parsing attributes in process `syz.6.12909'. [ 920.171386][T15298] dummy0: left allmulticast mode [ 920.176974][T15298] bridge0: port 3(dummy0) entered disabled state [ 920.187584][T15298] bridge_slave_1: left allmulticast mode [ 920.193327][T15298] bridge_slave_1: left promiscuous mode [ 920.199088][T15298] bridge0: port 2(bridge_slave_1) entered disabled state [ 920.218582][T15298] bridge_slave_0: left promiscuous mode [ 920.224452][T15298] bridge0: port 1(bridge_slave_0) entered disabled state [ 920.315706][T15298] batman_adv: batadv0: Interface deactivated: macvtap1 [ 920.322757][T15298] bridge0 (unregistering): left allmulticast mode [ 920.335969][T21257] FAULT_INJECTION: forcing a failure. [ 920.335969][T21257] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 920.349161][T21257] CPU: 0 UID: 0 PID: 21257 Comm: syz.5.12910 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 920.349265][T21257] Tainted: [W]=WARN [ 920.349274][T21257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 920.349291][T21257] Call Trace: [ 920.349297][T21257] [ 920.349305][T21257] __dump_stack+0x1d/0x30 [ 920.349332][T21257] dump_stack_lvl+0xe8/0x140 [ 920.349413][T21257] dump_stack+0x15/0x1b [ 920.349438][T21257] should_fail_ex+0x265/0x280 [ 920.349464][T21257] should_fail+0xb/0x20 [ 920.349482][T21257] should_fail_usercopy+0x1a/0x20 [ 920.349519][T21257] _copy_from_user+0x1c/0xb0 [ 920.349546][T21257] sctp_setsockopt+0x154/0xe30 [ 920.349614][T21257] sock_common_setsockopt+0x69/0x80 [ 920.349657][T21257] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 920.349694][T21257] __sys_setsockopt+0x184/0x200 [ 920.349730][T21257] __x64_sys_setsockopt+0x64/0x80 [ 920.349786][T21257] x64_sys_call+0x20ec/0x3000 [ 920.349979][T21257] do_syscall_64+0xd2/0x200 [ 920.349999][T21257] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 920.350033][T21257] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 920.350077][T21257] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 920.350173][T21257] RIP: 0033:0x7fcca692efc9 [ 920.350194][T21257] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 920.350218][T21257] RSP: 002b:00007fcca5397038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 920.350244][T21257] RAX: ffffffffffffffda RBX: 00007fcca6b85fa0 RCX: 00007fcca692efc9 [ 920.350262][T21257] RDX: 000000000000007c RSI: 0000000000000084 RDI: 0000000000000006 [ 920.350275][T21257] RBP: 00007fcca5397090 R08: 0000000000000008 R09: 0000000000000000 [ 920.350312][T21257] R10: 0000200000000000 R11: 0000000000000246 R12: 0000000000000001 [ 920.350324][T21257] R13: 00007fcca6b86038 R14: 00007fcca6b85fa0 R15: 00007fff1a79a968 [ 920.350355][T21257] [ 920.545724][T15298] batman_adv: batadv0: Removing interface: macvtap1 [ 920.606031][T15298] $Hÿ (unregistering): (slave bond_slave_0): Releasing backup interface [ 920.615327][T15298] bond_slave_0: left promiscuous mode [ 920.623270][T15298] $Hÿ (unregistering): (slave bond_slave_1): Releasing backup interface [ 920.657910][T15298] bond_slave_1: left promiscuous mode [ 920.664481][T15298] $Hÿ (unregistering): Released all slaves [ 920.672539][T21259] netlink: 161700 bytes leftover after parsing attributes in process `syz.5.12911'. [ 920.680878][T15298] bond1 (unregistering): Released all slaves [ 920.726752][T15298] bond2 (unregistering): Released all slaves [ 920.747180][T21220] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 920.774853][T21253] IPVS: Error connecting to the multicast addr [ 920.792588][T21220] team0: Port device team_slave_0 added [ 920.793873][T21220] team0: Port device team_slave_1 added [ 920.810218][ T29] kauditd_printk_skb: 249 callbacks suppressed [ 920.810233][ T29] audit: type=1400 audit(920.869:283349): avc: denied { mount } for pid=21261 comm="syz.6.12912" name="/" dev="configfs" ino=1981 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=filesystem permissive=1 [ 920.810724][ T29] audit: type=1400 audit(920.869:283350): avc: denied { search } for pid=21261 comm="syz.6.12912" name="/" dev="configfs" ino=1981 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 920.826017][T21220] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 920.826035][T21220] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 920.826183][T21220] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 920.826228][ T29] audit: type=1400 audit(920.889:283351): avc: denied { add_name } for pid=21261 comm="syz.6.12912" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:configfs_t tclass=dir permissive=1 [ 920.826339][ T29] audit: type=1400 audit(920.889:283352): avc: denied { create } for pid=21261 comm="syz.6.12912" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:configfs_t tclass=file permissive=1 [ 920.826990][T21220] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 920.827007][T21220] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 920.827062][T21220] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 920.829493][ T29] audit: type=1400 audit(920.889:283353): avc: denied { read } for pid=21261 comm="syz.6.12912" name="ptp0" dev="devtmpfs" ino=247 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 920.829536][ T29] audit: type=1400 audit(920.889:283354): avc: denied { open } for pid=21261 comm="syz.6.12912" path="/dev/ptp0" dev="devtmpfs" ino=247 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 920.829620][ T29] audit: type=1400 audit(920.889:283355): avc: denied { ioctl } for pid=21261 comm="syz.6.12912" path="/dev/ptp0" dev="devtmpfs" ino=247 ioctlcmd=0x3d05 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 920.859303][T21265] netlink: 83992 bytes leftover after parsing attributes in process `syz.6.12913'. [ 920.859424][T21265] netlink: zone id is out of range [ 920.859451][T21265] netlink: zone id is out of range [ 920.859485][T21265] netlink: zone id is out of range [ 920.859494][T21265] netlink: zone id is out of range [ 920.859551][T21265] netlink: zone id is out of range [ 920.859666][T21265] netlink: zone id is out of range [ 920.875293][T21265] netlink: set zone limit has 8 unknown bytes [ 921.113059][ T29] audit: type=1400 audit(921.159:283356): avc: denied { getopt } for pid=21264 comm="syz.6.12913" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 921.205204][T21220] hsr_slave_0: entered promiscuous mode [ 921.205790][T21220] hsr_slave_1: entered promiscuous mode [ 921.206121][T21220] debugfs: 'hsr0' already exists in 'hsr' [ 921.206135][T21220] Cannot create hsr debugfs directory [ 921.269273][T15298] hsr_slave_0: left promiscuous mode [ 921.269788][T15298] hsr_slave_1: left promiscuous mode [ 921.270353][T15298] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 921.270367][T15298] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 921.270779][T15298] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 921.270792][T15298] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 921.276450][T15298] team_slave_0: left promiscuous mode [ 921.276495][T15298] team_slave_1: left promiscuous mode [ 921.276532][T15298] veth1_macvtap: left promiscuous mode [ 921.276556][T15298] veth0_macvtap: left promiscuous mode [ 921.276652][T15298] veth1_vlan: left promiscuous mode [ 921.276736][T15298] veth0_vlan: left promiscuous mode [ 921.508117][T15298] team0 (unregistering): Port device team_slave_1 removed [ 921.510906][T15298] team0 (unregistering): Port device team_slave_0 removed [ 921.565838][T21275] hub 2-0:1.0: USB hub found [ 921.565915][T21275] hub 2-0:1.0: 8 ports detected [ 921.871469][T21220] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 921.881639][T21220] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 921.893672][T21220] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 921.903938][T21220] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 921.953127][T21220] 8021q: adding VLAN 0 to HW filter on device bond0 [ 921.968363][T21220] 8021q: adding VLAN 0 to HW filter on device team0 [ 921.985628][T15298] bridge0: port 1(bridge_slave_0) entered blocking state [ 921.992832][T15298] bridge0: port 1(bridge_slave_0) entered forwarding state [ 922.016344][T21220] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 922.027047][T21220] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 922.040539][T15298] bridge0: port 2(bridge_slave_1) entered blocking state [ 922.047714][T15298] bridge0: port 2(bridge_slave_1) entered forwarding state [ 922.055658][ T29] audit: type=1400 audit(922.110:283357): avc: denied { egress } for pid=3402 comm="kworker/1:4" daddr=ff02::16 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:netif_t tclass=netif permissive=1 [ 922.078028][ T29] audit: type=1400 audit(922.110:283358): avc: denied { sendto } for pid=3402 comm="kworker/1:4" daddr=ff02::16 netif=gretap0 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:node_t tclass=node permissive=1 [ 922.173118][T21220] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 922.254626][T21220] veth0_vlan: entered promiscuous mode [ 922.263104][T21220] veth1_vlan: entered promiscuous mode [ 922.281955][T21220] veth0_macvtap: entered