last executing test programs: 7m31.730824487s ago: executing program 2 (id=1505): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB='\v\x00\x00\x00\a\x00\x00\x00\b\x00\x00\x00\b'], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000002c0)={r0, &(0x7f0000000080), &(0x7f0000000280)=@tcp6, 0x1}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x18) rmdir(&(0x7f0000000100)='./control\x00') r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) linkat(r2, &(0x7f0000004040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffffff, &(0x7f0000001080)='./file0\x00', 0x1000) 7m31.713679257s ago: executing program 2 (id=1506): r0 = eventfd2(0x0, 0x80801) readv(r0, &(0x7f00000014c0)=[{&(0x7f0000000000)=""/248}, {&(0x7f0000000100)=""/42}, {&(0x7f0000000140)=""/96}, {&(0x7f00000001c0)=""/4096}, {&(0x7f0000001540)=""/243}, {&(0x7f00000012c0)=""/250}, {&(0x7f00000013c0)=""/78}, {&(0x7f0000001440)=""/109}], 0x10000000000002af) r1 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) ptrace(0x10, r1) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000040)={{r2}, &(0x7f0000000000), &(0x7f00000005c0)=r3}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000280)='sched_switch\x00', r3}, 0x18) r4 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r5 = fcntl$dupfd(r4, 0x0, r4) write$sndseq(r5, &(0x7f0000000180)=[{0xff, 0x0, 0x10, 0x0, @time={0x7fc, 0x400}, {0x6}, {}, @result={0x1, 0x2}}, {0x0, 0x0, 0xff, 0x3, @tick=0xf27, {0x1, 0x31}, {}, @queue={0x96, {0x9, 0x8}}}], 0x38) ptrace(0x10, r1) 7m31.674518858s ago: executing program 2 (id=1507): mount$9p_rdma(&(0x7f00000013c0), &(0x7f0000001400)='.\x00', &(0x7f0000001440), 0x800, &(0x7f0000000080)=ANY=[@ANYBLOB]) 7m31.651970358s ago: executing program 2 (id=1508): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$sock_int(r0, 0x1, 0xa, &(0x7f0000000500), 0x4) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="07000000040000000802000021"], 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r1, @ANYBLOB="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"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x5, &(0x7f0000000540)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}, {0xc, 0x5, 0x0, 0x121b3892}, {0x782e, 0x7, 0x3, 0x8}, {0xfffd, 0x2}, {0x8, 0x5, 0xdf, 0xfffffffe}]}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r2}, 0x18) shmdt(0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x2, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000180)='tlb_flush\x00', r3}, 0x10) socket$nl_sock_diag(0x10, 0x3, 0x4) syz_open_procfs(0x0, &(0x7f0000000100)='timerslack_ns\x00') syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file2\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0xfb, 0x11ff, &(0x7f0000001280)="$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") mount$nfs(&(0x7f0000000100)='<..', 0x0, 0x0, 0x4, 0x0) ioctl$TUNATTACHFILTER(0xffffffffffffffff, 0x401054d5, &(0x7f0000000600)={0x3, &(0x7f00000005c0)=[{0x6, 0xff, 0x8, 0xea9}, {0x7f, 0xe, 0x8, 0x3}, {0x8000, 0x4, 0x1, 0x1db63610}]}) mprotect(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='cpuset.effective_cpus\x00', 0x275a, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x3000003, 0x200000006c832, 0xffffffffffffffff, 0x0) r4 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r4, 0x0) r5 = getpid() r6 = syz_clone(0x8000200, &(0x7f00000001c0), 0x0, &(0x7f0000000080), &(0x7f0000000140), &(0x7f0000000240)="970687bd0cf8f337175aad119b5ed90f3f10e95a9f6367613232a5367f3046ebb7000da3df471eb1be6306832ac3eebc9a1fa9459eeee4c9de3cf891643d347093a36373895d888b7540117741e8978420dbb17cf6b9fa92a27c1877ba9f468a24b401163d66a4841dd312a4c978db4ddf15940d8268b0493323376cc36e6b670dab59143759db") kcmp(r5, r6, 0x6, r4, 0xffffffffffffffff) getsockopt$inet_sctp6_SCTP_GET_ASSOC_NUMBER(r4, 0x84, 0x1c, &(0x7f00000001c0), &(0x7f0000000200)=0x4) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000700)={0x11, 0x3, &(0x7f0000000040)=@framed, &(0x7f0000000000)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000004c0)='contention_begin\x00', r7}, 0x10) r8 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCSARP(r8, 0x8955, &(0x7f0000000180)={{0x2, 