last executing test programs:

1.97327819s ago: executing program 4 (id=209):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80020}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10)
mlock(&(0x7f0000000000/0x800000)=nil, 0x800000)
munlockall()
madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8)
madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) (fail_nth: 2)

1.871200691s ago: executing program 4 (id=211):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
io_setup(0x2278, &(0x7f0000000180)=<r1=>0x0)
socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff})
io_submit(r1, 0x2, &(0x7f0000000140)=[&(0x7f00000001c0)={0x0, 0x4, 0x0, 0x8, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x5, 0x2, r2, 0x0, 0x0, 0x0, 0x0, 0x2}])
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002c00)={0x2, &(0x7f0000000180)=[{0x14}, {0x6, 0x5, 0xcf, 0xad2}]})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r4}, 0x10)
syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00')
r5 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0)
ioctl$SG_GET_LOW_DMA(r5, 0x227a, &(0x7f0000000000))
madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15)
bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b40)={&(0x7f0000000a00)=ANY=[@ANYBLOB="9feb010018000000000000002800000016000000060000000400000001008f0d217300000200000009000000050000002f070000000000000f03000000e3dad89e30302e2600"], &(0x7f0000000c40)=""/110, 0x46, 0x6e, 0x1, 0x4, 0x0, @void, @value}, 0x28)
r6 = shmget$private(0x0, 0x2000, 0x80, &(0x7f000005f000/0x2000)=nil)
shmctl$SHM_INFO(r6, 0xe, &(0x7f0000000cc0)=""/4096)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='ext4_free_inode\x00', r4, 0x0, 0xbc8}, 0x18)

1.252896241s ago: executing program 2 (id=231):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10)
r2 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r2, 0x0, 0x0)
sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x2b8}, 0x1, 0x0, 0x0, 0x20000000}, 0x4048010)
r3 = socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x702, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50)
setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4)
bind$inet(r3, &(0x7f0000000380)={0x2, 0x0, @local}, 0x10)
connect$inet(r3, &(0x7f0000000480)={0x2, 0x4e20, @multicast2}, 0x10)
sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0)
setsockopt$inet_int(r3, 0x0, 0x17, &(0x7f0000000040)=0xe, 0x36)
setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000180)=0x5, 0x4)
mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1)
mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1)
r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0)
r5 = dup2(r4, r4)
ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x200000a, 0x1, 0x8})
ioctl$BLKTRACESETUP(r4, 0x1276, 0x0)
r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000180000000000000000000000000b6f7e8000000000000"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r7 = getpid()
setreuid(0xee00, 0x0)
r8 = syz_pidfd_open(r7, 0x0)
setns(r8, 0x24020000)
syz_clone3(&(0x7f00000008c0)={0x15340180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r7], 0x1}, 0x58)

1.124679403s ago: executing program 2 (id=232):
r0 = socket$nl_rdma(0x10, 0x3, 0x14)
r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xafd, 0x0, @perf_bp={0x0, 0x8}, 0x110a, 0x5dd9, 0x0, 0x5, 0xfffffffffffffffd, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
r3 = socket$inet6(0xa, 0x1, 0x0)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x3, 0x0, 0x0, @local, @local, 0x10, 0x7, 0x2, 0x8}})
ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000600)={'syztnl1\x00', 0x0})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10)
getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, <r4=>0x0}, &(0x7f00000000c0)=0xc)
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="ff9ecd415a6ad1af155f2fb481280000001800e73e31ccf36f13fc1b0100000000000000", @ANYRES32=r4, @ANYBLOB], 0x28}}, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000300)={@id={0x2, 0x0, @d}, 0x40, 0x0, '\x00', @b})
open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x14)
capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000040)={0x1000, 0x10ffff, 0xfffffffd})
r5 = socket$nl_route(0x10, 0x3, 0x0)
r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000440)='console\x00', r6, 0x0, 0x4000000001}, 0x18)
sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x600, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x13}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffff}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0)
r7 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8)
setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, 0x8)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
sendmmsg$inet6(r7, &(0x7f0000000480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x80020}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000034c0)='\x00', 0x1}], 0x1}}], 0x1, 0x34000811)
setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="30e01b3981ddca"], 0x1000f)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538)
sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="38000000031401002abd7000f6dbdf250900020073397a3100000000080041007369770014003300626f6e6430000000000000000000ff0092adb943d7640118cf1b739925ea34517e9d13f9ef331bb56d14a8c3627f76c69d3c4b1d3b14207056c3a8b0550e6c904319d954141f04a6651dae02bf050efba51af1de0bbbec6cf938ec09a4acdaa1230c4fac2af1a9145c248395bd8601438f43e3afa0f00b50f00dafed5c07f19c088e93bad69c06cb26ff09e92411479de2df"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20000000)
socket$netlink(0x10, 0x3, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x7, 0x2, 0xa, 0x1}, {0xfeff, 0x5, 0x2, 0x3}, {0x8, 0x7, 0x2, 0x3}, {0x9, 0x9, 0xec, 0x3}, {0xc31, 0x5, 0x8, 0xa}, {0x9, 0x8, 0x4, 0x10001}]})
accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14, 0x800)

991.198095ms ago: executing program 4 (id=234):
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3)
sendmsg$inet(0xffffffffffffffff, 0x0, 0x0)
bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20)
syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0)

768.731728ms ago: executing program 1 (id=243):
syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000006c0), 0x2, 0x246, &(0x7f0000000ac0)="$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")
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8)
r0 = getpid()
sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2)
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e)
sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0)
recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c33d7dd773ce784, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10)
fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) (fail_nth: 1)
creat(&(0x7f0000000100)='./bus\x00', 0x0)
openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x275a, 0x0)

728.987209ms ago: executing program 1 (id=244):
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10)
ftruncate(0xffffffffffffffff, 0xc17a)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
sendmsg$inet(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0)
recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100)
r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x1f, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x6}, [@generic={0x5, 0x8, 0x1, 0x5aa, 0xa226}, @ldst={0x2, 0x3, 0x2, 0xb, 0x6, 0xc, 0xffffffffffffffff}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @ringbuf_query, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x9, 0x5, 0x0, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000440)='syzkaller\x00', 0x40, 0x4f, &(0x7f0000000480)=""/79, 0x41100, 0x38, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x8, 0x8000, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x1, 0x3, 0xd, 0x8}, {0x4, 0x2, 0xc, 0x6}, {0x0, 0x5, 0x1, 0x1}], 0x10, 0x9, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000200)='mem_connect\x00', r3, 0x0, 0xc}, 0x18)
sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) (async)
ftruncate(0xffffffffffffffff, 0xc17a) (async)
socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)) (async)
sendmsg$inet(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) (async)
recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) (async)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x1f, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x6}, [@generic={0x5, 0x8, 0x1, 0x5aa, 0xa226}, @ldst={0x2, 0x3, 0x2, 0xb, 0x6, 0xc, 0xffffffffffffffff}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @ringbuf_query, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x9, 0x5, 0x0, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000440)='syzkaller\x00', 0x40, 0x4f, &(0x7f0000000480)=""/79, 0x41100, 0x38, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x8, 0x8000, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x1, 0x3, 0xd, 0x8}, {0x4, 0x2, 0xc, 0x6}, {0x0, 0x5, 0x1, 0x1}], 0x10, 0x9, @void, @value}, 0x94) (async)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000200)='mem_connect\x00', r3, 0x0, 0xc}, 0x18) (async)
sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) (async)

725.808279ms ago: executing program 4 (id=245):
bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b0000000500ffe5050000100900000001000000147506a56b70e6d0ab7d1212c2189c9384ca9d9cdec916c1c112bc4766480f67b4bb4f89dbb53a4d440fa936cde3fb2b386409ab0c51e57c1ac1ba55946525647133a61fc71a001984ff3dd45cf731", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48)
symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00')
creat(&(0x7f0000000240)='./bus\x00', 0xc2)
io_setup(0x7f, &(0x7f0000000100))
perf_event_open(&(0x7f0000000200)={0x2, 0xa9, 0x3d, 0x1, 0x0, 0x4, 0x0, 0x5, 0x62000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3304d38bcd9160e2, 0x0, 0x0, 0x6, 0x4, 0x3, 0xa, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x2, 0xffffffffffffffff, 0x8)
socket$inet6_tcp(0xa, 0x1, 0x0)
removexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.origin\x00')
syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x414, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000f40)="$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")
creat(&(0x7f0000000040)='./file0\x00', 0xa6)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000006c0f00000a"], 0x48)
bpf$PROG_LOAD(0x5, 0x0, 0x0)
r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r0}, 0x10)
pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0)
dup(r1)

658.62618ms ago: executing program 1 (id=247):
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48)
r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x10)
r1 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0)
sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="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"], 0x2b8}, 0x1, 0x0, 0x0, 0x20000000}, 0x4048010)
r2 = socket$inet_udp(0x2, 0x2, 0x0)
bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x702, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50)
setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4)
bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @local}, 0x10)
connect$inet(r2, &(0x7f0000000480)={0x2, 0x4e20, @multicast2}, 0x10)
sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0)
setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000040)=0xe, 0x36)
setsockopt$inet_int(r2, 0x0, 0x3, &(0x7f0000000180)=0x5, 0x4)
mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1)
mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1)
r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0)
r4 = dup2(r3, r3)
ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x200000a, 0x1, 0x8})
ioctl$BLKTRACESETUP(r3, 0x1276, 0x0)
r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000180000000000000000000000000b6f7e8000000000000"], 0x48)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kfree\x00', r6}, 0x10)
r7 = getpid()
setreuid(0xee00, 0x0)
r8 = syz_pidfd_open(r7, 0x0)
setns(r8, 0x24020000)
syz_clone3(&(0x7f00000008c0)={0x15340180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r7], 0x1}, 0x58)

621.7586ms ago: executing program 4 (id=249):
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x50)
r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000950000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002540)={{r0}, &(0x7f00000024c0), &(0x7f0000002500)}, 0x20) (async)
munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) (async)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
sendto$inet6(r2, &(0x7f0000000500)="a4", 0x34000, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c)

562.603361ms ago: executing program 4 (id=250):
r0 = socket$nl_rdma(0x10, 0x3, 0x14)
r1 = socket$netlink(0x10, 0x3, 0x0)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xafd, 0x0, @perf_bp={0x0, 0x8}, 0x110a, 0x5dd9, 0x0, 0x5, 0xfffffffffffffffd, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
r3 = socket$inet6(0xa, 0x1, 0x0)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x3, 0x0, 0x0, @local, @local, 0x10, 0x7, 0x2, 0x8}})
ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000600)={'syztnl1\x00', 0x0})
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10)
getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, <r4=>0x0}, &(0x7f00000000c0)=0xc)
sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="ff9ecd415a6ad1af155f2fb481280000001800e73e31ccf36f13fc1b0100000000000000", @ANYRES32=r4, @ANYBLOB], 0x28}}, 0x0)
ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000300)={@id={0x2, 0x0, @d}, 0x40, 0x0, '\x00', @b})
open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x14)
capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000040)={0x1000, 0x10ffff, 0xfffffffd})
r5 = socket$nl_route(0x10, 0x3, 0x0)
r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000440)='console\x00', r6, 0x0, 0x4000000001}, 0x18)
sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x600, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x13}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffff}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0)
r7 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8)
setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, 0x8)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
sendmmsg$inet6(r7, &(0x7f0000000480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x80020}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000034c0)='\x00', 0x1}], 0x1}}], 0x1, 0x34000811)
setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="30e01b3981ddca"], 0x1000f)
setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538)
sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="38000000031401002abd7000f6dbdf250900020073397a3100000000080041007369770014003300626f6e6430000000000000000000ff0092adb943d7640118cf1b739925ea34517e9d13f9ef331bb56d14a8c3627f76c69d3c4b1d3b14207056c3a8b0550e6c904319d954141f04a6651dae02bf050efba51af1de0bbbec6cf938ec09a4acdaa1230c4fac2af1a9145c248395bd8601438f43e3afa0f00b50f00dafed5c07f19c088e93bad69c06cb26ff09e92411479de2df"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20000000)
socket$netlink(0x10, 0x3, 0x0)
prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x7, 0x2, 0xa, 0x1}, {0xfeff, 0x5, 0x2, 0x3}, {0x8, 0x7, 0x2, 0x3}, {0x9, 0x9, 0xec, 0x3}, {0xc31, 0x5, 0x8, 0xa}, {0x9, 0x8, 0x4, 0x10001}]})

532.863732ms ago: executing program 1 (id=251):
socket$nl_rdma(0x10, 0x3, 0x14)
socket$netlink(0x10, 0x3, 0x0)
r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xafd, 0x0, @perf_bp={0x0, 0x8}, 0x110a, 0x5dd9, 0x0, 0x5, 0xfffffffffffffffd, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
r1 = socket$inet6(0xa, 0x1, 0x0)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x3, 0x0, 0x0, @local, @local, 0x10, 0x7, 0x2, 0x8}})
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8)
setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, 0x8)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
sendmmsg$inet6(r2, &(0x7f0000000480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x80020}, 0x1c, &(0x7f0000000500)}}], 0x1, 0x34000811)
setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="30e01b3981ddca"], 0x1000f)

488.054502ms ago: executing program 1 (id=252):
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8)
r0 = getpid()
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
syz_open_dev$usbfs(&(0x7f0000000040), 0x3, 0x100)
connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e)
ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, <r3=>r2}, './file0\x00'})
bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], ""/16, <r4=>0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0], 0x0, 0xd7, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x6f, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10)
bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r3, r4, 0x25, 0x14, @void}, 0x10)
sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0)
r5 = socket$nl_generic(0x10, 0x3, 0x10)
r6 = socket$netlink(0x10, 0x3, 0xf)
bind$netlink(r6, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc)
r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001440), 0xffffffffffffffff)
sendmsg$ETHTOOL_MSG_COALESCE_SET(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001500)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000400000000000ce0171e21baaafdf0014000000180001801400020073797a5f74756e000000000000000000"], 0x34}}, 0x0)
r8 = socket$inet_sctp(0x2, 0x1, 0x84)
setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000001c0)={0x8, 0x0, 0x0, 0xa}, 0x10)
bind$inet(r8, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10)
setsockopt$inet_sctp_SCTP_INITMSG(r8, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x3}, 0x8)
sendto$inet(r8, &(0x7f0000000300)="ab", 0x1a000, 0x0, &(0x7f0000000380)={0x2, 0x4e22, @local}, 0x10)
recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000bc0)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10)
unshare(0x62040200)
recvmsg$inet_nvme(r3, &(0x7f0000000b80)={&(0x7f0000000600)=@ax25={{0x3, @netrom}, [@null, @remote, @remote, @netrom, @netrom, @remote, @netrom, @bcast]}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000740)=""/90, 0x5a}, {&(0x7f00000007c0)=""/23, 0x17}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/87, 0x57}, {&(0x7f00000008c0)=""/4, 0x4}, {&(0x7f0000000900)=""/198, 0xc6}, {&(0x7f0000000a00)=""/181, 0xb5}], 0x7, &(0x7f0000000b40)=""/37, 0x25}, 0x10191)