promiscuous mode [ 922.290370][T21220] veth1_macvtap: entered promiscuous mode [ 922.312320][T21298] bridge0: entered promiscuous mode [ 922.325439][T21298] macvtap1: entered allmulticast mode [ 922.330969][T21298] bridge0: entered allmulticast mode [ 922.348154][T21298] batman_adv: batadv0: Adding interface: macvtap1 [ 922.354683][T21298] batman_adv: batadv0: The MTU of interface macvtap1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 922.382093][T21298] batman_adv: batadv0: Interface activated: macvtap1 [ 922.397837][T21220] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 922.428008][T21220] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 922.439861][T15298] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 922.448932][T15298] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 922.459142][T15298] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 922.488191][T15298] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 922.543277][T21313] netlink: 'syz.4.12924': attribute type 1 has an invalid length. [ 922.631617][T21322] ref_ctr increment failed for inode: 0x7f7 offset: 0x5 ref_ctr_offset: 0x1000 of mm: 0xffff88810005c500 [ 922.633022][T21323] netlink: 24 bytes leftover after parsing attributes in process `syz.6.12928'. [ 922.672964][T21323] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=21323 comm=syz.6.12928 [ 922.674176][T21325] netlink: 'syz.0.12929': attribute type 3 has an invalid length. [ 922.789623][T21334] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=23 sclass=netlink_tcpdiag_socket pid=21334 comm=syz.0.12933 [ 922.804211][T21334] ÿÿÿÿÿÿ: renamed from vlan1 (while UP) [ 923.029438][T21344] 9pnet_fd: Insufficient options for proto=fd [ 923.936445][T21372] netlink: 8 bytes leftover after parsing attributes in process `syz.0.12947'. [ 924.028722][T21383] netlink: 12 bytes leftover after parsing attributes in process `syz.4.12949'. [ 924.304076][T21391] tipc: Started in network mode [ 924.309032][T21391] tipc: Node identity f63455079f5, cluster identity 4711 [ 924.316242][T21391] tipc: Enabled bearer , priority 0 [ 924.324355][T21390] tipc: Disabling bearer [ 924.490172][T21395] netlink: 8 bytes leftover after parsing attributes in process `syz.1.12956'. [ 924.615508][T21405] netlink: 24 bytes leftover after parsing attributes in process `syz.0.12961'. [ 924.715052][T21411] netlink: 24 bytes leftover after parsing attributes in process `syz.1.12964'. [ 924.738274][T21411] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=21411 comm=syz.1.12964 [ 924.772013][T21417] netlink: 8 bytes leftover after parsing attributes in process `syz.0.12967'. [ 924.893318][T21422] netlink: 12 bytes leftover after parsing attributes in process `syz.4.12969'. [ 924.925763][T21429] netlink: 44 bytes leftover after parsing attributes in process `syz.1.12971'. [ 925.110847][T21446] netlink: 12 bytes leftover after parsing attributes in process `syz.4.12979'. [ 925.243540][T21451] netlink: 'syz.6.12981': attribute type 1 has an invalid length. [ 925.865784][T21461] xt_SECMARK: invalid security context 'system_u:object_r:dbusd_etc_t:s0' [ 925.896046][T21461] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=21461 comm=syz.0.12985 [ 925.918260][ T29] kauditd_printk_skb: 457 callbacks suppressed [ 925.918279][ T29] audit: type=1326 audit(925.972:283816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21464 comm="syz.5.12987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 926.007102][ T29] audit: type=1326 audit(926.002:283817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21464 comm="syz.5.12987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 926.030364][ T29] audit: type=1326 audit(926.012:283818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21464 comm="syz.5.12987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 926.053565][ T29] audit: type=1326 audit(926.012:283819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21464 comm="syz.5.12987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 926.076774][ T29] audit: type=1326 audit(926.012:283820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21464 comm="syz.5.12987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 926.100186][ T29] audit: type=1326 audit(926.012:283821): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21464 comm="syz.5.12987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 926.123468][ T29] audit: type=1326 audit(926.012:283822): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21464 comm="syz.5.12987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 926.146813][ T29] audit: type=1326 audit(926.012:283823): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21464 comm="syz.5.12987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 926.170401][ T29] audit: type=1326 audit(926.012:283824): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21464 comm="syz.5.12987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 926.193728][ T29] audit: type=1326 audit(926.012:283825): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21464 comm="syz.5.12987" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fcca692efc9 code=0x7ffc0000 [ 926.226056][T21478] netlink: 'syz.6.12992': attribute type 1 has an invalid length. [ 926.244881][T21480] team0: Port device team_slave_1 removed [ 926.344344][T21488] ref_ctr increment failed for inode: 0x40a offset: 0x5 ref_ctr_offset: 0x1000 of mm: 0xffff8881422e3f40 [ 926.591953][T21501] syz.6.13002: vmalloc error: size 8589938688, exceeds total pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 926.606646][T21501] CPU: 0 UID: 0 PID: 21501 Comm: syz.6.13002 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 926.606747][T21501] Tainted: [W]=WARN [ 926.606827][T21501] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 926.606845][T21501] Call Trace: [ 926.606854][T21501] [ 926.606865][T21501] __dump_stack+0x1d/0x30 [ 926.606890][T21501] dump_stack_lvl+0xe8/0x140 [ 926.606911][T21501] dump_stack+0x15/0x1b [ 926.606930][T21501] warn_alloc+0x12b/0x1a0 [ 926.607016][T21501] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 926.607096][T21501] __vmalloc_node_range_noprof+0x9d/0xed0 [ 926.607207][T21501] ? __pfx_avc_audit_post_callback+0x10/0x10 [ 926.607243][T21501] ? __rcu_read_unlock+0x4f/0x70 [ 926.607335][T21501] ? __perf_event_task_sched_in+0xa5b/0xac0 [ 926.607385][T21501] ? __rcu_read_unlock+0x4f/0x70 [ 926.607491][T21501] ? xfd_validate_state+0x45/0xf0 [ 926.607527][T21501] ? save_fpregs_to_fpstate+0x100/0x160 [ 926.607590][T21501] ? should_fail_ex+0x30/0x280 [ 926.607614][T21501] ? xskq_create+0x36/0xe0 [ 926.607638][T21501] vmalloc_user_noprof+0x7d/0xb0 [ 926.607765][T21501] ? xskq_create+0x80/0xe0 [ 926.607787][T21501] xskq_create+0x80/0xe0 [ 926.607864][T21501] xsk_init_queue+0x95/0xf0 [ 926.607894][T21501] xsk_setsockopt+0x477/0x640 [ 926.607948][T21501] ? __pfx_xsk_setsockopt+0x10/0x10 [ 926.607968][T21501] __sys_setsockopt+0x184/0x200 [ 926.608017][T21501] __x64_sys_setsockopt+0x64/0x80 [ 926.608102][T21501] x64_sys_call+0x20ec/0x3000 [ 926.608128][T21501] do_syscall_64+0xd2/0x200 [ 926.608154][T21501] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 926.608199][T21501] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 926.608231][T21501] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 926.608259][T21501] RIP: 0033:0x7fadd687efc9 [ 926.608334][T21501] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 926.608359][T21501] RSP: 002b:00007fadd52e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 926.608380][T21501] RAX: ffffffffffffffda RBX: 00007fadd6ad5fa0 RCX: 00007fadd687efc9 [ 926.608397][T21501] RDX: 0000000000000002 RSI: 000000000000011b RDI: 0000000000000009 [ 926.608414][T21501] RBP: 00007fadd6901f91 R08: 0000000000000004 R09: 0000000000000000 [ 926.608428][T21501] R10: 0000200000000900 R11: 0000000000000246 R12: 0000000000000000 [ 926.608441][T21501] R13: 00007fadd6ad6038 R14: 00007fadd6ad5fa0 R15: 00007ffd64a00418 [ 926.608461][T21501] [ 926.608491][T21501] Mem-Info: [ 926.671323][T21515] netlink: 'syz.5.13007': attribute type 1 has an invalid length. [ 926.676484][T21501] active_anon:20644 inactive_anon:125 isolated_anon:0 [ 926.676484][T21501] active_file:16408 inactive_file:6713 isolated_file:0 [ 926.676484][T21501] unevictable:0 dirty:139 writeback:0 [ 926.676484][T21501] slab_reclaimable:3712 slab_unreclaimable:19040 [ 926.676484][T21501] mapped:29980 shmem:17080 pagetables:1256 [ 926.676484][T21501] sec_pagetables:0 bounce:0 [ 926.676484][T21501] kernel_misc_reclaimable:0 [ 926.676484][T21501] free:1842576 free_pcp:25225 free_cma:0 [ 926.676570][T21501] Node 0 active_anon:82576kB inactive_anon:500kB active_file:65632kB inactive_file:26852kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:119920kB dirty:556kB writeback:0kB shmem:68320kB kernel_stack:4032kB pagetables:5024kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 926.938466][T21501] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 926.968473][T21501] lowmem_reserve[]: 0 2881 7859 7859 [ 