0x1, @loopback}, {0x1, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x18}}, 0x7a, {0x2, 0x4e24, @empty}}) mprotect(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x6) 7m31.53629415s ago: executing program 2 (id=1510): r0 = bpf$MAP_CREATE_CONST_STR(0x0, 0x0, 0x0) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000003c0)={r0, 0xffffffffffffffff}, 0x4) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x0, 0x10, &(0x7f0000000580)=@framed={{0x18, 0x5, 0x0, 0x0, 0x7c}, [@snprintf={{}, {}, {}, {}, {}, {}, {}, {}, {}, {0x18, 0x3, 0x2, 0x0, r1}, {0x7, 0x0, 0xb, 0x4}, {0x85, 0x0, 0x0, 0x95}}]}, 0x0, 0x0, 0x0, 0x0, 0x41000, 0x1, '\x00', 0x0, @fallback=0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x33, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r2}, 0x10) unshare(0x22020400) 7m31.330937263s ago: executing program 2 (id=1514): bpf$MAP_CREATE(0x0, &(0x7f0000004180)=ANY=[@ANYBLOB="02000000040000000700000002"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000300)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$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") unlink(&(0x7f0000000180)='./file1\x00') 7m31.330872543s ago: executing program 32 (id=1514): bpf$MAP_CREATE(0x0, &(0x7f0000004180)=ANY=[@ANYBLOB="02000000040000000700000002"], 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xc, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='sys_enter\x00', r0}, 0x10) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000300)='./file0\x00', 0xa08886, &(0x7f0000000040)=ANY=[@ANYRES32=0x0], 0x1, 0x2a8, &(0x7f0000000500)="$eJzs3F9IU38Yx/FH50/9GTqJCAqqp7ypiIPbdaAjNKKBUS4sITjmWY2dtrEzVpNwCwJvuuimf9cVRAhCdBEEYhddhRLeddGdd15kV0lEJ+Y0N5tapk7y/brYHvZ8P4fv+bPD9h1s+vjda9GwY4TNlFTXV0l1u+RktkqapVoW5OTI9ZH3+85duHg6EAx2nFXtDHT7/KradGC09+bwobHUjvMvm17XyXjzpekZ/9T47vE909+7r0YcjTgai6fU1L54PGX22Zb233eihuoZ2zIdSyMxx0qW9MN2PJHIqBnrb2xIJC3HUTOW0aiV0VRcU8mMmlfMSEwNw9DGBsHKhtOPAst3Q89nXVdmUu9cty4nruvmX6zfxOmhwubOv+sWnf87lZ4SNlHRTb1exB5Kh9KhwnOhHwhLRGyxpFW88k3y14j7eMSdu1Tyjzf8I8HJo2/fqGqzDNrZ+Xw2HfKU5n3idT2FTEGh7jwV7PBpQWn+P2kozvvFK7vK5/1l87VyuKUob4hXJi9LXGyZGD34Zapr6MFCftCneqIruCT/v/QvHqZnnyt0fgAAAAAAAAAAWAtDfyq7fm/kB9weUNXGJf1CvtzvA0vX51vLrs/XyN6ayu47AAAAAADbhZMZiJq2bSX/ssh/lV+P7fx7xZNbvz94f+fKY1raPBPtH3KJrbBff1B87dkS0ygtZH71abXBnnV+pywWn9ZlO1Xz81t+zMnejy9W3U7tL8dnOWMbf1cCAAAAsBEWP/S3STb8Kp3tOXav0nMCAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGC7WcNfjk08LNfSfLHzablWpfcRAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABgJT8CAAD//wva0Pw=") unlink(&(0x7f0000000180)='./file1\x00') 18.255727046s ago: executing program 5 (id=8680): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='\v\x00\x00\x00\b'], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8a, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r5, 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', 0xffffffffffffffff, 0x0, 0x80000000000}, 0x18) r6 = memfd_secret(0x80000) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0900000000000000008dc2fa967089d32eed38e3404815b1b5de05650000994c4a7ebccac5bf88c7ded9db7b8270f00f808f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000b80)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYBLOB="0000000000000000b7ecffffffffffff7a8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000003000000a000000000000000", @ANYRESHEX=r6, @ANYRESHEX=r6, @ANYRESDEC=r6, @ANYRES32=r6, @ANYRESDEC=r4], &(0x7f0000000800)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x17, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = openat$nci(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) close_range(r7, 0xffffffffffffffff, 0x200000000000000) 18.115078099s ago: executing program 5 (id=8684): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r1}, 0x10) r2 = io_uring_setup(0x792f, &(0x7f0000000600)={0x0, 0x2002, 0x2, 0x0, 0x4b1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) setrlimit(0x40000000000008, &(0x7f00000002c0)={0x0, 0x5}) syz_open_procfs(0x0, &(0x7f0000000180)='net/kcm\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000000080)=[{{&(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000012c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @private=0xa010102}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10000}}], 