407.932823ms ago: executing program 0 (id=254):
syz_open_dev$rtc(&(0x7f0000000140), 0x0, 0x0)
openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x2, 0x800800000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xff7b, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0)

407.216844ms ago: executing program 0 (id=255):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x3, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=<r1=>r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10)
socket$nl_xfrm(0x10, 0x3, 0x6)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="1800000000008000000000000000000018110000", @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r0}, 0x4)
r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x0}, @generic={0x66}, @initr0, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)

406.437644ms ago: executing program 0 (id=256):
r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x0}, @generic={0x66}, @initr0, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (fail_nth: 2)

405.936474ms ago: executing program 1 (id=257):
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8)
r0 = getpid()
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e)
sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0)
recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x48)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
unshare(0x62040200)

347.297085ms ago: executing program 0 (id=258):
r0 = socket$nl_generic(0x10, 0x3, 0x10)
r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0)
sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x38, r1, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffffffff}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x44000}, 0x44004)
syz_emit_ethernet(0x86, &(0x7f00000010c0)={@broadcast, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @local}, @redirect={0x3, 0x4, 0x0, @broadcast=0x1000000, {0x17, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty, {[@timestamp_addr={0x44, 0xc, 0x0, 0x1, 0x0, [{@remote, 0x6e210000}]}, @timestamp_addr={0x44, 0x3c, 0x0, 0x1, 0x2, [{@multicast1}, {@broadcast}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@private=0xa010101}, {@empty}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@dev}]}]}}}}}}}, 0x0)

346.973875ms ago: executing program 0 (id=259):
ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)='1\a')
r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000020000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10)
r1 = memfd_create(&(0x7f0000000400)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xa4(Q\x80Fy\xb5\xe4q\xc9\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f\x1f\xc2e/\x8d\x1e\n\xd0_\xbd!^\xa46\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88y\xebX\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a', 0x1)
r2 = socket$inet_sctp(0x2, 0x5, 0x84)
setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x84, @private=0xa010100, 0x15, 0x3, 'none\x00', 0x1, 0x4, 0x75}, 0x2c)
setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @broadcast, 0x4e21, 0x3, 'lc\x00', 0xb, 0x323b, 0x25}, {@rand_addr=0x64010102, 0x4e23, 0x4, 0xc3, 0x12d5c, 0x12d5c}}, 0x44)
r3 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0xa00040, &(0x7f0000000000)={[{@bsdgroups}, {@grpid}, {@usrquota}]}, 0x1, 0x5b2, &(0x7f00000037c0)="$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")
r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x126)
name_to_handle_at(r3, &(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000340), 0x1000)
pwrite64(r4, &(0x7f0000000140)='2', 0xfdef, 0xfecc)
write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300b300000000002a002400b3d7c52ebf31a8d5c8c3c6cb00000009e500d5ffffff05ffffff03"], 0xd8)
execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000)

346.771105ms ago: executing program 0 (id=260):
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8)
r0 = getpid()
connect$inet(0xffffffffffffffff, 0x0, 0x0)
sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7)
mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0)
socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e)
sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0)
recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0)
bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10)
unshare(0x62040200)

284.681886ms ago: executing program 2 (id=261):
r0 = socket$inet_sctp(0x2, 0x1, 0x84)
getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={<r1=>0x0, 0xe5af, 0x30}, &(0x7f0000000040)=0xc)
getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={<r2=>r1, 0x4, 0x9, 0x8}, &(0x7f00000000c0)=0x10)
getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={<r3=>r2, 0x2}, &(0x7f0000000140)=0x8)
setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r3, 0x400, 0x3, 0x0, 0x7f, 0x1000}, 0x14)
getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r2, 0x4}, &(0x7f0000000200)=0x8)
mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0)
r4 = gettid()
r5 = perf_event_open$cgroup(&(0x7f0000000380)={0x2, 0x80, 0x7f, 0x7, 0x6, 0x2, 0x0, 0x3, 0x40000, 0x7, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x8, 0xdd64}, 0x0, 0x8, 0xa0, 0x52554c061e4cab8e, 0x8, 0x1, 0x200, 0x0, 0xfffffffb, 0x0, 0x80000001}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8)
perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0xc, 0x6, 0x3, 0xe, 0x0, 0xa, 0x100, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x100000001, 0x9}, 0x101000, 0x2, 0xfff, 0x0, 0x80, 0x10, 0x2, 0x0, 0xf35d, 0x0, 0x3}, r4, 0x3, r5, 0x2)
bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@generic={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x18)
r6 = socket$inet6_sctp(0xa, 0x6, 0x84)
getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000480)={r1, @in={{0x2, 0x4e22, @rand_addr=0x64010101}}}, &(0x7f0000000540)=0x84)
pipe(&(0x7f0000000580)={<r7=>0xffffffffffffffff, <r8=>0xffffffffffffffff})
sendmsg$NFT_BATCH(r8, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_NEWOBJ={0x48, 0x12, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x6}, @NFT_OBJECT_CT_HELPER=@NFTA_OBJ_DATA={0x34, 0x4, 0x0, 0x1, [@NFTA_CT_HELPER_L4PROTO={0x5, 0x3, 0x11}, @NFTA_CT_HELPER_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_CT_HELPER_L4PROTO={0x5, 0x3, 0x11}, @NFTA_CT_HELPER_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_CT_HELPER_L4PROTO={0x5, 0x3, 0x6}]}}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x5}}}, 0x70}, 0x1, 0x0, 0x0, 0x90}, 0x4c004)
unlink(&(0x7f0000000700)='./file0\x00')
prctl$PR_SET_NAME(0xf, &(0x7f0000000740)='\\-*\x00')
sigaltstack(&(0x7f0000000840)={&(0x7f0000000780)=""/137, 0x7, 0x89}, &(0x7f0000000900)={&(0x7f0000000880)=""/80, 0x0, 0x50})
r9 = add_key$keyring(&(0x7f00000009c0), &(0x7f0000000a00)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa)
add_key$keyring(&(0x7f0000000940), &(0x7f0000000980)={'syz', 0x1}, 0x0, 0x0, r9)
mount$bind(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0), 0x0, 0x0)
writev(r0, &(0x7f0000000b80)=[{&(0x7f0000000b00)="42bda064ff4dda006c93389c5f45a30e5b4e124d0352c07c50791d54de0fe8af6c3d2ed49c498133c81c7ff01e480380ce5b353dbf5141bef4067ba82d", 0x3d}, {&(0x7f0000000b40)="fe8288", 0x3}], 0x2)
prctl$PR_SET_NAME(0xf, &(0x7f0000000bc0)='pipefs\x00')
r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c80)=@o_path={&(0x7f0000000c40)='./file0\x00', 0x0, 0x8, r8}, 0x18)
bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d00)={{r7}, &(0x7f0000000c00), &(0x7f0000000cc0)=r10}, 0x20)
sendmmsg(r8, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000d40)="fae500f87cc6abe809a9e1b077", 0xd}], 0x1, &(0x7f0000000dc0)=[{0xb0, 0x112, 0x800, "1ca3a72b43706add67a4ad74bebec8602b72a451a77fac640c7b81929d4a1c4f1f60525c4c7b4f101648e5138e13bb3bde49926545f38035bb006dea812b25ce152754774a3f10ffd9e2758a0680ffdc9215591b8e8bf4c23eec745cfc028dcf5ad2267d3ebe61ef518e263c2f7ffab7573df37a2d7f5eba0d2151bd0ce011d5b05ea5bbc04b7a782ea6ccc83bf8176689ba65a12223b951018a"}, {0xf8, 0x84, 0x6, "69bdb968bfc9c004bb0608c6e55a33ab0f7b64eed4e81d67b5a8b0360057dfb26e6635f56a8c854eedbcf7246e24959ce416f9e11fe187740117a682649320063c04734e1b87cd8820a6dfef108b1dbc22288699ca49999de9ea9a11205bc6b703cdbe4849418239e9db7e170dc046cd411ee7d3a9fa93a1fd6795ee7c0f43f1e5f54aa7f6aecfc5a2cd2bec47b57349007d207190781ad57dc6e05961ac77f9ff59549097198d0266120f8225a7a357ebf24a31cedaac0b1fd67e702d6a42bb46d483bbc5bada826c166a0ae8d6cb123036598f36d22fe841b536a860f74aecb0"}], 0x1a8}}], 0x1, 0x40080)
setxattr$security_ima(&(0x7f0000000fc0)='\x00', &(0x7f0000001000), &(0x7f0000001040)=@v1={0x2, "6b4a0a13c9b7008742f59c50"}, 0xd, 0x3)
bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001100)={0x1, 0x58, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r11=>0x0}}, 0x10)
bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80000001, '\x00', r11, r7, 0x3, 0x5, 0x1, 0x0, @void, @value, @void, @value}, 0x50)
sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f00000011c0), 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x14, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x40c0)

222.247946ms ago: executing program 2 (id=262):
socket$nl_rdma(0x10, 0x3, 0x14)
socket$netlink(0x10, 0x3, 0x0)
r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48)
bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4)
bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xafd, 0x0, @perf_bp={0x0, 0x8}, 0x110a, 0x5dd9, 0x0, 0x5, 0xfffffffffffffffd, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8)
r1 = socket$inet6(0xa, 0x1, 0x0)
ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x3, 0x0, 0x0, @local, @local, 0x10, 0x7, 0x2, 0x8}})
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78)
r2 = socket$inet6_sctp(0xa, 0x1, 0x84)
setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8)
setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, 0x8)
setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c)
sendmmsg$inet6(r2, &(0x7f0000000480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x80020}, 0x1c, &(0x7f0000000500)=[{0x0}], 0x1}}], 0x1, 0x34000811)
setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="30e01b3981ddca"], 0x1000f)

143.240388ms ago: executing program 2 (id=263):
r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000080000000000000000009500000025f05888"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x400}, 0x18)
r1 = socket$tipc(0x1e, 0x5, 0x0)
r2 = socket$inet6(0xa, 0x2, 0x3a)
sendto$inet6(r2, &(0x7f0000000000)="800037bbfa9ba1ce", 0x8, 0x0, &(0x7f0000001100)={0xa, 0x0, 0x1000, @dev={0xfe, 0x80, '\x00', 0xc}}, 0x1c)
recvfrom$inet6(r2, 0x0, 0x0, 0x20, 0x0, 0x0)
setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10)
r3 = socket$tipc(0x1e, 0x2, 0x0)
r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90)
r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10)
setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10)
close(r1)

137.248098ms ago: executing program 2 (id=264):
socket$l2tp6(0xa, 0x2, 0x73)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x88040, 0x0)
fcntl$setlease(r0, 0x400, 0x0)
r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0)
fcntl$setlease(r1, 0x400, 0x0)
syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00')
syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x40, &(0x7f0000000340), 0x1, 0x573, &(0x7f0000000ec0)="$eJzs3T1sG+UbAPDnzvG/X/mTIoEEqEMFSEWq6iT9gMLUrohKlTogsUDkuFEVJ47iBJooQ7pXiA4IUJeywcAIYmBALIysLCBmpIpGIDUdwMhfaZo4wSl1XHK/n3T2vfee/bzvnZ/XvtOdHEBmHa0/pBHPRsTFJGJoXd1AtCqPNtdbXVkq3ltZKiZRq136LYkkIu6uLBXb6yet50MRsRwRz0TEd/mI4+nmuNWFxcmxcrk02yoPz03NDFcXFk9cmRqbKE2Upk+98uqZs6fPjJ4cXf+ye7X1pfzO+nr95xvvX//h9Vs3Pv/iyHLxw7EkzsVgq259Px6l5jbJx7kNy0/3IlgfJf1uAA8l18rzeio9HUORa2V9J7WhXW0a0GO1fRE1IKMS+Q8Z1f4dUD/+bU+7+fvj9vnmAUg97mpratYMNM9NxP7GscnB35MHjkzqx5uHd7Oh7EnL1yJiZGBg8+c/aX3+Ht7Io2ggPfXt+eaO2rz/07XxJzqMP4Ptc6f/Unv8W900/t2Pn9ti/LvYZYw/3/rlky3jX4t4rmP8ZC1+0iF+GhHvdBn/5ptfn92qrvZpxLHoHL8t2f788PDlK+XSSPOxY4xvjh15bbv+H9wifvOc7f7G10yn7T/TZf+/+v7L55e3if/SC9vv/07b/0BEfNBl/CfvfvbGVnW3ryV36r8Cdrr/68tudRn/5XNHf+pyVQAAAAAAAAAAYAfSxrVsSVpYm0/TQqF5D+9TcTAtV6pzxy9X5qfHm9e8HY582r7SaqhZTurl0db1uO3yyQ3lU7lWwNyBRrlQrJTH+9x3AAAAAAAAAAAAAAAAAAAAeFwc2nD//x+5xv3/G/+uGtirtv7Lb2Cvk/+QXQ/mf9K3dgC7z/c/ZFZN/kN2yX/ILvkP2SX/IbvkP2SX/Ifskv8AAAAAAAAAAAAAAAAAAAAAAAAAANATFy9cqE+1eytLxXp5fGBhfrLy7onxUnWyMDVfLBQrszOFiUplolwqFCtT//R+SaUyMxLT81eH50rVueHqwuLbU5X56fZ/ipbyPe8RAAAAAAAAAAAAAAAAAAAA/PcMNqYkLURE2phP00Ih4v8RcTjyyeUr5dJIRDwRET/m8vvq5dF+NxoAAAAAAAAAAAAAAAAAAAD2mOrC4uRYuVyazcjMwE5WjojlR9uM+jvu+FX51r56XLahmSzM9HlgAgAAAAAAAAAAAAAAAACADLp/02+3r/irtw0CAAAAAAAAAAAAAAAAAACATEp/TSKiPh0benFwY+3/ktVc4zki3rt56aOrY3Nzs6P15XfWls993Fp+sh/tB7rVztN2HgMAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD3VRcWJ8fK5dJsD2f63UcAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACAh/F3AAAA///pCdd8")
r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x141042, 0x0)
pwritev2(r2, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0x8800000, 0x0, 0x0)
socket$packet(0x11, 0x3, 0x300)
bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50)
r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0)
ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0xc0a85320, &(0x7f0000000480)={{0x80, 0x3}, 'port0\x00', 0xa5, 0x0, 0x6, 0x67, 0x0, 0x3, 0x0, 0x0, 0x0, 0xc})
socket$packet(0x11, 0x1, 0x300)
prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]})
r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48)
bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0)
fcntl$setlease(r5, 0x400, 0x0)
unlinkat(0xffffffffffffff9c, &(0x7f0000000c40)='./file1\x00', 0x0)