926.974060][T21501] Node 0 DMA32 free:2946736kB boost:0kB min:4132kB low:7060kB high:9988kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB zspages:0kB present:3129332kB managed:2950264kB mlocked:0kB bounce:0kB free_pcp:3528kB local_pcp:3528kB free_cma:0kB [ 927.005637][T21501] lowmem_reserve[]: 0 0 4978 4978 [ 927.010827][T21501] Node 0 Normal free:4408208kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB free_highatomic:0KB active_anon:89536kB inactive_anon:500kB active_file:68648kB inactive_file:26852kB unevictable:0kB writepending:672kB zspages:0kB present:5242880kB managed:5098240kB mlocked:0kB bounce:0kB free_pcp:85920kB local_pcp:49996kB free_cma:0kB [ 927.044189][T21501] lowmem_reserve[]: 0 0 0 0 [ 927.048867][T21501] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 927.061819][T21501] Node 0 DMA32: 2*4kB (M) 3*8kB (M) 5*16kB (M) 2*32kB (M) 4*64kB (M) 2*128kB (M) 2*256kB (M) 3*512kB (M) 3*1024kB (M) 2*2048kB (M) 717*4096kB (M) = 2946736kB [ 927.078012][T21501] Node 0 Normal: 2512*4kB (UME) 874*8kB (UME) 930*16kB (UME) 1099*32kB (UME) 678*64kB (UME) 196*128kB (UME) 420*256kB (UM) 281*512kB (UM) 133*1024kB (UM) 33*2048kB (UM) 932*4096kB (UM) = 4408208kB [ 927.098437][T21501] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 927.107870][T21501] 44082 total pagecache pages [ 927.112759][T21501] 146 pages in swap cache [ 927.117219][T21501] Free swap = 120824kB [ 927.121466][T21501] Total swap = 124996kB [ 927.125759][T21501] 2097051 pages RAM [ 927.129685][T21501] 0 pages HighMem/MovableOnly [ 927.134490][T21501] 81085 pages reserved [ 927.687399][T21545] netlink: 'syz.4.13017': attribute type 16 has an invalid length. [ 927.695500][T21545] netlink: 'syz.4.13017': attribute type 17 has an invalid length. [ 927.812767][T21545] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 927.911049][T21532] __nla_validate_parse: 7 callbacks suppressed [ 927.911067][T21532] netlink: 24 bytes leftover after parsing attributes in process `syz.5.13013'. [ 928.269895][T21572] netlink: 'syz.6.13019': attribute type 1 has an invalid length. [ 928.337157][T21576] macvlan1: entered promiscuous mode [ 928.371296][T21576] ipvlan0: entered promiscuous mode [ 928.377327][T21576] ipvlan0: left promiscuous mode [ 928.411023][T21576] macvlan1: left promiscuous mode [ 928.801093][T21621] netlink: 12 bytes leftover after parsing attributes in process `syz.1.13030'. [ 928.897443][T21625] netlink: 12 bytes leftover after parsing attributes in process `syz.1.13031'. [ 929.356772][T21675] netlink: 60 bytes leftover after parsing attributes in process `syz.6.13042'. [ 929.497122][T21691] netlink: 12 bytes leftover after parsing attributes in process `syz.5.13044'. [ 929.719097][T21719] ref_ctr increment failed for inode: 0x4fd offset: 0x5 ref_ctr_offset: 0x1000 of mm: 0xffff8881422e3980 [ 930.029552][T21760] netlink: 12 bytes leftover after parsing attributes in process `syz.1.13058'. [ 930.115702][T21774] FAULT_INJECTION: forcing a failure. [ 930.115702][T21774] name failslab, interval 1, probability 0, space 0, times 0 [ 930.128608][T21774] CPU: 0 UID: 0 PID: 21774 Comm: syz.5.13062 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 930.128669][T21774] Tainted: [W]=WARN [ 930.128678][T21774] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 930.128693][T21774] Call Trace: [ 930.128700][T21774] [ 930.128709][T21774] __dump_stack+0x1d/0x30 [ 930.128738][T21774] dump_stack_lvl+0xe8/0x140 [ 930.128811][T21774] dump_stack+0x15/0x1b [ 930.128835][T21774] should_fail_ex+0x265/0x280 [ 930.128859][T21774] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 930.128923][T21774] should_failslab+0x8c/0xb0 [ 930.128963][T21774] kmem_cache_alloc_lru_noprof+0x55/0x490 [ 930.129021][T21774] ? shmem_alloc_inode+0x34/0x50 [ 930.129154][T21774] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 930.129184][T21774] shmem_alloc_inode+0x34/0x50 [ 930.129213][T21774] alloc_inode+0x40/0x170 [ 930.129247][T21774] new_inode+0x1d/0xe0 [ 930.129283][T21774] shmem_get_inode+0x244/0x750 [ 930.129350][T21774] __shmem_file_setup+0x113/0x210 [ 930.129373][T21774] shmem_file_setup+0x3b/0x50 [ 930.129453][T21774] __se_sys_memfd_create+0x2c3/0x590 [ 930.129556][T21774] __x64_sys_memfd_create+0x31/0x40 [ 930.129641][T21774] x64_sys_call+0x2ac2/0x3000 [ 930.129689][T21774] do_syscall_64+0xd2/0x200 [ 930.129747][T21774] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 930.129787][T21774] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 930.129887][T21774] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 930.129911][T21774] RIP: 0033:0x7fcca692efc9 [ 930.129971][T21774] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 930.129990][T21774] RSP: 002b:00007fcca5396d68 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 930.130086][T21774] RAX: ffffffffffffffda RBX: 00000000000005a2 RCX: 00007fcca692efc9 [ 930.130126][T21774] RDX: 00007fcca5396dec RSI: 0000000000000000 RDI: 00007fcca69b2960 [ 930.130139][T21774] RBP: 0000200000000640 R08: 00007fcca5396b07 R09: 0000000000000000 [ 930.130152][T21774] R10: 000000000000000a R11: 0000000000000202 R12: 0000000000000001 [ 930.130164][T21774] R13: 00007fcca5396dec R14: 00007fcca5396df0 R15: 00007fff1a79a968 [ 930.130187][T21774] [ 930.508669][T21793] batadv_slave_1: entered promiscuous mode [ 930.545838][T21791] batadv_slave_1: left promiscuous mode [ 930.579774][T21799] netlink: 12 bytes leftover after parsing attributes in process `syz.6.13071'. [ 930.620574][T21801] lo speed is unknown, defaulting to 1000 [ 930.688000][T21808] FAULT_INJECTION: forcing a failure. [ 930.688000][T21808] name failslab, interval 1, probability 0, space 0, times 0 [ 930.700752][T21808] CPU: 1 UID: 0 PID: 21808 Comm: syz.1.13072 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 930.700814][T21808] Tainted: [W]=WARN [ 930.700823][T21808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 930.700919][T21808] Call Trace: [ 930.700933][T21808] [ 930.700942][T21808] __dump_stack+0x1d/0x30 [ 930.700973][T21808] dump_stack_lvl+0xe8/0x140 [ 930.700998][T21808] dump_stack+0x15/0x1b [ 930.701016][T21808] should_fail_ex+0x265/0x280 [ 930.701043][T21808] should_failslab+0x8c/0xb0 [ 930.701081][T21808] __kmalloc_cache_node_noprof+0x54/0x4a0 [ 930.701183][T21808] ? __get_vm_area_node+0x106/0x1d0 [ 930.701231][T21808] __get_vm_area_node+0x106/0x1d0 [ 930.701297][T21808] __vmalloc_node_range_noprof+0x28c/0xed0 [ 930.701331][T21808] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 930.701406][T21808] ? _parse_integer+0x27/0x40 [ 930.701446][T21808] ? __rcu_read_unlock+0x4f/0x70 [ 930.701556][T21808] ? avc_has_perm_noaudit+0x1b1/0x200 [ 930.701580][T21808] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 930.701622][T21808] __vmalloc_noprof+0x83/0xc0 [ 930.701685][T21808] ? bpf_prog_alloc_no_stats+0x47/0x3b0 [ 930.701731][T21808] bpf_prog_alloc_no_stats+0x47/0x3b0 [ 930.701833][T21808] ? bpf_prog_alloc+0x2a/0x150 [ 930.701883][T21808] bpf_prog_alloc+0x3c/0x150 [ 930.701919][T21808] bpf_prog_create_from_user+0x7d/0x260 [ 930.702029][T21808] ? __pfx_seccomp_check_filter+0x10/0x10 [ 930.702093][T21808] do_seccomp+0x5ef/0xa40 [ 930.702144][T21808] ? fput+0x8f/0xc0 [ 930.702162][T21808] ? ksys_write+0x192/0x1a0 [ 930.702189][T21808] __x64_sys_seccomp+0x40/0x50 [ 930.702224][T21808] x64_sys_call+0x2ad8/0x3000 [ 930.702261][T21808] do_syscall_64+0xd2/0x200 [ 930.702281][T21808] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 930.702314][T21808] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 930.702433][T21808] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 930.702458][T21808] RIP: 0033:0x7ff3697befc9 [ 930.702478][T21808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 930.702503][T21808] RSP: 002b:00007ff368206038 EFLAGS: 00000246 ORIG_RAX: 000000000000013d [ 930.702528][T21808] RAX: ffffffffffffffda RBX: 00007ff369a16090 RCX: 00007ff3697befc9 [ 930.702541][T21808] RDX: 0000200000000040 RSI: 000000000000001d RDI: 0000000000000001 [ 930.702561][T21808] RBP: 00007ff368206090 R08: 0000000000000000 R09: 0000000000000000 [ 930.702578][T21808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 930.702595][T21808] R13: 00007ff369a16128 R14: 00007ff369a16090 R15: 00007ffd86621e18 [ 930.702618][T21808] [ 930.975070][ T29] kauditd_printk_skb: 456 callbacks suppressed [ 930.975141][ T29] audit: type=1326 audit(931.034:284282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21812 comm="syz.0.13077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 931.035907][ T29] audit: type=1326 audit(931.034:284283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21812 comm="syz.0.13077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 931.059394][ T29] audit: type=1326 audit(931.034:284284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21812 comm="syz.0.13077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 931.082742][ T29] audit: type=1326 audit(931.034:284285): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21812 comm="syz.0.13077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 