last executing test programs: 1.97327819s ago: executing program 4 (id=209): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0xc, &(0x7f0000000180)=@framed={{0x18, 0x0, 0x0, 0x0, 0x80020}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x7}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='tlb_flush\x00', r1}, 0x10) mlock(&(0x7f0000000000/0x800000)=nil, 0x800000) munlockall() madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x8) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) (fail_nth: 2) 1.871200691s ago: executing program 4 (id=211): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="0b00000007000000010001000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000d0000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_setup(0x2278, &(0x7f0000000180)=<r1=>0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={<r2=>0xffffffffffffffff, <r3=>0xffffffffffffffff}) io_submit(r1, 0x2, &(0x7f0000000140)=[&(0x7f00000001c0)={0x0, 0x4, 0x0, 0x8, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x2}, &(0x7f0000000080)={0x0, 0x0, 0x2, 0x5, 0x2, r2, 0x0, 0x0, 0x0, 0x0, 0x2}]) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002c00)={0x2, &(0x7f0000000180)=[{0x14}, {0x6, 0x5, 0xcf, 0xad2}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000740)='scsi_dispatch_cmd_start\x00', r4}, 0x10) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps_rollup\x00') r5 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r5, 0x227a, &(0x7f0000000000)) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000b40)={&(0x7f0000000a00)=ANY=[@ANYBLOB="9feb010018000000000000002800000016000000060000000400000001008f0d217300000200000009000000050000002f070000000000000f03000000e3dad89e30302e2600"], &(0x7f0000000c40)=""/110, 0x46, 0x6e, 0x1, 0x4, 0x0, @void, @value}, 0x28) r6 = shmget$private(0x0, 0x2000, 0x80, &(0x7f000005f000/0x2000)=nil) shmctl$SHM_INFO(r6, 0xe, &(0x7f0000000cc0)=""/4096) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='ext4_free_inode\x00', r4, 0x0, 0xbc8}, 0x18) 1.252896241s ago: executing program 2 (id=231): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, 0x0, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={0x0, 0x2b8}, 0x1, 0x0, 0x0, 0x20000000}, 0x4048010) r3 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x702, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$SO_TIMESTAMPING(r3, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r3, &(0x7f0000000380)={0x2, 0x0, @local}, 0x10) connect$inet(r3, &(0x7f0000000480)={0x2, 0x4e20, @multicast2}, 0x10) sendmmsg(r3, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r3, 0x0, 0x17, &(0x7f0000000040)=0xe, 0x36) setsockopt$inet_int(r3, 0x0, 0x3, &(0x7f0000000180)=0x5, 0x4) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r4 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r5 = dup2(r4, r4) ioctl$BLKTRACESETUP(r5, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x200000a, 0x1, 0x8}) ioctl$BLKTRACESETUP(r4, 0x1276, 0x0) r6 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000180000000000000000000000000b6f7e8000000000000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r6}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = getpid() setreuid(0xee00, 0x0) r8 = syz_pidfd_open(r7, 0x0) setns(r8, 0x24020000) syz_clone3(&(0x7f00000008c0)={0x15340180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r7], 0x1}, 0x58) 1.124679403s ago: executing program 2 (id=232): r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r1}, 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xafd, 0x0, @perf_bp={0x0, 0x8}, 0x110a, 0x5dd9, 0x0, 0x5, 0xfffffffffffffffd, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x3, 0x0, 0x0, @local, @local, 0x10, 0x7, 0x2, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000600)={'syztnl1\x00', 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, <r4=>0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="ff9ecd415a6ad1af155f2fb481280000001800e73e31ccf36f13fc1b0100000000000000", @ANYRES32=r4, @ANYBLOB], 0x28}}, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000300)={@id={0x2, 0x0, @d}, 0x40, 0x0, '\x00', @b}) open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x14) capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000040)={0x1000, 0x10ffff, 0xfffffffd}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000440)='console\x00', r6, 0x0, 0x4000000001}, 0x18) sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x600, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x13}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffff}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmmsg$inet6(r7, &(0x7f0000000480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x80020}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000034c0)='\x00', 0x1}], 0x1}}], 0x1, 0x34000811) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="30e01b3981ddca"], 0x1000f) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="38000000031401002abd7000f6dbdf250900020073397a3100000000080041007369770014003300626f6e6430000000000000000000ff0092adb943d7640118cf1b739925ea34517e9d13f9ef331bb56d14a8c3627f76c69d3c4b1d3b14207056c3a8b0550e6c904319d954141f04a6651dae02bf050efba51af1de0bbbec6cf938ec09a4acdaa1230c4fac2af1a9145c248395bd8601438f43e3afa0f00b50f00dafed5c07f19c088e93bad69c06cb26ff09e92411479de2df"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) socket$netlink(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x7, 0x2, 0xa, 0x1}, {0xfeff, 0x5, 0x2, 0x3}, {0x8, 0x7, 0x2, 0x3}, {0x9, 0x9, 0xec, 0x3}, {0xc31, 0x5, 0x8, 0xa}, {0x9, 0x8, 0x4, 0x10001}]}) accept4$packet(0xffffffffffffffff, &(0x7f0000000140)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000180)=0x14, 0x800) 991.198095ms ago: executing program 4 (id=234): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="180000000008002b000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x11, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r0}, 0x10) bpf$PROG_LOAD(0x5, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x3) sendmsg$inet(0xffffffffffffffff, 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f00000002c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) syz_clone(0xc0126080, 0x0, 0x0, 0x0, 0x0, 0x0) 768.731728ms ago: executing program 1 (id=243): syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000740)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x0, &(0x7f00000006c0), 0x2, 0x246, &(0x7f0000000ac0)="$eJzs3T9oM2UcB/DvXRJf+75BXnURxD8gIloor5vg8rooFKQUEUGFioiL0gq1xa1xcnHQWaWTSxE3q6N0KS6K4FS1Q10ELQ4WBx0iybVS24ja1Jz0Ph+43l3vee73HLnvkyyXBGisq0muJ2klmU7SSVIcb3B3tVw93F2f2l5I+v0nfiqG7ar9ylG/K0l6SR5KslUWeamdrG4+s/fLzmP3vbnSuff9zaenJnqRh/b3dh8/eG/ujY9mH1z94qsf5opcT/dP13X+ihH/axfJLf9Fsf+Jol33CPgn5l/78OtB7m9Ncs8w/52UqV68t5Zv2OrkgXf/qu/bP355+yTHCpy/fr8zeA/s9YHGKZN0U5QzSartspyZqT7Df9O6XL68tPzq9ItLK4sv1D1TAeelm+w++smlj6+cyP/3rSr/wMU1yP+T8xvfDrYPWnWPBpiIO6rVIP/Tz63dH/mHxpF/aC75h+aSf2gu+Yfmkn9oLvmHC6xztNEbeVj+obnkH5pL/qG5jucfAGiW/qW6n0AG6lL3/AMAAAAAAAAAAAAAAAAAAJy2PrW9cLRMquZn7yT7jyRpj6rfGv4ecXLj8O/ln4tBsz8UVbexPHvXmCcY0wc1P31903f11v/8znrrry0mvdeTXGu3T99/xeH9d3Y3/83xzvNjFviXihP7Dz812fon/bZRb/3ZneTTwfxzbdT8U+a24Xr0/NM9/hXLZ/TKr2OeAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgIn5PQAA//8PK23M") prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000001"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8c33d7dd773ce784, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f0000000300)='sched_switch\x00', r4}, 0x10) fsopen(&(0x7f00000001c0)='ramfs\x00', 0x0) (fail_nth: 1) creat(&(0x7f0000000100)='./bus\x00', 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='cpuacct.usage_percpu\x00', 0x275a, 0x0) 728.987209ms ago: executing program 1 (id=244): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) ftruncate(0xffffffffffffffff, 0xc17a) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) sendmsg$inet(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) r3 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x1f, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x6}, [@generic={0x5, 0x8, 0x1, 0x5aa, 0xa226}, @ldst={0x2, 0x3, 0x2, 0xb, 0x6, 0xc, 0xffffffffffffffff}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @ringbuf_query, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x9, 0x5, 0x0, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000440)='syzkaller\x00', 0x40, 0x4f, &(0x7f0000000480)=""/79, 0x41100, 0x38, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x8, 0x8000, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x1, 0x3, 0xd, 0x8}, {0x4, 0x2, 0xc, 0x6}, {0x0, 0x5, 0x1, 0x1}], 0x10, 0x9, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000200)='mem_connect\x00', r3, 0x0, 0xc}, 0x18) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020148100000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x10) (async) ftruncate(0xffffffffffffffff, 0xc17a) (async) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000012c0)) (async) sendmsg$inet(r1, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000b80)=[{&(0x7f00000005c0)='F', 0x1}], 0x1}, 0x0) (async) recvmsg(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)=[{&(0x7f0000000340)=""/251, 0x2}], 0x1}, 0x40000100) (async) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x11, 0x1f, &(0x7f0000000240)=@framed={{0x18, 0x0, 0x0, 0x0, 0x10000, 0x0, 0x0, 0x0, 0x6}, [@generic={0x5, 0x8, 0x1, 0x5aa, 0xa226}, @ldst={0x2, 0x3, 0x2, 0xb, 0x6, 0xc, 0xffffffffffffffff}, @printk={@lli, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x3, 0x0, 0x0, 0x4}}, @ringbuf_query, @ringbuf_output={{0x18, 0x1, 0x1, 0x0, 0x1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x2}, {}, {}, {}, {}, {0x7, 0x0, 0xb, 0x4, 0x0, 0x0, 0x1}}, @jmp={0x5, 0x0, 0x9, 0x5, 0x0, 0xfffffffffffffff4, 0x4}, @cb_func={0x18, 0x7, 0x4, 0x0, 0xfffffffffffffffe}, @map_idx_val={0x18, 0xb, 0x6, 0x0, 0x8, 0x0, 0x0, 0x0, 0x3}]}, &(0x7f0000000440)='syzkaller\x00', 0x40, 0x4f, &(0x7f0000000480)=""/79, 0x41100, 0x38, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, &(0x7f0000000500)={0x0, 0x8, 0x8000, 0x2}, 0x10, 0x0, 0x0, 0x3, &(0x7f0000000540)=[0xffffffffffffffff, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xffffffffffffffff, r2, 0xffffffffffffffff, 0xffffffffffffffff], &(0x7f0000000580)=[{0x1, 0x3, 0xd, 0x8}, {0x4, 0x2, 0xc, 0x6}, {0x0, 0x5, 0x1, 0x1}], 0x10, 0x9, @void, @value}, 0x94) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000200)='mem_connect\x00', r3, 0x0, 0xc}, 0x18) (async) sendmsg$inet(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)=[{&(0x7f0000001300)="d3", 0x1}], 0x1}, 0x0) (async) 725.808279ms ago: executing program 4 (id=245): bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0b0000000500ffe5050000100900000001000000147506a56b70e6d0ab7d1212c2189c9384ca9d9cdec916c1c112bc4766480f67b4bb4f89dbb53a4d440fa936cde3fb2b386409ab0c51e57c1ac1ba55946525647133a61fc71a001984ff3dd45cf731", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) symlinkat(&(0x7f0000001040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') creat(&(0x7f0000000240)='./bus\x00', 0xc2) io_setup(0x7f, &(0x7f0000000100)) perf_event_open(&(0x7f0000000200)={0x2, 0xa9, 0x3d, 0x1, 0x0, 0x4, 0x0, 0x5, 0x62000, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x3304d38bcd9160e2, 0x0, 0x0, 0x6, 0x4, 0x3, 0xa, 0x0, 0x0, 0x0, 0x80000000}, 0x0, 0x2, 0xffffffffffffffff, 0x8) socket$inet6_tcp(0xa, 0x1, 0x0) removexattr(&(0x7f00000003c0)='./file0\x00', &(0x7f00000004c0)=@known='trusted.overlay.origin\x00') syz_mount_image$vfat(&(0x7f0000000400), &(0x7f0000000280)='./file0\x00', 0x414, &(0x7f0000000080)=ANY=[@ANYBLOB="6e6f6e756d7461696c2c6e66732c73686f72746e616d653d6c6f7765722c757466383d312c64656275672c696f636861727365743d757466382c73686f72746e616d653d6d697865642c757466383d312c004845160000000000"], 0x1, 0x2a1, &(0x7f0000000f40)="$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") creat(&(0x7f0000000040)='./file0\x00', 0xa6) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="06000000040000006c0f00000a"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000300)='sys_enter\x00', r0}, 0x10) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, <r1=>0xffffffffffffffff}, 0x0) dup(r1) 658.62618ms ago: executing program 1 (id=247): bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0200000004000000020000000c0000000014"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a90020000060a0b04000000000000000002000000400204803c0201800a0001006d617463680000002c020280080002400000000115020300d67a8527f76ec1d39e537c4c3060c6a405106c72848aa8bcb429b3a20d532452032d5f146334739d1719a5778bd4f724ee4ca57f2527aeeb0c75755d68fc6fa55f4825682ee95e581039823e5963beedcf65b8b005623d90772b8b6ebd2498b0aff725a3eabb6c99cb2edfe10b9c33be8a971e08401bc0807e75a2ff376b7934473bc1f02bb512b77414daf260c9c7d4e1f0758b56ec5823892af310e6252fcfb1d9dbaddefdaa26f43f12f831fd221926d6536eeff641db46920ae0e48f3ff5de599714ba6510ce479d4116a519792281736f39c9fc0e10ef557392c43389271cebcf36543fcf6f83bf74b93ee4eb5e8c82e35bb4784cc1ed0ad291b16e8368487589f7590bf5896f340a36555a1cf69736da230a809176dbdfba3d47efb9a6932e5503d277532b7d4e6f7c7373a298e5843a9f74d5fd07fbc6ad22bc644ba9b3c94ec3c8f0b9321b16e5826b1f058f781760a5d4b6a8880202b41689139c37cd51f65a92d883f8901add03b650c9ec182fb565a4d657ebba9d6a5eb426b22d5933b72362e6ec327fb679aa8034b8b3b6680ad138be47652a3e77981187d2921cebfc1639aa280e3d38dba9b1af49ceded79c78a2d656b3a3e946e17e6257def6679f70f11aa01a2d906aecf4dbc7d1a332a8932ed719ce7eecb5450f494f944b3f6b637502ddba609c6e45dcfad1db7c7dda3e2c755ddcf27132985442e9b8df16f96c82e72e3e2491856d07756b9f8700000008000100627066000900010073797a30000000000900020073797a32"], 0x2b8}, 0x1, 0x0, 0x0, 0x20000000}, 0x4048010) r2 = socket$inet_udp(0x2, 0x2, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000140)={0xffffffffffffffff, 0x702, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x50) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x25, &(0x7f0000000080)=0x474c, 0x4) bind$inet(r2, &(0x7f0000000380)={0x2, 0x0, @local}, 0x10) connect$inet(r2, &(0x7f0000000480)={0x2, 0x4e20, @multicast2}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) setsockopt$inet_int(r2, 0x0, 0x17, &(0x7f0000000040)=0xe, 0x36) setsockopt$inet_int(r2, 0x0, 0x3, &(0x7f0000000180)=0x5, 0x4) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) mknod$loop(&(0x7f0000000080)='./file0\x00', 0x100000000000600d, 0x1) r3 = creat(&(0x7f0000000280)='./file0\x00', 0x0) r4 = dup2(r3, r3) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x200000a, 0x1, 0x8}) ioctl$BLKTRACESETUP(r3, 0x1276, 0x0) r5 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="00000000000180000000000000000000000000b6f7e8000000000000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r5}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) r7 = getpid() setreuid(0xee00, 0x0) r8 = syz_pidfd_open(r7, 0x0) setns(r8, 0x24020000) syz_clone3(&(0x7f00000008c0)={0x15340180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f00000002c0)=[r7], 0x1}, 0x58) 621.7586ms ago: executing program 4 (id=249): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b708000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000950000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) (async) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000002540)={{r0}, &(0x7f00000024c0), &(0x7f0000002500)}, 0x20) (async) munmap(&(0x7f0000002000/0x1000)=nil, 0x1000) (async) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) sendto$inet6(r2, &(0x7f0000000500)="a4", 0x34000, 0x2000c851, &(0x7f0000000140)={0xa, 0x4e23, 0x0, @loopback, 0xffffffff}, 0x1c) 562.603361ms ago: executing program 4 (id=250): r0 = socket$nl_rdma(0x10, 0x3, 0x14) r1 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480), 0x4) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xafd, 0x0, @perf_bp={0x0, 0x8}, 0x110a, 0x5dd9, 0x0, 0x5, 0xfffffffffffffffd, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r3 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r3, 0x89f1, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x3, 0x0, 0x0, @local, @local, 0x10, 0x7, 0x2, 0x8}}) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r3, 0x89f2, &(0x7f0000000600)={'syztnl1\x00', 0x0}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000040)={0x0, <r4=>0x0}, &(0x7f00000000c0)=0xc) sendmsg$nl_generic(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYBLOB="ff9ecd415a6ad1af155f2fb481280000001800e73e31ccf36f13fc1b0100000000000000", @ANYRES32=r4, @ANYBLOB], 0x28}}, 0x0) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(0xffffffffffffffff, 0xc0506617, &(0x7f0000000300)={@id={0x2, 0x0, @d}, 0x40, 0x0, '\x00', @b}) open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x14) capset(&(0x7f0000000080)={0x20080522}, &(0x7f0000000040)={0x1000, 0x10ffff, 0xfffffffd}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000440)='console\x00', r6, 0x0, 0x4000000001}, 0x18) sendmsg$nl_route_sched(r5, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000700)=@newtaction={0x8c, 0x30, 0x1, 0x0, 0x600, {}, [{0x78, 0x1, [@m_ct={0x2c, 0x2, 0x0, 0x0, {{0x7}, {0x4}, {0x4, 0x2}, {0xc}, {0xc}}}, @m_ife={0x48, 0x1, 0x0, 0x0, {{0x13}, {0x20, 0x2, 0x0, 0x1, [@TCA_IFE_PARMS={0x1c, 0x1, {{0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffff}}}]}, {0x25}, {0xc}, {0xc}}}]}]}, 0x8c}}, 0x0) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r7, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r7, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r7, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmmsg$inet6(r7, &(0x7f0000000480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x80020}, 0x1c, &(0x7f0000000500)=[{&(0x7f00000034c0)='\x00', 0x1}], 0x1}}], 0x1, 0x34000811) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r7, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="30e01b3981ddca"], 0x1000f) setsockopt$IPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000540)=@raw={'raw\x00', 0x8, 0x3, 0x4d8, 0x340, 0x11, 0x148, 0x340, 0x0, 0x440, 0x2a8, 0x2a8, 0x440, 0x2a8, 0x3, 0x0, {[{{@uncond, 0x0, 0x2f8, 0x340, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x88000000, 0x3, 0x7}}}, @common=@unspec=@bpf1={{0x230}, @pinned={0x1, 0x0, 0x0, './file0\x00'}}]}, @unspec=@CT0={0x48}}, {{@ip={@multicast2, @empty, 0x0, 0x0, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@unspec=@quota={{0x38}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x538) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000780)=ANY=[@ANYBLOB="38000000031401002abd7000f6dbdf250900020073397a3100000000080041007369770014003300626f6e6430000000000000000000ff0092adb943d7640118cf1b739925ea34517e9d13f9ef331bb56d14a8c3627f76c69d3c4b1d3b14207056c3a8b0550e6c904319d954141f04a6651dae02bf050efba51af1de0bbbec6cf938ec09a4acdaa1230c4fac2af1a9145c248395bd8601438f43e3afa0f00b50f00dafed5c07f19c088e93bad69c06cb26ff09e92411479de2df"], 0x38}, 0x1, 0x0, 0x0, 0x800}, 0x20000000) socket$netlink(0x10, 0x3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000080)={0x6, &(0x7f0000000040)=[{0x7, 0x2, 0xa, 0x1}, {0xfeff, 0x5, 0x2, 0x3}, {0x8, 0x7, 0x2, 0x3}, {0x9, 0x9, 0xec, 0x3}, {0xc31, 0x5, 0x8, 0xa}, {0x9, 0x8, 0x4, 0x10001}]}) 532.863732ms ago: executing program 1 (id=251): socket$nl_rdma(0x10, 0x3, 0x14) socket$netlink(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xafd, 0x0, @perf_bp={0x0, 0x8}, 0x110a, 0x5dd9, 0x0, 0x5, 0xfffffffffffffffd, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x3, 0x0, 0x0, @local, @local, 0x10, 0x7, 0x2, 0x8}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmmsg$inet6(r2, &(0x7f0000000480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x80020}, 0x1c, &(0x7f0000000500)}}], 0x1, 0x34000811) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="30e01b3981ddca"], 0x1000f) 488.054502ms ago: executing program 1 (id=252): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() connect$inet(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) syz_open_dev$usbfs(&(0x7f0000000040), 0x3, 0x100) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000180)={{0x1, 0x1, 0x18, <r3=>r2}, './file0\x00'}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0xe0, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, &(0x7f00000001c0)=[0x0, 0x0, 0x0, 0x0], ""/16, <r4=>0x0, 0x0, 0x0, 0x0, 0x8, 0x2, &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000280)=[0x0, 0x0], 0x0, 0xd7, &(0x7f00000002c0)=[{}, {}, {}, {}, {}, {}, {}, {}], 0x40, 0x10, &(0x7f0000000340), &(0x7f0000000380), 0x8, 0x6f, 0x8, 0x8, &(0x7f00000003c0)}}, 0x10) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000005c0)={r3, r4, 0x25, 0x14, @void}, 0x10) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = socket$netlink(0x10, 0x3, 0xf) bind$netlink(r6, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r7 = syz_genetlink_get_family_id$ethtool(&(0x7f0000001440), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_COALESCE_SET(r5, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000001600)={&(0x7f0000001500)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r7, @ANYBLOB="010000400000000000ce0171e21baaafdf0014000000180001801400020073797a5f74756e000000000000000000"], 0x34}}, 0x0) r8 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r8, 0x84, 0x22, &(0x7f00000001c0)={0x8, 0x0, 0x0, 0xa}, 0x10) bind$inet(r8, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) setsockopt$inet_sctp_SCTP_INITMSG(r8, 0x84, 0x2, &(0x7f0000000040)={0x0, 0x3}, 0x8) sendto$inet(r8, &(0x7f0000000300)="ab", 0x1a000, 0x0, &(0x7f0000000380)={0x2, 0x4e22, @local}, 0x10) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000c00)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000bc0)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', r4, @fallback=0xa, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r3, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r9}, 0x10) unshare(0x62040200) recvmsg$inet_nvme(r3, &(0x7f0000000b80)={&(0x7f0000000600)=@ax25={{0x3, @netrom}, [@null, @remote, @remote, @netrom, @netrom, @remote, @netrom, @bcast]}, 0x80, &(0x7f0000000ac0)=[{&(0x7f0000000740)=""/90, 0x5a}, {&(0x7f00000007c0)=""/23, 0x17}, {&(0x7f0000000800)=""/35, 0x23}, {&(0x7f0000000840)=""/87, 0x57}, {&(0x7f00000008c0)=""/4, 0x4}, {&(0x7f0000000900)=""/198, 0xc6}, {&(0x7f0000000a00)=""/181, 0xb5}], 0x7, &(0x7f0000000b40)=""/37, 0x25}, 0x10191) 407.932823ms ago: executing program 0 (id=254): syz_open_dev$rtc(&(0x7f0000000140), 0x0, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x2, 0x800800000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xff7b, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) 407.216844ms ago: executing program 0 (id=255): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x3, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=<r1=>r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000040)=ANY=[@ANYBLOB, @ANYRES32=r0, @ANYBLOB="1800000000008000000000000000000018110000", @ANYRESDEC=r1], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000180)={r0}, 0x4) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x0}, @generic={0x66}, @initr0, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) 406.437644ms ago: executing program 0 (id=256): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000001000)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000140)='sched_switch\x00', r2}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x12, &(0x7f0000000080)=@framed={{0x18, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000}, [@func={0x85, 0x0, 0x1, 0x0, 0x6}, @map_fd={0x18, 0x2, 0x0}, @generic={0x66}, @initr0, @alu={0x6, 0x0, 0x3, 0xa}, @printk={@x, {}, {}, {}, {}, {0x5, 0x0, 0xb, 0xa}}]}, &(0x7f0000000000)='GPL\x00', 0x2, 0xde, &(0x7f0000000340)=""/222, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) (fail_nth: 2) 405.936474ms ago: executing program 1 (id=257): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() connect$inet(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) unshare(0x62040200) 347.297085ms ago: executing program 0 (id=258): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0) sendmsg$ETHTOOL_MSG_FEATURES_SET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)={0x38, r1, 0x1, 0x70bd2a, 0x25dfdbfb, {}, [@ETHTOOL_A_FEATURES_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_batadv\x00'}]}, @ETHTOOL_A_FEATURES_WANTED={0xc, 0x3, 0x0, 0x1, [@ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xffffffff}]}]}, 0x38}, 0x1, 0x0, 0x0, 0x44000}, 0x44004) syz_emit_ethernet(0x86, &(0x7f00000010c0)={@broadcast, @multicast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x78, 0x0, 0x0, 0x0, 0x1, 0x0, @private=0xa010102, @local}, @redirect={0x3, 0x4, 0x0, @broadcast=0x1000000, {0x17, 0x4, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x11, 0x0, @empty, @empty, {[@timestamp_addr={0x44, 0xc, 0x0, 0x1, 0x0, [{@remote, 0x6e210000}]}, @timestamp_addr={0x44, 0x3c, 0x0, 0x1, 0x2, [{@multicast1}, {@broadcast}, {@initdev={0xac, 0x1e, 0x1, 0x0}}, {@private=0xa010101}, {@empty}, {@initdev={0xac, 0x1e, 0x0, 0x0}}, {@dev}]}]}}}}}}}, 0x0) 346.973875ms ago: executing program 0 (id=259): ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f0000000040)='1\a') r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000020000000000000004850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = memfd_create(&(0x7f0000000400)='\xa3\x9fn\xb4dR\x04i5\x02\xac\xce\xe1\x88\x9d[@8\xd7\xce\x1f 9I\x7f\x15\x1d\x93=\xb5\xe7\\\'L\xe6\xd2\x8e\xbc)JtTDq\x81\xcf\x81\xba\xe51\xf5 \xc8\x10>\xc9\\\x85\x17L\xbf\xcf\x91\xdfM\xf3\x02^T*\x00\x02\xb9~B\x9f\xacl\x1d3\x06o\xf8\x16H\xaa*\x02\xf7\xfb\x06\xf1\x83\x92\xa8\xc2\xcb\xae\xb0\xb4\x93\xb8\x04\xf1\x99\xc2yY+\xd9y\x8a\xd5b\xe8\"q\x1b0)\xccm\xacz\xc1\xadd\x9b6a\xf3\xdds\xbb\x88\xff\b\x85\xb3s\x00\x0e\xbcfvi\x85\xfc.|\xd4h\xec\x82o\x8e\x93\x11\xc1\xd4\xae\x05\x17=\xd9R\xd0\xd4\x90\xcf\x9b\xdc\xaeV\x88\x94\x9f\xe3\xefqi\xed\xa8w\xbe\xd0\xd0-tBl\x9e+\xd3\xed\xce\x9f\x83\x86\xf9\x12\x16Ts\x80\x13]C\xfb`\xc2`\xf7\x1a\x00\x00\x00\x00\x00\x00\x00k\xae\xcb\x1a.\xc2\x8f\xd1x4]PZ\x9e\xd5Y\xf0L\xa4\xbc\x84\xf6\x04L\xff0\x8b\\*\xf9,\xb6\r\x97\xedy\xe0\x8a\xe2\x8ck\xc6S\xc3g\xb9\x1a\xf8\x8f \x9d\x00u7\xd8\'\xf1E\xa4(Q\x80Fy\xb5\xe4q\xc9\xff \xd8\x9d\xad\x11\xf8m\xd3\xbc\x9e\x10D\x7f!\xca\x0ev\x15h$\x01\xdd\xe5\xce\xf8*\xb3\x01\x85\a\xe4qv&\x9c\xac\x9aN~o\xe5\x89\xd5\a\x9f\f\x1f\xc2e/\x8d\x1e\n\xd0_\xbd!^\xa46\xb8j\xc0x\n\xdb\xe1\xa3\xd6\xae;\r\x92@\xa5I\x88Z1F\xf0\x1at\t\xd0\x8a\x04m\x06\xf3BL\xffS\x9eY\xf4\xb0U \xf8\xd00\x88y\xebX\x92\xd5\xbb\xa1h7\xf3\xe0\x0f\xbd\x02\xe4%\xf9\xb1\x87\x8aM\xfeG\xb2L\xbd\x92-\xcd\x1f\xf4\xe1,\xb7G|\xec\"\xa2\xab\xf6\x84\xe0\xcf1\x9a', 0x1) r2 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$IP_VS_SO_SET_ADD(r2, 0x0, 0x482, &(0x7f0000000040)={0x84, @private=0xa010100, 0x15, 0x3, 'none\x00', 0x1, 0x4, 0x75}, 0x2c) setsockopt$IP_VS_SO_SET_ADDDEST(r2, 0x0, 0x487, &(0x7f0000000000)={{0x11, @broadcast, 0x4e21, 0x3, 'lc\x00', 0xb, 0x323b, 0x25}, {@rand_addr=0x64010102, 0x4e23, 0x4, 0xc3, 0x12d5c, 0x12d5c}}, 0x44) r3 = syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0xa00040, &(0x7f0000000000)={[{@bsdgroups}, {@grpid}, {@usrquota}]}, 0x1, 0x5b2, &(0x7f00000037c0)="$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") r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x126) name_to_handle_at(r3, &(0x7f0000000180)='./file0\x00', 0x0, &(0x7f0000000340), 0x1000) pwrite64(r4, &(0x7f0000000140)='2', 0xfdef, 0xfecc) write$binfmt_elf32(r1, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c466000002ed8e4f97765ce27b90300060000000000000000b738000000000035f4c38422a3bc8220000500000004020300b300000000002a002400b3d7c52ebf31a8d5c8c3c6cb00000009e500d5ffffff05ffffff03"], 0xd8) execveat(r1, &(0x7f0000000000)='\x00', 0x0, 0x0, 0x1000) 346.771105ms ago: executing program 0 (id=260): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r0 = getpid() connect$inet(0xffffffffffffffff, 0x0, 0x0) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000200)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="18090000000000000000000000000000850000006d0000001801000020696c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007000000095"], 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) unshare(0x62040200) 284.681886ms ago: executing program 2 (id=261): r0 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(0xffffffffffffffff, 0x84, 0x72, &(0x7f0000000000)={<r1=>0x0, 0xe5af, 0x30}, &(0x7f0000000040)=0xc) getsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000080)={<r2=>r1, 0x4, 0x9, 0x8}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000100)={<r3=>r2, 0x2}, &(0x7f0000000140)=0x8) setsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x1, &(0x7f0000000180)={r3, 0x400, 0x3, 0x0, 0x7f, 0x1000}, 0x14) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f00000001c0)={r2, 0x4}, &(0x7f0000000200)=0x8) mount$bind(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, 0x0) r4 = gettid() r5 = perf_event_open$cgroup(&(0x7f0000000380)={0x2, 0x80, 0x7f, 0x7, 0x6, 0x2, 0x0, 0x3, 0x40000, 0x7, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000001, 0x0, @perf_config_ext={0x8, 0xdd64}, 0x0, 0x8, 0xa0, 0x52554c061e4cab8e, 0x8, 0x1, 0x200, 0x0, 0xfffffffb, 0x0, 0x80000001}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000300)={0x3, 0x80, 0xc, 0x6, 0x3, 0xe, 0x0, 0xa, 0x100, 0x5, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5, 0x4, @perf_config_ext={0x100000001, 0x9}, 0x101000, 0x2, 0xfff, 0x0, 0x80, 0x10, 0x2, 0x0, 0xf35d, 0x0, 0x3}, r4, 0x3, r5, 0x2) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000440)=@generic={&(0x7f0000000400)='./file0\x00', 0x0, 0x8}, 0x18) r6 = socket$inet6_sctp(0xa, 0x6, 0x84) getsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r6, 0x84, 0x6, &(0x7f0000000480)={r1, @in={{0x2, 0x4e22, @rand_addr=0x64010101}}}, &(0x7f0000000540)=0x84) pipe(&(0x7f0000000580)={<r7=>0xffffffffffffffff, <r8=>0xffffffffffffffff}) sendmsg$NFT_BATCH(r8, &(0x7f00000006c0)={&(0x7f00000005c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000680)={&(0x7f0000000600)={{0x14}, [@NFT_MSG_NEWOBJ={0x48, 0x12, 