107.492568ms ago: executing program 3 (id=265):
r0 = socket$l2tp(0x2, 0x2, 0x73)
r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50)
r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10)
r3 = socket$nl_netfilter(0x10, 0x3, 0xc)
sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000020000000900010073797a300000000048000000030a01010000000000000000020000000900010073797a30000000000900030057797a3200000000080007006e617400140004800800024000000000080001400000000414"], 0xa4}}, 0x0)
bind$l2tp(r0, 0x0, 0x0)
r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0)
fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f00000003c0)={0x2, 0x4, 0x2, 0x7})
r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='\v\x00\x00\x00\b\x00\x00\x00\f'], 0x48)
r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000b40)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r6}, 0x10)
r7 = io_uring_setup(0x77f7, &(0x7f00000006c0)={0x0, 0xcddc, 0x400, 0x0, 0x7fd, 0x0, r4})
io_uring_register$IORING_REGISTER_BUFFERS(r7, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a)
writev(r4, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}], 0x1)
r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x20, 0x10, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x58db4c0f20c06932, '\x00', 0x0, @fallback, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r9 = socket(0x2, 0x80805, 0x0)
r10 = socket$inet(0x2, 0x80001, 0x84)
getsockopt$inet_sctp_SCTP_MAX_BURST(r10, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r11=>0x0}, &(0x7f0000000040)=0x8)
getsockopt$inet_sctp6_SCTP_RTOINFO(r9, 0x84, 0x0, &(0x7f00000001c0)={r11, 0x641516c6, 0x8, 0xfffffffc}, &(0x7f0000000240)=0x10)
getsockopt$inet_sctp_SCTP_RTOINFO(r8, 0x84, 0x0, &(0x7f0000000080)={r11, 0x3579, 0x6, 0xfff}, &(0x7f00000000c0)=0x10)
socket$inet6(0xa, 0x1, 0x0)
bpf$MAP_CREATE(0x0, 0x0, 0x50)
r12 = socket$netlink(0x10, 0x3, 0x0)
bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94)
syz_open_dev$tty20(0xc, 0x4, 0x0)
r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fe4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48)
r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000008001000000000000000000a652330f73d00f41b66cd3c318110000558494d620ddf36e9e651c70841a52bae9e2d513473b90f45b93e9a8fe6eeed44d138f0fcf82d58a9df15c33752ebcc12edced0c9f18efd020d8bc07ed379382099f1a0fa742eeafddad24e31c2726d1ca7cda1a7cbee75f9151ef21e9aa189fd995aee10ebd4ba2f7c7403e2edadaed09680e33841fa71989edd63536b38edc69db6f3d9718a9a145ee2fd410d30446066c94ec882ae2732d99f5994fdf193c78bf68624b847019d19b83401829fd8865d0cb36976633ee44d6fd909fb4", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000009c0)='kfree\x00', r14}, 0x10)
sendmsg$nl_route_sched(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x4000c00)

46.961089ms ago: executing program 3 (id=266):
openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0)
close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2)
perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x2, 0x800800000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xff7b, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9)
ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0)

46.335489ms ago: executing program 3 (id=267):
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0xf}, 0x0)
getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, 0x0, 0x0)
r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48)
pipe(&(0x7f0000000880)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff})
r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRESHEX=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x3c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94)
r4 = socket$nl_route(0x10, 0x3, 0x0)
r5 = socket(0x10, 0x3, 0x0)
r6 = socket$nl_route(0x10, 0x3, 0x0)
r7 = socket(0x3, 0xa, 0x65)
syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r7)
getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, <r8=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14)
sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x24, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYRESDEC=r5, @ANYRES32=r8], 0x3c}}, 0x0)
sendmsg$nl_route_sched(r5, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001240)=@newqdisc={0x2c, 0x24, 0x5820a61ca228651, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r8, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0)
sendmsg$nl_route_sched(r4, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001380)=@newtfilter={0x38, 0x28, 0xd27, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, r8, {0x3}, {0xffff, 0xffe0}, {0x0, 0xb}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_CLASSID={0x8, 0x1, {0xa, 0x2}}]}}]}, 0x38}}, 0x10)
mkdir(&(0x7f0000000180)='./file0\x00', 0x0)
mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0)
chdir(&(0x7f0000000240)='./file0\x00')
mkdir(&(0x7f0000000000)='./control\x00', 0x0)
open$dir(&(0x7f00000002c0)='./control/file0\x00', 0x80040, 0x0)
r9 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0)
mkdirat(r9, &(0x7f0000000100)='./control\x00', 0x0)
getdents64(r9, &(0x7f0000fc4fbe)=""/80, 0x50)
unlink(&(0x7f00000001c0)='./control/file0\x00')
unlinkat(r9, &(0x7f0000000140)='./control\x00', 0x200)
rmdir(&(0x7f0000000040)='./control\x00')
bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="8e09313f083288dc6ce9b1befa8ef053ae394630168ed7440167f7677b078b6566ba5779616a1ec57d05b0e843e8380f766e2ed5ccf70d44d03d997bcea9b37a0139bdd0e43debf52736adf710b51868800fb8e900975e051b29add087654ab8b85865c8023bea629ed96535f766e603d0ba12c93017d1cb286d8365457b12fb6edf10ccafa884631879e8615b0db7dfd5257cccf0e33932a94180c716ce27f27484b9fb73fbd107dffc72cf85d72af88a9cf311374031ec20c3d70fa2255ce9ce1db3e6c8bd5d604d5b1a44", @ANYBLOB="000100"/20, @ANYRES32=r8, @ANYRES32=r2, @ANYBLOB="0300000004000000050000000f00000000000000", @ANYRES32=r1, @ANYBLOB="0000800135bd0bc78411b92295f45cebb1cf1af1f1a9"], 0x50)
bind$inet(r1, &(0x7f00000018c0)={0x2, 0x4e22, @empty}, 0x10)
bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r3, 0x0, 0xffff}, 0x18)
writev(0xffffffffffffffff, &(0x7f0000000b80)=[{&(0x7f0000000840)="a9", 0x1}], 0x1)
socket$inet6_sctp(0xa, 0x1, 0x84)

44.446869ms ago: executing program 3 (id=268):
prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0)
getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x8, 0x0, 0x0)
sched_setscheduler(0x0, 0x2, &(0x7f0000001700)=0x4)
syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000940)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@noquota}, {@abort}, {@noload}, {@nodiscard}]}, 0x64, 0x50a, &(0x7f0000000200)="$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")

26.29669ms ago: executing program 3 (id=269):
r0 = socket$inet(0x2, 0x2, 0x1)
sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="96bc1480bb58", 0x6}], 0x2, &(0x7f0000000780)=[@ip_tos_u8={{0x11, 0x0, 0x7}}], 0x18}, 0x0)

0s ago: executing program 3 (id=270):
syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x2000046, &(0x7f0000000cc0)={[{@nombcache}, {@oldalloc}, {@inlinecrypt}, {@delalloc}, {@noload}, {@delalloc}, {@noload}, {@resuid}, {@lazytime}]}, 0x3, 0x4ea, &(0x7f00000006c0)="$eJzs3UtvG1sdAPD/OPa9yW3AuYVFqURb+lCKoE7S9BGxKK3EY1UJUfZpSJwoihNXidM2UQXuJwChCpBYsWKDxAdAQv0ICKkS7FiwAlWQ0gUbZDR+tI1jh+TWjdvk95NO58w59fz/x4/xnJlRHMCRdSYibkbEQERciIh8sz3TLFFtlPT/vdh6NJuWJGq1O/9MImm2tW/zWPNhqe9/N+KHyc64axubSzOlUnF1e/PmpcXlmYXiQnFlcnLi2tT1qatT43scSZLdrXc4Im586+XPf/Kb79z4w9cf/G36Hxd/lKZ1t9nfaRy90Bh6LgZbDdV3EaV/0vdNtj5CAAA+BOcj4nhEnI2Ir0Y+BmLXw2gAAADgA1T75vDHrSoAAABwOGXq98YmmULzft/hyGQKhcY9vF+MTzKl8lrla/Pl9ZW5xj20I5HLzC+WiuPNe4VHIpek6xP1+uv1y23rkxHxaUQ8yQ+l6/U+AAAA4GAca5v/v8w35v8AAADAIeNiPAAAABx+5v8AAABw+Jn/AwAAwKH2vdu301J7sfWo/jsAc/c31pfK9y/NFdeWCsvrs4XZ8uq9wkK5vFAqFgb+//ZK5fK9K7Gy/nCskl2rjK1tbE4vl9dXKtP13/WeLh4/gDEBAAAA2316+ulfkoiofmOoXlIfNftyfc0MeI8k2baGu1/pUyZAT+zhlP52Z9bfTSLAgWv/TgeODnN8IGlvaDswGOx2qPDH/cdyzAEAAP0x+iXX/+GoyvQ7AaBvftrvBIC+cS4ejq7c/u8ABA6ZHdf/2wx269jz9f9abV8JAQAAPTfcWFSjeS1wODKZQuHVZcFkfrFUHI+Iz0fEn/O5j9P1iT7mCwAAAAAAAAAAAAAAAAAAAAAAAAAfolotiRoAAABwqEVk/p40f/9rNH9+uP38wEfJf/L1ZUQ8+NWdXzycqVRWJ9L2f71qr/yy2X65H2cwAAAA4CjK7drbmqe35vEAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0Esvth7NtspBxn1+K4ZipFP8bAzWl4ORi4hP/p1E9o3HJREx0IP41ccRcaJT/CRNK0aaWbTHz0TEUJ/jH+tBfDjKnt6KiJudPn+ZOFNfdv78ZZvlbT2/Vf+Qd4zf2v8NdNn/fW6PMU4++91Y1/iPI05mO+9/WvGTLvHP7TH+3R9sbnbrq/06YrTj90+yLdZYZfne2NrG5qXF5ZmF4kJxZXJy4trU9amrU+Nj84ulYvPfjjF+9uXfV590HX+mvnwzfmucI40Mf9xt/Of3OP7/Pnu49YVGNbczfsTFc51f/xP1ZefnP31PXGh+D6T9o616tVF/06nf/ulUt9zS+HNdnv/G65+vdRv/xb0Nf8eYAYD+WtvYXJoplYqrB1A5e6V3G0wOKGeVLpXB9yONg658+6230zocfpvt/LVn40rnDJ27+rxjAgAAeu71QX+/MwEAAAAAAAAAAAAAAAAAAICj6zP98bDT+3tUe8xqf4YKAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAALCr/wUAAP//GpnIcw==") (async, rerun: 64)
r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) (async, rerun: 64)
r1 = socket$nl_generic(0x10, 0x3, 0x10)
r2 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32)
r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) (async, rerun: 32)
r4 = socket$nl_generic(0x10, 0x3, 0x10)
sendmsg$NL80211_CMD_SET_TID_CONFIG(r4, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001180)={0x38, r3, 0x10ada85e65c25359, 0xfffffffd, 0x8000000, {{0x6b}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x72}}}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}]}]}]}, 0x38}}, 0x0)
pipe(&(0x7f0000000000)={0xffffffffffffffff, <r5=>0xffffffffffffffff}) (async)
r6 = socket$nl_generic(0x10, 0x3, 0x10) (async)
r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff)
sendmsg$NL80211_CMD_SET_TID_CONFIG(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="8b3326bd70000000000005"], 0x20}, 0x1, 0x0, 0x0, 0x24000001}, 0x0)
r8 = socket$nl_route(0x10, 0x3, 0x0)
r9 = socket$nl_generic(0x10, 0x3, 0x10)
r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r9)
sendmsg$NL80211_CMD_GET_WIPHY(r9, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)={0x28, r10, 0x301, 0x0, 0x25dfdbfe, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0x2, 0x3}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x88d1}, 0x40) (async)
ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', <r11=>0x0})
sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r10, 0x2, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0x1, 0x5c}}}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20020884}, 0x40)
sendmsg$NL80211_CMD_TDLS_MGMT(r5, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f0000000a40)={0x1a8, r7, 0x805, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x7d}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x62}, @NL80211_ATTR_IE={0xd5, 0x2a, [@peer_mgmt={0x75, 0x6, {0x0, 0x3ff, @void, @val=0x2e, @void}}, @rann={0x7e, 0x15, {{0x0, 0x1}, 0x27, 0xc, @device_b, 0x2, 0x9, 0x80000001}}, @chsw_timing={0x68, 0x4, {0x8, 0x84b3}}, @fast_bss_trans={0x37, 0xaa, {0x1, 0x4, "b562cf8f92c6a2c99fc710696074a5f3", "67c359b615787cedbc6bff57165222bedaafcd0ddcfe37e19997205655438aa7", "d942ec90f883d93abbe7487f966ee175dac90b4ef2aba313aaf89bf07929709b", [{0x2, 0x1a, "1cc99ce915c6bea95f853fd25b8594b0d9db9e28a104d344bd10"}, {0x4, 0x21, "4d8e05843bb973aed6468f969f896f58c11bbed713ff52a2f9e4a4cdde94c31d32"}, {0x1, 0xa, "2fee39128b19beef6a4c"}, {0x4, 0xb, "67b8e28db73cd101afb988"}]}}]}, @NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x73}, @NL80211_ATTR_TDLS_INITIATOR={0x4}, @NL80211_ATTR_IE={0x89, 0x2a, [@measure_req={0x26, 0x5e, {0x3, 0xf8, 0x0, "4dbc3adcfc2ec93540bfdd28bd42da242bc7a08fc51272a571749e082d747ec6ea662b844f18548a2348cf0aded3b5e5a883844659b53b20accc5394408199cf17b5bec525112b3e9c87fa66d07b3c34ac5e0265c7713848cba2a1"}}, @cf={0x4, 0x6, {0x1, 0x7, 0x5, 0xfff7}}, @dsss={0x3, 0x1, 0x9d}, @mic={0x8c, 0x18, {0xe0f, "b25be59aabfd", @long="94f0e7bfab483bbb827a649b0ed50522"}}]}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x50}, 0x20000800) (async, rerun: 64)
sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r2, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f00000007c0)={0x280, r3, 0x400, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0x0, 0x41}}}}, [@NL80211_ATTR_IE={0x1c7, 0x2a, [@preq={0x82, 0x62, {{0x0, 0x0, 0x1, 0x0, 0x1}, 0x23, 0x4, 0x9e33, @broadcast, 0x8, @value=@broadcast, 0xf908, 0x9, 0x6, [{{0x1}, @device_b, 0x7}, {{0x1}, @broadcast, 0x3}, {{}, @device_a, 0x50}, {{0x1, 0x0, 0x1}, @device_a, 0x9}, {{}, @broadcast, 0x3}, {{0x0, 0x0, 0x1}, @device_a, 0xea}]}}, @peer_mgmt={0x75, 0x4, {0x1, 0x1, @void, @void, @void}}, @tim={0x5, 0x8d, {0x6, 0xa2, 0x2, "d830294eaf359121fb6a65fc326336f4fe1ece92ed6310fcd38b6bf36bb14d6a49ae1a0eec0dabfc2a4105bf01364c21f1705845f60de6ab44cc3d1f56f7981e6972d4d626af41aff800e09c48a645a5bb0e2cf4ff671043b933c360bd86dd73f00a629f9526cb94db744b48c91aa7359bd283004385f5d226e378d4312bc96985f4236047b27e158863"}}, @prep={0x83, 0x1f, {{}, 0xf, 0x40, @device_b, 0x100, @void, 0x2, 0x4e, @device_b, 0x2}}, @random_vendor={0xdd, 0x41, "b2bd70659dc5feee5265fc4bb66244f96b231ca9c119a8dd21de2f1864234a559a9c09cc3dec9295572dfead33be074b86edd078fc334d534f72eedd2b105da03f"}, @preq={0x82, 0x5c, {{0x1, 0x1, 0x1}, 0x1, 0x2, 0x0, @device_b, 0x4, @void, 0x40000000, 0x1, 0x6, [{{0x1, 0x0, 0x1}, @broadcast, 0x7fff}, {{0x1, 0x0, 0x1}, @device_b, 0xae4d}, {{0x0, 0x0, 0x1}, @device_a, 0x1}, {{0x1, 0x0, 0x1}, @broadcast, 0x7}, {{0x1}, @broadcast, 0x4}, {{}, @device_b, 0x43}]}}, @mesh_id={0x72, 0x6}]}, @NL80211_ATTR_IE={0x8e, 0x2a, [@random_vendor={0xdd, 0x7f, "b9d3b96bd8dbc0647acd6cd50b7aa3fe4ec0180788ab7c00302a7273fa209b178e9de634dab1ac1b3f289729d14365860501158cb2b2f2c2576b52a33d7d22ed63502871380d67895cced136db5263279a5c9bec3b72699083c2ae2515f896690136a7688b22928d829b5cfd17fcb6d1c8a49550e9232105f216ca0e495941"}, @erp={0x2a, 0x1, {0x0, 0x1}}, @ext_channel_switch={0x3c, 0x4, {0x1, 0xd9, 0xaf, 0x1}}]}]}, 0x280}, 0x1, 0x0, 0x0, 0x8000}, 0x44000) (async, rerun: 64)
sendmsg$NL80211_CMD_SET_MAC_ACL(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x1, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8, 0x3, r11}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x810) (async)
sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x48, r0, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0x8000, 0x6a}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x2a}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4000)
r12 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0)
ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r12, 0x8004587d, &(0x7f0000000080)={@desc={0x1, 0x0, @desc2}}) (async, rerun: 32)
ioctl$VT_RELDISP(r12, 0x5605) (async, rerun: 32)
open$dir(&(0x7f0000000100)='./file1\x00', 0x2000, 0x40)
ioctl$SNDRV_TIMER_IOCTL_PARAMS(r12, 0x40505412, &(0x7f0000000000)={0x3, 0xf77, 0x9, 0x0, 0xe})