0x38}}], 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000000040000000026e890d98490ad69cfc8000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0xfb81, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) r6 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x26000400) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="8627a5ae189fb7f1fb93de54dc74bdd809477fd9440200000021526fe4764fb98d1a0000000000000000", @ANYRES16=r6, @ANYRES32=r1, @ANYRES64, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x602, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000"], 0x48) r7 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x0, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r7, 0x0, 0x2}, 0x18) r8 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$UHID_CREATE2(r8, 0x0, 0x8) r9 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r9}, &(0x7f0000bbdffc)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000003c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r10, &(0x7f0000000080)=[{&(0x7f00000004c0)="7cd1", 0x2}, {&(0x7f0000000540)}], 0x2, 0x0) 17.186806583s ago: executing program 5 (id=8702): syz_open_dev$hidraw(0x0, 0x8, 0x800) r0 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000700)={0x6, 0x3, &(0x7f0000000680)=ANY=[@ANYBLOB="18000000020000000000000000"], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r0, 0x5, 0xb68, 0x560b0007, &(0x7f0000000000)="259a53f271a76d2686dd4c6588a8", 0x0, 0xd01, 0x2a0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000f7850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000ac0)='kmem_cache_free\x00', r1}, 0x10) 17.170594363s ago: executing program 5 (id=8703): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000001bc0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(r0, &(0x7f0000001d40)={0x0, 0x0, &(0x7f0000001d00)={&(0x7f0000001c00)={0x18, r1, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4008814}, 0x24008880) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080), 0x64, 0x53e, &(0x7f0000000740)="$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") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket(0x2000000015, 0x80005, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x200}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) getpeername$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) r6 = socket$kcm(0x2, 0xf, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x39, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) r9 = geteuid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r8, {0x0, 0xffffffffffffffff}}, './file0\x00'}) setresuid(0x0, r9, r10) sendmsg$nl_xfrm(r4, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f0000000c80)=@newsa={0x110, 0x10, 0x20, 0x70bd2c, 0x25dfdbfb, {{@in6=@remote, @in=@multicast2, 0x4e24, 0x2, 0x4e20, 0xff, 0xa, 0x80, 0x20, 0x2c, r5, r9}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d2, 0x33}, @in=@rand_addr=0x64010101, {0x9, 0x4, 0x45, 0x8, 0x0, 0x2000000, 0xffffffffffffffff, 0x8}, {0x100, 0x2, 0x81, 0x2}, {0x3b99, 0x2, 0x4}, 0x70bd2d, 0x3505, 0xa, 0x1, 0x1, 0xf27aec1229832c14}, [@coaddr={0x14, 0xe, @in6=@ipv4={'\x00', '\xff\xff', @broadcast}}, @lastused={0xc, 0xf, 0x7}]}, 0x110}, 0x1, 0x0, 0x0, 0x4040844}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) socket$inet6_udp(0xa, 0x2, 0x0) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r11 = socket$nl_generic(0x10, 0x3, 0x10) r12 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r11, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r12, @ANYBLOB="871000000000000000000100000008000300000001000500060000000000050005"], 0x30}, 0x1, 0x0, 0x0, 0x94}, 0x8808) 17.071267115s ago: executing program 5 (id=8704): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="07000000040000000800000001"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r0, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r1}, 0x18) r2 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000f40)=ANY=[@ANYBLOB="4000000010001fff00"/20, @ANYRES32=0x0, @ANYBLOB="81ffffff00000000180012800e0001007769726567756172640000000400028008000a00bc"], 