0xa, 0x5, 0x0, 0x0, {0x5, 0x0, 0x6}, @NFT_OBJECT_CT_HELPER=@NFTA_OBJ_DATA={0x34, 0x4, 0x0, 0x1, [@NFTA_CT_HELPER_L4PROTO={0x5, 0x3, 0x11}, @NFTA_CT_HELPER_NAME={0x9, 0x1, 'syz0\x00'}, @NFTA_CT_HELPER_L4PROTO={0x5, 0x3, 0x11}, @NFTA_CT_HELPER_NAME={0x9, 0x1, 'syz1\x00'}, @NFTA_CT_HELPER_L4PROTO={0x5, 0x3, 0x6}]}}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x5}}}, 0x70}, 0x1, 0x0, 0x0, 0x90}, 0x4c004) unlink(&(0x7f0000000700)='./file0\x00') prctl$PR_SET_NAME(0xf, &(0x7f0000000740)='\\-*\x00') sigaltstack(&(0x7f0000000840)={&(0x7f0000000780)=""/137, 0x7, 0x89}, &(0x7f0000000900)={&(0x7f0000000880)=""/80, 0x0, 0x50}) r9 = add_key$keyring(&(0x7f00000009c0), &(0x7f0000000a00)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffa) add_key$keyring(&(0x7f0000000940), &(0x7f0000000980)={'syz', 0x1}, 0x0, 0x0, r9) mount$bind(&(0x7f0000000a40)='./file0\x00', &(0x7f0000000a80)='./file0\x00', &(0x7f0000000ac0), 0x0, 0x0) writev(r0, &(0x7f0000000b80)=[{&(0x7f0000000b00)="42bda064ff4dda006c93389c5f45a30e5b4e124d0352c07c50791d54de0fe8af6c3d2ed49c498133c81c7ff01e480380ce5b353dbf5141bef4067ba82d", 0x3d}, {&(0x7f0000000b40)="fe8288", 0x3}], 0x2) prctl$PR_SET_NAME(0xf, &(0x7f0000000bc0)='pipefs\x00') r10 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000c80)=@o_path={&(0x7f0000000c40)='./file0\x00', 0x0, 0x8, r8}, 0x18) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000d00)={{r7}, &(0x7f0000000c00), &(0x7f0000000cc0)=r10}, 0x20) sendmmsg(r8, &(0x7f0000000f80)=[{{0x0, 0x0, &(0x7f0000000d80)=[{&(0x7f0000000d40)="fae500f87cc6abe809a9e1b077", 0xd}], 0x1, &(0x7f0000000dc0)=[{0xb0, 0x112, 0x800, "1ca3a72b43706add67a4ad74bebec8602b72a451a77fac640c7b81929d4a1c4f1f60525c4c7b4f101648e5138e13bb3bde49926545f38035bb006dea812b25ce152754774a3f10ffd9e2758a0680ffdc9215591b8e8bf4c23eec745cfc028dcf5ad2267d3ebe61ef518e263c2f7ffab7573df37a2d7f5eba0d2151bd0ce011d5b05ea5bbc04b7a782ea6ccc83bf8176689ba65a12223b951018a"}, {0xf8, 0x84, 0x6, "69bdb968bfc9c004bb0608c6e55a33ab0f7b64eed4e81d67b5a8b0360057dfb26e6635f56a8c854eedbcf7246e24959ce416f9e11fe187740117a682649320063c04734e1b87cd8820a6dfef108b1dbc22288699ca49999de9ea9a11205bc6b703cdbe4849418239e9db7e170dc046cd411ee7d3a9fa93a1fd6795ee7c0f43f1e5f54aa7f6aecfc5a2cd2bec47b57349007d207190781ad57dc6e05961ac77f9ff59549097198d0266120f8225a7a357ebf24a31cedaac0b1fd67e702d6a42bb46d483bbc5bada826c166a0ae8d6cb123036598f36d22fe841b536a860f74aecb0"}], 0x1a8}}], 0x1, 0x40080) setxattr$security_ima(&(0x7f0000000fc0)='\x00', &(0x7f0000001000), &(0x7f0000001040)=@v1={0x2, "6b4a0a13c9b7008742f59c50"}, 0xd, 0x3) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000001100)={0x1, 0x58, &(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, ""/16, <r11=>0x0}}, 0x10) bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000001140)={0x3, 0x4, 0x4, 0xa, 0x0, 0xffffffffffffffff, 0x80000001, '\x00', r11, r7, 0x3, 0x5, 0x1, 0x0, @void, @value, @void, @value}, 0x50) sendmsg$NL80211_CMD_STOP_AP(0xffffffffffffffff, &(0x7f0000001280)={&(0x7f00000011c0), 0xc, &(0x7f0000001240)={&(0x7f0000001200)={0x14, 0x0, 0x200, 0x70bd2d, 0x25dfdbfb, {{}, {@void, @void}}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x80}, 0x40c0) 222.247946ms ago: executing program 2 (id=262): socket$nl_rdma(0x10, 0x3, 0x14) socket$netlink(0x10, 0x3, 0x0) r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a00)=ANY=[@ANYBLOB="0200000004000000080000000100000080"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000480)={r0}, 0x4) bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x18, &(0x7f00000001c0)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000000000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70500000000000085000000a5000000180100002020640500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000a50000000800000095"], &(0x7f0000000680)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @void, @value}, 0x94) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x40, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xafd, 0x0, @perf_bp={0x0, 0x8}, 0x110a, 0x5dd9, 0x0, 0x5, 0xfffffffffffffffd, 0x8, 0xfffb, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r1 = socket$inet6(0xa, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r1, 0x89f1, &(0x7f00000004c0)={'ip6tnl0\x00', &(0x7f0000000740)={'syztnl1\x00', 0x0, 0x29, 0x0, 0x3, 0x0, 0x0, @local, @local, 0x10, 0x7, 0x2, 0x8}}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000008000000000000001000000940000000fad413ec50000000f00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x78) r2 = socket$inet6_sctp(0xa, 0x1, 0x84) setsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r2, 0x84, 0x76, &(0x7f0000444ff8)={0x0, 0x7}, 0x8) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r2, 0x84, 0x75, &(0x7f0000000000)={0x0, 0x9}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000280)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) sendmmsg$inet6(r2, &(0x7f0000000480)=[{{&(0x7f0000000080)={0xa, 0x4e23, 0x0, @loopback, 0x80020}, 0x1c, &(0x7f0000000500)=[{0x0}], 0x1}}], 0x1, 0x34000811) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000640)=ANY=[@ANYBLOB="30e01b3981ddca"], 0x1000f) 143.240388ms ago: executing program 2 (id=263): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x3, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000080000000000000000009500000025f05888"], &(0x7f0000000200)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='kmem_cache_free\x00', r0, 0x0, 0x400}, 0x18) r1 = socket$tipc(0x1e, 0x5, 0x0) r2 = socket$inet6(0xa, 0x2, 0x3a) sendto$inet6(r2, &(0x7f0000000000)="800037bbfa9ba1ce", 0x8, 0x0, &(0x7f0000001100)={0xa, 0x0, 0x1000, @dev={0xfe, 0x80, '\x00', 0xc}}, 0x1c) recvfrom$inet6(r2, 0x0, 0x0, 0x20, 0x0, 0x0) setsockopt$TIPC_GROUP_JOIN(r1, 0x10f, 0x87, &(0x7f0000000300)={0x43, 0x3, 0x3, 0x3}, 0x10) r3 = socket$tipc(0x1e, 0x2, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0x1, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800"/15, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r5}, 0x10) setsockopt$TIPC_GROUP_JOIN(r3, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) close(r1) 137.248098ms ago: executing program 2 (id=264): socket$l2tp6(0xa, 0x2, 0x73) r0 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x88040, 0x0) fcntl$setlease(r0, 0x400, 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fdinfo/4\x00') syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x40, &(0x7f0000000340), 0x1, 0x573, &(0x7f0000000ec0)="$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") r2 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x141042, 0x0) pwritev2(r2, &(0x7f00000001c0)=[{&(0x7f0000000080)="ff", 0xfdef}], 0x1, 0x8800000, 0x0, 0x0) socket$packet(0x11, 0x3, 0x300) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000410"], 0x50) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000100), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r3, 0xc0a85320, &(0x7f0000000480)={{0x80, 0x3}, 'port0\x00', 0xa5, 0x0, 0x6, 0x67, 0x0, 0x3, 0x0, 0x0, 0x0, 0xc}) socket$packet(0x11, 0x1, 0x300) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000020000000000000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, r2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x2040, 0x0) fcntl$setlease(r5, 0x400, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f0000000c40)='./file1\x00', 0x0) 107.492568ms ago: executing program 3 (id=265): r0 = socket$l2tp(0x2, 0x2, 0x73) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000880)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000002c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0xffffffff}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}}]}, &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010000000000000000020000000900010073797a300000000048000000030a01010000000000000000020000000900010073797a30000000000900030057797a3200000000080007006e617400140004800800024000000000080001400000000414"], 0xa4}}, 0x0) bind$l2tp(r0, 0x0, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000280), 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x24, &(0x7f00000003c0)={0x2, 0x4, 0x2, 0x7}) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='\v\x00\x00\x00\b\x00\x00\x00\f'], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xd, &(0x7f0000000b40)=ANY=[@ANYBLOB="18000000000000000000000000000000850000006d00000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000021007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000010b704000000000000850000000100000095"], &(0x7f0000000000)='syzkaller\x00', 0x2, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x29, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', r6}, 0x10) r7 = io_uring_setup(0x77f7, &(0x7f00000006c0)={0x0, 0xcddc, 0x400, 0x0, 0x7fd, 0x0, r4}) io_uring_register$IORING_REGISTER_BUFFERS(r7, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) writev(r4, &(0x7f0000000040)=[{&(0x7f0000002500)='\f7', 0x2}], 0x1) r8 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x20, 0x10, &(0x7f00000002c0)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x58db4c0f20c06932, '\x00', 0x0, @fallback, r4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r9 = socket(0x2, 0x80805, 0x0) r10 = socket$inet(0x2, 0x80001, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r10, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={<r11=>0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_RTOINFO(r9, 0x84, 0x0, &(0x7f00000001c0)={r11, 0x641516c6, 0x8, 0xfffffffc}, &(0x7f0000000240)=0x10) getsockopt$inet_sctp_SCTP_RTOINFO(r8, 0x84, 0x0, &(0x7f0000000080)={r11, 0x3579, 0x6, 0xfff}, &(0x7f00000000c0)=0x10) socket$inet6(0xa, 0x1, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x50) r12 = socket$netlink(0x10, 0x3, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000100)=ANY=[], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) syz_open_dev$tty20(0xc, 0x4, 0x0) r13 = bpf$MAP_CREATE(0x0, &(0x7f0000000100)=@base={0x5, 0x4, 0x7fe4, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r14 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000008001000000000000000000a652330f73d00f41b66cd3c318110000558494d620ddf36e9e651c70841a52bae9e2d513473b90f45b93e9a8fe6eeed44d138f0fcf82d58a9df15c33752ebcc12edced0c9f18efd020d8bc07ed379382099f1a0fa742eeafddad24e31c2726d1ca7cda1a7cbee75f9151ef21e9aa189fd995aee10ebd4ba2f7c7403e2edadaed09680e33841fa71989edd63536b38edc69db6f3d9718a9a145ee2fd410d30446066c94ec882ae2732d99f5994fdf193c78bf68624b847019d19b83401829fd8865d0cb36976633ee44d6fd909fb4", @ANYRES32=r13, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000030000009500000000000000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f00000009c0)='kfree\x00', r14}, 0x10) sendmsg$nl_route_sched(r12, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000440)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, {0xffe0}, {0xf}, {0xe, 0xd}}, [@TCA_RATE={0x6, 0x5, {0x9, 0x1}}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x491, 0x0, 0x0, 0x0, 0x8, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x4000c00) 46.961089ms ago: executing program 3 (id=266): openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3e, 0x1, 0x0, 0x0, 0x0, 0x5, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1, @perf_config_ext={0x2, 0x800800000003}, 0x1100, 0x5dd8, 0x3, 0x5, 0x0, 0x8, 0xff7b, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) ppoll(&(0x7f00000000c0)=[{}, {}], 0x20000000000000dc, 0x0, 0x0, 0x0) 46.335489ms ago: executing program 3 (id=267): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0xf}, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0xb, 0x0, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000005000000020000000010"], 0x48) pipe(&(0x7f0000000880)={<r1=>0xffffffffffffffff, <r2=>0xffffffffffffffff}) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYRESHEX=r0], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x3c, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x3, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) r7 = socket(0x3, 0xa, 0x65) syz_genetlink_get_family_id$mptcp(&(0x7f00000000c0), r7) getsockname$packet(r7, &(0x7f0000000100)={0x11, 0x0, <r8=>0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r6, &(0x7f0000000000)={0x0, 0x24, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYRESDEC=r5, @ANYRES32=r8], 0x3c}}, 0x0) sendmsg$nl_route_sched(r5, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001240)=@newqdisc={0x2c, 0x24, 0x5820a61ca228651, 0x70bd26, 0x0, {0x0, 0x0, 0x0, r8, {0x0, 0x6}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_drr={0x8}]}, 0x2c}}, 0x0) sendmsg$nl_route_sched(r4, &(0x7f0000001300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000001380)=@newtfilter={0x38, 0x28, 0xd27, 0x70bd2c, 0x0, {0x0, 0x0, 0x0, r8, {0x3}, {0xffff, 0xffe0}, {0x0, 0xb}}, [@filter_kind_options=@f_u32={{0x8}, {0xc, 0x2, [@TCA_U32_CLASSID={0x8, 0x1, {0xa, 0x2}}]}}]}, 0x38}}, 0x10) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x0, 0x0) chdir(&(0x7f0000000240)='./file0\x00') mkdir(&(0x7f0000000000)='./control\x00', 0x0) open$dir(&(0x7f00000002c0)='./control/file0\x00', 0x80040, 0x0) r9 = open(&(0x7f0000022ff6)='./control\x00', 0x0, 0x0) mkdirat(r9, &(0x7f0000000100)='./control\x00', 0x0) getdents64(r9, &(0x7f0000fc4fbe)=""/80, 0x50) unlink(&(0x7f00000001c0)='./control/file0\x00') unlinkat(r9, &(0x7f0000000140)='./control\x00', 0x200) rmdir(&(0x7f0000000040)='./control\x00') bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYRES32=0x0, @ANYBLOB="8e09313f083288dc6ce9b1befa8ef053ae394630168ed7440167f7677b078b6566ba5779616a1ec57d05b0e843e8380f766e2ed5ccf70d44d03d997bcea9b37a0139bdd0e43debf52736adf710b51868800fb8e900975e051b29add087654ab8b85865c8023bea629ed96535f766e603d0ba12c93017d1cb286d8365457b12fb6edf10ccafa884631879e8615b0db7dfd5257cccf0e33932a94180c716ce27f27484b9fb73fbd107dffc72cf85d72af88a9cf311374031ec20c3d70fa2255ce9ce1db3e6c8bd5d604d5b1a44", @ANYBLOB="000100"/20, @ANYRES32=r8, @ANYRES32=r2, @ANYBLOB="0300000004000000050000000f00000000000000", @ANYRES32=r1, @ANYBLOB="0000800135bd0bc78411b92295f45cebb1cf1af1f1a9"], 0x50) bind$inet(r1, &(0x7f00000018c0)={0x2, 0x4e22, @empty}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000040)='kmem_cache_free\x00', r3, 0x0, 0xffff}, 0x18) writev(0xffffffffffffffff, &(0x7f0000000b80)=[{&(0x7f0000000840)="a9", 0x1}], 0x1) socket$inet6_sctp(0xa, 0x1, 0x84) 44.446869ms ago: executing program 3 (id=268): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) getsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x8, 0x0, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000001700)=0x4) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000940)={[{@bsdgroups}, {@nodiscard}, {@noblock_validity}, {@grpjquota}, {@grpjquota}, {@noquota}, {@abort}, {@noload}, {@nodiscard}]}, 0x64, 0x50a, &(0x7f0000000200)="$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") 26.29669ms ago: executing program 3 (id=269): r0 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r0, &(0x7f0000000140)={&(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f0000000180)="96bc1480bb58", 