kernel console output (not intermixed with test programs):

[   20.598551][   T29] audit: type=1400 audit(1743527460.041:81): avc:  denied  { read } for  pid=2987 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1
Warning: Permanently added '10.128.10.53' (ED25519) to the list of known hosts.
[   26.560704][   T29] audit: type=1400 audit(1743527466.001:82): avc:  denied  { mounton } for  pid=3292 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1
[   26.561629][ T3292] cgroup: Unknown subsys name 'net'
[   26.583468][   T29] audit: type=1400 audit(1743527466.001:83): avc:  denied  { mount } for  pid=3292 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   26.610821][   T29] audit: type=1400 audit(1743527466.031:84): avc:  denied  { unmount } for  pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1
[   26.746054][ T3292] cgroup: Unknown subsys name 'cpuset'
[   26.752125][ T3292] cgroup: Unknown subsys name 'rlimit'
[   26.892746][   T29] audit: type=1400 audit(1743527466.331:85): avc:  denied  { setattr } for  pid=3292 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1
[   26.916012][   T29] audit: type=1400 audit(1743527466.331:86): avc:  denied  { create } for  pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[   26.936560][   T29] audit: type=1400 audit(1743527466.331:87): avc:  denied  { write } for  pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[   26.957040][   T29] audit: type=1400 audit(1743527466.331:88): avc:  denied  { read } for  pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1
[   26.963957][ T3296] SELinux:  Context root:object_r:swapfile_t is not valid (left unmapped).
[   26.977355][   T29] audit: type=1400 audit(1743527466.331:89): avc:  denied  { mounton } for  pid=3292 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1
[   27.010874][   T29] audit: type=1400 audit(1743527466.331:90): avc:  denied  { mount } for  pid=3292 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1
Setting up swapspace version 1, size = 127995904 bytes
[   27.034220][   T29] audit: type=1400 audit(1743527466.431:91): avc:  denied  { relabelto } for  pid=3296 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t"
[   27.063300][ T3292] Adding 124996k swap on ./swap-file.  Priority:0 extents:1 across:124996k 
[   28.239014][ T3306] chnl_net:caif_netlink_parms(): no params data found
[   28.251272][ T3312] chnl_net:caif_netlink_parms(): no params data found
[   28.276872][ T3302] chnl_net:caif_netlink_parms(): no params data found
[   28.303999][ T3310] chnl_net:caif_netlink_parms(): no params data found
[   28.389202][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state
[   28.396290][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state
[   28.403463][ T3306] bridge_slave_0: entered allmulticast mode
[   28.409925][ T3306] bridge_slave_0: entered promiscuous mode
[   28.445698][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state
[   28.452754][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state
[   28.459861][ T3306] bridge_slave_1: entered allmulticast mode
[   28.466204][ T3306] bridge_slave_1: entered promiscuous mode
[   28.481741][ T3307] chnl_net:caif_netlink_parms(): no params data found
[   28.490258][ T3302] bridge0: port 1(bridge_slave_0) entered blocking state
[   28.497381][ T3302] bridge0: port 1(bridge_slave_0) entered disabled state
[   28.504477][ T3302] bridge_slave_0: entered allmulticast mode
[   28.510916][ T3302] bridge_slave_0: entered promiscuous mode
[   28.526616][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state
[   28.533677][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state
[   28.540966][ T3312] bridge_slave_0: entered allmulticast mode
[   28.547307][ T3312] bridge_slave_0: entered promiscuous mode
[   28.556579][ T3302] bridge0: port 2(bridge_slave_1) entered blocking state
[   28.563633][ T3302] bridge0: port 2(bridge_slave_1) entered disabled state
[   28.570801][ T3302] bridge_slave_1: entered allmulticast mode
[   28.577221][ T3302] bridge_slave_1: entered promiscuous mode
[   28.588098][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state
[   28.595157][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state
[   28.602304][ T3310] bridge_slave_0: entered allmulticast mode
[   28.608811][ T3310] bridge_slave_0: entered promiscuous mode
[   28.615202][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state
[   28.622286][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state
[   28.629451][ T3312] bridge_slave_1: entered allmulticast mode
[   28.635827][ T3312] bridge_slave_1: entered promiscuous mode
[   28.653941][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   28.667914][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state
[   28.674965][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state
[   28.682120][ T3310] bridge_slave_1: entered allmulticast mode
[   28.688421][ T3310] bridge_slave_1: entered promiscuous mode
[   28.704741][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   28.714784][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   28.731510][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   28.741418][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   28.764668][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   28.783496][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   28.810112][ T3302] team0: Port device team_slave_0 added
[   28.816466][ T3306] team0: Port device team_slave_0 added
[   28.822876][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   28.832494][ T3306] team0: Port device team_slave_1 added
[   28.843306][ T3312] team0: Port device team_slave_0 added
[   28.850674][ T3302] team0: Port device team_slave_1 added
[   28.874421][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state
[   28.881574][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state
[   28.888769][ T3307] bridge_slave_0: entered allmulticast mode
[   28.895185][ T3307] bridge_slave_0: entered promiscuous mode
[   28.902112][ T3312] team0: Port device team_slave_1 added
[   28.921342][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_0
[   28.928415][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   28.954335][ T3302] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   28.965491][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0
[   28.972484][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   28.998459][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   29.013476][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state
[   29.020611][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state
[   29.027769][ T3307] bridge_slave_1: entered allmulticast mode
[   29.034096][ T3307] bridge_slave_1: entered promiscuous mode
[   29.040548][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0
[   29.047660][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   29.073569][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   29.084652][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_1
[   29.091679][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   29.117575][ T3302] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   29.129059][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1
[   29.136025][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   29.162025][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   29.173261][ T3310] team0: Port device team_slave_0 added
[   29.183845][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1
[   29.190802][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   29.216707][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   29.240730][ T3310] team0: Port device team_slave_1 added
[   29.252384][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link
[   29.273057][ T3312] hsr_slave_0: entered promiscuous mode
[   29.278953][ T3312] hsr_slave_1: entered promiscuous mode
[   29.295378][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link
[   29.314935][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0
[   29.321933][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   29.347956][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   29.359195][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1
[   29.366204][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   29.392122][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   29.429807][ T3307] team0: Port device team_slave_0 added
[   29.445095][ T3302] hsr_slave_0: entered promiscuous mode
[   29.451166][ T3302] hsr_slave_1: entered promiscuous mode
[   29.457086][ T3302] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[   29.464628][ T3302] Cannot create hsr debugfs directory
[   29.472066][ T3306] hsr_slave_0: entered promiscuous mode
[   29.478080][ T3306] hsr_slave_1: entered promiscuous mode
[   29.483838][ T3306] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[   29.491428][ T3306] Cannot create hsr debugfs directory
[   29.497661][ T3307] team0: Port device team_slave_1 added
[   29.538568][ T3310] hsr_slave_0: entered promiscuous mode
[   29.544479][ T3310] hsr_slave_1: entered promiscuous mode
[   29.550407][ T3310] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[   29.558152][ T3310] Cannot create hsr debugfs directory
[   29.570058][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0
[   29.577058][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   29.602958][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active
[   29.614433][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1
[   29.621486][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem.
[   29.647440][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active
[   29.724377][ T3307] hsr_slave_0: entered promiscuous mode
[   29.730414][ T3307] hsr_slave_1: entered promiscuous mode
[   29.736363][ T3307] debugfs: Directory 'hsr0' with parent 'hsr' already present!
[   29.743926][ T3307] Cannot create hsr debugfs directory
[   29.843053][ T3312] netdevsim netdevsim3 netdevsim0: renamed from eth0
[   29.852172][ T3312] netdevsim netdevsim3 netdevsim1: renamed from eth1
[   29.869749][ T3312] netdevsim netdevsim3 netdevsim2: renamed from eth2
[   29.880300][ T3312] netdevsim netdevsim3 netdevsim3: renamed from eth3
[   29.904848][ T3302] netdevsim netdevsim0 netdevsim0: renamed from eth0
[   29.913685][ T3302] netdevsim netdevsim0 netdevsim1: renamed from eth1
[   29.922434][ T3302] netdevsim netdevsim0 netdevsim2: renamed from eth2
[   29.930960][ T3302] netdevsim netdevsim0 netdevsim3: renamed from eth3
[   29.957383][ T3306] netdevsim netdevsim4 netdevsim0: renamed from eth0
[   29.969667][ T3306] netdevsim netdevsim4 netdevsim1: renamed from eth1
[   29.978756][ T3306] netdevsim netdevsim4 netdevsim2: renamed from eth2
[   29.989834][ T3306] netdevsim netdevsim4 netdevsim3: renamed from eth3
[   30.012566][ T3310] netdevsim netdevsim2 netdevsim0: renamed from eth0
[   30.023207][ T3310] netdevsim netdevsim2 netdevsim1: renamed from eth1
[   30.036114][ T3310] netdevsim netdevsim2 netdevsim2: renamed from eth2
[   30.044744][ T3310] netdevsim netdevsim2 netdevsim3: renamed from eth3
[   30.078215][ T3307] netdevsim netdevsim1 netdevsim0: renamed from eth0
[   30.086962][ T3307] netdevsim netdevsim1 netdevsim1: renamed from eth1
[   30.098443][ T3307] netdevsim netdevsim1 netdevsim2: renamed from eth2
[   30.111488][ T3307] netdevsim netdevsim1 netdevsim3: renamed from eth3
[   30.135757][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0
[   30.164885][ T3312] 8021q: adding VLAN 0 to HW filter on device team0
[   30.174725][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0
[   30.186359][  T370] bridge0: port 1(bridge_slave_0) entered blocking state
[   30.193428][  T370] bridge0: port 1(bridge_slave_0) entered forwarding state
[   30.207343][ T3302] 8021q: adding VLAN 0 to HW filter on device team0
[   30.223114][  T370] bridge0: port 2(bridge_slave_1) entered blocking state
[   30.230250][  T370] bridge0: port 2(bridge_slave_1) entered forwarding state
[   30.251326][  T370] bridge0: port 1(bridge_slave_0) entered blocking state
[   30.258380][  T370] bridge0: port 1(bridge_slave_0) entered forwarding state
[   30.267093][  T370] bridge0: port 2(bridge_slave_1) entered blocking state
[   30.274141][  T370] bridge0: port 2(bridge_slave_1) entered forwarding state
[   30.298195][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0
[   30.314024][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0
[   30.348220][ T3306] 8021q: adding VLAN 0 to HW filter on device team0
[   30.356921][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0
[   30.373019][ T3310] 8021q: adding VLAN 0 to HW filter on device team0
[   30.389042][ T3307] 8021q: adding VLAN 0 to HW filter on device team0
[   30.401409][   T12] bridge0: port 1(bridge_slave_0) entered blocking state
[   30.408474][   T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[   30.417234][   T12] bridge0: port 2(bridge_slave_1) entered blocking state
[   30.424270][   T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[   30.433819][   T12] bridge0: port 1(bridge_slave_0) entered blocking state
[   30.440915][   T12] bridge0: port 1(bridge_slave_0) entered forwarding state
[   30.449631][   T12] bridge0: port 2(bridge_slave_1) entered blocking state
[   30.456702][   T12] bridge0: port 2(bridge_slave_1) entered forwarding state
[   30.468430][   T57] bridge0: port 1(bridge_slave_0) entered blocking state
[   30.475536][   T57] bridge0: port 1(bridge_slave_0) entered forwarding state
[   30.492904][   T57] bridge0: port 2(bridge_slave_1) entered blocking state
[   30.499998][   T57] bridge0: port 2(bridge_slave_1) entered forwarding state
[   30.529567][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0