931.106175][ T29] audit: type=1326 audit(931.034:284286): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21812 comm="syz.0.13077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 931.129551][ T29] audit: type=1326 audit(931.034:284287): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21812 comm="syz.0.13077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 931.152849][ T29] audit: type=1326 audit(931.034:284288): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21812 comm="syz.0.13077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 931.176052][ T29] audit: type=1326 audit(931.034:284289): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21812 comm="syz.0.13077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 931.199368][ T29] audit: type=1326 audit(931.034:284290): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21812 comm="syz.0.13077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f39e4ddf003 code=0x7ffc0000 [ 931.222365][ T29] audit: type=1326 audit(931.044:284291): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21812 comm="syz.0.13077" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f39e4ddda7f code=0x7ffc0000 [ 931.465515][T21837] netlink: 12 bytes leftover after parsing attributes in process `syz.6.13085'. [ 931.555581][T21841] hub 2-0:1.0: USB hub found [ 931.571664][T21841] hub 2-0:1.0: 8 ports detected [ 931.663130][T21856] FAULT_INJECTION: forcing a failure. [ 931.663130][T21856] name failslab, interval 1, probability 0, space 0, times 0 [ 931.675863][T21856] CPU: 0 UID: 0 PID: 21856 Comm: syz.6.13093 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 931.675907][T21856] Tainted: [W]=WARN [ 931.675916][T21856] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 931.675934][T21856] Call Trace: [ 931.675952][T21856] [ 931.675962][T21856] __dump_stack+0x1d/0x30 [ 931.676063][T21856] dump_stack_lvl+0xe8/0x140 [ 931.676091][T21856] dump_stack+0x15/0x1b [ 931.676115][T21856] should_fail_ex+0x265/0x280 [ 931.676139][T21856] should_failslab+0x8c/0xb0 [ 931.676179][T21856] __kvmalloc_node_noprof+0x12e/0x670 [ 931.676222][T21856] ? xt_alloc_entry_offsets+0x4d/0x60 [ 931.676337][T21856] xt_alloc_entry_offsets+0x4d/0x60 [ 931.676381][T21856] translate_table+0xa9/0xf90 [ 931.676400][T21856] ? __rcu_read_unlock+0x4f/0x70 [ 931.676492][T21856] ? __memcg_slab_post_alloc_hook+0x44c/0x580 [ 931.676526][T21856] ? should_fail_ex+0xdb/0x280 [ 931.676553][T21856] ? _copy_from_user+0x89/0xb0 [ 931.676630][T21856] do_ipt_set_ctl+0x66f/0x820 [ 931.676650][T21856] ? _raw_spin_unlock_bh+0x36/0x40 [ 931.676679][T21856] ? tcp_release_cb+0xf1/0x370 [ 931.676796][T21856] nf_setsockopt+0x199/0x1b0 [ 931.676836][T21856] ip_setsockopt+0x102/0x110 [ 931.676935][T21856] ipv6_setsockopt+0xfb/0x130 [ 931.676978][T21856] tcp_setsockopt+0x98/0xb0 [ 931.677025][T21856] sock_common_setsockopt+0x69/0x80 [ 931.677096][T21856] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 931.677129][T21856] __sys_setsockopt+0x184/0x200 [ 931.677239][T21856] __x64_sys_setsockopt+0x64/0x80 [ 931.677279][T21856] x64_sys_call+0x20ec/0x3000 [ 931.677309][T21856] do_syscall_64+0xd2/0x200 [ 931.677380][T21856] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 931.677418][T21856] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 931.677460][T21856] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 931.677526][T21856] RIP: 0033:0x7fadd687efc9 [ 931.677546][T21856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 931.677581][T21856] RSP: 002b:00007fadd52e7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 931.677607][T21856] RAX: ffffffffffffffda RBX: 00007fadd6ad5fa0 RCX: 00007fadd687efc9 [ 931.677623][T21856] RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000006 [ 931.677639][T21856] RBP: 00007fadd52e7090 R08: 00000000000004a0 R09: 0000000000000000 [ 931.677657][T21856] R10: 0000200000000a00 R11: 0000000000000246 R12: 0000000000000001 [ 931.677674][T21856] R13: 00007fadd6ad6038 R14: 00007fadd6ad5fa0 R15: 00007ffd64a00418 [ 931.677700][T21856] [ 932.002474][T21867] netlink: 12 bytes leftover after parsing attributes in process `syz.5.13098'. [ 932.223855][T21899] xt_CT: No such helper "pptp" [ 932.239745][T21902] netlink: 12 bytes leftover after parsing attributes in process `syz.5.13111'. [ 932.315470][T21911] bridge0: entered promiscuous mode [ 932.326806][T21911] macvtap1: entered allmulticast mode [ 932.332315][T21911] bridge0: entered allmulticast mode [ 932.362433][T21911] batman_adv: batadv0: Adding interface: macvtap1 [ 932.369011][T21911] batman_adv: batadv0: The MTU of interface macvtap1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 932.397284][T21911] batman_adv: batadv0: Interface activated: macvtap1 [ 932.418303][T21920] binfmt_misc: register: failed to install interpreter file ./file0 [ 932.435918][T21920] binfmt_misc: register: failed to install interpreter file ./file0 [ 932.498273][T21926] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=21926 comm=syz.4.13122 [ 932.572294][T21936] ref_ctr increment failed for inode: 0xdd offset: 0x5 ref_ctr_offset: 0x1000 of mm: 0xffff88810005cac0 [ 932.724486][T21948] netlink: zone id is out of range [ 932.729741][T21948] netlink: zone id is out of range [ 932.747158][T21948] netlink: zone id is out of range [ 932.753640][T21948] netlink: zone id is out of range [ 932.766752][T21948] netlink: zone id is out of range [ 932.776708][T21948] netlink: zone id is out of range [ 932.789030][T21948] netlink: zone id is out of range [ 932.805614][T21948] netlink: del zone limit has 8 unknown bytes [ 932.886516][T21961] sg_write: data in/out 49276/1 bytes for SCSI command 0x1c-- guessing data in; [ 932.886516][T21961] program syz.6.13136 not setting count and/or reply_len properly [ 933.396995][T21984] SELinux: failed to load policy [ 933.525246][T21991] __nla_validate_parse: 4 callbacks suppressed [ 933.525264][T21991] netlink: 16 bytes leftover after parsing attributes in process `syz.6.13147'. [ 933.586292][T21991] netlink: 'syz.6.13147': attribute type 16 has an invalid length. [ 933.594271][T21991] netlink: 156 bytes leftover after parsing attributes in process `syz.6.13147'. [ 933.701133][T21997] bridge0: entered promiscuous mode [ 933.709450][T21997] macvtap1: entered allmulticast mode [ 933.714884][T21997] bridge0: entered allmulticast mode [ 933.753496][T21997] batman_adv: batadv0: Adding interface: macvtap1 [ 933.760275][T21997] batman_adv: batadv0: The MTU of interface macvtap1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 933.787821][T21997] batman_adv: batadv0: Interface activated: macvtap1 [ 933.836573][T22006] netlink: 60 bytes leftover after parsing attributes in process `syz.1.13153'. [ 934.064723][T22018] sch_tbf: burst 36283 is lower than device lo mtu (65550) ! [ 934.210006][T22036] hub 2-0:1.0: USB hub found [ 934.214805][T22036] hub 2-0:1.0: 8 ports detected [ 934.358194][T22053] netlink: 12 bytes leftover after parsing attributes in process `syz.6.13174'. [ 934.402309][T22063] netlink: 'syz.6.13178': attribute type 1 has an invalid length. [ 934.424475][T22065] netlink: 'syz.1.13179': attribute type 1 has an invalid length. [ 934.614487][T22093] netlink: 'syz.1.13191': attribute type 1 has an invalid length. [ 934.837099][T22107] bridge0: entered promiscuous mode [ 934.842650][T22107] macvtap1: entered allmulticast mode [ 934.848575][T22107] bridge0: entered allmulticast mode [ 934.860873][T22107] bridge0: left allmulticast mode [ 934.866032][T22107] bridge0: left promiscuous mode [ 934.962418][T22110] netlink: 124 bytes leftover after parsing attributes in process `syz.0.13197'. [ 935.221236][T22127] netlink: 12 bytes leftover after parsing attributes in process `syz.5.13205'. [ 935.312956][T22120] block device autoloading is deprecated and will be removed. [ 935.330695][T22134] netlink: 161700 bytes leftover after parsing attributes in process `syz.4.13208'. [ 935.423102][T22120] lo speed is unknown, defaulting to 1000 [ 935.461933][T22125] netlink: 'syz.0.13202': attribute type 10 has an invalid length. [ 935.476608][T22125] team0: Port device dummy0 added [ 935.484675][T22125] netlink: 'syz.0.13202': attribute type 10 has an invalid length. [ 935.508670][T22125] team0: Port device dummy0 removed [ 935.519776][T22125] bond0: (slave dummy0): Enslaving as an active interface with an up link [ 935.558988][T22142] hub 2-0:1.0: USB hub found [ 935.563719][T22142] hub 2-0:1.0: 8 ports detected [ 935.617379][T22146] FAULT_INJECTION: forcing a failure. [ 935.617379][T22146] name failslab, interval 1, probability 0, space 0, times 0 [ 935.630185][T22146] CPU: 1 UID: 0 PID: 22146 Comm: syz.1.13212 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 935.630291][T22146] Tainted: [W]=WARN [ 935.630299][T22146] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 935.630315][T22146] Call Trace: [ 935.630322][T22146] [ 935.630331][T22146] __dump_stack+0x1d/0x30 [ 935.630362][T22146] dump_stack_lvl+0xe8/0x140 [ 935.630390][T22146] dump_stack+0x15/0x1b [ 935.630413][T22146] should_fail_ex+0x265/0x280 [ 935.630522][T22146] should_failslab+0x8c/0xb0 [ 935.630561][T22146] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 935.630599][T22146] ? __alloc_skb+0x101/0x320 [ 935.630717][T22146] __alloc_skb+0x101/0x320 [ 935.630753][T22146] ? audit_log_start+0x342/0x720 [ 935.630805][T22146] audit_log_start+0x3a0/0x720 [ 935.630834][T22146] ? kstrtouint+0x76/0xc0 [ 935.630870][T22146] audit_seccomp+0x48/0x100 [ 935.630950][T22146] ? __seccomp_filter+0x82d/0x1250 [ 935.631022][T22146] __seccomp_filter+0x83e/0x1250 [ 935.631059][T22146] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 935.631099][T22146] ? vfs_write+0x7e8/0x960 [ 935.631130][T22146] ? __rcu_read_unlock+0x4f/0x70 [ 935.631228][T22146] ? __fget_files+0x184/0x1c0 [ 935.631306][T22146] __secure_computing+0x82/0x150 [ 935.631465][T22146] syscall_trace_enter+0xcf/0x1e0 [ 935.631507][T22146] do_syscall_64+0xac/0x200 [ 935.631528][T22146] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 935.631656][T22146] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 935.631696][T22146] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 935.631726][T22146] RIP: 0033:0x7ff3697befc9 [ 935.631747][T22146] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 935.631807][T22146] RSP: 002b:00007ff368227038 EFLAGS: 00000246 ORIG_RAX: 0000000000000146 [ 935.631829][T22146] RAX: ffffffffffffffda RBX: 00007ff369a15fa0 RCX: 00007ff3697befc9 [ 935.631847][T22146] RDX: 0000000000000006 RSI: 0000000000000000 RDI: 0000000000000006 [ 935.631864][T22146] RBP: 00007ff368227090 R08: 0000000000000101 R09: 0000000000000000 [ 935.631910][T22146] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 935.631927][T22146] R13: 00007ff369a16038 R14: 00007ff369a15fa0 R15: 00007ffd86621e18 [ 935.631956][T22146] [ 936.123275][ T29] kauditd_printk_skb: 640 callbacks suppressed [ 936.123338][ T29] audit: type=1400 audit(936.187:284930): avc: denied { setopt } for pid=22165 comm="syz.0.13218" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rxrpc_socket permissive=1 [ 936.161213][ T29] audit: type=1400 audit(936.227:284931): avc: denied { recv } for pid=20297 comm="kworker/u8:33" saddr=10.128.0.163 src=40062 daddr=10.128.0.150 dest=22 netif=eth0 scontext=system_u:system_r:sshd_t tcontext=system_u:object_r:unlabeled_t tclass=peer permissive=1 [ 936.255024][ T29] audit: type=1400 audit(936.317:284932): avc: denied { read } for pid=22171 comm="syz.5.13221" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 936.528813][ T29] audit: type=1400 audit(936.597:284933): avc: denied { getopt } for pid=22181 comm="syz.4.13224" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=icmp_socket permissive=1 [ 936.530791][T22182] netlink: 8 bytes leftover after parsing attributes in process `syz.4.13224'. [ 936.654665][T22187] netlink: 60 bytes leftover after parsing attributes in process `syz.1.13226'. [ 936.723513][ T29] audit: type=1400 audit(936.597:284934): avc: denied { ioctl } for pid=22181 comm="syz.4.13224" path="socket:[152589]" dev="sockfs" ino=152589 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 936.750329][T22190] netlink: 12 bytes leftover after parsing attributes in process `syz.1.13227'. [ 936.763328][ T29] audit: type=1326 audit(936.827:284935): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22188 comm="syz.1.13227" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 936.787208][ T29] audit: type=1326 audit(936.827:284936): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22188 comm="syz.1.13227" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 936.810797][ T29] audit: type=1326 audit(936.827:284937): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22188 comm="syz.1.13227" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 936.834024][ T29] audit: type=1326 audit(936.827:284938): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22188 comm="syz.1.13227" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 936.857188][ T29] audit: type=1326 audit(936.827:284939): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22188 comm="syz.1.13227" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 937.140268][T22206] hub 2-0:1.0: USB hub found [ 937.145273][T22206] hub 2-0:1.0: 8 ports detected [ 937.212342][T22214] bridge0: entered promiscuous mode [ 937.218320][T22214] macvtap1: entered allmulticast mode [ 937.223865][T22214] bridge0: entered allmulticast mode [ 937.231371][T22214] bridge0: left allmulticast mode [ 937.236465][T22214] bridge0: left promiscuous mode [ 937.335874][T22217] bridge0: entered promiscuous mode [ 937.341287][T22217] macvtap1: entered allmulticast mode [ 937.346742][T22217] bridge0: entered allmulticast mode [ 937.354292][T22217] bridge0: left allmulticast mode [ 937.359427][T22217] bridge0: left promiscuous mode [ 937.584190][T22240] lo speed is unknown, defaulting to 1000 [ 937.590199][T22240] lo speed is unknown, defaulting to 1000 [ 937.596327][T22240] lo speed is unknown, defaulting to 1000 [ 937.603600][T22240] infiniband syz0: RDMA CMA: cma_listen_on_dev, error -98 [ 937.616022][T22240] lo speed is unknown, defaulting to 1000 [ 937.622258][T22240] lo speed is unknown, defaulting to 1000 [ 937.628966][T22240] lo speed is unknown, defaulting to 1000 [ 937.635506][T22240] lo speed is unknown, defaulting to 1000 [ 937.641696][T22240] lo speed is unknown, defaulting to 1000 [ 937.649071][T22240] lo speed is unknown, defaulting to 1000 [ 937.806619][T22247] FAULT_INJECTION: forcing a failure. [ 937.806619][T22247] name failslab, interval 1, probability 0, space 0, times 0 [ 937.819355][T22247] CPU: 0 UID: 0 PID: 22247 Comm: syz.1.13247 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 937.819508][T22247] Tainted: [W]=WARN [ 937.819517][T22247] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 937.819530][T22247] Call Trace: [ 937.819542][T22247] [ 937.819617][T22247] __dump_stack+0x1d/0x30 [ 937.819649][T22247] dump_stack_lvl+0xe8/0x140 [ 937.819676][T22247] dump_stack+0x15/0x1b [ 937.819706][T22247] should_fail_ex+0x265/0x280 [ 937.819732][T22247] should_failslab+0x8c/0xb0 [ 937.819815][T22247] kmem_cache_alloc_node_noprof+0x57/0x4a0 [ 937.819854][T22247] ? __alloc_skb+0x101/0x320 [ 937.819889][T22247] __alloc_skb+0x101/0x320 [ 937.819916][T22247] ? audit_log_start+0x342/0x720 [ 937.819971][T22247] audit_log_start+0x3a0/0x720 [ 937.819992][T22247] ? kstrtouint+0x76/0xc0 [ 937.820075][T22247] audit_seccomp+0x48/0x100 [ 937.820119][T22247] ? __seccomp_filter+0x82d/0x1250 [ 937.820177][T22247] __seccomp_filter+0x83e/0x1250 [ 937.820224][T22247] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 937.820282][T22247] ? vfs_write+0x7e8/0x960 [ 937.820312][T22247] ? __rcu_read_unlock+0x4f/0x70 [ 937.820347][T22247] ? __fget_files+0x184/0x1c0 [ 937.820406][T22247] __secure_computing+0x82/0x150 [ 937.820443][T22247] syscall_trace_enter+0xcf/0x1e0 [ 937.820515][T22247] do_syscall_64+0xac/0x200 [ 937.820586][T22247] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 937.820624][T22247] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 937.820710][T22247] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 937.820732][T22247] RIP: 0033:0x7ff3697befc9 [ 937.820748][T22247] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 937.820846][T22247] RSP: 002b:00007ff368227038 EFLAGS: 00000246 ORIG_RAX: 00000000000000bb [ 937.820874][T22247] RAX: ffffffffffffffda RBX: 00007ff369a15fa0 RCX: 00007ff3697befc9 [ 937.820886][T22247] RDX: 000000000000002b RSI: 0000000000000005 RDI: ffffffffffffffff [ 937.820954][T22247] RBP: 00007ff368227090 R08: 0000000000000000 R09: 0000000000000000 [ 937.820965][T22247] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 937.820977][T22247] R13: 00007ff369a16038 R14: 00007ff369a15fa0 R15: 00007ffd86621e18 [ 937.820996][T22247] [ 938.064327][T22249] bridge0: entered promiscuous mode [ 938.069677][T22249] macvtap0: entered allmulticast mode [ 938.075136][T22249] bridge0: entered allmulticast mode [ 938.082293][T22249] batman_adv: batadv0: Adding interface: macvtap0 [ 938.088945][T22249] batman_adv: batadv0: The MTU of interface macvtap0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 938.116948][T22249] batman_adv: batadv0: Interface activated: macvtap0 [ 938.278767][T22271] hub 2-0:1.0: USB hub found [ 938.283574][T22271] hub 2-0:1.0: 8 ports detected [ 938.414606][T22282] macvtap2: entered allmulticast mode [ 938.429508][T22282] batman_adv: batadv0: Adding interface: macvtap2 [ 938.436043][T22282] batman_adv: batadv0: The MTU of interface macvtap2 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 938.463875][T22282] batman_adv: batadv0: Interface activated: macvtap2 [ 938.515346][T22288] geneve0 speed is unknown, defaulting to 1000 [ 938.521590][T22288] geneve0 speed is unknown, defaulting to 1000 [ 938.528076][T22288] geneve0 speed is unknown, defaulting to 1000 [ 938.536601][T22288] infiniband syz2: RDMA CMA: cma_listen_on_dev, error -98 [ 938.596316][T22288] geneve0 speed is unknown, defaulting to 1000 [ 938.603141][T22288] geneve0 speed is unknown, defaulting to 1000 [ 