0x6}], 0x2, &(0x7f0000000780)=[@ip_tos_u8={{0x11, 0x0, 0x7}}], 0x18}, 0x0) 0s ago: executing program 3 (id=270): syz_mount_image$ext4(&(0x7f00000001c0)='ext4\x00', &(0x7f0000000140)='./file0\x00', 0x2000046, &(0x7f0000000cc0)={[{@nombcache}, {@oldalloc}, {@inlinecrypt}, {@delalloc}, {@noload}, {@delalloc}, {@noload}, {@resuid}, {@lazytime}]}, 0x3, 0x4ea, &(0x7f00000006c0)="$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") (async, rerun: 64) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) (async, rerun: 64) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) (async, rerun: 32) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000580), 0xffffffffffffffff) (async, rerun: 32) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TID_CONFIG(r4, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000001180)={0x38, r3, 0x10ada85e65c25359, 0xfffffffd, 0x8000000, {{0x6b}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x72}}}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5}]}]}]}, 0x38}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, <r5=>0xffffffffffffffff}) (async) r6 = socket$nl_generic(0x10, 0x3, 0x10) (async) r7 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r6, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000380)=ANY=[@ANYBLOB=' \x00\x00\x00', @ANYRES16=r7, @ANYBLOB="8b3326bd70000000000005"], 0x20}, 0x1, 0x0, 0x0, 0x24000001}, 0x0) r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r9) sendmsg$NL80211_CMD_GET_WIPHY(r9, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000240)={0x28, r10, 0x301, 0x0, 0x25dfdbfe, {{}, {@void, @val={0x8}, @val={0xc, 0x99, {0x2, 0x3}}}}}, 0x28}, 0x1, 0x0, 0x0, 0x88d1}, 0x40) (async) ioctl$sock_SIOCGIFINDEX_80211(r8, 0x8933, &(0x7f0000000100)={'wlan1\x00', <r11=>0x0}) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x28, r10, 0x2, 0x70bd26, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0x1, 0x5c}}}}, ["", "", "", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x20020884}, 0x40) sendmsg$NL80211_CMD_TDLS_MGMT(r5, &(0x7f0000000480)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000440)={&(0x7f0000000a40)={0x1a8, r7, 0x805, 0x70bd2a, 0x25dfdbfb, {{}, {@val={0x8, 0x3, r11}, @void}}, [@NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x7d}, @NL80211_ATTR_MAC={0xa}, @NL80211_ATTR_STATUS_CODE={0x6, 0x48, 0x62}, @NL80211_ATTR_IE={0xd5, 0x2a, [@peer_mgmt={0x75, 0x6, {0x0, 0x3ff, @void, @val=0x2e, @void}}, @rann={0x7e, 0x15, {{0x0, 0x1}, 0x27, 0xc, @device_b, 0x2, 0x9, 0x80000001}}, @chsw_timing={0x68, 0x4, {0x8, 0x84b3}}, @fast_bss_trans={0x37, 0xaa, {0x1, 0x4, "b562cf8f92c6a2c99fc710696074a5f3", "67c359b615787cedbc6bff57165222bedaafcd0ddcfe37e19997205655438aa7", "d942ec90f883d93abbe7487f966ee175dac90b4ef2aba313aaf89bf07929709b", [{0x2, 0x1a, "1cc99ce915c6bea95f853fd25b8594b0d9db9e28a104d344bd10"}, {0x4, 0x21, "4d8e05843bb973aed6468f969f896f58c11bbed713ff52a2f9e4a4cdde94c31d32"}, {0x1, 0xa, "2fee39128b19beef6a4c"}, {0x4, 0xb, "67b8e28db73cd101afb988"}]}}]}, @NL80211_ATTR_TDLS_DIALOG_TOKEN={0x5, 0x89, 0x73}, @NL80211_ATTR_TDLS_INITIATOR={0x4}, @NL80211_ATTR_IE={0x89, 0x2a, [@measure_req={0x26, 0x5e, {0x3, 0xf8, 0x0, "4dbc3adcfc2ec93540bfdd28bd42da242bc7a08fc51272a571749e082d747ec6ea662b844f18548a2348cf0aded3b5e5a883844659b53b20accc5394408199cf17b5bec525112b3e9c87fa66d07b3c34ac5e0265c7713848cba2a1"}}, @cf={0x4, 0x6, {0x1, 0x7, 0x5, 0xfff7}}, @dsss={0x3, 0x1, 0x9d}, @mic={0x8c, 0x18, {0xe0f, "b25be59aabfd", @long="94f0e7bfab483bbb827a649b0ed50522"}}]}]}, 0x1a8}, 0x1, 0x0, 0x0, 0x50}, 0x20000800) (async, rerun: 64) sendmsg$NL80211_CMD_UPDATE_CONNECT_PARAMS(r2, &(0x7f0000000280)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000240)={&(0x7f00000007c0)={0x280, r3, 0x400, 0x70bd25, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0x0, 0x41}}}}, [@NL80211_ATTR_IE={0x1c7, 0x2a, [@preq={0x82, 0x62, {{0x0, 0x0, 0x1, 0x0, 0x1}, 0x23, 0x4, 0x9e33, @broadcast, 0x8, @value=@broadcast, 0xf908, 0x9, 0x6, [{{0x1}, @device_b, 0x7}, {{0x1}, @broadcast, 0x3}, {{}, @device_a, 0x50}, {{0x1, 0x0, 0x1}, @device_a, 0x9}, {{}, @broadcast, 0x3}, {{0x0, 0x0, 0x1}, @device_a, 0xea}]}}, @peer_mgmt={0x75, 0x4, {0x1, 0x1, @void, @void, @void}}, @tim={0x5, 0x8d, {0x6, 0xa2, 0x2, "d830294eaf359121fb6a65fc326336f4fe1ece92ed6310fcd38b6bf36bb14d6a49ae1a0eec0dabfc2a4105bf01364c21f1705845f60de6ab44cc3d1f56f7981e6972d4d626af41aff800e09c48a645a5bb0e2cf4ff671043b933c360bd86dd73f00a629f9526cb94db744b48c91aa7359bd283004385f5d226e378d4312bc96985f4236047b27e158863"}}, @prep={0x83, 0x1f, {{}, 0xf, 0x40, @device_b, 0x100, @void, 0x2, 0x4e, @device_b, 0x2}}, @random_vendor={0xdd, 0x41, "b2bd70659dc5feee5265fc4bb66244f96b231ca9c119a8dd21de2f1864234a559a9c09cc3dec9295572dfead33be074b86edd078fc334d534f72eedd2b105da03f"}, @preq={0x82, 0x5c, {{0x1, 0x1, 0x1}, 0x1, 0x2, 0x0, @device_b, 0x4, @void, 0x40000000, 0x1, 0x6, [{{0x1, 0x0, 0x1}, @broadcast, 0x7fff}, {{0x1, 0x0, 0x1}, @device_b, 0xae4d}, {{0x0, 0x0, 0x1}, @device_a, 0x1}, {{0x1, 0x0, 0x1}, @broadcast, 0x7}, {{0x1}, @broadcast, 0x4}, {{}, @device_b, 0x43}]}}, @mesh_id={0x72, 0x6}]}, @NL80211_ATTR_IE={0x8e, 0x2a, [@random_vendor={0xdd, 0x7f, "b9d3b96bd8dbc0647acd6cd50b7aa3fe4ec0180788ab7c00302a7273fa209b178e9de634dab1ac1b3f289729d14365860501158cb2b2f2c2576b52a33d7d22ed63502871380d67895cced136db5263279a5c9bec3b72699083c2ae2515f896690136a7688b22928d829b5cfd17fcb6d1c8a49550e9232105f216ca0e495941"}, @erp={0x2a, 0x1, {0x0, 0x1}}, @ext_channel_switch={0x3c, 0x4, {0x1, 0xd9, 0xaf, 0x1}}]}]}, 0x280}, 0x1, 0x0, 0x0, 0x8000}, 0x44000) (async, rerun: 64) sendmsg$NL80211_CMD_SET_MAC_ACL(r1, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x0, 0x1, 0x70bd28, 0x25dfdbff, {{}, {@val={0x8, 0x3, r11}, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x810) (async) sendmsg$NL80211_CMD_START_NAN(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000200)={&(0x7f0000000280)={0x48, r0, 0x200, 0x70bd2b, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r11}, @val={0xc, 0x99, {0x8000, 0x6a}}}}, [@NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x2a}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x7}, @NL80211_ATTR_BANDS={0x8, 0xef, 0x2}, @NL80211_ATTR_NAN_MASTER_PREF={0x5, 0xee, 0x2}]}, 0x48}, 0x1, 0x0, 0x0, 0x800}, 0x4000) r12 = openat(0xffffffffffffff9c, &(0x7f0000000240)='.\x00', 0x0, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r12, 0x8004587d, &(0x7f0000000080)={@desc={0x1, 0x0, @desc2}}) (async, rerun: 32) ioctl$VT_RELDISP(r12, 0x5605) (async, rerun: 32) open$dir(&(0x7f0000000100)='./file1\x00', 0x2000, 0x40) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r12, 0x40505412, &(0x7f0000000000)={0x3, 0xf77, 0x9, 0x0, 0xe}) kernel console output (not intermixed with test programs): [ 20.598551][ T29] audit: type=1400 audit(1743527460.041:81): avc: denied { read } for pid=2987 comm="syslogd" name="log" dev="sda1" ino=1915 scontext=system_u:system_r:syslogd_t tcontext=system_u:object_r:var_t tclass=lnk_file permissive=1 Warning: Permanently added '10.128.10.53' (ED25519) to the list of known hosts. [ 26.560704][ T29] audit: type=1400 audit(1743527466.001:82): avc: denied { mounton } for pid=3292 comm="syz-executor" path="/syzcgroup/unified" dev="sda1" ino=1925 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:root_t tclass=dir permissive=1 [ 26.561629][ T3292] cgroup: Unknown subsys name 'net' [ 26.583468][ T29] audit: type=1400 audit(1743527466.001:83): avc: denied { mount } for pid=3292 comm="syz-executor" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.610821][ T29] audit: type=1400 audit(1743527466.031:84): avc: denied { unmount } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 26.746054][ T3292] cgroup: Unknown subsys name 'cpuset' [ 26.752125][ T3292] cgroup: Unknown subsys name 'rlimit' [ 26.892746][ T29] audit: type=1400 audit(1743527466.331:85): avc: denied { setattr } for pid=3292 comm="syz-executor" name="raw-gadget" dev="devtmpfs" ino=142 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 26.916012][ T29] audit: type=1400 audit(1743527466.331:86): avc: denied { create } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.936560][ T29] audit: type=1400 audit(1743527466.331:87): avc: denied { write } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.957040][ T29] audit: type=1400 audit(1743527466.331:88): avc: denied { read } for pid=3292 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 26.963957][ T3296] SELinux: Context root:object_r:swapfile_t is not valid (left unmapped). [ 26.977355][ T29] audit: type=1400 audit(1743527466.331:89): avc: denied { mounton } for pid=3292 comm="syz-executor" path="/proc/sys/fs/binfmt_misc" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=dir permissive=1 [ 27.010874][ T29] audit: type=1400 audit(1743527466.331:90): avc: denied { mount } for pid=3292 comm="syz-executor" name="/" dev="binfmt_misc" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:binfmt_misc_fs_t tclass=filesystem permissive=1 Setting up swapspace version 1, size = 127995904 bytes [ 27.034220][ T29] audit: type=1400 audit(1743527466.431:91): avc: denied { relabelto } for pid=3296 comm="mkswap" name="swap-file" dev="sda1" ino=1928 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon="root:object_r:swapfile_t" [ 27.063300][ T3292] Adding 124996k swap on ./swap-file. Priority:0 extents:1 across:124996k [ 28.239014][ T3306] chnl_net:caif_netlink_parms(): no params data found [ 28.251272][ T3312] chnl_net:caif_netlink_parms(): no params data found [ 28.276872][ T3302] chnl_net:caif_netlink_parms(): no params data found [ 28.303999][ T3310] chnl_net:caif_netlink_parms(): no params data found [ 28.389202][ T3306] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.396290][ T3306] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.403463][ T3306] bridge_slave_0: entered allmulticast mode [ 28.409925][ T3306] bridge_slave_0: entered promiscuous mode [ 28.445698][ T3306] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.452754][ T3306] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.459861][ T3306] bridge_slave_1: entered allmulticast mode [ 28.466204][ T3306] bridge_slave_1: entered promiscuous mode [ 28.481741][ T3307] chnl_net:caif_netlink_parms(): no params data found [ 28.490258][ T3302] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.497381][ T3302] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.504477][ T3302] bridge_slave_0: entered allmulticast mode [ 28.510916][ T3302] bridge_slave_0: entered promiscuous mode [ 28.526616][ T3312] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.533677][ T3312] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.540966][ T3312] bridge_slave_0: entered allmulticast mode [ 28.547307][ T3312] bridge_slave_0: entered promiscuous mode [ 28.556579][ T3302] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.563633][ T3302] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.570801][ T3302] bridge_slave_1: entered allmulticast mode [ 28.577221][ T3302] bridge_slave_1: entered promiscuous mode [ 28.588098][ T3310] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.595157][ T3310] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.602304][ T3310] bridge_slave_0: entered allmulticast mode [ 28.608811][ T3310] bridge_slave_0: entered promiscuous mode [ 28.615202][ T3312] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.622286][ T3312] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.629451][ T3312] bridge_slave_1: entered allmulticast mode [ 28.635827][ T3312] bridge_slave_1: entered promiscuous mode [ 28.653941][ T3306] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.667914][ T3310] bridge0: port 2(bridge_slave_1) entered blocking state [ 28.674965][ T3310] bridge0: port 2(bridge_slave_1) entered disabled state [ 28.682120][ T3310] bridge_slave_1: entered allmulticast mode [ 28.688421][ T3310] bridge_slave_1: entered promiscuous mode [ 28.704741][ T3306] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.714784][ T3302] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.731510][ T3312] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.741418][ T3302] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.764668][ T3312] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.783496][ T3310] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 28.810112][ T3302] team0: Port device team_slave_0 added [ 28.816466][ T3306] team0: Port device team_slave_0 added [ 28.822876][ T3310] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 28.832494][ T3306] team0: Port device team_slave_1 added [ 28.843306][ T3312] team0: Port device team_slave_0 added [ 28.850674][ T3302] team0: Port device team_slave_1 added [ 28.874421][ T3307] bridge0: port 1(bridge_slave_0) entered blocking state [ 28.881574][ T3307] bridge0: port 1(bridge_slave_0) entered disabled state [ 28.888769][ T3307] bridge_slave_0: entered allmulticast mode [ 28.895185][ T3307] bridge_slave_0: entered promiscuous mode [ 28.902112][ T3312] team0: Port device team_slave_1 added [ 28.921342][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.928415][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.954335][ T3302] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 28.965491][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 28.972484][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 28.998459][ T3306] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.013476][ T3307] bridge0: port 2(bridge_slave_1) entered blocking state [ 29.020611][ T3307] bridge0: port 2(bridge_slave_1) entered disabled state [ 29.027769][ T3307] bridge_slave_1: entered allmulticast mode [ 29.034096][ T3307] bridge_slave_1: entered promiscuous mode [ 29.040548][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.047660][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.073569][ T3312] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.084652][ T3302] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.091679][ T3302] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.117575][ T3302] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.129059][ T3306] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.136025][ T3306] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.162025][ T3306] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.173261][ T3310] team0: Port device team_slave_0 added [ 29.183845][ T3312] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.190802][ T3312] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.216707][ T3312] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.240730][ T3310] team0: Port device team_slave_1 added [ 29.252384][ T3307] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 29.273057][ T3312] hsr_slave_0: entered promiscuous mode [ 29.278953][ T3312] hsr_slave_1: entered promiscuous mode [ 29.295378][ T3307] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 