0x40}}, 0x0) 16.956083287s ago: executing program 5 (id=8706): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r1}, 0x10) r2 = io_uring_setup(0x792f, &(0x7f0000000600)={0x0, 0x2002, 0x2, 0x0, 0x4b1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) setrlimit(0x40000000000008, &(0x7f00000002c0)={0x0, 0x5}) syz_open_procfs(0x0, &(0x7f0000000180)='net/kcm\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000000080)=[{{&(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000012c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @private=0xa010102}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10000}}], 0x38}}], 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000000040000000026e890d98490ad69cfc8000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0xfb81, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x26000400) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x602, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x0, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x2}, 0x18) r7 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$UHID_CREATE2(r7, 0x0, 0x8) r8 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r8}, &(0x7f0000bbdffc)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000003c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000080)=[{&(0x7f00000004c0)="7cd1", 0x2}, {&(0x7f0000000540)}], 0x2, 0x0) 16.917542067s ago: executing program 33 (id=8706): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r1}, 0x10) r2 = io_uring_setup(0x792f, &(0x7f0000000600)={0x0, 0x2002, 0x2, 0x0, 0x4b1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) setrlimit(0x40000000000008, &(0x7f00000002c0)={0x0, 0x5}) syz_open_procfs(0x0, &(0x7f0000000180)='net/kcm\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000000080)=[{{&(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000012c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @private=0xa010102}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10000}}], 0x38}}], 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000000040000000026e890d98490ad69cfc8000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0xfb81, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x26000400) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x602, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x0, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x2}, 0x18) r7 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$UHID_CREATE2(r7, 0x0, 0x8) r8 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r8}, &(0x7f0000bbdffc)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000003c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r9, &(0x7f0000000080)=[{&(0x7f00000004c0)="7cd1", 0x2}, {&(0x7f0000000540)}], 0x2, 0x0) 10.603220495s ago: executing program 6 (id=8811): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60d, @void, @value}, 0x94) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @broadcast}, 0x10) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000480)={0xa, 0x4e20, 0x0, @mcast1={0xff, 0x5}}, 0x1c) connect$inet(r0, &(0x7f0000000100)={0x2, 0x4e21, @remote}, 0x10) syz_emit_ethernet(0x2e, &(0x7f0000000000)={@multicast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @multicast1}, {0x0, 0x4e20, 0xc, 0x0, @gue={{0x1, 0x0, 0x0, 0x0, 0x0, @void}}}}}}}, 0x0) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x6, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000001600000018110000", @ANYRES32=r2], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r4 = syz_usb_connect$hid(0x1, 0x36, &(0x7f0000000040)={{0x12, 0x1, 0x200, 0x0, 0x0, 0x0, 0x8, 0x4d9, 0xa067, 0x0, 0x0, 0x0, 0x0, 0x1, [{{0x9, 0x2, 0x24, 0x1, 0x0, 0x0, 0xa0, 0x20, [{{0x9, 0x4, 0x0, 0x6, 0x1, 0x3, 0x0, 0x2, 0x0, {0x9, 0x21, 0x0, 0x0, 0x1, {0x22, 0x8}}, {{{0x9, 0x5, 0x81, 0x3, 0x400, 0x0, 0xfe, 0x9}}}}}]}}]}}, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_buf(r5, 0x0, 0x8008000000010, &(0x7f00000003c0)="17000000020001000003d68c5ee17688a2002b71ec95c63208030300ecff3f0000000300000a0000000098fc5ad9485bbb6a880000d6c8db0000dba67e06000000e28900000200df018000000000f50607bdff59100ac45761547a681f009cee4a5acb3da400001fb700674f00c88ebbf9315033bf79ac2dff060115003901000000000000ea000000000000000002ffff02dfccebf6ba0008400200000000e90554062a80e605007f71174aa951f3c63e5c83f1ba2312ce", 