938.610255][T22288] geneve0 speed is unknown, defaulting to 1000 [ 938.617113][T22288] geneve0 speed is unknown, defaulting to 1000 [ 938.624322][T22288] geneve0 speed is unknown, defaulting to 1000 [ 938.631164][T22288] geneve0 speed is unknown, defaulting to 1000 [ 938.845805][T22296] __nla_validate_parse: 5 callbacks suppressed [ 938.845836][T22296] netlink: 12 bytes leftover after parsing attributes in process `syz.5.13267'. [ 939.917041][T22320] netlink: 12 bytes leftover after parsing attributes in process `syz.5.13276'. [ 940.601299][T22342] netlink: 'syz.6.13286': attribute type 1 has an invalid length. [ 940.624876][T22344] netlink: 12 bytes leftover after parsing attributes in process `syz.5.13287'. [ 940.783702][T22365] tipc: New replicast peer: 255.255.255.83 [ 940.789676][T22365] tipc: Enabled bearer , priority 10 [ 940.820390][T22365] xt_TCPMSS: Only works on TCP SYN packets [ 940.833536][T22353] sch_tbf: burst 3298 is lower than device lo mtu (65550) ! [ 940.874619][T22372] netlink: 'syz.4.13299': attribute type 1 has an invalid length. [ 940.905259][T22374] netlink: 12 bytes leftover after parsing attributes in process `syz.4.13300'. [ 941.053753][T22385] tipc: Started in network mode [ 941.058772][T22385] tipc: Node identity 82fb5c51846d, cluster identity 4711 [ 941.066243][T22385] tipc: Enabled bearer , priority 0 [ 941.078138][T22385] netlink: 4 bytes leftover after parsing attributes in process `syz.6.13304'. [ 941.114841][T22383] tipc: Resetting bearer [ 941.138652][T22383] tipc: Disabling bearer [ 941.227378][ T29] kauditd_printk_skb: 251 callbacks suppressed [ 941.227474][ T29] audit: type=1326 audit(941.299:285189): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22397 comm="syz.0.13308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 941.292459][ T29] audit: type=1326 audit(941.329:285190): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22397 comm="syz.0.13308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 941.315760][ T29] audit: type=1326 audit(941.329:285191): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22397 comm="syz.0.13308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 941.338995][ T29] audit: type=1326 audit(941.329:285192): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22397 comm="syz.0.13308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 941.362306][ T29] audit: type=1326 audit(941.329:285193): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22397 comm="syz.0.13308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 941.385632][ T29] audit: type=1326 audit(941.329:285194): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22397 comm="syz.0.13308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 941.408843][ T29] audit: type=1326 audit(941.329:285195): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22397 comm="syz.0.13308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 941.432041][ T29] audit: type=1326 audit(941.329:285196): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22397 comm="syz.0.13308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 941.455221][ T29] audit: type=1326 audit(941.329:285197): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22397 comm="syz.0.13308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 941.478450][ T29] audit: type=1326 audit(941.329:285198): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22397 comm="syz.0.13308" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f39e4ddefc9 code=0x7ffc0000 [ 941.551338][T22406] netlink: 12 bytes leftover after parsing attributes in process `syz.5.13311'. [ 941.560842][T22410] netlink: 12 bytes leftover after parsing attributes in process `syz.0.13313'. [ 941.716892][T22416] hub 2-0:1.0: USB hub found [ 941.721702][T22416] hub 2-0:1.0: 8 ports detected [ 941.733595][T22428] netlink: 'syz.1.13320': attribute type 1 has an invalid length. [ 941.782225][ T1051] tipc: Node number set to 2088342563 [ 941.872570][T22438] netlink: 12 bytes leftover after parsing attributes in process `syz.1.13324'. [ 941.980719][T22448] loop1: detected capacity change from 0 to 1024 [ 941.994617][T22448] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 942.026866][T22448] EXT4-fs error (device loop1): ext4_mb_mark_diskspace_used:4193: comm syz.1.13329: Allocating blocks 497-513 which overlap fs metadata [ 942.049345][T22448] EXT4-fs (loop1): pa ffff8881071d29a0: logic 16, phys. 129, len 24 [ 942.057551][T22448] EXT4-fs error (device loop1): ext4_mb_release_inode_pa:5444: group 0, free 0, pa_free 1 [ 942.083370][T17816] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 942.135734][T22454] hub 2-0:1.0: USB hub found [ 942.140900][T22454] hub 2-0:1.0: 8 ports detected [ 942.227523][T22470] netlink: 12 bytes leftover after parsing attributes in process `syz.4.13336'. [ 942.296249][T22480] netlink: 24 bytes leftover after parsing attributes in process `syz.4.13341'. [ 942.314137][T22482] FAULT_INJECTION: forcing a failure. [ 942.314137][T22482] name failslab, interval 1, probability 0, space 0, times 0 [ 942.326875][T22482] CPU: 0 UID: 0 PID: 22482 Comm: syz.1.13342 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 942.326955][T22482] Tainted: [W]=WARN [ 942.326965][T22482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 942.326979][T22482] Call Trace: [ 942.326986][T22482] [ 942.326994][T22482] __dump_stack+0x1d/0x30 [ 942.327024][T22482] dump_stack_lvl+0xe8/0x140 [ 942.327049][T22482] dump_stack+0x15/0x1b [ 942.327067][T22482] should_fail_ex+0x265/0x280 [ 942.327138][T22482] ? audit_log_d_path+0x8d/0x150 [ 942.327237][T22482] should_failslab+0x8c/0xb0 [ 942.327275][T22482] __kmalloc_cache_noprof+0x4c/0x4a0 [ 942.327319][T22482] audit_log_d_path+0x8d/0x150 [ 942.327349][T22482] audit_log_d_path_exe+0x42/0x70 [ 942.327406][T22482] audit_log_task+0x1e9/0x250 [ 942.327451][T22482] ? kstrtouint+0x76/0xc0 [ 942.327496][T22482] audit_seccomp+0x61/0x100 [ 942.327544][T22482] ? __seccomp_filter+0x82d/0x1250 [ 942.327628][T22482] __seccomp_filter+0x83e/0x1250 [ 942.327744][T22482] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 942.327777][T22482] ? vfs_write+0x7e8/0x960 [ 942.327802][T22482] ? __rcu_read_unlock+0x4f/0x70 [ 942.327839][T22482] ? __fget_files+0x184/0x1c0 [ 942.327872][T22482] __secure_computing+0x82/0x150 [ 942.327912][T22482] syscall_trace_enter+0xcf/0x1e0 [ 942.327951][T22482] do_syscall_64+0xac/0x200 [ 942.327976][T22482] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 942.328044][T22482] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 942.328080][T22482] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 942.328158][T22482] RIP: 0033:0x7ff3697befc9 [ 942.328177][T22482] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 942.328212][T22482] RSP: 002b:00007ff368227038 EFLAGS: 00000246 ORIG_RAX: 00000000000000fc [ 942.328237][T22482] RAX: ffffffffffffffda RBX: 00007ff369a15fa0 RCX: 00007ff3697befc9 [ 942.328255][T22482] RDX: 0000000000000000 RSI: 000000000000ee01 RDI: 0000000000000003 [ 942.328271][T22482] RBP: 00007ff368227090 R08: 0000000000000000 R09: 0000000000000000 [ 942.328287][T22482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 942.328304][T22482] R13: 00007ff369a16038 R14: 00007ff369a15fa0 R15: 00007ffd86621e18 [ 942.328331][T22482] [ 942.708782][T22504] netlink: 'syz.0.13352': attribute type 9 has an invalid length. [ 942.767906][T22514] @ÿ: renamed from hsr0 (while UP) [ 942.959212][T22539] pimreg: entered allmulticast mode [ 942.966100][T22539] pimreg: left allmulticast mode [ 943.038208][T22548] netlink: 'syz.1.13367': attribute type 1 has an invalid length. [ 943.049789][T22542] bond0: (slave dummy0): Releasing backup interface [ 943.074444][T22542] batman_adv: batadv0: Adding interface: dummy0 [ 943.080747][T22542] batman_adv: batadv0: The MTU of interface dummy0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 943.106303][T22542] batman_adv: batadv0: Not using interface dummy0 (retrying later): interface not active [ 943.387572][T22567] tipc: Started in network mode [ 943.392663][T22567] tipc: Node identity fad5445456cc, cluster identity 4711 [ 943.399878][T22567] tipc: Enabled bearer , priority 0 [ 943.408648][T22565] tipc: Resetting bearer [ 943.437244][T22565] tipc: Disabling bearer [ 943.463984][T22574] netlink: 'syz.0.13379': attribute type 1 has an invalid length. [ 943.501454][ T3402] IPVS: starting estimator thread 0... [ 943.529587][T22582] syz_tun: entered allmulticast mode [ 943.556488][T22582] syz_tun (unregistering): left allmulticast mode [ 943.591398][T22577] IPVS: using max 2016 ests per chain, 100800 per kthread [ 943.803582][T22606] netlink: 'syz.0.13390': attribute type 1 has an invalid length. [ 943.866865][T22607] hub 2-0:1.0: USB hub found [ 943.882799][T22607] hub 2-0:1.0: 8 ports detected [ 943.900724][T22618] __nla_validate_parse: 10 callbacks suppressed [ 943.900747][T22618] netlink: 12 bytes leftover after parsing attributes in process `syz.4.13394'. [ 944.033922][T22633] netlink: 8 bytes leftover after parsing attributes in process `syz.6.13395'. [ 944.327929][T22650] netlink: 'syz.1.13402': attribute type 1 has an invalid length. [ 944.591048][T22656] bond0: (slave bond_slave_0): Releasing backup interface [ 944.610014][T22659] netlink: 'syz.6.13404': attribute type 10 has an invalid length. [ 944.618064][T22659] netlink: 40 bytes leftover after parsing attributes in process `syz.6.13404'. [ 944.621248][T22656] bond0: (slave bond_slave_1): Releasing backup interface [ 944.720757][T22656] team0: Port device team_slave_0 removed [ 944.854668][T22656] team0: Port device team_slave_1 removed [ 944.935169][T22656] A link change request failed with some changes committed already. Interface hsr_slave_0 may have been left with an inconsistent configuration, please check. [ 945.029607][T22675] netlink: 8 bytes leftover after parsing attributes in process `syz.5.13410'. [ 945.085509][T22659] A link change request failed with some changes committed already. Interface veth1_vlan may have been left with an inconsistent configuration, please check. [ 945.115182][T22662] lo speed is unknown, defaulting to 1000 [ 945.175634][T22662] lo speed is unknown, defaulting to 1000 [ 945.182097][T22662] geneve0 speed is unknown, defaulting to 1000 [ 945.767673][T22693] netlink: 'syz.4.13414': attribute type 16 has an invalid length. [ 945.775690][T22693] netlink: 'syz.4.13414': attribute type 17 has an invalid length. [ 945.854361][T22693] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 945.881372][T22711] macvtap2: entered allmulticast mode [ 945.890064][T22711] batman_adv: batadv0: Adding interface: macvtap2 [ 945.896646][T22711] batman_adv: batadv0: The MTU of interface macvtap2 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 945.922435][T22711] batman_adv: batadv0: Interface activated: macvtap2 [ 946.070837][T22728] openvswitch: netlink: Either Ethernet header or EtherType is required. [ 946.148618][T22736] netlink: 236 bytes leftover after parsing attributes in process `syz.1.13423'. [ 946.274576][T22745] netlink: 60 bytes leftover after parsing attributes in process `syz.1.13425'. [ 946.421566][ T29] kauditd_printk_skb: 198 callbacks suppressed [ 946.421587][ T29] audit: type=1326 audit(946.492:285397): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22768 comm="syz.1.13427" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 946.452465][ T29] audit: type=1326 audit(946.492:285398): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22768 comm="syz.1.13427" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 946.475780][ T29] audit: type=1326 audit(946.492:285399): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22768 comm="syz.1.13427" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 946.499136][ T29] audit: type=1326 audit(946.492:285400): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22768 comm="syz.1.13427" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 946.522504][ T29] audit: type=1326 audit(946.492:285401): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22768 comm="syz.1.13427" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 946.545743][ T29] audit: type=1326 audit(946.492:285402): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22768 comm="syz.1.13427" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 946.568925][ T29] audit: type=1326 audit(946.492:285403): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22768 comm="syz.1.13427" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 946.592107][ T29] audit: type=1326 audit(946.492:285404): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22768 comm="syz.1.13427" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 946.615372][ T29] audit: type=1326 audit(946.492:285405): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22768 comm="syz.1.13427" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 946.638644][ T29] audit: type=1326 audit(946.492:285406): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=22768 comm="syz.1.13427" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7ff3697befc9 code=0x7ffc0000 [ 946.822301][T22802] netlink: 'syz.6.13434': attribute type 16 has an invalid length. [ 946.830334][T22802] netlink: 'syz.6.13434': attribute type 17 has an invalid length. [ 946.847624][T22802] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 946.938468][T22809] netlink: 40 bytes leftover after parsing attributes in process `'. [ 947.421253][T22855] lo speed is unknown, defaulting to 1000 [ 947.484425][T22855] lo speed is unknown, defaulting to 1000 [ 947.491400][T22855] geneve0 speed is unknown, defaulting to 1000 [ 947.953957][T22860] loop1: detected capacity change from 0 to 512 [ 948.181094][T22860] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 948.260854][T17816] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 948.557217][T22895] netlink: 60 bytes leftover after parsing attributes in process `syz.0.13452'. [ 949.341027][T23069] netlink: 60 bytes leftover after parsing attributes in process `syz.1.13463'. [ 949.623850][T23096] loop1: detected capacity change from 0 to 256 [ 949.678779][T23096] vfat: Unknown parameter 'shortnamg' [ 949.702936][T23096] loop1: detected capacity change from 0 to 512 [ 949.729082][T23096] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 949.751630][T23103] netlink: 60 bytes leftover after parsing attributes in process `syz.5.13476'. [ 949.775375][T23106] SELinux: Context system_u:object_r:systemd_systemctl_exec_t:s0 is not valid (left unmapped). [ 949.871745][T17816] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 950.027338][T23140] netlink: 60 bytes leftover after parsing attributes in process `syz.4.13491'. [ 950.048851][T23143] netlink: 'syz.6.13489': attribute type 16 has an invalid length. [ 950.056831][T23143] netlink: 'syz.6.13489': attribute type 17 has an invalid length. [ 950.088808][T23143] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 950.509381][T23192] x_tables: ip6_tables: rpfilter match: used from hooks OUTPUT, but only valid from PREROUTING [ 950.592392][T23205] netlink: 60 bytes leftover after parsing attributes in process `syz.4.13504'. [ 950.772553][T23237] lo speed is unknown, defaulting to 1000 [ 950.844137][T23237] lo speed is unknown, defaulting to 1000 [ 950.850605][T23237] geneve0 speed is unknown, defaulting to 1000 [ 951.062444][T23278] loop1: detected capacity change from 0 to 512 [ 951.092952][T23278] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 951.177911][T17816] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 951.497865][T23331] lo speed is unknown, defaulting to 1000 [ 951.567464][ T29] kauditd_printk_skb: 54 callbacks suppressed [ 951.567481][ T29] audit: type=1326 audit(951.645:285461): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23346 comm="syz.4.13531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 951.604876][T23331] lo speed is unknown, defaulting to 1000 [ 951.611399][T23331] geneve0 speed is unknown, defaulting to 1000 [ 951.617766][ T29] audit: type=1326 audit(951.675:285462): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23346 comm="syz.4.13531" exe="/root/syz-executor" sig=0 arch=c000003e syscall=157 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 951.641129][ T29] audit: type=1326 audit(951.675:285463): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23346 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 951.664560][ T29] audit: type=1326 audit(951.675:285464): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23346 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 951.687706][ T29] audit: type=1326 audit(951.675:285465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23346 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 951.710828][ T29] audit: type=1326 audit(951.675:285466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23346 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 951.733977][ T29] audit: type=1326 audit(951.675:285467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23346 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 951.751373][T23351] lo speed is unknown, defaulting to 1000 [ 951.757129][ T29] audit: type=1326 audit(951.675:285468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23346 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 951.793503][ T29] audit: type=1326 audit(951.745:285469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23346 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 951.816923][ T29] audit: type=1326 audit(951.765:285470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=23346 comm=77DEA305FF07 exe="/root/syz-executor" sig=0 arch=c000003e syscall=8 compat=0 ip=0x7f01346fefc9 code=0x7ffc0000 [ 951.839892][T23357] loop1: detected capacity change from 0 to 512 [ 951.869154][T23357] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 951.917885][T23351] lo speed is unknown, defaulting to 1000 [ 951.924615][T23351] geneve0 speed is unknown, defaulting to 1000 [ 952.282383][T17816] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 952.487098][T23412] netlink: 4 bytes