29.314935][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.321933][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.347956][ T3310] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.359195][ T3310] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.366204][ T3310] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.392122][ T3310] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.429807][ T3307] team0: Port device team_slave_0 added [ 29.445095][ T3302] hsr_slave_0: entered promiscuous mode [ 29.451166][ T3302] hsr_slave_1: entered promiscuous mode [ 29.457086][ T3302] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.464628][ T3302] Cannot create hsr debugfs directory [ 29.472066][ T3306] hsr_slave_0: entered promiscuous mode [ 29.478080][ T3306] hsr_slave_1: entered promiscuous mode [ 29.483838][ T3306] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.491428][ T3306] Cannot create hsr debugfs directory [ 29.497661][ T3307] team0: Port device team_slave_1 added [ 29.538568][ T3310] hsr_slave_0: entered promiscuous mode [ 29.544479][ T3310] hsr_slave_1: entered promiscuous mode [ 29.550407][ T3310] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.558152][ T3310] Cannot create hsr debugfs directory [ 29.570058][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 29.577058][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.602958][ T3307] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 29.614433][ T3307] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 29.621486][ T3307] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 29.647440][ T3307] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 29.724377][ T3307] hsr_slave_0: entered promiscuous mode [ 29.730414][ T3307] hsr_slave_1: entered promiscuous mode [ 29.736363][ T3307] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 29.743926][ T3307] Cannot create hsr debugfs directory [ 29.843053][ T3312] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 29.852172][ T3312] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 29.869749][ T3312] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 29.880300][ T3312] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 29.904848][ T3302] netdevsim netdevsim0 netdevsim0: renamed from eth0 [ 29.913685][ T3302] netdevsim netdevsim0 netdevsim1: renamed from eth1 [ 29.922434][ T3302] netdevsim netdevsim0 netdevsim2: renamed from eth2 [ 29.930960][ T3302] netdevsim netdevsim0 netdevsim3: renamed from eth3 [ 29.957383][ T3306] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 29.969667][ T3306] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 29.978756][ T3306] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 29.989834][ T3306] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 30.012566][ T3310] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 30.023207][ T3310] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 30.036114][ T3310] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 30.044744][ T3310] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 30.078215][ T3307] netdevsim netdevsim1 netdevsim0: renamed from eth0 [ 30.086962][ T3307] netdevsim netdevsim1 netdevsim1: renamed from eth1 [ 30.098443][ T3307] netdevsim netdevsim1 netdevsim2: renamed from eth2 [ 30.111488][ T3307] netdevsim netdevsim1 netdevsim3: renamed from eth3 [ 30.135757][ T3312] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.164885][ T3312] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.174725][ T3302] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.186359][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.193428][ T370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.207343][ T3302] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.223114][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.230250][ T370] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.251326][ T370] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.258380][ T370] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.267093][ T370] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.274141][ T370] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.298195][ T3310] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.314024][ T3306] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.348220][ T3306] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.356921][ T3307] 8021q: adding VLAN 0 to HW filter on device bond0 [ 30.373019][ T3310] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.389042][ T3307] 8021q: adding VLAN 0 to HW filter on device team0 [ 30.401409][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.408474][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.417234][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.424270][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.433819][ T12] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.440915][ T12] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.449631][ T12] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.456702][ T12] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.468430][ T57] bridge0: port 1(bridge_slave_0) entered blocking state [ 30.475536][ T57] bridge0: port 1(bridge_slave_0) entered forwarding state [ 30.492904][ T57] bridge0: port 2(bridge_slave_1) entered blocking state [ 30.499998][ T57] bridge0: port 2(bridge_slave_1) entered forwarding state [ 30.529567][ T3312] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.543052][ T3307] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.553603][ T3307] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.578316][ T3306] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 30.588736][ T3306] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 30.637900][ T3302] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.687582][ T3307] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.730993][ T3306] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.742780][ T3310] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 30.785022][ T3312] veth0_vlan: entered promiscuous mode [ 30.801953][ T3312] veth1_vlan: entered promiscuous mode [ 30.808737][ T3302] veth0_vlan: entered promiscuous mode [ 30.825062][ T3302] veth1_vlan: entered promiscuous mode [ 30.847417][ T3307] veth0_vlan: entered promiscuous mode [ 30.855340][ T3312] veth0_macvtap: entered promiscuous mode [ 30.871198][ T3312] veth1_macvtap: entered promiscuous mode [ 30.879850][ T3307] veth1_vlan: entered promiscuous mode [ 30.894549][ T3302] veth0_macvtap: entered promiscuous mode [ 30.916507][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 30.932424][ T3302] veth1_macvtap: entered promiscuous mode [ 30.939222][ T3307] veth0_macvtap: entered promiscuous mode [ 30.948545][ T3310] veth0_vlan: entered promiscuous mode [ 30.964349][ T3312] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 30.973203][ T3310] veth1_vlan: entered promiscuous mode [ 30.979534][ T3307] veth1_macvtap: entered promiscuous mode [ 30.990316][ T3312] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 30.999123][ T3312] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.007896][ T3312] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.016616][ T3312] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.027585][ T3306] veth0_vlan: entered promiscuous mode [ 31.039420][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.049978][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.060335][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.070066][ T3302] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.080634][ T3302] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.090519][ T3302] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.100948][ T3302] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.111351][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.120530][ T3302] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.131119][ T3302] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.141564][ T3302] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.153629][ T3302] netdevsim netdevsim0 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.162392][ T3302] netdevsim netdevsim0 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.171186][ T3302] netdevsim netdevsim0 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.179952][ T3302] netdevsim netdevsim0 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.193480][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.204123][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.214020][ T3307] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.224589][ T3307] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.235134][ T3307] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.244674][ T3307] netdevsim netdevsim1 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.253462][ T3307] netdevsim netdevsim1 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.262290][ T3307] netdevsim netdevsim1 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.271135][ T3307] netdevsim netdevsim1 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.287298][ T3306] veth1_vlan: entered promiscuous mode [ 31.306079][ T3310] veth0_macvtap: entered promiscuous mode [ 31.317660][ T3312] soft_limit_in_bytes is deprecated and will be removed. Please report your usecase to linux-mm@kvack.org if you depend on this functionality. [ 31.319746][ T3306] veth0_macvtap: entered promiscuous mode [ 31.352636][ T3306] veth1_macvtap: entered promiscuous mode [ 31.366167][ T3310] veth1_macvtap: entered promiscuous mode [ 31.382406][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.392982][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.402929][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.413456][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.423299][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.433731][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.447879][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.458197][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.468653][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.478469][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.488911][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.498755][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.509207][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.519151][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_0 [ 31.529595][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.550338][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 31.567704][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.578238][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.588112][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.598594][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.608450][ T3306] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.618961][ T3306] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.636627][ T29] kauditd_printk_skb: 47 callbacks suppressed [ 31.636673][ T29] audit: type=1400 audit(1743527471.081:139): avc: denied { create } for pid=3451 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 31.641435][ T3306] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.645683][ T29] audit: type=1400 audit(1743527471.081:140): avc: denied { create } for pid=3451 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.663555][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.669142][ T29] audit: type=1400 audit(1743527471.081:141): avc: denied { setopt } for pid=3451 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.688450][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.698813][ T29] audit: type=1400 audit(1743527471.081:142): avc: denied { bind } for pid=3451 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.718115][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.757602][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.767494][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.777935][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.787763][ T3310] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3f) already exists on: batadv_slave_1 [ 31.798232][ T3310] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 31.810061][ T3310] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 31.817886][ T3450] netlink: 48 bytes leftover after parsing attributes in process `syz.0.1'. [ 31.826609][ T3450] netlink: 48 bytes leftover after parsing attributes in process `syz.0.1'. [ 31.836675][ T29] audit: type=1400 audit(1743527471.221:143): avc: denied { write } for pid=3446 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_rdma_socket permissive=1 [ 31.839213][ T3455] iwpm_register_pid: Unable to send a nlmsg (client = 2) [ 31.856598][ T29] audit: type=1400 audit(1743527471.251:144): avc: denied { create } for pid=3446 comm="syz.0.