[   30.543052][ T3307] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[   30.553603][ T3307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   30.578316][ T3306] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network
[   30.588736][ T3306] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network
[   30.637900][ T3302] 8021q: adding VLAN 0 to HW filter on device batadv0
[   30.687582][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0
[   30.730993][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0
[   30.742780][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0
[   30.785022][ T3312] veth0_vlan: entered promiscuous mode
[   30.801953][ T3312] veth1_vlan: entered promiscuous mode
[   30.808737][ T3302] veth0_vlan: entered promiscuous mode
[   30.825062][ T3302] veth1_vlan: entered promiscuous mode
[   30.847417][ T3307] veth0_vlan: entered promiscuous mode
[   30.855340][ T3312] veth0_macvtap: entered promiscuous mode
[   30.871198][ T3312] veth1_macvtap: entered promiscuous mode
[   30.879850][ T3307] veth1_vlan: entered promiscuous mode
[   30.894549][ T3302] veth0_macvtap: entered promiscuous mode
[   30.916507][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0
[   30.932424][ T3302] veth1_macvtap: entered promiscuous mode
[   30.939222][ T3307] veth0_macvtap: entered promiscuous mode
[   30.948545][ T3310] veth0_vlan: entered promiscuous mode
[   30.964349][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1
[   30.973203][ T3310] veth1_vlan: entered promiscuous mode
[   30.979534][ T3307] veth1_macvtap: entered promiscuous mode
[   30.990316][ T3312] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   30.999123][ T3312] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   31.007896][ T3312] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   31.016616][ T3312] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[   31.027585][ T3306] veth0_vlan: entered promiscuous mode
[   31.039420][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[   31.049978][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.060335][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0
[   31.070066][ T3302] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[   31.080634][ T3302] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.090519][ T3302] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[   31.100948][ T3302] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.111351][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_0
[   31.120530][ T3302] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[   31.131119][ T3302] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.141564][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_1
[   31.153629][ T3302] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   31.162392][ T3302] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   31.171186][ T3302] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   31.179952][ T3302] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[   31.193480][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[   31.204123][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.214020][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[   31.224589][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.235134][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1
[   31.244674][ T3307] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   31.253462][ T3307] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   31.262290][ T3307] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   31.271135][ T3307] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[   31.287298][ T3306] veth1_vlan: entered promiscuous mode
[   31.306079][ T3310] veth0_macvtap: entered promiscuous mode
[   31.317660][ T3312] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality.
[   31.319746][ T3306] veth0_macvtap: entered promiscuous mode
[   31.352636][ T3306] veth1_macvtap: entered promiscuous mode
[   31.366167][ T3310] veth1_macvtap: entered promiscuous mode
[   31.382406][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[   31.392982][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.402929][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[   31.413456][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.423299][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[   31.433731][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.447879][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0
[   31.458197][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[   31.468653][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.478469][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[   31.488911][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.498755][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[   31.509207][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.519151][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0
[   31.529595][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.550338][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0
[   31.567704][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[   31.578238][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.588112][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[   31.598594][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.608450][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[   31.618961][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.636627][   T29] kauditd_printk_skb: 47 callbacks suppressed
[   31.636673][   T29] audit: type=1400 audit(1743527471.081:139): avc:  denied  { create } for  pid=3451 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1
[   31.641435][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1
[   31.645683][   T29] audit: type=1400 audit(1743527471.081:140): avc:  denied  { create } for  pid=3451 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[   31.663555][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[   31.669142][   T29] audit: type=1400 audit(1743527471.081:141): avc:  denied  { setopt } for  pid=3451 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[   31.688450][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.698813][   T29] audit: type=1400 audit(1743527471.081:142): avc:  denied  { bind } for  pid=3451 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[   31.718115][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[   31.757602][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.767494][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[   31.777935][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.787763][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1
[   31.798232][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems!
[   31.810061][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1
[   31.817886][ T3450] netlink: 48 bytes leftover after parsing attributes in process `syz.0.1'.
[   31.826609][ T3450] netlink: 48 bytes leftover after parsing attributes in process `syz.0.1'.
[   31.836675][   T29] audit: type=1400 audit(1743527471.221:143): avc:  denied  { write } for  pid=3446 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1
[   31.839213][ T3455] iwpm_register_pid: Unable to send a nlmsg (client = 2)
[   31.856598][   T29] audit: type=1400 audit(1743527471.251:144): avc:  denied  { create } for  pid=3446 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1
[   31.864730][ T3306] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   31.882669][   T29] audit: type=1400 audit(1743527471.251:145): avc:  denied  { write } for  pid=3451 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[   31.891341][ T3306] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   31.911317][   T29] audit: type=1326 audit(1743527471.281:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3446 comm="syz.0.1" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7face648d169 code=0x0
[   31.919331][ T3306] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   31.950534][ T3306] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[   31.956002][ T3455] infiniband s9z1: RDMA CMA: cma_listen_on_dev, error -98
[   31.986482][ T3310] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0
[   31.995365][ T3310] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0
[   32.004142][ T3310] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0
[   32.013264][ T3310] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0
[   32.017733][ T3457] FAULT_INJECTION: forcing a failure.
[   32.017733][ T3457] name failslab, interval 1, probability 0, space 0, times 1
[   32.034673][ T3457] CPU: 1 UID: 0 PID: 3457 Comm: syz.1.8 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) 
[   32.034766][ T3457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   32.034785][ T3457] Call Trace:
[   32.034791][ T3457]  <TASK>
[   32.034798][ T3457]  dump_stack_lvl+0xf6/0x150
[   32.034874][ T3457]  dump_stack+0x15/0x1a
[   32.034891][ T3457]  should_fail_ex+0x261/0x270
[   32.034913][ T3457]  should_failslab+0x8f/0xb0
[   32.034940][ T3457]  __kmalloc_noprof+0xad/0x410
[   32.035078][ T3457]  ? alloc_pipe_info+0x1cb/0x360
[   32.035108][ T3457]  alloc_pipe_info+0x1cb/0x360
[   32.035136][ T3457]  splice_direct_to_actor+0x621/0x680
[   32.035162][ T3457]  ? __pfx_direct_splice_actor+0x10/0x10
[   32.035189][ T3457]  ? selinux_file_permission+0x32a/0x360
[   32.035236][ T3457]  do_splice_direct+0xd9/0x150
[   32.035260][ T3457]  ? __pfx_direct_file_splice_eof+0x10/0x10
[   32.035302][ T3457]  do_sendfile+0x40a/0x690
[   32.035343][ T3457]  __x64_sys_sendfile64+0x113/0x160
[   32.035395][ T3457]  x64_sys_call+0xfc3/0x2e10
[   32.035421][ T3457]  do_syscall_64+0xc9/0x1c0
[   32.035457][ T3457]  ? clear_bhb_loop+0x25/0x80
[   32.035566][ T3457]  ? clear_bhb_loop+0x25/0x80
[   32.035589][ T3457]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   32.035616][ T3457] RIP: 0033:0x7f4541c5d169
[   32.035632][ T3457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   32.035647][ T3457] RSP: 002b:00007f45402c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028
[   32.035666][ T3457] RAX: ffffffffffffffda RBX: 00007f4541e75fa0 RCX: 00007f4541c5d169
[   32.035676][ T3457] RDX: 0000000000000000 RSI: 000000000000000b RDI: 000000000000000c
[   32.035715][ T3457] RBP: 00007f45402c7090 R08: 0000000000000000 R09: 0000000000000000
[   32.035725][ T3457] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000001
[   32.035735][ T3457] R13: 0000000000000000 R14: 00007f4541e75fa0 R15: 00007ffff12602a8
[   32.035749][ T3457]  </TASK>
[   32.279598][   T29] audit: type=1400 audit(1743527471.721:147): avc:  denied  { allowed } for  pid=3458 comm="',%I" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1
[   32.298412][   T29] audit: type=1400 audit(1743527471.721:148): avc:  denied  { sqpoll } for  pid=3458 comm="',%I" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1
[   32.405855][ T3455] syz.0.1 (3455) used greatest stack depth: 10776 bytes left
[   32.459518][    C0] hrtimer: interrupt took 38077 ns
[   32.483738][ T3473] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2567 sclass=netlink_route_socket pid=3473 comm=syz.4.5
[   32.539269][ T3476] netlink: 20 bytes leftover after parsing attributes in process `syz.2.13'.
[   32.660279][ T3484] loop2: detected capacity change from 0 to 512
[   32.687090][ T3486] loop0: detected capacity change from 0 to 128
[   32.702115][ T3484] ext4: Unknown parameter 'euid>00000000000000000000'
[   32.722887][ T3488] loop4: detected capacity change from 0 to 512
[   32.729700][ T3488] =======================================================
[   32.729700][ T3488] WARNING: The mand mount option has been deprecated and
[   32.729700][ T3488]          and is ignored by this kernel. Remove the mand
[   32.729700][ T3488]          option from the mount to silence this warning.
[   32.729700][ T3488] =======================================================
[   32.779485][ T3488] EXT4-fs: Mount option(s) incompatible with ext2
[   32.945934][ T3501] netlink: 48 bytes leftover after parsing attributes in process `syz.2.21'.
[   32.954766][ T3501] netlink: 48 bytes leftover after parsing attributes in process `syz.2.21'.
[   33.002870][ T3501] siw: device registration error -23
[   33.087768][ T3509] FAULT_INJECTION: forcing a failure.
[   33.087768][ T3509] name fail_page_alloc, interval 1, probability 0, space 0, times 1
[   33.101098][ T3509] CPU: 1 UID: 0 PID: 3509 Comm: syz.4.24 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) 
[   33.101125][ T3509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   33.101200][ T3509] Call Trace:
[   33.101206][ T3509]  <TASK>
[   33.101215][ T3509]  dump_stack_lvl+0xf6/0x150
[   33.101253][ T3509]  dump_stack+0x15/0x1a
[   33.101271][ T3509]  should_fail_ex+0x261/0x270
[   33.101291][ T3509]  should_fail_alloc_page+0xfd/0x110
[   33.101316][ T3509]  alloc_pages_bulk_noprof+0xfd/0x580
[   33.101372][ T3509]  copy_splice_read+0xe7/0x5d0
[   33.101400][ T3509]  ? file_has_perm+0x334/0x380
[   33.101479][ T3509]  sock_splice_read+0xac/0xb0
[   33.101516][ T3509]  ? __pfx_sock_splice_read+0x10/0x10
[   33.101540][ T3509]  splice_file_to_pipe+0x237/0x390
[   33.101604][ T3509]  do_splice+0xcec/0x1160
[   33.101630][ T3509]  ? get_pid_task+0x94/0xd0
[   33.101656][ T3509]  ? proc_fail_nth_write+0x12d/0x160
[   33.101683][ T3509]  ? __pfx_proc_fail_nth_write+0x10/0x10
[   33.101783][ T3509]  ? __rcu_read_unlock+0x4e/0x70
[   33.101812][ T3509]  ? __fget_files+0x186/0x1c0
[   33.101844][ T3509]  ? pipe_clear_nowait+0xd7/0x110
[   33.101923][ T3509]  __se_sys_splice+0x254/0x3b0
[   33.102015][ T3509]  __x64_sys_splice+0x78/0x90
[   33.102039][ T3509]  x64_sys_call+0xf5b/0x2e10
[   33.102078][ T3509]  do_syscall_64+0xc9/0x1c0
[   33.102099][ T3509]  ? clear_bhb_loop+0x25/0x80
[   33.102119][ T3509]  ? clear_bhb_loop+0x25/0x80