leftover after parsing attributes in process `syz.1.13550'. [ 952.933265][T23401] Set syz1 is full, maxelem 65536 reached [ 952.979505][T23428] netlink: 'syz.5.13555': attribute type 4 has an invalid length. [ 953.029903][T23432] netlink: 'syz.5.13555': attribute type 4 has an invalid length. [ 953.078763][T23428] block device autoloading is deprecated and will be removed. [ 953.082883][T23440] loop1: detected capacity change from 0 to 1024 [ 953.118467][T23440] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 953.136337][T23440] EXT4-fs error (device loop1): ext4_mb_mark_diskspace_used:4193: comm syz.1.13561: Allocating blocks 497-513 which overlap fs metadata [ 953.151485][T23440] EXT4-fs (loop1): pa ffff8881071d2a10: logic 16, phys. 129, len 24 [ 953.159606][T23440] EXT4-fs error (device loop1): ext4_mb_release_inode_pa:5444: group 0, free 0, pa_free 1 [ 953.196027][T17816] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 953.381560][T23466] loop1: detected capacity change from 0 to 4096 [ 953.397357][T23466] EXT4-fs: Ignoring removed nomblk_io_submit option [ 953.410901][T23466] ext3: Bad value for 'resuid' [ 953.415726][T23466] ext3: Bad value for 'resuid' [ 953.477501][T23486] netlink: 12 bytes leftover after parsing attributes in process `syz.0.13574'. [ 953.598584][T23508] FAULT_INJECTION: forcing a failure. [ 953.598584][T23508] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 953.611856][T23508] CPU: 0 UID: 0 PID: 23508 Comm: syz.6.13577 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 953.611900][T23508] Tainted: [W]=WARN [ 953.611926][T23508] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 953.611945][T23508] Call Trace: [ 953.611955][T23508] [ 953.611965][T23508] __dump_stack+0x1d/0x30 [ 953.611994][T23508] dump_stack_lvl+0xe8/0x140 [ 953.612015][T23508] dump_stack+0x15/0x1b [ 953.612036][T23508] should_fail_ex+0x265/0x280 [ 953.612124][T23508] should_fail+0xb/0x20 [ 953.612156][T23508] should_fail_usercopy+0x1a/0x20 [ 953.612184][T23508] _copy_from_iter+0xd2/0xe80 [ 953.612215][T23508] ? __build_skb_around+0x1ab/0x200 [ 953.612251][T23508] ? __alloc_skb+0x223/0x320 [ 953.612361][T23508] netlink_sendmsg+0x471/0x6b0 [ 953.612392][T23508] ? __pfx_netlink_sendmsg+0x10/0x10 [ 953.612419][T23508] __sock_sendmsg+0x145/0x180 [ 953.612444][T23508] ____sys_sendmsg+0x31e/0x4e0 [ 953.612502][T23508] ___sys_sendmsg+0x17b/0x1d0 [ 953.612561][T23508] __x64_sys_sendmsg+0xd4/0x160 [ 953.612587][T23508] x64_sys_call+0x191e/0x3000 [ 953.612675][T23508] do_syscall_64+0xd2/0x200 [ 953.612701][T23508] ? arch_exit_to_user_mode_prepare+0x27/0x80 [ 953.612810][T23508] ? irqentry_exit_to_user_mode+0x7b/0xa0 [ 953.612875][T23508] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 953.612905][T23508] RIP: 0033:0x7fadd687efc9 [ 953.612992][T23508] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 953.613018][T23508] RSP: 002b:00007fadd52c6038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 953.613044][T23508] RAX: ffffffffffffffda RBX: 00007fadd6ad6090 RCX: 00007fadd687efc9 [ 953.613061][T23508] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 953.613143][T23508] RBP: 00007fadd52c6090 R08: 0000000000000000 R09: 0000000000000000 [ 953.613237][T23508] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 953.613251][T23508] R13: 00007fadd6ad6128 R14: 00007fadd6ad6090 R15: 00007ffd64a00418 [ 953.613276][T23508] [ 954.007133][T23535] netlink: 4 bytes leftover after parsing attributes in process `syz.5.13583'. [ 954.030022][T23535] syzkaller1: entered promiscuous mode [ 954.035556][T23535] syzkaller1: entered allmulticast mode [ 954.166239][T23547] bridge0: port 3(veth0_to_bridge) entered blocking state [ 954.173490][T23547] bridge0: port 3(veth0_to_bridge) entered disabled state [ 954.193525][T23547] veth0_to_bridge: entered allmulticast mode [ 954.213317][T23547] veth0_to_bridge: entered promiscuous mode [ 954.219645][T23547] bridge0: adding interface veth0_to_bridge with same address as a received packet (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 954.253139][T23547] bridge0: port 3(veth0_to_bridge) entered blocking state [ 954.260440][T23547] bridge0: port 3(veth0_to_bridge) entered forwarding state [ 954.349725][T23542] netlink: 32 bytes leftover after parsing attributes in process `syz.5.13583'. [ 954.364088][T23562] sctp: [Deprecated]: syz.6.13584 (pid 23562) Use of struct sctp_assoc_value in delayed_ack socket option. [ 954.364088][T23562] Use struct sctp_sack_info instead [ 954.891049][T23626] netlink: 'syz.0.13589': attribute type 16 has an invalid length. [ 954.899130][T23626] netlink: 'syz.0.13589': attribute type 17 has an invalid length. [ 954.974850][T23626] batman_adv: batadv0: Interface activated: dummy0 [ 954.981625][T23626] batadv0: mtu less than device minimum [ 954.987826][T23626] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 954.998715][T23626] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 955.009505][T23626] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 955.020337][T23626] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 955.031380][T23626] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 955.042454][T23626] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 955.053366][T23626] batman_adv: batadv0: Forced to purge local tt entries to fit new maximum fragment MTU (-320) [ 958.817467][T23626] net_ratelimit: 12 callbacks suppressed [ 958.817502][T23626] A link change request failed with some changes committed already. Interface caif0 may have been left with an inconsistent configuration, please check. [ 962.012199][T23672] netlink: 12 bytes leftover after parsing attributes in process `syz.4.13595'. [ 969.948152][ C0] ================================================================== [ 969.956313][ C0] BUG: KCSAN: data-race in br_fdb_update / br_fdb_update [ 969.963383][ C0] [ 969.965724][ C0] read to 0xffff88810556cbc0 of 8 bytes by interrupt on cpu 1: [ 969.973291][ C0] br_fdb_update+0x106/0x460 [ 969.977910][ C0] br_handle_frame_finish+0x34b/0x1040 [ 969.983413][ C0] br_handle_frame+0x5d1/0x9e0 [ 969.988240][ C0] __netif_receive_skb_core+0xad3/0x2550 [ 969.993907][ C0] __netif_receive_skb+0x59/0x270 [ 969.999020][ C0] process_backlog+0x229/0x420 [ 970.003810][ C0] __napi_poll+0x66/0x310 [ 970.008214][ C0] net_rx_action+0x423/0x8c0 [ 970.012846][ C0] handle_softirqs+0xba/0x290 [ 970.017579][ C0] do_softirq+0x5d/0x90 [ 970.021773][ C0] __local_bh_enable_ip+0x70/0x80 [ 970.026830][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 970.031802][ C0] release_sock+0x116/0x150 [ 970.036359][ C0] rds_tcp_tune+0x263/0x2a0 [ 970.040894][ C0] rds_tcp_conn_path_connect+0x1a0/0x440 [ 970.046566][ C0] rds_connect_worker+0x12f/0x1b0 [ 970.051622][ C0] process_scheduled_works+0x4ce/0x9d0 [ 970.057140][ C0] worker_thread+0x582/0x770 [ 970.061752][ C0] kthread+0x489/0x510 [ 970.065858][ C0] ret_from_fork+0x122/0x1b0 [ 970.070481][ C0] ret_from_fork_asm+0x1a/0x30 [ 970.075280][ C0] [ 970.077620][ C0] write to 0xffff88810556cbc0 of 8 bytes by interrupt on cpu 0: [ 970.085278][ C0] br_fdb_update+0x13e/0x460 [ 970.089891][ C0] br_handle_frame_finish+0x34b/0x1040 [ 970.095385][ C0] br_handle_frame+0x5d1/0x9e0 [ 970.100191][ C0] __netif_receive_skb_core+0xad3/0x2550 [ 970.105880][ C0] __netif_receive_skb+0x59/0x270 [ 970.110947][ C0] process_backlog+0x229/0x420 [ 970.115752][ C0] __napi_poll+0x66/0x310 [ 970.120118][ C0] net_rx_action+0x423/0x8c0 [ 970.124743][ C0] handle_softirqs+0xba/0x290 [ 970.129453][ C0] do_softirq+0x5d/0x90 [ 970.133638][ C0] __local_bh_enable_ip+0x70/0x80 [ 970.138687][ C0] _raw_spin_unlock_bh+0x36/0x40 [ 970.143664][ C0] batadv_tt_purge+0x2cd/0x610 [ 970.148542][ C0] process_scheduled_works+0x4ce/0x9d0 [ 970.154061][ C0] worker_thread+0x582/0x770 [ 970.158679][ C0] kthread+0x489/0x510 [ 970.162776][ C0] ret_from_fork+0x122/0x1b0 [ 970.167399][ C0] ret_from_fork_asm+0x1a/0x30 [ 970.172188][ C0] [ 970.174524][ C0] value changed: 0x0000000100010577 -> 0x0000000100010578 [ 970.181643][ C0] [ 970.183980][ C0] Reported by Kernel Concurrency Sanitizer on: [ 970.190144][ C0] CPU: 0 UID: 0 PID: 13795 Comm: kworker/u8:9 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 970.201710][ C0] Tainted: [W]=WARN [ 970.205527][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/02/2025 [ 970.215622][ C0] Workqueue: bat_events batadv_tt_purge [ 970.221197][ C0] ================================================================== [ 971.318467][ C1] bridge0: received packet on bridge_slave_0 with own address as source address (addr:aa:aa:aa:aa:aa:1b, vlan:0) [ 972.829253][ T29] kauditd_printk_skb: 102 callbacks suppressed [ 972.829275][ T29] audit: type=1400 audit(972.785:285573): avc: denied { write } for pid=3304 comm="syz-executor" path="pipe:[2484]" dev="pipefs" ino=2484 scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:sshd_t tclass=fifo_file permissive=1 [ 973.456820][T23695] netlink: 'syz.5.13602': attribute type 11 has an invalid length. SYZFAIL: failed to send rpc fd=3 want=56 sent=0 n=-1 (errno 32: Broken pipe)