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 31.864730][ T3306] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.882669][ T29] audit: type=1400 audit(1743527471.251:145): avc: denied { write } for pid=3451 comm="syz.1.7" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 31.891341][ T3306] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.911317][ T29] audit: type=1326 audit(1743527471.281:146): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3446 comm="syz.0.1" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7face648d169 code=0x0 [ 31.919331][ T3306] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.950534][ T3306] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.956002][ T3455] infiniband s9z1: RDMA CMA: cma_listen_on_dev, error -98 [ 31.986482][ T3310] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 31.995365][ T3310] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.004142][ T3310] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.013264][ T3310] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 32.017733][ T3457] FAULT_INJECTION: forcing a failure. [ 32.017733][ T3457] name failslab, interval 1, probability 0, space 0, times 1 [ 32.034673][ T3457] CPU: 1 UID: 0 PID: 3457 Comm: syz.1.8 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 32.034766][ T3457] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 32.034785][ T3457] Call Trace: [ 32.034791][ T3457] <TASK> [ 32.034798][ T3457] dump_stack_lvl+0xf6/0x150 [ 32.034874][ T3457] dump_stack+0x15/0x1a [ 32.034891][ T3457] should_fail_ex+0x261/0x270 [ 32.034913][ T3457] should_failslab+0x8f/0xb0 [ 32.034940][ T3457] __kmalloc_noprof+0xad/0x410 [ 32.035078][ T3457] ? alloc_pipe_info+0x1cb/0x360 [ 32.035108][ T3457] alloc_pipe_info+0x1cb/0x360 [ 32.035136][ T3457] splice_direct_to_actor+0x621/0x680 [ 32.035162][ T3457] ? __pfx_direct_splice_actor+0x10/0x10 [ 32.035189][ T3457] ? selinux_file_permission+0x32a/0x360 [ 32.035236][ T3457] do_splice_direct+0xd9/0x150 [ 32.035260][ T3457] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 32.035302][ T3457] do_sendfile+0x40a/0x690 [ 32.035343][ T3457] __x64_sys_sendfile64+0x113/0x160 [ 32.035395][ T3457] x64_sys_call+0xfc3/0x2e10 [ 32.035421][ T3457] do_syscall_64+0xc9/0x1c0 [ 32.035457][ T3457] ? clear_bhb_loop+0x25/0x80 [ 32.035566][ T3457] ? clear_bhb_loop+0x25/0x80 [ 32.035589][ T3457] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 32.035616][ T3457] RIP: 0033:0x7f4541c5d169 [ 32.035632][ T3457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 32.035647][ T3457] RSP: 002b:00007f45402c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 32.035666][ T3457] RAX: ffffffffffffffda RBX: 00007f4541e75fa0 RCX: 00007f4541c5d169 [ 32.035676][ T3457] RDX: 0000000000000000 RSI: 000000000000000b RDI: 000000000000000c [ 32.035715][ T3457] RBP: 00007f45402c7090 R08: 0000000000000000 R09: 0000000000000000 [ 32.035725][ T3457] R10: 0000000100000002 R11: 0000000000000246 R12: 0000000000000001 [ 32.035735][ T3457] R13: 0000000000000000 R14: 00007f4541e75fa0 R15: 00007ffff12602a8 [ 32.035749][ T3457] </TASK> [ 32.279598][ T29] audit: type=1400 audit(1743527471.721:147): avc: denied { allowed } for pid=3458 comm="',%I" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 32.298412][ T29] audit: type=1400 audit(1743527471.721:148): avc: denied { sqpoll } for pid=3458 comm="',%I" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 [ 32.405855][ T3455] syz.0.1 (3455) used greatest stack depth: 10776 bytes left [ 32.459518][ C0] hrtimer: interrupt took 38077 ns [ 32.483738][ T3473] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=2567 sclass=netlink_route_socket pid=3473 comm=syz.4.5 [ 32.539269][ T3476] netlink: 20 bytes leftover after parsing attributes in process `syz.2.13'. [ 32.660279][ T3484] loop2: detected capacity change from 0 to 512 [ 32.687090][ T3486] loop0: detected capacity change from 0 to 128 [ 32.702115][ T3484] ext4: Unknown parameter 'euid>00000000000000000000' [ 32.722887][ T3488] loop4: detected capacity change from 0 to 512 [ 32.729700][ T3488] ======================================================= [ 32.729700][ T3488] WARNING: The mand mount option has been deprecated and [ 32.729700][ T3488] and is ignored by this kernel. Remove the mand [ 32.729700][ T3488] option from the mount to silence this warning. [ 32.729700][ T3488] ======================================================= [ 32.779485][ T3488] EXT4-fs: Mount option(s) incompatible with ext2 [ 32.945934][ T3501] netlink: 48 bytes leftover after parsing attributes in process `syz.2.21'. [ 32.954766][ T3501] netlink: 48 bytes leftover after parsing attributes in process `syz.2.21'. [ 33.002870][ T3501] siw: device registration error -23 [ 33.087768][ T3509] FAULT_INJECTION: forcing a failure. [ 33.087768][ T3509] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 33.101098][ T3509] CPU: 1 UID: 0 PID: 3509 Comm: syz.4.24 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 33.101125][ T3509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 33.101200][ T3509] Call Trace: [ 33.101206][ T3509] <TASK> [ 33.101215][ T3509] dump_stack_lvl+0xf6/0x150 [ 33.101253][ T3509] dump_stack+0x15/0x1a [ 33.101271][ T3509] should_fail_ex+0x261/0x270 [ 33.101291][ T3509] should_fail_alloc_page+0xfd/0x110 [ 33.101316][ T3509] alloc_pages_bulk_noprof+0xfd/0x580 [ 33.101372][ T3509] copy_splice_read+0xe7/0x5d0 [ 33.101400][ T3509] ? file_has_perm+0x334/0x380 [ 33.101479][ T3509] sock_splice_read+0xac/0xb0 [ 33.101516][ T3509] ? __pfx_sock_splice_read+0x10/0x10 [ 33.101540][ T3509] splice_file_to_pipe+0x237/0x390 [ 33.101604][ T3509] do_splice+0xcec/0x1160 [ 33.101630][ T3509] ? get_pid_task+0x94/0xd0 [ 33.101656][ T3509] ? proc_fail_nth_write+0x12d/0x160 [ 33.101683][ T3509] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 33.101783][ T3509] ? __rcu_read_unlock+0x4e/0x70 [ 33.101812][ T3509] ? __fget_files+0x186/0x1c0 [ 33.101844][ T3509] ? pipe_clear_nowait+0xd7/0x110 [ 33.101923][ T3509] __se_sys_splice+0x254/0x3b0 [ 33.102015][ T3509] __x64_sys_splice+0x78/0x90 [ 33.102039][ T3509] x64_sys_call+0xf5b/0x2e10 [ 33.102078][ T3509] do_syscall_64+0xc9/0x1c0 [ 33.102099][ T3509] ? clear_bhb_loop+0x25/0x80 [ 33.102119][ T3509] ? clear_bhb_loop+0x25/0x80 [ 33.102214][ T3509] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 33.102276][ T3509] RIP: 0033:0x7fd1c6cad169 [ 33.102290][ T3509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 33.102306][ T3509] RSP: 002b:00007fd1c52f6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 33.102323][ T3509] RAX: ffffffffffffffda RBX: 00007fd1c6ec6080 RCX: 00007fd1c6cad169 [ 33.102407][ T3509] RDX: 0000000000000004 RSI: 0000000000000000 RDI: 0000000000000005 [ 33.102417][ T3509] RBP: 00007fd1c52f6090 R08: 000000007ffff000 R09: 0000000000000006 [ 33.102427][ T3509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 33.102437][ T3509] R13: 0000000000000001 R14: 00007fd1c6ec6080 R15: 00007ffc3ed9f568 [ 33.102452][ T3509] </TASK> [ 33.347267][ T3511] netlink: 80 bytes leftover after parsing attributes in process `syz.4.25'. [ 33.368808][ T3511] tipc: Started in network mode [ 33.373685][ T3511] tipc: Node identity 00000000000000000000000000000001, cluster identity 4711 [ 33.392824][ T3511] tipc: New replicast peer: fe80:0000:0000:0000:0000:0000:0000:00bb [ 33.401178][ T3511] tipc: Enabled bearer <udp:syz1>, priority 10 [ 33.793550][ T3526] loop2: detected capacity change from 0 to 128 [ 34.339225][ T3540] xt_AUDIT: Audit type out of range (valid range: 0..2) [ 34.363865][ T3540] loop0: detected capacity change from 0 to 512 [ 34.370882][ T3540] ext4: Unknown parameter 'appraise_type' [ 34.378983][ T3540] netlink: 300 bytes leftover after parsing attributes in process `syz.0.35'. [ 34.408068][ T3543] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3543 comm=syz.1.36 [ 34.408098][ T3546] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=3546 comm=syz.1.36 [ 34.463557][ T3551] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3551 comm=syz.1.39 [ 34.484212][ T3551] Zero length message leads to an empty skb [ 34.495030][ T3551] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 34.515747][ T3438] tipc: Node number set to 1 [ 34.519588][ T3555] netlink: 36 bytes leftover after parsing attributes in process `syz.0.40'. [ 34.538103][ T3551] netlink: 4 bytes leftover after parsing attributes in process `syz.1.39'. [ 34.547074][ T3555] x_tables: ip_tables: bpf.1 match: invalid size 528 (kernel) != (user) 536 [ 34.556042][ T3551] bridge_slave_1: left allmulticast mode [ 34.561761][ T3551] bridge_slave_1: left promiscuous mode [ 34.567463][ T3551] bridge0: port 2(bridge_slave_1) entered disabled state [ 34.595762][ T3551] bridge_slave_0: left allmulticast mode [ 34.601434][ T3551] bridge_slave_0: left promiscuous mode [ 34.607180][ T3551] bridge0: port 1(bridge_slave_0) entered disabled state [ 34.692541][ T3564] loop4: detected capacity change from 0 to 128 [ 34.929096][ T3580] FAULT_INJECTION: forcing a failure. [ 34.929096][ T3580] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 34.942188][ T3580] CPU: 0 UID: 0 PID: 3580 Comm: syz.0.51 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 34.942211][ T3580] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 34.942321][ T3580] Call Trace: [ 34.942325][ T3580] <TASK> [ 34.942331][ T3580] dump_stack_lvl+0xf6/0x150 [ 34.942350][ T3580] dump_stack+0x15/0x1a [ 34.942364][ T3580] should_fail_ex+0x261/0x270 [ 34.942386][ T3580] should_fail+0xb/0x10 [ 34.942402][ T3580] should_fail_usercopy+0x1a/0x20 [ 34.942485][ T3580] _copy_from_user+0x1c/0xa0 [ 34.942507][ T3580] ip6_tnl_siocdevprivate+0x13d/0x700 [ 34.942556][ T3580] dev_ifsioc+0x937/0xb20 [ 34.942574][ T3580] dev_ioctl+0x8da/0xad0 [ 34.942604][ T3580] sock_ioctl+0x5b8/0x630 [ 34.942629][ T3580] ? __pfx_sock_ioctl+0x10/0x10 [ 34.942653][ T3580] __se_sys_ioctl+0xc9/0x140 [ 34.942677][ T3580] __x64_sys_ioctl+0x43/0x50 [ 34.942696][ T3580] x64_sys_call+0x168d/0x2e10 [ 34.942755][ T3580] do_syscall_64+0xc9/0x1c0 [ 34.942810][ T3580] ? clear_bhb_loop+0x25/0x80 [ 34.942827][ T3580] ? clear_bhb_loop+0x25/0x80 [ 34.942843][ T3580] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 34.942860][ T3580] RIP: 0033:0x7face648d169 [ 34.942875][ T3580] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 34.942893][ T3580] RSP: 002b:00007face4aef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 34.942929][ T3580] RAX: ffffffffffffffda RBX: 00007face66a5fa0 RCX: 00007face648d169 [ 34.942939][ T3580] RDX: 0000200000000080 RSI: 00000000000089f1 RDI: 0000000000000009 [ 34.942948][ T3580] RBP: 00007face4aef090 R08: 0000000000000000 R09: 0000000000000000 [ 34.942957][ T3580] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 34.942969][ T3580] R13: 0000000000000000 R14: 00007face66a5fa0 R15: 00007fff1c5404e8 [ 34.943002][ T3580] </TASK> [ 35.172315][ T3583] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.173902][ T3588] loop2: detected capacity change from 0 to 1024 [ 35.198887][ T3588] EXT4-fs (loop2): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 35.211407][ T3588] ext4 filesystem being mounted at /7/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 35.223027][ T3588] EXT4-fs (loop2): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 35.234302][ T3583] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.288769][ T3583] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.337778][ T3583] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 35.391655][ T3583] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.402568][ T3583] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.413283][ T3583] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.425135][ T3583] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 35.483206][ T3602] loop3: detected capacity change from 0 to 128 [ 35.562850][ T3610] UDPLite6: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list [ 35.563450][ T3612] loop3: detected capacity change from 0 to 512 [ 35.584384][ T3612] EXT4-fs: Warning: mounting with data=journal disables delayed allocation, dioread_nolock, O_DIRECT and fast_commit support! [ 35.597648][ T3612] EXT4-fs (loop3): encrypted files will use data=ordered instead of data journaling mode [ 35.612086][ T3612] EXT4-fs (loop3): 1 truncate cleaned up [ 35.619706][ T3612] EXT4-fs (loop3): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.634576][ T3623] loop1: detected capacity change from 0 to 512 [ 35.636080][ T3612] raw_sendmsg: syz.3.63 forgot to set AF_INET. Fix it! [ 35.649591][ T3612] EXT4-fs error (device loop3): mb_free_blocks:1948: group 0, inode 16: block 33:freeing already freed block (bit 32); block bitmap corrupt. [ 35.664088][ T3623] EXT4-fs (loop1): encrypted files will use data=ordered instead of data journaling mode [ 35.666703][ T3612] EXT4-fs (loop3): Remounting filesystem read-only [ 35.677511][ T3625] netlink: 36 bytes leftover after parsing attributes in process `syz.4.66'. [ 35.696024][ T3625] x_tables: ip_tables: bpf.1 match: invalid size 528 (kernel) != (user) 536 [ 35.708661][ T3623] EXT4-fs (loop1): 1 truncate cleaned up [ 35.714752][ T3623] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 35.729743][ T3623] EXT4-fs error (device loop1): mb_free_blocks:1948: group 0, inode 16: block 33:freeing already freed block (bit 32); block bitmap corrupt. [ 35.745006][ T3623] EXT4-fs (loop1): Remounting filesystem read-only [ 36.388268][ T3681] FAULT_INJECTION: forcing a failure. [ 36.388268][ T3681] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 36.401474][ T3681] CPU: 1 UID: 60928 PID: 3681 Comm: syz.0.75 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 36.401501][ T3681] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 36.401513][ T3681] Call Trace: [ 36.401519][ T3681] <TASK> [ 36.401526][ T3681] dump_stack_lvl+0xf6/0x150 [ 36.401577][ T3681] dump_stack+0x15/0x1a [ 36.401594][ T3681] should_fail_ex+0x261/0x270 [ 36.401616][ T3681] should_fail+0xb/0x10 [ 36.401634][ T3681] should_fail_usercopy+0x1a/0x20 [ 36.401656][ T3681] strncpy_from_user+0x25/0x230 [ 36.401719][ T3681] ? getname_flags+0x81/0x3b0 [ 36.401750][ T3681] getname_flags+0xb0/0x3b0 [ 36.401780][ T3681] do_sys_openat2+0x65/0x110 [ 36.401888][ T3681] __x64_sys_openat+0xf8/0x120 [ 36.401908][ T3681] x64_sys_call+0x1ac/0x2e10 [ 36.401929][ T3681] do_syscall_64+0xc9/0x1c0 [ 36.401950][ T3681] ? clear_bhb_loop+0x25/0x80 [ 36.402037][ T3681] ? clear_bhb_loop+0x25/0x80 [ 36.402058][ T3681] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 36.402080][ T3681] RIP: 0033:0x7face648d169 [ 36.402094][ T3681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 36.402112][ T3681] RSP: 002b:00007face4aef038 EFLAGS: 00000246 ORIG_RAX: 0000000000000101 [ 36.402196][ T3681] RAX: ffffffffffffffda RBX: 00007face66a5fa0 RCX: 00007face648d169 [ 36.402209][ T3681] RDX: 00000000001a10c1 RSI: 0000200000000140 RDI: ffffffffffffff9c [ 36.402222][ T3681] RBP: 00007face4aef090 R08: 0000000000000000 R09: 0000000000000000 [ 36.402234][ T3681] R10: 9c37611dc13d0d83 R11: 0000000000000246 R12: 0000000000000001 [ 36.402244][ T3681] R13: 0000000000000000 R14: 00007face66a5fa0 R15: 00007fff1c5404e8 [ 36.402260][ T3681] </TASK> [ 36.598735][ T3312] EXT4-fs (loop3): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.614182][ T3307] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 36.677126][ T29] kauditd_printk_skb: 319 callbacks suppressed [ 36.677140][ T29] audit: type=1400 audit(1743527476.121:468): avc: denied { bind } for pid=3686 comm="syz.1.77" lport=58 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rawip_socket permissive=1 [ 36.703492][ T29] audit: type=1400 audit(1743527476.121:469): avc: denied { name_bind } for pid=3686 comm="syz.1.77" src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=rawip_socket permissive=1 [ 36.724159][ T29] audit: type=1400 audit(1743527476.121:470): avc: denied { node_bind } for pid=3686 comm="syz.1.77" saddr=fc00::1 src=20002 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:node_t tclass=rawip_socket permissive=1 [ 36.763661][ T29] audit: type=1400 audit(1743527476.201:471): avc: denied { read } for pid=3689 comm="syz.1.79" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=packet_socket permissive=1 [ 36.792818][ T3690] rtc_cmos 00:00: Alarms can be up to one day in the future [ 36.915773][ T3700] wg2: entered promiscuous mode [ 36.920709][ T3700] wg2: entered allmulticast mode [ 37.181878][ T29] audit: type=1326 audit(1743527476.621:472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3704 comm="syz.2.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff2bf0ed169 code=0x7ffc0000 [ 37.298511][ T29] audit: type=1326 audit(1743527476.651:473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3704 comm="syz.2.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff2bf0ed169 code=0x7ffc0000 [ 37.321786][ T29] audit: type=1326 audit(1743527476.651:474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3704 comm="syz.2.