[   33.102214][ T3509]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   33.102276][ T3509] RIP: 0033:0x7fd1c6cad169
[   33.102290][ T3509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   33.102306][ T3509] RSP: 002b:00007fd1c52f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000113
[   33.102323][ T3509] RAX: ffffffffffffffda RBX: 00007fd1c6ec6080 RCX: 00007fd1c6cad169
[   33.102407][ T3509] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000005
[   33.102417][ T3509] RBP: 00007fd1c52f6090 R08: 000000007ffff000 R09: 0000000000000006
[   33.102427][ T3509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   33.102437][ T3509] R13: 0000000000000001 R14: 00007fd1c6ec6080 R15: 00007ffc3ed9f568
[   33.102452][ T3509]  </TASK>
[   33.347267][ T3511] netlink: 80 bytes leftover after parsing attributes in process `syz.4.25'.
[   33.368808][ T3511] tipc: Started in network mode
[   33.373685][ T3511] tipc: Node identity 00000000000000000000000000000001, cluster identity 4711
[   33.392824][ T3511] tipc: New replicast peer: fe80:0000:0000:0000:0000:0000:0000:00bb
[   33.401178][ T3511] tipc: Enabled bearer <udp:syz1>, priority 10
[   33.793550][ T3526] loop2: detected capacity change from 0 to 128
[   34.339225][ T3540] xt_AUDIT: Audit type out of range (valid range: 0..2)
[   34.363865][ T3540] loop0: detected capacity change from 0 to 512
[   34.370882][ T3540] ext4: Unknown parameter 'appraise_type'
[   34.378983][ T3540] netlink: 300 bytes leftover after parsing attributes in process `syz.0.35'.
[   34.408068][ T3543] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3543 comm=syz.1.36
[   34.408098][ T3546] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3546 comm=syz.1.36
[   34.463557][ T3551] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3551 comm=syz.1.39
[   34.484212][ T3551] Zero length message leads to an empty skb
[   34.495030][ T3551] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[   34.515747][ T3438] tipc: Node number set to 1
[   34.519588][ T3555] netlink: 36 bytes leftover after parsing attributes in process `syz.0.40'.
[   34.538103][ T3551] netlink: 4 bytes leftover after parsing attributes in process `syz.1.39'.
[   34.547074][ T3555] x_tables: ip_tables: bpf.1 match: invalid size 528 (kernel) != (user) 536
[   34.556042][ T3551] bridge_slave_1: left allmulticast mode
[   34.561761][ T3551] bridge_slave_1: left promiscuous mode
[   34.567463][ T3551] bridge0: port 2(bridge_slave_1) entered disabled state
[   34.595762][ T3551] bridge_slave_0: left allmulticast mode
[   34.601434][ T3551] bridge_slave_0: left promiscuous mode
[   34.607180][ T3551] bridge0: port 1(bridge_slave_0) entered disabled state
[   34.692541][ T3564] loop4: detected capacity change from 0 to 128
[   34.929096][ T3580] FAULT_INJECTION: forcing a failure.
[   34.929096][ T3580] name fail_usercopy, interval 1, probability 0, space 0, times 1
[   34.942188][ T3580] CPU: 0 UID: 0 PID: 3580 Comm: syz.0.51 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) 
[   34.942211][ T3580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   34.942321][ T3580] Call Trace:
[   34.942325][ T3580]  <TASK>
[   34.942331][ T3580]  dump_stack_lvl+0xf6/0x150
[   34.942350][ T3580]  dump_stack+0x15/0x1a
[   34.942364][ T3580]  should_fail_ex+0x261/0x270
[   34.942386][ T3580]  should_fail+0xb/0x10
[   34.942402][ T3580]  should_fail_usercopy+0x1a/0x20
[   34.942485][ T3580]  _copy_from_user+0x1c/0xa0
[   34.942507][ T3580]  ip6_tnl_siocdevprivate+0x13d/0x700
[   34.942556][ T3580]  dev_ifsioc+0x937/0xb20
[   34.942574][ T3580]  dev_ioctl+0x8da/0xad0
[   34.942604][ T3580]  sock_ioctl+0x5b8/0x630
[   34.942629][ T3580]  ? __pfx_sock_ioctl+0x10/0x10
[   34.942653][ T3580]  __se_sys_ioctl+0xc9/0x140
[   34.942677][ T3580]  __x64_sys_ioctl+0x43/0x50
[   34.942696][ T3580]  x64_sys_call+0x168d/0x2e10
[   34.942755][ T3580]  do_syscall_64+0xc9/0x1c0
[   34.942810][ T3580]  ? clear_bhb_loop+0x25/0x80
[   34.942827][ T3580]  ? clear_bhb_loop+0x25/0x80
[   34.942843][ T3580]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   34.942860][ T3580] RIP: 0033:0x7face648d169
[   34.942875][ T3580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   34.942893][ T3580] RSP: 002b:00007face4aef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[   34.942929][ T3580] RAX: ffffffffffffffda RBX: 00007face66a5fa0 RCX: 00007face648d169
[   34.942939][ T3580] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000009
[   34.942948][ T3580] RBP: 00007face4aef090 R08: 0000000000000000 R09: 0000000000000000
[   34.942957][ T3580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   34.942969][ T3580] R13: 0000000000000000 R14: 00007face66a5fa0 R15: 00007fff1c5404e8
[   34.943002][ T3580]  </TASK>
[   35.172315][ T3583] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[   35.173902][ T3588] loop2: detected capacity change from 0 to 1024
[   35.198887][ T3588] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none.
[   35.211407][ T3588] ext4 filesystem being mounted at /7/file1 supports timestamps until 2038-01-19 (0x7fffffff)
[   35.223027][ T3588] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[   35.234302][ T3583] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[   35.288769][ T3583] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[   35.337778][ T3583] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0
[   35.391655][ T3583] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0
[   35.402568][ T3583] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0
[   35.413283][ T3583] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0
[   35.425135][ T3583] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0
[   35.483206][ T3602] loop3: detected capacity change from 0 to 128
[   35.562850][ T3610] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list
[   35.563450][ T3612] loop3: detected capacity change from 0 to 512
[   35.584384][ T3612] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support!
[   35.597648][ T3612] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode
[   35.612086][ T3612] EXT4-fs (loop3): 1 truncate cleaned up
[   35.619706][ T3612] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
[   35.634576][ T3623] loop1: detected capacity change from 0 to 512
[   35.636080][ T3612] raw_sendmsg: syz.3.63 forgot to set AF_INET. Fix it!
[   35.649591][ T3612] EXT4-fs error (device loop3): mb_free_blocks:1948: group 0, inode 16: block 33:freeing already freed block (bit 32); block bitmap corrupt.
[   35.664088][ T3623] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode
[   35.666703][ T3612] EXT4-fs (loop3): Remounting filesystem read-only
[   35.677511][ T3625] netlink: 36 bytes leftover after parsing attributes in process `syz.4.66'.
[   35.696024][ T3625] x_tables: ip_tables: bpf.1 match: invalid size 528 (kernel) != (user) 536
[   35.708661][ T3623] EXT4-fs (loop1): 1 truncate cleaned up
[   35.714752][ T3623] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback.
[   35.729743][ T3623] EXT4-fs error (device loop1): mb_free_blocks:1948: group 0, inode 16: block 33:freeing already freed block (bit 32); block bitmap corrupt.
[   35.745006][ T3623] EXT4-fs (loop1): Remounting filesystem read-only
[   36.388268][ T3681] FAULT_INJECTION: forcing a failure.
[   36.388268][ T3681] name fail_usercopy, interval 1, probability 0, space 0, times 0
[   36.401474][ T3681] CPU: 1 UID: 60928 PID: 3681 Comm: syz.0.75 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) 
[   36.401501][ T3681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   36.401513][ T3681] Call Trace:
[   36.401519][ T3681]  <TASK>
[   36.401526][ T3681]  dump_stack_lvl+0xf6/0x150
[   36.401577][ T3681]  dump_stack+0x15/0x1a
[   36.401594][ T3681]  should_fail_ex+0x261/0x270
[   36.401616][ T3681]  should_fail+0xb/0x10
[   36.401634][ T3681]  should_fail_usercopy+0x1a/0x20
[   36.401656][ T3681]  strncpy_from_user+0x25/0x230
[   36.401719][ T3681]  ? getname_flags+0x81/0x3b0
[   36.401750][ T3681]  getname_flags+0xb0/0x3b0
[   36.401780][ T3681]  do_sys_openat2+0x65/0x110
[   36.401888][ T3681]  __x64_sys_openat+0xf8/0x120
[   36.401908][ T3681]  x64_sys_call+0x1ac/0x2e10
[   36.401929][ T3681]  do_syscall_64+0xc9/0x1c0
[   36.401950][ T3681]  ? clear_bhb_loop+0x25/0x80
[   36.402037][ T3681]  ? clear_bhb_loop+0x25/0x80
[   36.402058][ T3681]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   36.402080][ T3681] RIP: 0033:0x7face648d169
[   36.402094][ T3681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   36.402112][ T3681] RSP: 002b:00007face4aef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101
[   36.402196][ T3681] RAX: ffffffffffffffda RBX: 00007face66a5fa0 RCX: 00007face648d169
[   36.402209][ T3681] RDX: 00000000001a10c1 RSI: 0000200000000140 RDI: ffffffffffffff9c
[   36.402222][ T3681] RBP: 00007face4aef090 R08: 0000000000000000 R09: 0000000000000000
[   36.402234][ T3681] R10: 9c37611dc13d0d83 R11: 0000000000000246 R12: 0000000000000001
[   36.402244][ T3681] R13: 0000000000000000 R14: 00007face66a5fa0 R15: 00007fff1c5404e8
[   36.402260][ T3681]  </TASK>
[   36.598735][ T3312] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[   36.614182][ T3307] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000.
[   36.677126][   T29] kauditd_printk_skb: 319 callbacks suppressed
[   36.677140][   T29] audit: type=1400 audit(1743527476.121:468): avc:  denied  { bind } for  pid=3686 comm="syz.1.77" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1
[   36.703492][   T29] audit: type=1400 audit(1743527476.121:469): avc:  denied  { name_bind } for  pid=3686 comm="syz.1.77" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1
[   36.724159][   T29] audit: type=1400 audit(1743527476.121:470): avc:  denied  { node_bind } for  pid=3686 comm="syz.1.77" saddr=fc00::1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1
[   36.763661][   T29] audit: type=1400 audit(1743527476.201:471): avc:  denied  { read } for  pid=3689 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1
[   36.792818][ T3690] rtc_cmos 00:00: Alarms can be up to one day in the future
[   36.915773][ T3700] wg2: entered promiscuous mode
[   36.920709][ T3700] wg2: entered allmulticast mode
[   37.181878][   T29] audit: type=1326 audit(1743527476.621:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3704 comm="syz.2.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff2bf0ed169 code=0x7ffc0000
[   37.298511][   T29] audit: type=1326 audit(1743527476.651:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3704 comm="syz.2.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff2bf0ed169 code=0x7ffc0000
[   37.321786][   T29] audit: type=1326 audit(1743527476.651:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3704 comm="syz.2.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=25 compat=0 ip=0x7ff2bf0ed169 code=0x7ffc0000
[   37.345262][   T29] audit: type=1326 audit(1743527476.651:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3704 comm="syz.2.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff2bf0ed169 code=0x7ffc0000
[   37.368481][   T29] audit: type=1326 audit(1743527476.651:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3704 comm="syz.2.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=80 compat=0 ip=0x7ff2bf0ed169 code=0x7ffc0000
[   37.391543][   T29] audit: type=1326 audit(1743527476.651:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3704 comm="syz.2.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff2bf0ed169 code=0x7ffc0000
[   37.588715][ T3438] rtc_cmos 00:00: Alarms can be up to one day in the future
[   37.596479][ T3438] rtc_cmos 00:00: Alarms can be up to one day in the future
[   37.604123][ T3438] rtc_cmos 00:00: Alarms can be up to one day in the future
[   37.611722][ T3438] rtc_cmos 00:00: Alarms can be up to one day in the future
[   37.619087][ T3438] rtc rtc0: __rtc_set_alarm: err=-22
[   37.714537][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   37.722093][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   37.729509][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   37.738617][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   37.746147][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   37.753671][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   37.761102][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   37.768578][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   37.776025][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   37.783406][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   37.790919][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   37.798424][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   37.805830][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.732207][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.739746][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.747211][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.754596][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.762067][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.769528][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.776956][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.784377][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.791872][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.799271][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.806696][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.814105][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.821511][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.829012][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.836437][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0
[   38.846402][ T1054] hid-generic 0000:0000:0000.0001: hidraw0: <UNKNOWN> HID v0.00 Device [syz0] on syz1
[   39.150611][ T3745] FAULT_INJECTION: forcing a failure.