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=25 compat=0 ip=0x7ff2bf0ed169 code=0x7ffc0000 [ 37.345262][ T29] audit: type=1326 audit(1743527476.651:475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3704 comm="syz.2.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff2bf0ed169 code=0x7ffc0000 [ 37.368481][ T29] audit: type=1326 audit(1743527476.651:476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3704 comm="syz.2.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=80 compat=0 ip=0x7ff2bf0ed169 code=0x7ffc0000 [ 37.391543][ T29] audit: type=1326 audit(1743527476.651:477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3704 comm="syz.2.82" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7ff2bf0ed169 code=0x7ffc0000 [ 37.588715][ T3438] rtc_cmos 00:00: Alarms can be up to one day in the future [ 37.596479][ T3438] rtc_cmos 00:00: Alarms can be up to one day in the future [ 37.604123][ T3438] rtc_cmos 00:00: Alarms can be up to one day in the future [ 37.611722][ T3438] rtc_cmos 00:00: Alarms can be up to one day in the future [ 37.619087][ T3438] rtc rtc0: __rtc_set_alarm: err=-22 [ 37.714537][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.722093][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.729509][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.738617][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.746147][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.753671][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.761102][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.768578][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.776025][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.783406][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.790919][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.798424][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 37.805830][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.732207][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.739746][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.747211][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.754596][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.762067][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.769528][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.776956][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.784377][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.791872][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.799271][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.806696][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.814105][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.821511][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.829012][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.836437][ T1054] hid-generic 0000:0000:0000.0001: unknown main item tag 0x0 [ 38.846402][ T1054] hid-generic 0000:0000:0000.0001: hidraw0: <UNKNOWN> HID v0.00 Device [syz0] on syz1 [ 39.150611][ T3745] FAULT_INJECTION: forcing a failure. [ 39.150611][ T3745] name failslab, interval 1, probability 0, space 0, times 0 [ 39.163345][ T3745] CPU: 0 UID: 0 PID: 3745 Comm: syz.1.94 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 39.163366][ T3745] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 39.163375][ T3745] Call Trace: [ 39.163380][ T3745] <TASK> [ 39.163407][ T3745] dump_stack_lvl+0xf6/0x150 [ 39.163432][ T3745] dump_stack+0x15/0x1a [ 39.163449][ T3745] should_fail_ex+0x261/0x270 [ 39.163472][ T3745] should_failslab+0x8f/0xb0 [ 39.163568][ T3745] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 39.163600][ T3745] ? __alloc_skb+0x10d/0x320 [ 39.163698][ T3745] __alloc_skb+0x10d/0x320 [ 39.163757][ T3745] tcp_stream_alloc_skb+0x2f/0x1e0 [ 39.163780][ T3745] tcp_sendmsg_locked+0x933/0x2760 [ 39.163808][ T3745] ? mntput+0x49/0x70 [ 39.163904][ T3745] ? __rcu_read_unlock+0x4e/0x70 [ 39.163926][ T3745] ? avc_has_perm_noaudit+0x1cc/0x210 [ 39.163958][ T3745] ? __pfx_tcp_sendmsg+0x10/0x10 [ 39.163988][ T3745] tcp_sendmsg+0x30/0x50 [ 39.164009][ T3745] inet_sendmsg+0x77/0xd0 [ 39.164095][ T3745] __sock_sendmsg+0x102/0x180 [ 39.164123][ T3745] __sys_sendto+0x1aa/0x230 [ 39.164158][ T3745] __x64_sys_sendto+0x78/0x90 [ 39.164246][ T3745] x64_sys_call+0x2bcb/0x2e10 [ 39.164266][ T3745] do_syscall_64+0xc9/0x1c0 [ 39.164292][ T3745] ? clear_bhb_loop+0x25/0x80 [ 39.164317][ T3745] ? clear_bhb_loop+0x25/0x80 [ 39.164362][ T3745] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.164381][ T3745] RIP: 0033:0x7f4541c5d169 [ 39.164396][ T3745] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.164455][ T3745] RSP: 002b:00007f45402c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002c [ 39.164471][ T3745] RAX: ffffffffffffffda RBX: 00007f4541e75fa0 RCX: 00007f4541c5d169 [ 39.164482][ T3745] RDX: ffffffffffffff94 RSI: 0000200000000000 RDI: 0000000000000003 [ 39.164493][ T3745] RBP: 00007f45402c7090 R08: 0000000000000000 R09: 0000000000000000 [ 39.164503][ T3745] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 39.164514][ T3745] R13: 0000000000000000 R14: 00007f4541e75fa0 R15: 00007ffff12602a8 [ 39.164533][ T3745] </TASK> [ 39.429757][ T3751] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=12 sclass=netlink_route_socket pid=3751 comm=syz.3.96 [ 39.482188][ T3759] geneve0: entered allmulticast mode [ 39.490822][ T3759] serio: Serial port ptm0 [ 39.544868][ T3759] netlink: 8 bytes leftover after parsing attributes in process `syz.3.98'. [ 39.590230][ T3764] netlink: 36 bytes leftover after parsing attributes in process `syz.3.100'. [ 39.811507][ T3774] loop0: detected capacity change from 0 to 2048 [ 39.811566][ T3775] FAULT_INJECTION: forcing a failure. [ 39.811566][ T3775] name failslab, interval 1, probability 0, space 0, times 0 [ 39.831071][ T3775] CPU: 1 UID: 0 PID: 3775 Comm: syz.3.104 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 39.831218][ T3775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 39.831245][ T3775] Call Trace: [ 39.831251][ T3775] <TASK> [ 39.831259][ T3775] dump_stack_lvl+0xf6/0x150 [ 39.831314][ T3775] dump_stack+0x15/0x1a [ 39.831329][ T3775] should_fail_ex+0x261/0x270 [ 39.831347][ T3775] should_failslab+0x8f/0xb0 [ 39.831462][ T3775] __kmalloc_cache_node_noprof+0x58/0x340 [ 39.831490][ T3775] ? __get_vm_area_node+0xfb/0x1c0 [ 39.831513][ T3775] __get_vm_area_node+0xfb/0x1c0 [ 39.831535][ T3775] __vmalloc_node_range_noprof+0x285/0xe80 [ 39.831629][ T3775] ? copy_process+0x39e/0x1f60 [ 39.831650][ T3775] ? mod_objcg_state+0x3f9/0x530 [ 39.831672][ T3775] ? kmem_cache_alloc_node_noprof+0x233/0x340 [ 39.831768][ T3775] dup_task_struct+0x4a5/0x710 [ 39.831789][ T3775] ? copy_process+0x39e/0x1f60 [ 39.831825][ T3775] ? copy_process+0x368/0x1f60 [ 39.831847][ T3775] copy_process+0x39e/0x1f60 [ 39.831940][ T3775] ? __rcu_read_unlock+0x4e/0x70 [ 39.831966][ T3775] kernel_clone+0x168/0x5d0 [ 39.831991][ T3775] __x64_sys_clone+0xe9/0x120 [ 39.832065][ T3775] x64_sys_call+0x2dc9/0x2e10 [ 39.832083][ T3775] do_syscall_64+0xc9/0x1c0 [ 39.832101][ T3775] ? clear_bhb_loop+0x25/0x80 [ 39.832119][ T3775] ? clear_bhb_loop+0x25/0x80 [ 39.832140][ T3775] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 39.832157][ T3775] RIP: 0033:0x7f5a3df6d169 [ 39.832169][ T3775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 39.832183][ T3775] RSP: 002b:00007f5a3c5d6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 39.832256][ T3775] RAX: ffffffffffffffda RBX: 00007f5a3e185fa0 RCX: 00007f5a3df6d169 [ 39.832265][ T3775] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000022023400 [ 39.832275][ T3775] RBP: 00007f5a3c5d7090 R08: 0000000000000000 R09: 0000000000000000 [ 39.832284][ T3775] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 39.832294][ T3775] R13: 0000000000000000 R14: 00007f5a3e185fa0 R15: 00007fff0935d548 [ 39.832309][ T3775] </TASK> [ 39.832336][ T3775] syz.3.104: vmalloc error: size 16384, vm_struct allocation failed, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=/,mems_allowed=0 [ 40.063736][ T3775] CPU: 1 UID: 0 PID: 3775 Comm: syz.3.104 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 40.063806][ T3775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 40.063815][ T3775] Call Trace: [ 40.063820][ T3775] <TASK> [ 40.063826][ T3775] dump_stack_lvl+0xf6/0x150 [ 40.063845][ T3775] dump_stack+0x15/0x1a [ 40.063859][ T3775] warn_alloc+0x145/0x1b0 [ 40.063885][ T3775] __vmalloc_node_range_noprof+0x2aa/0xe80 [ 40.063909][ T3775] ? mod_objcg_state+0x3f9/0x530 [ 40.063930][ T3775] ? kmem_cache_alloc_node_noprof+0x233/0x340 [ 40.063958][ T3775] dup_task_struct+0x4a5/0x710 [ 40.063993][ T3775] ? copy_process+0x39e/0x1f60 [ 40.064080][ T3775] ? copy_process+0x368/0x1f60 [ 40.064100][ T3775] copy_process+0x39e/0x1f60 [ 40.064188][ T3775] ? __rcu_read_unlock+0x4e/0x70 [ 40.064216][ T3775] kernel_clone+0x168/0x5d0 [ 40.064267][ T3775] __x64_sys_clone+0xe9/0x120 [ 40.064309][ T3775] x64_sys_call+0x2dc9/0x2e10 [ 40.064466][ T3775] do_syscall_64+0xc9/0x1c0 [ 40.064485][ T3775] ? clear_bhb_loop+0x25/0x80 [ 40.064504][ T3775] ? clear_bhb_loop+0x25/0x80 [ 40.064525][ T3775] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 40.064550][ T3775] RIP: 0033:0x7f5a3df6d169 [ 40.064627][ T3775] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 40.064648][ T3775] RSP: 002b:00007f5a3c5d6fe8 EFLAGS: 00000206 ORIG_RAX: 0000000000000038 [ 40.064746][ T3775] RAX: ffffffffffffffda RBX: 00007f5a3e185fa0 RCX: 00007f5a3df6d169 [ 40.064757][ T3775] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000022023400 [ 40.064768][ T3775] RBP: 00007f5a3c5d7090 R08: 0000000000000000 R09: 0000000000000000 [ 40.064778][ T3775] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000000000001 [ 40.064789][ T3775] R13: 0000000000000000 R14: 00007f5a3e185fa0 R15: 00007fff0935d548 [ 40.064889][ T3775] </TASK> [ 40.064897][ T3775] Mem-Info: [ 40.259608][ T3775] active_anon:4257 inactive_anon:0 isolated_anon:0 [ 40.259608][ T3775] active_file:17231 inactive_file:2143 isolated_file:0 [ 40.259608][ T3775] unevictable:0 dirty:1793 writeback:0 [ 40.259608][ T3775] slab_reclaimable:2780 slab_unreclaimable:13545 [ 40.259608][ T3775] mapped:28700 shmem:471 pagetables:935 [ 40.259608][ T3775] sec_pagetables:0 bounce:0 [ 40.259608][ T3775] kernel_misc_reclaimable:0 [ 40.259608][ T3775] free:1898091 free_pcp:7487 free_cma:0 [ 40.304555][ T3775] Node 0 active_anon:17028kB inactive_anon:0kB active_file:68924kB inactive_file:8572kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:114800kB dirty:7172kB writeback:0kB shmem:1884kB writeback_tmp:0kB kernel_stack:2768kB pagetables:3740kB sec_pagetables:0kB all_unreclaimable? no [ 40.332520][ T3775] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 40.359492][ T3775] lowmem_reserve[]: 0 2884 7862 7862 [ 40.364823][ T3775] Node 0 DMA32 free:2949876kB boost:0kB min:4132kB low:7064kB high:9996kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2953408kB mlocked:0kB bounce:0kB free_pcp:3532kB local_pcp:0kB free_cma:0kB [ 40.393099][ T3775] lowmem_reserve[]: 0 0 4978 4978 [ 40.398183][ T3775] Node 0 Normal free:4627128kB boost:0kB min:7184kB low:12280kB high:17376kB reserved_highatomic:0KB active_anon:17028kB inactive_anon:0kB active_file:69040kB inactive_file:8572kB unevictable:0kB writepending:7172kB present:5242880kB managed:5098248kB mlocked:0kB bounce:0kB free_pcp:25984kB local_pcp:220kB free_cma:0kB [ 40.428261][ T3775] lowmem_reserve[]: 0 0 0 0 [ 40.432793][ T3775] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 40.445604][ T3775] Node 0 DMA32: 3*4kB (M) 1*8kB (M) 2*16kB (M) 4*32kB (M) 5*64kB (M) 4*128kB (M) 3*256kB (M) 4*512kB (M) 3*1024kB (M) 3*2048kB (M) 717*4096kB (M) = 2949876kB [ 40.461674][ T3775] Node 0 Normal: 262*4kB (UME) 606*8kB (UM) 477*16kB (UM) 445*32kB (UME) 453*64kB (UME) 84*128kB (UME) 51*256kB (UME) 34*512kB (UM) 31*1024kB (UM) 18*2048kB (UM) 1089*4096kB (UM) = 4627128kB [ 40.480610][ T3775] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 40.489916][ T3775] 19903 total pagecache pages [ 40.494597][ T3775] 0 pages in swap cache [ 40.498780][ T3775] Free swap = 124996kB [ 40.502936][ T3775] Total swap = 124996kB [ 40.507138][ T3775] 2097051 pages RAM [ 40.510975][ T3775] 0 pages HighMem/MovableOnly [ 40.515669][ T3775] 80297 pages reserved [ 40.564176][ T3785] bridge0: port 3(vlan2) entered blocking state [ 40.570859][ T3785] bridge0: port 3(vlan2) entered disabled state [ 40.579571][ T3785] vlan2: entered allmulticast mode [ 40.584803][ T3785] bridge0: entered allmulticast mode [ 40.592920][ T3785] vlan2: left allmulticast mode [ 40.597956][ T3785] bridge0: left allmulticast mode [ 40.638272][ T3800] SELinux: unrecognized netlink message: protocol=6 nlmsg_type=2329 sclass=netlink_xfrm_socket pid=3800 comm=syz.4.112 [ 40.656584][ T3788] netlink: 48 bytes leftover after parsing attributes in process `syz.0.109'. [ 40.665581][ T3788] netlink: 48 bytes leftover after parsing attributes in process `syz.0.109'. [ 40.825955][ T3777] rtc_cmos 00:00: Alarms can be up to one day in the future [ 41.483294][ T3853] pim6reg1: entered promiscuous mode [ 41.488750][ T3853] pim6reg1: entered allmulticast mode [ 41.531598][ T993] rtc_cmos 00:00: Alarms can be up to one day in the future [ 41.539248][ T993] rtc_cmos 00:00: Alarms can be up to one day in the future [ 41.544633][ T3864] pim6reg1: entered promiscuous mode [ 41.546848][ T993] rtc_cmos 00:00: Alarms can be up to one day in the future [ 41.551864][ T3864] pim6reg1: entered allmulticast mode [ 41.559431][ T993] rtc_cmos 00:00: Alarms can be up to one day in the future [ 41.571860][ T993] rtc rtc0: __rtc_set_alarm: err=-22 [ 41.688241][ T29] kauditd_printk_skb: 359 callbacks suppressed [ 41.688269][ T29] audit: type=1400 audit(1743527481.131:833): avc: denied { map_create } for pid=3875 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 41.723828][ T29] audit: type=1400 audit(1743527481.131:834): avc: denied { prog_load } for pid=3875 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 41.742935][ T29] audit: type=1400 audit(1743527481.131:835): avc: denied { create } for pid=3875 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_netfilter_socket permissive=0 [ 41.768622][ T29] audit: type=1400 audit(1743527481.201:836): avc: denied { create } for pid=3875 comm="syz.1.138" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0 [ 41.789206][ T29] audit: type=1400 audit(1743527481.201:837): avc: denied { create } for pid=3875 comm="syz.1.138" name="file0" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=blk_file permissive=0 [ 41.809783][ T29] audit: type=1400 audit(1743527481.211:838): avc: denied { read write } for pid=3312 comm="syz-executor" name="loop3" dev="devtmpfs" ino=103 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 41.833921][ T29] audit: type=1400 audit(1743527481.211:839): avc: denied { map_create } for pid=3875 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 41.852873][ T29] audit: type=1400 audit(1743527481.211:840): avc: denied { prog_load } for pid=3875 