[   39.150611][ T3745] name failslab, interval 1, probability 0, space 0, times 0
[   39.163345][ T3745] CPU: 0 UID: 0 PID: 3745 Comm: syz.1.94 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) 
[   39.163366][ T3745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   39.163375][ T3745] Call Trace:
[   39.163380][ T3745]  <TASK>
[   39.163407][ T3745]  dump_stack_lvl+0xf6/0x150
[   39.163432][ T3745]  dump_stack+0x15/0x1a
[   39.163449][ T3745]  should_fail_ex+0x261/0x270
[   39.163472][ T3745]  should_failslab+0x8f/0xb0
[   39.163568][ T3745]  kmem_cache_alloc_node_noprof+0x5c/0x340
[   39.163600][ T3745]  ? __alloc_skb+0x10d/0x320
[   39.163698][ T3745]  __alloc_skb+0x10d/0x320
[   39.163757][ T3745]  tcp_stream_alloc_skb+0x2f/0x1e0
[   39.163780][ T3745]  tcp_sendmsg_locked+0x933/0x2760
[   39.163808][ T3745]  ? mntput+0x49/0x70
[   39.163904][ T3745]  ? __rcu_read_unlock+0x4e/0x70
[   39.163926][ T3745]  ? avc_has_perm_noaudit+0x1cc/0x210
[   39.163958][ T3745]  ? __pfx_tcp_sendmsg+0x10/0x10
[   39.163988][ T3745]  tcp_sendmsg+0x30/0x50
[   39.164009][ T3745]  inet_sendmsg+0x77/0xd0
[   39.164095][ T3745]  __sock_sendmsg+0x102/0x180
[   39.164123][ T3745]  __sys_sendto+0x1aa/0x230
[   39.164158][ T3745]  __x64_sys_sendto+0x78/0x90
[   39.164246][ T3745]  x64_sys_call+0x2bcb/0x2e10
[   39.164266][ T3745]  do_syscall_64+0xc9/0x1c0
[   39.164292][ T3745]  ? clear_bhb_loop+0x25/0x80
[   39.164317][ T3745]  ? clear_bhb_loop+0x25/0x80
[   39.164362][ T3745]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   39.164381][ T3745] RIP: 0033:0x7f4541c5d169
[   39.164396][ T3745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   39.164455][ T3745] RSP: 002b:00007f45402c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c
[   39.164471][ T3745] RAX: ffffffffffffffda RBX: 00007f4541e75fa0 RCX: 00007f4541c5d169
[   39.164482][ T3745] RDX: ffffffffffffff94 RSI: 0000200000000000 RDI: 0000000000000003
[   39.164493][ T3745] RBP: 00007f45402c7090 R08: 0000000000000000 R09: 0000000000000000
[   39.164503][ T3745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   39.164514][ T3745] R13: 0000000000000000 R14: 00007f4541e75fa0 R15: 00007ffff12602a8
[   39.164533][ T3745]  </TASK>
[   39.429757][ T3751] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12 sclass=netlink_route_socket pid=3751 comm=syz.3.96
[   39.482188][ T3759] geneve0: entered allmulticast mode
[   39.490822][ T3759] serio: Serial port ptm0
[   39.544868][ T3759] netlink: 8 bytes leftover after parsing attributes in process `syz.3.98'.
[   39.590230][ T3764] netlink: 36 bytes leftover after parsing attributes in process `syz.3.100'.
[   39.811507][ T3774] loop0: detected capacity change from 0 to 2048
[   39.811566][ T3775] FAULT_INJECTION: forcing a failure.
[   39.811566][ T3775] name failslab, interval 1, probability 0, space 0, times 0
[   39.831071][ T3775] CPU: 1 UID: 0 PID: 3775 Comm: syz.3.104 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) 
[   39.831218][ T3775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   39.831245][ T3775] Call Trace:
[   39.831251][ T3775]  <TASK>
[   39.831259][ T3775]  dump_stack_lvl+0xf6/0x150
[   39.831314][ T3775]  dump_stack+0x15/0x1a
[   39.831329][ T3775]  should_fail_ex+0x261/0x270
[   39.831347][ T3775]  should_failslab+0x8f/0xb0
[   39.831462][ T3775]  __kmalloc_cache_node_noprof+0x58/0x340
[   39.831490][ T3775]  ? __get_vm_area_node+0xfb/0x1c0
[   39.831513][ T3775]  __get_vm_area_node+0xfb/0x1c0
[   39.831535][ T3775]  __vmalloc_node_range_noprof+0x285/0xe80
[   39.831629][ T3775]  ? copy_process+0x39e/0x1f60
[   39.831650][ T3775]  ? mod_objcg_state+0x3f9/0x530
[   39.831672][ T3775]  ? kmem_cache_alloc_node_noprof+0x233/0x340
[   39.831768][ T3775]  dup_task_struct+0x4a5/0x710
[   39.831789][ T3775]  ? copy_process+0x39e/0x1f60
[   39.831825][ T3775]  ? copy_process+0x368/0x1f60
[   39.831847][ T3775]  copy_process+0x39e/0x1f60
[   39.831940][ T3775]  ? __rcu_read_unlock+0x4e/0x70
[   39.831966][ T3775]  kernel_clone+0x168/0x5d0
[   39.831991][ T3775]  __x64_sys_clone+0xe9/0x120
[   39.832065][ T3775]  x64_sys_call+0x2dc9/0x2e10
[   39.832083][ T3775]  do_syscall_64+0xc9/0x1c0
[   39.832101][ T3775]  ? clear_bhb_loop+0x25/0x80
[   39.832119][ T3775]  ? clear_bhb_loop+0x25/0x80
[   39.832140][ T3775]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   39.832157][ T3775] RIP: 0033:0x7f5a3df6d169
[   39.832169][ T3775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   39.832183][ T3775] RSP: 002b:00007f5a3c5d6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[   39.832256][ T3775] RAX: ffffffffffffffda RBX: 00007f5a3e185fa0 RCX: 00007f5a3df6d169
[   39.832265][ T3775] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000022023400
[   39.832275][ T3775] RBP: 00007f5a3c5d7090 R08: 0000000000000000 R09: 0000000000000000
[   39.832284][ T3775] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001
[   39.832294][ T3775] R13: 0000000000000000 R14: 00007f5a3e185fa0 R15: 00007fff0935d548
[   39.832309][ T3775]  </TASK>
[   39.832336][ T3775] syz.3.104: vmalloc error: size 16384, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0
[   40.063736][ T3775] CPU: 1 UID: 0 PID: 3775 Comm: syz.3.104 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) 
[   40.063806][ T3775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   40.063815][ T3775] Call Trace:
[   40.063820][ T3775]  <TASK>
[   40.063826][ T3775]  dump_stack_lvl+0xf6/0x150
[   40.063845][ T3775]  dump_stack+0x15/0x1a
[   40.063859][ T3775]  warn_alloc+0x145/0x1b0
[   40.063885][ T3775]  __vmalloc_node_range_noprof+0x2aa/0xe80
[   40.063909][ T3775]  ? mod_objcg_state+0x3f9/0x530
[   40.063930][ T3775]  ? kmem_cache_alloc_node_noprof+0x233/0x340
[   40.063958][ T3775]  dup_task_struct+0x4a5/0x710
[   40.063993][ T3775]  ? copy_process+0x39e/0x1f60
[   40.064080][ T3775]  ? copy_process+0x368/0x1f60
[   40.064100][ T3775]  copy_process+0x39e/0x1f60
[   40.064188][ T3775]  ? __rcu_read_unlock+0x4e/0x70
[   40.064216][ T3775]  kernel_clone+0x168/0x5d0
[   40.064267][ T3775]  __x64_sys_clone+0xe9/0x120
[   40.064309][ T3775]  x64_sys_call+0x2dc9/0x2e10
[   40.064466][ T3775]  do_syscall_64+0xc9/0x1c0
[   40.064485][ T3775]  ? clear_bhb_loop+0x25/0x80
[   40.064504][ T3775]  ? clear_bhb_loop+0x25/0x80
[   40.064525][ T3775]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   40.064550][ T3775] RIP: 0033:0x7f5a3df6d169
[   40.064627][ T3775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   40.064648][ T3775] RSP: 002b:00007f5a3c5d6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038
[   40.064746][ T3775] RAX: ffffffffffffffda RBX: 00007f5a3e185fa0 RCX: 00007f5a3df6d169
[   40.064757][ T3775] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000022023400
[   40.064768][ T3775] RBP: 00007f5a3c5d7090 R08: 0000000000000000 R09: 0000000000000000
[   40.064778][ T3775] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001
[   40.064789][ T3775] R13: 0000000000000000 R14: 00007f5a3e185fa0 R15: 00007fff0935d548
[   40.064889][ T3775]  </TASK>
[   40.064897][ T3775] Mem-Info:
[   40.259608][ T3775] active_anon:4257 inactive_anon:0 isolated_anon:0
[   40.259608][ T3775]  active_file:17231 inactive_file:2143 isolated_file:0
[   40.259608][ T3775]  unevictable:0 dirty:1793 writeback:0
[   40.259608][ T3775]  slab_reclaimable:2780 slab_unreclaimable:13545
[   40.259608][ T3775]  mapped:28700 shmem:471 pagetables:935
[   40.259608][ T3775]  sec_pagetables:0 bounce:0
[   40.259608][ T3775]  kernel_misc_reclaimable:0
[   40.259608][ T3775]  free:1898091 free_pcp:7487 free_cma:0
[   40.304555][ T3775] Node 0 active_anon:17028kB inactive_anon:0kB active_file:68924kB inactive_file:8572kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:114800kB dirty:7172kB writeback:0kB shmem:1884kB writeback_tmp:0kB kernel_stack:2768kB pagetables:3740kB sec_pagetables:0kB all_unreclaimable? no
[   40.332520][ T3775] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB
[   40.359492][ T3775] lowmem_reserve[]: 0 2884 7862 7862
[   40.364823][ T3775] Node 0 DMA32 free:2949876kB boost:0kB min:4132kB low:7064kB high:9996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2953408kB mlocked:0kB bounce:0kB free_pcp:3532kB local_pcp:0kB free_cma:0kB
[   40.393099][ T3775] lowmem_reserve[]: 0 0 4978 4978
[   40.398183][ T3775] Node 0 Normal free:4627128kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB active_anon:17028kB inactive_anon:0kB active_file:69040kB inactive_file:8572kB unevictable:0kB writepending:7172kB present:5242880kB managed:5098248kB mlocked:0kB bounce:0kB free_pcp:25984kB local_pcp:220kB free_cma:0kB
[   40.428261][ T3775] lowmem_reserve[]: 0 0 0 0
[   40.432793][ T3775] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB
[   40.445604][ T3775] Node 0 DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 4*32kB (M) 5*64kB (M) 4*128kB (M) 3*256kB (M) 4*512kB (M) 3*1024kB (M) 3*2048kB (M) 717*4096kB (M) = 2949876kB
[   40.461674][ T3775] Node 0 Normal: 262*4kB (UME) 606*8kB (UM) 477*16kB (UM) 445*32kB (UME) 453*64kB (UME) 84*128kB (UME) 51*256kB (UME) 34*512kB (UM) 31*1024kB (UM) 18*2048kB (UM) 1089*4096kB (UM) = 4627128kB
[   40.480610][ T3775] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB
[   40.489916][ T3775] 19903 total pagecache pages
[   40.494597][ T3775] 0 pages in swap cache
[   40.498780][ T3775] Free swap  = 124996kB
[   40.502936][ T3775] Total swap = 124996kB
[   40.507138][ T3775] 2097051 pages RAM
[   40.510975][ T3775] 0 pages HighMem/MovableOnly
[   40.515669][ T3775] 80297 pages reserved
[   40.564176][ T3785] bridge0: port 3(vlan2) entered blocking state
[   40.570859][ T3785] bridge0: port 3(vlan2) entered disabled state
[   40.579571][ T3785] vlan2: entered allmulticast mode
[   40.584803][ T3785] bridge0: entered allmulticast mode
[   40.592920][ T3785] vlan2: left allmulticast mode
[   40.597956][ T3785] bridge0: left allmulticast mode
[   40.638272][ T3800] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2329 sclass=netlink_xfrm_socket pid=3800 comm=syz.4.112
[   40.656584][ T3788] netlink: 48 bytes leftover after parsing attributes in process `syz.0.109'.
[   40.665581][ T3788] netlink: 48 bytes leftover after parsing attributes in process `syz.0.109'.
[   40.825955][ T3777] rtc_cmos 00:00: Alarms can be up to one day in the future
[   41.483294][ T3853] pim6reg1: entered promiscuous mode
[   41.488750][ T3853] pim6reg1: entered allmulticast mode
[   41.531598][  T993] rtc_cmos 00:00: Alarms can be up to one day in the future
[   41.539248][  T993] rtc_cmos 00:00: Alarms can be up to one day in the future
[   41.544633][ T3864] pim6reg1: entered promiscuous mode
[   41.546848][  T993] rtc_cmos 00:00: Alarms can be up to one day in the future
[   41.551864][ T3864] pim6reg1: entered allmulticast mode
[   41.559431][  T993] rtc_cmos 00:00: Alarms can be up to one day in the future
[   41.571860][  T993] rtc rtc0: __rtc_set_alarm: err=-22
[   41.688241][   T29] kauditd_printk_skb: 359 callbacks suppressed
[   41.688269][   T29] audit: type=1400 audit(1743527481.131:833): avc:  denied  { map_create } for  pid=3875 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0
[   41.723828][   T29] audit: type=1400 audit(1743527481.131:834): avc:  denied  { prog_load } for  pid=3875 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0
[   41.742935][   T29] audit: type=1400 audit(1743527481.131:835): avc:  denied  { create } for  pid=3875 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0
[   41.768622][   T29] audit: type=1400 audit(1743527481.201:836): avc:  denied  { create } for  pid=3875 comm="syz.1.138" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0
[   41.789206][   T29] audit: type=1400 audit(1743527481.201:837): avc:  denied  { create } for  pid=3875 comm="syz.1.138" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0
[   41.809783][   T29] audit: type=1400 audit(1743527481.211:838): avc:  denied  { read write } for  pid=3312 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
[   41.833921][   T29] audit: type=1400 audit(1743527481.211:839): avc:  denied  { map_create } for  pid=3875 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0
[   41.852873][   T29] audit: type=1400 audit(1743527481.211:840): avc:  denied  { prog_load } for  pid=3875 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0
[   41.871741][   T29] audit: type=1400 audit(1743527481.211:841): avc:  denied  { create } for  pid=3875 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=0
[   41.879001][ T3884] FAULT_INJECTION: forcing a failure.
[   41.879001][ T3884] name failslab, interval 1, probability 0, space 0, times 0
[   41.893776][   T29] audit: type=1400 audit(1743527481.221:842): avc:  denied  { prog_load } for  pid=3879 comm="syz.3.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0
[   41.908142][ T3884] CPU: 0 UID: 0 PID: 3884 Comm: syz.1.141 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) 
[   41.908243][ T3884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   41.908256][ T3884] Call Trace:
[   41.908262][ T3884]  <TASK>
[   41.908269][ T3884]  dump_stack_lvl+0xf6/0x150
[   41.908293][ T3884]  dump_stack+0x15/0x1a
[   41.908311][ T3884]  should_fail_ex+0x261/0x270
[   41.908394][ T3884]  should_failslab+0x8f/0xb0
[   41.908422][ T3884]  __kmalloc_node_noprof+0xaf/0x420
[   41.908457][ T3884]  ? __rcu_read_unlock+0x4e/0x70
[   41.908502][ T3884]  ? qdisc_alloc+0x65/0x450
[   41.908534][ T3884]  ? __pfx_vxlan_netdevice_event+0x10/0x10
[   41.908562][ T3884]  qdisc_alloc+0x65/0x450
[   41.908649][ T3884]  ? ib_device_get_by_netdev+0x1f8/0x230
[   41.908671][ T3884]  ? __pfx_netconsole_netdev_event+0x10/0x10
[   41.908709][ T3884]  qdisc_create_dflt+0x4c/0x280
[   41.908773][ T3884]  dev_activate+0x211/0x9f0
[   41.908842][ T3884]  __dev_open+0x48e/0x540