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 41.871741][ T29] audit: type=1400 audit(1743527481.211:841): avc: denied { create } for pid=3875 comm="syz.1.138" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=user_namespace permissive=0 [ 41.879001][ T3884] FAULT_INJECTION: forcing a failure. [ 41.879001][ T3884] name failslab, interval 1, probability 0, space 0, times 0 [ 41.893776][ T29] audit: type=1400 audit(1743527481.221:842): avc: denied { prog_load } for pid=3879 comm="syz.3.139" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=0 [ 41.908142][ T3884] CPU: 0 UID: 0 PID: 3884 Comm: syz.1.141 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 41.908243][ T3884] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 41.908256][ T3884] Call Trace: [ 41.908262][ T3884] <TASK> [ 41.908269][ T3884] dump_stack_lvl+0xf6/0x150 [ 41.908293][ T3884] dump_stack+0x15/0x1a [ 41.908311][ T3884] should_fail_ex+0x261/0x270 [ 41.908394][ T3884] should_failslab+0x8f/0xb0 [ 41.908422][ T3884] __kmalloc_node_noprof+0xaf/0x420 [ 41.908457][ T3884] ? __rcu_read_unlock+0x4e/0x70 [ 41.908502][ T3884] ? qdisc_alloc+0x65/0x450 [ 41.908534][ T3884] ? __pfx_vxlan_netdevice_event+0x10/0x10 [ 41.908562][ T3884] qdisc_alloc+0x65/0x450 [ 41.908649][ T3884] ? ib_device_get_by_netdev+0x1f8/0x230 [ 41.908671][ T3884] ? __pfx_netconsole_netdev_event+0x10/0x10 [ 41.908709][ T3884] qdisc_create_dflt+0x4c/0x280 [ 41.908773][ T3884] dev_activate+0x211/0x9f0 [ 41.908842][ T3884] __dev_open+0x48e/0x540 [ 41.908871][ T3884] __dev_change_flags+0x157/0x410 [ 41.908961][ T3884] netif_change_flags+0x59/0xd0 [ 41.908993][ T3884] dev_change_flags+0xde/0x1a0 [ 41.909021][ T3884] ? strcmp+0x21/0x50 [ 41.909046][ T3884] dev_ifsioc+0x5de/0xb20 [ 41.909067][ T3884] ? __rcu_read_unlock+0x4e/0x70 [ 41.909149][ T3884] dev_ioctl+0x843/0xad0 [ 41.909171][ T3884] sock_do_ioctl+0x121/0x270 [ 41.909227][ T3884] sock_ioctl+0x436/0x630 [ 41.909253][ T3884] ? __pfx_sock_ioctl+0x10/0x10 [ 41.909278][ T3884] __se_sys_ioctl+0xc9/0x140 [ 41.909352][ T3884] __x64_sys_ioctl+0x43/0x50 [ 41.909375][ T3884] x64_sys_call+0x168d/0x2e10 [ 41.909435][ T3884] do_syscall_64+0xc9/0x1c0 [ 41.909457][ T3884] ? clear_bhb_loop+0x25/0x80 [ 41.909480][ T3884] ? clear_bhb_loop+0x25/0x80 [ 41.909505][ T3884] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 41.909526][ T3884] RIP: 0033:0x7f4541c5d169 [ 41.909542][ T3884] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 41.909562][ T3884] RSP: 002b:00007f45402c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 41.909583][ T3884] RAX: ffffffffffffffda RBX: 00007f4541e75fa0 RCX: 00007f4541c5d169 [ 41.909596][ T3884] RDX: 0000200000000140 RSI: 0000000000008914 RDI: 0000000000000005 [ 41.909608][ T3884] RBP: 00007f45402c7090 R08: 0000000000000000 R09: 0000000000000000 [ 41.909621][ T3884] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 41.909642][ T3884] R13: 0000000000000000 R14: 00007f4541e75fa0 R15: 00007ffff12602a8 [ 41.909659][ T3884] </TASK> [ 41.909665][ T3884] pim6reg1: default qdisc (pfifo_fast) fail, fallback to noqueue [ 42.188070][ T3884] pim6reg1: entered promiscuous mode [ 42.193412][ T3884] pim6reg1: entered allmulticast mode [ 42.274075][ T3894] FAULT_INJECTION: forcing a failure. [ 42.274075][ T3894] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 42.287224][ T3894] CPU: 0 UID: 0 PID: 3894 Comm: syz.1.145 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 42.287250][ T3894] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 42.287262][ T3894] Call Trace: [ 42.287268][ T3894] <TASK> [ 42.287332][ T3894] dump_stack_lvl+0xf6/0x150 [ 42.287356][ T3894] dump_stack+0x15/0x1a [ 42.287373][ T3894] should_fail_ex+0x261/0x270 [ 42.287395][ T3894] should_fail+0xb/0x10 [ 42.287415][ T3894] should_fail_usercopy+0x1a/0x20 [ 42.287504][ T3894] _copy_from_user+0x1c/0xa0 [ 42.287532][ T3894] move_addr_to_kernel+0x8c/0x130 [ 42.287560][ T3894] __sys_connect+0x6c/0x1b0 [ 42.287616][ T3894] __x64_sys_connect+0x41/0x50 [ 42.287706][ T3894] x64_sys_call+0x2030/0x2e10 [ 42.287786][ T3894] do_syscall_64+0xc9/0x1c0 [ 42.287806][ T3894] ? clear_bhb_loop+0x25/0x80 [ 42.287899][ T3894] ? clear_bhb_loop+0x25/0x80 [ 42.287922][ T3894] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 42.287990][ T3894] RIP: 0033:0x7f4541c5d169 [ 42.288004][ T3894] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 42.288017][ T3894] RSP: 002b:00007f45402c7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002a [ 42.288101][ T3894] RAX: ffffffffffffffda RBX: 00007f4541e75fa0 RCX: 00007f4541c5d169 [ 42.288114][ T3894] RDX: 0000000000000010 RSI: 0000200000000180 RDI: 0000000000000003 [ 42.288127][ T3894] RBP: 00007f45402c7090 R08: 0000000000000000 R09: 0000000000000000 [ 42.288139][ T3894] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 42.288227][ T3894] R13: 0000000000000000 R14: 00007f4541e75fa0 R15: 00007ffff12602a8 [ 42.288244][ T3894] </TASK> [ 42.488505][ T3898] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=3898 comm=syz.2.147 [ 43.162420][ T3988] FAULT_INJECTION: forcing a failure. [ 43.162420][ T3988] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 43.176165][ T3988] CPU: 0 UID: 0 PID: 3988 Comm: syz.3.185 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 43.176193][ T3988] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 43.176229][ T3988] Call Trace: [ 43.176235][ T3988] <TASK> [ 43.176242][ T3988] dump_stack_lvl+0xf6/0x150 [ 43.176266][ T3988] dump_stack+0x15/0x1a [ 43.176283][ T3988] should_fail_ex+0x261/0x270 [ 43.176340][ T3988] should_fail+0xb/0x10 [ 43.176368][ T3988] should_fail_usercopy+0x1a/0x20 [ 43.176392][ T3988] _copy_to_user+0x20/0xa0 [ 43.176419][ T3988] simple_read_from_buffer+0xb2/0x130 [ 43.176514][ T3988] proc_fail_nth_read+0x103/0x140 [ 43.176612][ T3988] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 43.176667][ T3988] vfs_read+0x1b2/0x710 [ 43.176690][ T3988] ? __rcu_read_unlock+0x4e/0x70 [ 43.176715][ T3988] ? __fget_files+0x186/0x1c0 [ 43.176755][ T3988] ksys_read+0xeb/0x1b0 [ 43.176779][ T3988] __x64_sys_read+0x42/0x50 [ 43.176820][ T3988] x64_sys_call+0x2a3b/0x2e10 [ 43.176901][ T3988] do_syscall_64+0xc9/0x1c0 [ 43.176923][ T3988] ? clear_bhb_loop+0x25/0x80 [ 43.176944][ T3988] ? clear_bhb_loop+0x25/0x80 [ 43.176985][ T3988] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 43.177003][ T3988] RIP: 0033:0x7f5a3df6bb7c [ 43.177016][ T3988] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 43.177035][ T3988] RSP: 002b:00007f5a3c5d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 43.177054][ T3988] RAX: ffffffffffffffda RBX: 00007f5a3e185fa0 RCX: 00007f5a3df6bb7c [ 43.177066][ T3988] RDX: 000000000000000f RSI: 00007f5a3c5d70a0 RDI: 0000000000000003 [ 43.177079][ T3988] RBP: 00007f5a3c5d7090 R08: 0000000000000000 R09: 0000000000000000 [ 43.177091][ T3988] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 43.177126][ T3988] R13: 0000000000000000 R14: 00007f5a3e185fa0 R15: 00007fff0935d548 [ 43.177145][ T3988] </TASK> [ 44.331823][ T4049] FAULT_INJECTION: forcing a failure. [ 44.331823][ T4049] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 44.344907][ T4049] CPU: 1 UID: 0 PID: 4049 Comm: syz.3.210 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 44.344932][ T4049] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 44.344944][ T4049] Call Trace: [ 44.344963][ T4049] <TASK> [ 44.344971][ T4049] dump_stack_lvl+0xf6/0x150 [ 44.344997][ T4049] dump_stack+0x15/0x1a [ 44.345017][ T4049] should_fail_ex+0x261/0x270 [ 44.345042][ T4049] should_fail+0xb/0x10 [ 44.345064][ T4049] should_fail_usercopy+0x1a/0x20 [ 44.345091][ T4049] _copy_to_user+0x20/0xa0 [ 44.345197][ T4049] simple_read_from_buffer+0xb2/0x130 [ 44.345229][ T4049] proc_fail_nth_read+0x103/0x140 [ 44.345258][ T4049] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 44.345346][ T4049] vfs_read+0x1b2/0x710 [ 44.345372][ T4049] ? __rcu_read_unlock+0x4e/0x70 [ 44.345458][ T4049] ? __fget_files+0x186/0x1c0 [ 44.345505][ T4049] ksys_read+0xeb/0x1b0 [ 44.345567][ T4049] __x64_sys_read+0x42/0x50 [ 44.345615][ T4049] x64_sys_call+0x2a3b/0x2e10 [ 44.345633][ T4049] do_syscall_64+0xc9/0x1c0 [ 44.345650][ T4049] ? clear_bhb_loop+0x25/0x80 [ 44.345667][ T4049] ? clear_bhb_loop+0x25/0x80 [ 44.345753][ T4049] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 44.345775][ T4049] RIP: 0033:0x7f5a3df6bb7c [ 44.345790][ T4049] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 44.345805][ T4049] RSP: 002b:00007f5a3c5d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 44.345850][ T4049] RAX: ffffffffffffffda RBX: 00007f5a3e185fa0 RCX: 00007f5a3df6bb7c [ 44.345862][ T4049] RDX: 000000000000000f RSI: 00007f5a3c5d70a0 RDI: 0000000000000003 [ 44.345874][ T4049] RBP: 00007f5a3c5d7090 R08: 0000000000000000 R09: 0000000000000000 [ 44.345886][ T4049] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.345897][ T4049] R13: 0000000000000000 R14: 00007f5a3e185fa0 R15: 00007fff0935d548 [ 44.345915][ T4049] </TASK> [ 44.695169][ T4070] FAULT_INJECTION: forcing a failure. [ 44.695169][ T4070] name failslab, interval 1, probability 0, space 0, times 0 [ 44.707940][ T4070] CPU: 0 UID: 0 PID: 4070 Comm: syz.2.220 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 44.707963][ T4070] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 44.707976][ T4070] Call Trace: [ 44.707981][ T4070] <TASK> [ 44.707986][ T4070] dump_stack_lvl+0xf6/0x150 [ 44.708006][ T4070] dump_stack+0x15/0x1a [ 44.708020][ T4070] should_fail_ex+0x261/0x270 [ 44.708039][ T4070] should_failslab+0x8f/0xb0 [ 44.708062][ T4070] kmem_cache_alloc_node_noprof+0x5c/0x340 [ 44.708123][ T4070] ? __alloc_skb+0x10d/0x320 [ 44.708213][ T4070] __alloc_skb+0x10d/0x320 [ 44.708240][ T4070] netlink_alloc_large_skb+0xad/0xe0 [ 44.708266][ T4070] netlink_sendmsg+0x3da/0x720 [ 44.708289][ T4070] ? __pfx_netlink_sendmsg+0x10/0x10 [ 44.708305][ T4070] __sock_sendmsg+0x140/0x180 [ 44.708339][ T4070] ____sys_sendmsg+0x350/0x4e0 [ 44.708359][ T4070] __sys_sendmsg+0x1a0/0x240 [ 44.708385][ T4070] __x64_sys_sendmsg+0x46/0x50 [ 44.708402][ T4070] x64_sys_call+0x26f3/0x2e10 [ 44.708421][ T4070] do_syscall_64+0xc9/0x1c0 [ 44.708497][ T4070] ? clear_bhb_loop+0x25/0x80 [ 44.708515][ T4070] ? clear_bhb_loop+0x25/0x80 [ 44.708592][ T4070] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 44.708613][ T4070] RIP: 0033:0x7ff2bf0ed169 [ 44.708627][ T4070] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 44.708644][ T4070] RSP: 002b:00007ff2bd757038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 44.708663][ T4070] RAX: ffffffffffffffda RBX: 00007ff2bf305fa0 RCX: 00007ff2bf0ed169 [ 44.708681][ T4070] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000003 [ 44.708712][ T4070] RBP: 00007ff2bd757090 R08: 0000000000000000 R09: 0000000000000000 [ 44.708724][ T4070] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 44.708735][ T4070] R13: 0000000000000000 R14: 00007ff2bf305fa0 R15: 00007ffdcf382108 [ 44.708751][ T4070] </TASK> [ 45.053107][ T4097] FAULT_INJECTION: forcing a failure. [ 45.053107][ T4097] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 45.066242][ T4097] CPU: 0 UID: 0 PID: 4097 Comm: syz.1.230 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 45.066274][ T4097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 45.066286][ T4097] Call Trace: [ 45.066292][ T4097] <TASK> [ 45.066299][ T4097] dump_stack_lvl+0xf6/0x150 [ 45.066321][ T4097] dump_stack+0x15/0x1a [ 45.066339][ T4097] should_fail_ex+0x261/0x270 [ 45.066431][ T4097] should_fail+0xb/0x10 [ 45.066446][ T4097] should_fail_usercopy+0x1a/0x20 [ 45.066464][ T4097] strncpy_from_user+0x25/0x230 [ 45.066493][ T4097] ? getname_flags+0x81/0x3b0 [ 45.066588][ T4097] getname_flags+0xb0/0x3b0 [ 45.066618][ T4097] getname_uflags+0x21/0x30 [ 45.066651][ T4097] __x64_sys_execveat+0x5e/0x90 [ 45.066671][ T4097] x64_sys_call+0x2ac7/0x2e10 [ 45.066723][ T4097] do_syscall_64+0xc9/0x1c0 [ 45.066745][ T4097] ? clear_bhb_loop+0x25/0x80 [ 45.066844][ T4097] ? clear_bhb_loop+0x25/0x80 [ 45.066867][ T4097] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 45.066912][ T4097] RIP: 0033:0x7f4541c5d169 [ 45.066924][ T4097] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 45.066938][ T4097] RSP: 002b:00007f45402c7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000142 [ 45.066952][ T4097] RAX: ffffffffffffffda RBX: 00007f4541e75fa0 RCX: 00007f4541c5d169 [ 45.066979][ T4097] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000003 [ 45.066990][ T4097] RBP: 00007f45402c7090 R08: 0000000000001000 R09: 0000000000000000 [ 45.067002][ T4097] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 45.067014][ T4097] R13: 0000000000000000 R14: 00007f4541e75fa0 R15: 00007ffff12602a8 [ 45.067031][ T4097] </TASK> [ 45.399848][ T4122] capability: warning: `syz.1.239' uses 32-bit capabilities (legacy support in use) [ 46.306604][ T4198] ================================================================== [ 46.314707][ T4198] BUG: KCSAN: data-race in mas_replace_node / mtree_range_walk [ 46.322262][ T4198] [ 46.324579][ T4198] write to 0xffff888103572200 of 8 bytes by task 4197 on cpu 1: [ 46.332209][ T4198] mas_replace_node+0x1b8/0x430 [ 46.337063][ T4198] mas_wr_store_entry+0x1e80/0x2460 [ 46.342269][ T4198] mas_store_prealloc+0x6d5/0x960 [ 46.347285][ T4198] mmap_region+0xf91/0x1630 [ 46.351792][ T4198] do_mmap+0x9ef/0xc80 [ 46.355855][ T4198] vm_mmap_pgoff+0x16d/0x2d0 [ 46.360450][ T4198] ksys_mmap_pgoff+0xd0/0x340 [ 46.365134][ T4198] x64_sys_call+0x1945/0x2e10 [ 46.369818][ T4198] do_syscall_64+0xc9/0x1c0 [ 46.374325][ T4198] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 46.380219][ T4198] [ 46.382536][ T4198] read to 0xffff888103572200 of 8 bytes by task 4198 on cpu 0: [ 46.390069][ T4198] mtree_range_walk+0x347/0x460 [ 46.394919][ T4198] mas_walk+0x16e/0x320 [ 46.399073][ T4198] lock_vma_under_rcu+0x97/0x290 [ 46.404013][ T4198] exc_page_fault+0x150/0x650 [ 46.408696][ T4198] asm_exc_page_fault+0x26/0x30 [ 46.413542][ T4198] [ 46.415867][ T4198] value changed: 0xffff8881044fbb0e -> 0xffff888103572200 [ 46.422961][ T4198] [ 46.425282][ T4198] Reported by Kernel Concurrency Sanitizer on: [ 46.431436][ T4198] CPU: 0 UID: 0 PID: 4198 Comm: syz.3.270 Not tainted 6.14.0-syzkaller-11270-g08733088b566 #0 PREEMPT(voluntary) [ 46.443406][ T4198] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2025 [ 46.453453][ T4198] ================================================================== [ 46.804077][ T29] kauditd_printk_skb: 1703 callbacks suppressed [ 46.804090][ T29] audit: type=1400 audit(1743527486.241:2524): avc: denied { read write } for pid=3302 comm="syz-executor" name="loop0" dev="devtmpfs" ino=100 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0 [ 47.012587][ T29] audit: type=1400 audit(1743527486.451:2525): avc: denied { read write } for pid=3310 comm="syz-executor" name="loop2" dev="devtmpfs" ino=102 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fixed_disk_device_t tclass=blk_file permissive=0