[   41.908871][ T3884]  __dev_change_flags+0x157/0x410
[   41.908961][ T3884]  netif_change_flags+0x59/0xd0
[   41.908993][ T3884]  dev_change_flags+0xde/0x1a0
[   41.909021][ T3884]  ? strcmp+0x21/0x50
[   41.909046][ T3884]  dev_ifsioc+0x5de/0xb20
[   41.909067][ T3884]  ? __rcu_read_unlock+0x4e/0x70
[   41.909149][ T3884]  dev_ioctl+0x843/0xad0
[   41.909171][ T3884]  sock_do_ioctl+0x121/0x270
[   41.909227][ T3884]  sock_ioctl+0x436/0x630
[   41.909253][ T3884]  ? __pfx_sock_ioctl+0x10/0x10
[   41.909278][ T3884]  __se_sys_ioctl+0xc9/0x140
[   41.909352][ T3884]  __x64_sys_ioctl+0x43/0x50
[   41.909375][ T3884]  x64_sys_call+0x168d/0x2e10
[   41.909435][ T3884]  do_syscall_64+0xc9/0x1c0
[   41.909457][ T3884]  ? clear_bhb_loop+0x25/0x80
[   41.909480][ T3884]  ? clear_bhb_loop+0x25/0x80
[   41.909505][ T3884]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   41.909526][ T3884] RIP: 0033:0x7f4541c5d169
[   41.909542][ T3884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   41.909562][ T3884] RSP: 002b:00007f45402c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010
[   41.909583][ T3884] RAX: ffffffffffffffda RBX: 00007f4541e75fa0 RCX: 00007f4541c5d169
[   41.909596][ T3884] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 0000000000000005
[   41.909608][ T3884] RBP: 00007f45402c7090 R08: 0000000000000000 R09: 0000000000000000
[   41.909621][ T3884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   41.909642][ T3884] R13: 0000000000000000 R14: 00007f4541e75fa0 R15: 00007ffff12602a8
[   41.909659][ T3884]  </TASK>
[   41.909665][ T3884] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue
[   42.188070][ T3884] pim6reg1: entered promiscuous mode
[   42.193412][ T3884] pim6reg1: entered allmulticast mode
[   42.274075][ T3894] FAULT_INJECTION: forcing a failure.
[   42.274075][ T3894] name fail_usercopy, interval 1, probability 0, space 0, times 0
[   42.287224][ T3894] CPU: 0 UID: 0 PID: 3894 Comm: syz.1.145 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) 
[   42.287250][ T3894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   42.287262][ T3894] Call Trace:
[   42.287268][ T3894]  <TASK>
[   42.287332][ T3894]  dump_stack_lvl+0xf6/0x150
[   42.287356][ T3894]  dump_stack+0x15/0x1a
[   42.287373][ T3894]  should_fail_ex+0x261/0x270
[   42.287395][ T3894]  should_fail+0xb/0x10
[   42.287415][ T3894]  should_fail_usercopy+0x1a/0x20
[   42.287504][ T3894]  _copy_from_user+0x1c/0xa0
[   42.287532][ T3894]  move_addr_to_kernel+0x8c/0x130
[   42.287560][ T3894]  __sys_connect+0x6c/0x1b0
[   42.287616][ T3894]  __x64_sys_connect+0x41/0x50
[   42.287706][ T3894]  x64_sys_call+0x2030/0x2e10
[   42.287786][ T3894]  do_syscall_64+0xc9/0x1c0
[   42.287806][ T3894]  ? clear_bhb_loop+0x25/0x80
[   42.287899][ T3894]  ? clear_bhb_loop+0x25/0x80
[   42.287922][ T3894]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   42.287990][ T3894] RIP: 0033:0x7f4541c5d169
[   42.288004][ T3894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   42.288017][ T3894] RSP: 002b:00007f45402c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a
[   42.288101][ T3894] RAX: ffffffffffffffda RBX: 00007f4541e75fa0 RCX: 00007f4541c5d169
[   42.288114][ T3894] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000003
[   42.288127][ T3894] RBP: 00007f45402c7090 R08: 0000000000000000 R09: 0000000000000000
[   42.288139][ T3894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   42.288227][ T3894] R13: 0000000000000000 R14: 00007f4541e75fa0 R15: 00007ffff12602a8
[   42.288244][ T3894]  </TASK>
[   42.488505][ T3898] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3898 comm=syz.2.147
[   43.162420][ T3988] FAULT_INJECTION: forcing a failure.
[   43.162420][ T3988] name fail_usercopy, interval 1, probability 0, space 0, times 0
[   43.176165][ T3988] CPU: 0 UID: 0 PID: 3988 Comm: syz.3.185 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) 
[   43.176193][ T3988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   43.176229][ T3988] Call Trace:
[   43.176235][ T3988]  <TASK>
[   43.176242][ T3988]  dump_stack_lvl+0xf6/0x150
[   43.176266][ T3988]  dump_stack+0x15/0x1a
[   43.176283][ T3988]  should_fail_ex+0x261/0x270
[   43.176340][ T3988]  should_fail+0xb/0x10
[   43.176368][ T3988]  should_fail_usercopy+0x1a/0x20
[   43.176392][ T3988]  _copy_to_user+0x20/0xa0
[   43.176419][ T3988]  simple_read_from_buffer+0xb2/0x130
[   43.176514][ T3988]  proc_fail_nth_read+0x103/0x140
[   43.176612][ T3988]  ? __pfx_proc_fail_nth_read+0x10/0x10
[   43.176667][ T3988]  vfs_read+0x1b2/0x710
[   43.176690][ T3988]  ? __rcu_read_unlock+0x4e/0x70
[   43.176715][ T3988]  ? __fget_files+0x186/0x1c0
[   43.176755][ T3988]  ksys_read+0xeb/0x1b0
[   43.176779][ T3988]  __x64_sys_read+0x42/0x50
[   43.176820][ T3988]  x64_sys_call+0x2a3b/0x2e10
[   43.176901][ T3988]  do_syscall_64+0xc9/0x1c0
[   43.176923][ T3988]  ? clear_bhb_loop+0x25/0x80
[   43.176944][ T3988]  ? clear_bhb_loop+0x25/0x80
[   43.176985][ T3988]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   43.177003][ T3988] RIP: 0033:0x7f5a3df6bb7c
[   43.177016][ T3988] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48
[   43.177035][ T3988] RSP: 002b:00007f5a3c5d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[   43.177054][ T3988] RAX: ffffffffffffffda RBX: 00007f5a3e185fa0 RCX: 00007f5a3df6bb7c
[   43.177066][ T3988] RDX: 000000000000000f RSI: 00007f5a3c5d70a0 RDI: 0000000000000003
[   43.177079][ T3988] RBP: 00007f5a3c5d7090 R08: 0000000000000000 R09: 0000000000000000
[   43.177091][ T3988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   43.177126][ T3988] R13: 0000000000000000 R14: 00007f5a3e185fa0 R15: 00007fff0935d548
[   43.177145][ T3988]  </TASK>
[   44.331823][ T4049] FAULT_INJECTION: forcing a failure.
[   44.331823][ T4049] name fail_usercopy, interval 1, probability 0, space 0, times 0
[   44.344907][ T4049] CPU: 1 UID: 0 PID: 4049 Comm: syz.3.210 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) 
[   44.344932][ T4049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   44.344944][ T4049] Call Trace:
[   44.344963][ T4049]  <TASK>
[   44.344971][ T4049]  dump_stack_lvl+0xf6/0x150
[   44.344997][ T4049]  dump_stack+0x15/0x1a
[   44.345017][ T4049]  should_fail_ex+0x261/0x270
[   44.345042][ T4049]  should_fail+0xb/0x10
[   44.345064][ T4049]  should_fail_usercopy+0x1a/0x20
[   44.345091][ T4049]  _copy_to_user+0x20/0xa0
[   44.345197][ T4049]  simple_read_from_buffer+0xb2/0x130
[   44.345229][ T4049]  proc_fail_nth_read+0x103/0x140
[   44.345258][ T4049]  ? __pfx_proc_fail_nth_read+0x10/0x10
[   44.345346][ T4049]  vfs_read+0x1b2/0x710
[   44.345372][ T4049]  ? __rcu_read_unlock+0x4e/0x70
[   44.345458][ T4049]  ? __fget_files+0x186/0x1c0
[   44.345505][ T4049]  ksys_read+0xeb/0x1b0
[   44.345567][ T4049]  __x64_sys_read+0x42/0x50
[   44.345615][ T4049]  x64_sys_call+0x2a3b/0x2e10
[   44.345633][ T4049]  do_syscall_64+0xc9/0x1c0
[   44.345650][ T4049]  ? clear_bhb_loop+0x25/0x80
[   44.345667][ T4049]  ? clear_bhb_loop+0x25/0x80
[   44.345753][ T4049]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   44.345775][ T4049] RIP: 0033:0x7f5a3df6bb7c
[   44.345790][ T4049] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48
[   44.345805][ T4049] RSP: 002b:00007f5a3c5d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[   44.345850][ T4049] RAX: ffffffffffffffda RBX: 00007f5a3e185fa0 RCX: 00007f5a3df6bb7c
[   44.345862][ T4049] RDX: 000000000000000f RSI: 00007f5a3c5d70a0 RDI: 0000000000000003
[   44.345874][ T4049] RBP: 00007f5a3c5d7090 R08: 0000000000000000 R09: 0000000000000000
[   44.345886][ T4049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   44.345897][ T4049] R13: 0000000000000000 R14: 00007f5a3e185fa0 R15: 00007fff0935d548
[   44.345915][ T4049]  </TASK>
[   44.695169][ T4070] FAULT_INJECTION: forcing a failure.
[   44.695169][ T4070] name failslab, interval 1, probability 0, space 0, times 0
[   44.707940][ T4070] CPU: 0 UID: 0 PID: 4070 Comm: syz.2.220 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) 
[   44.707963][ T4070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   44.707976][ T4070] Call Trace:
[   44.707981][ T4070]  <TASK>
[   44.707986][ T4070]  dump_stack_lvl+0xf6/0x150
[   44.708006][ T4070]  dump_stack+0x15/0x1a
[   44.708020][ T4070]  should_fail_ex+0x261/0x270
[   44.708039][ T4070]  should_failslab+0x8f/0xb0
[   44.708062][ T4070]  kmem_cache_alloc_node_noprof+0x5c/0x340
[   44.708123][ T4070]  ? __alloc_skb+0x10d/0x320
[   44.708213][ T4070]  __alloc_skb+0x10d/0x320
[   44.708240][ T4070]  netlink_alloc_large_skb+0xad/0xe0
[   44.708266][ T4070]  netlink_sendmsg+0x3da/0x720
[   44.708289][ T4070]  ? __pfx_netlink_sendmsg+0x10/0x10
[   44.708305][ T4070]  __sock_sendmsg+0x140/0x180
[   44.708339][ T4070]  ____sys_sendmsg+0x350/0x4e0
[   44.708359][ T4070]  __sys_sendmsg+0x1a0/0x240
[   44.708385][ T4070]  __x64_sys_sendmsg+0x46/0x50
[   44.708402][ T4070]  x64_sys_call+0x26f3/0x2e10
[   44.708421][ T4070]  do_syscall_64+0xc9/0x1c0
[   44.708497][ T4070]  ? clear_bhb_loop+0x25/0x80
[   44.708515][ T4070]  ? clear_bhb_loop+0x25/0x80
[   44.708592][ T4070]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   44.708613][ T4070] RIP: 0033:0x7ff2bf0ed169
[   44.708627][ T4070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   44.708644][ T4070] RSP: 002b:00007ff2bd757038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e
[   44.708663][ T4070] RAX: ffffffffffffffda RBX: 00007ff2bf305fa0 RCX: 00007ff2bf0ed169
[   44.708681][ T4070] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000003
[   44.708712][ T4070] RBP: 00007ff2bd757090 R08: 0000000000000000 R09: 0000000000000000
[   44.708724][ T4070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   44.708735][ T4070] R13: 0000000000000000 R14: 00007ff2bf305fa0 R15: 00007ffdcf382108
[   44.708751][ T4070]  </TASK>
[   45.053107][ T4097] FAULT_INJECTION: forcing a failure.
[   45.053107][ T4097] name fail_usercopy, interval 1, probability 0, space 0, times 0
[   45.066242][ T4097] CPU: 0 UID: 0 PID: 4097 Comm: syz.1.230 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) 
[   45.066274][ T4097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   45.066286][ T4097] Call Trace:
[   45.066292][ T4097]  <TASK>
[   45.066299][ T4097]  dump_stack_lvl+0xf6/0x150
[   45.066321][ T4097]  dump_stack+0x15/0x1a
[   45.066339][ T4097]  should_fail_ex+0x261/0x270
[   45.066431][ T4097]  should_fail+0xb/0x10
[   45.066446][ T4097]  should_fail_usercopy+0x1a/0x20
[   45.066464][ T4097]  strncpy_from_user+0x25/0x230
[   45.066493][ T4097]  ? getname_flags+0x81/0x3b0
[   45.066588][ T4097]  getname_flags+0xb0/0x3b0
[   45.066618][ T4097]  getname_uflags+0x21/0x30
[   45.066651][ T4097]  __x64_sys_execveat+0x5e/0x90
[   45.066671][ T4097]  x64_sys_call+0x2ac7/0x2e10
[   45.066723][ T4097]  do_syscall_64+0xc9/0x1c0
[   45.066745][ T4097]  ? clear_bhb_loop+0x25/0x80
[   45.066844][ T4097]  ? clear_bhb_loop+0x25/0x80
[   45.066867][ T4097]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   45.066912][ T4097] RIP: 0033:0x7f4541c5d169
[   45.066924][ T4097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48
[   45.066938][ T4097] RSP: 002b:00007f45402c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142
[   45.066952][ T4097] RAX: ffffffffffffffda RBX: 00007f4541e75fa0 RCX: 00007f4541c5d169
[   45.066979][ T4097] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003
[   45.066990][ T4097] RBP: 00007f45402c7090 R08: 0000000000001000 R09: 0000000000000000
[   45.067002][ T4097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001
[   45.067014][ T4097] R13: 0000000000000000 R14: 00007f4541e75fa0 R15: 00007ffff12602a8
[   45.067031][ T4097]  </TASK>
[   45.399848][ T4122] capability: warning: `syz.1.239' uses 32-bit capabilities (legacy support in use)
[   46.306604][ T4198] ==================================================================
[   46.314707][ T4198] BUG: KCSAN: data-race in mas_replace_node / mtree_range_walk
[   46.322262][ T4198] 
[   46.324579][ T4198] write to 0xffff888103572200 of 8 bytes by task 4197 on cpu 1:
[   46.332209][ T4198]  mas_replace_node+0x1b8/0x430
[   46.337063][ T4198]  mas_wr_store_entry+0x1e80/0x2460
[   46.342269][ T4198]  mas_store_prealloc+0x6d5/0x960
[   46.347285][ T4198]  mmap_region+0xf91/0x1630
[   46.351792][ T4198]  do_mmap+0x9ef/0xc80
[   46.355855][ T4198]  vm_mmap_pgoff+0x16d/0x2d0
[   46.360450][ T4198]  ksys_mmap_pgoff+0xd0/0x340
[   46.365134][ T4198]  x64_sys_call+0x1945/0x2e10
[   46.369818][ T4198]  do_syscall_64+0xc9/0x1c0
[   46.374325][ T4198]  entry_SYSCALL_64_after_hwframe+0x77/0x7f
[   46.380219][ T4198] 
[   46.382536][ T4198] read to 0xffff888103572200 of 8 bytes by task 4198 on cpu 0:
[   46.390069][ T4198]  mtree_range_walk+0x347/0x460
[   46.394919][ T4198]  mas_walk+0x16e/0x320
[   46.399073][ T4198]  lock_vma_under_rcu+0x97/0x290
[   46.404013][ T4198]  exc_page_fault+0x150/0x650
[   46.408696][ T4198]  asm_exc_page_fault+0x26/0x30
[   46.413542][ T4198] 
[   46.415867][ T4198] value changed: 0xffff8881044fbb0e -> 0xffff888103572200
[   46.422961][ T4198] 
[   46.425282][ T4198] Reported by Kernel Concurrency Sanitizer on:
[   46.431436][ T4198] CPU: 0 UID: 0 PID: 4198 Comm: syz.3.270 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) 
[   46.443406][ T4198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025
[   46.453453][ T4198] ==================================================================
[   46.804077][   T29] kauditd_printk_skb: 1703 callbacks suppressed
[   46.804090][   T29] audit: type=1400 audit(1743527486.241:2524): avc:  denied  { read write } for  pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0
[   47.012587][   T29] audit: type=1400 audit(1743527486.451:2525): avc:  denied  { read write } for  pid=3310 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0