0xb8) syz_usb_control_io$hid(r4, 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000080)={0x0, r5}, 0x8) ioctl$ifreq_SIOCGIFINDEX_team(r5, 0x8933, &(0x7f0000000380)={'team0\x00', 0x0}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000004c0)={0x18, 0x0, 0x0, &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', r6, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x8000000, @void, @value}, 0x94) syz_usb_control_io$hid(r4, &(0x7f00000002c0)={0x24, 0x0, 0x0, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\"\b\x00\x00\x00'], 0x0}, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000580)='./file1\x00', 0x800040, &(0x7f0000000340), 0x1, 0x59b, &(0x7f0000002480)="$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") r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r7, &(0x7f0000000040)=ANY=[@ANYBLOB="7f454c460d04000c028000000000000003003e00ecffffff940200000000002172b4ce359280e2004d02000000000000000000000000380001"], 0x78) close(r7) execveat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x0, 0x0, 0x100) r8 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) finit_module(r8, &(0x7f0000000200)='\\[!\x00', 0x2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r3}, 0x10) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000780)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000040)='task_newtask\x00', r9}, 0x10) syz_clone(0x400, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000180)={0x2, 0x4, 0x8, 0x1, 0x80, r2, 0xa, '\x00', 0x0, 0xffffffffffffffff, 0x3, 0x1, 0x5, 0x0, @void, @value, @void, @value}, 0x50) 9.582362551s ago: executing program 6 (id=8830): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = openat$nci(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) close_range(r3, 0xffffffffffffffff, 0x200000000000000) 9.436583233s ago: executing program 6 (id=8834): r0 = socket$kcm(0xa, 0x1, 0x106) r1 = socket$netlink(0x10, 0x3, 0x10) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r3}, 0x10) setsockopt$sock_int(r1, 0x1, 0x8, &(0x7f0000000000), 0x4) r4 = getpid() r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140), r1) sendmsg$DEVLINK_CMD_RELOAD(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x3c, r6, 0x1, 0x70bd26, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r4}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x4040010}, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r1, 0x10e, 0x4, &(0x7f0000000640)=0x1800, 0x4) sendmsg$kcm(r0, &(0x7f00000019c0)={&(0x7f0000000080)=@l2tp6={0xa, 0x0, 0x0, @dev, 0x5}, 0x80, 0x0}, 0x24004059) close(r0) 8.455784169s ago: executing program 6 (id=8851): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000001bc0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(r0, &(0x7f0000001d40)={0x0, 0x0, &(0x7f0000001d00)={&(0x7f0000001c00)={0x18, r1, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4008814}, 0x24008880) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080), 0x64, 0x53e, &(0x7f0000000740)="$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") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket(0x2000000015, 0x80005, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x200}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) getpeername$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) r6 = socket$kcm(0x2, 0xf, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x39, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) r9 = geteuid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r8, {0x0, 0xffffffffffffffff}}, './file0\x00'}) setresuid(0x0, r9, r10) sendmsg$nl_xfrm(r4, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f0000000c80)=@newsa={0x110, 0x10, 0x20, 0x70bd2c, 0x25dfdbfb, {{@in6=@remote, @in=@multicast2, 0x4e24, 0x2, 0x4e20, 0xff, 0xa, 0x80, 0x20, 0x2c, r5, r9}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d2, 0x33}, @in=@rand_addr=0x64010101, {0x9, 0x4, 0x45, 0x8, 0x0, 0x2000000, 0xffffffffffffffff, 0x8}, {0x100, 0x2, 0x81, 0x2}, {0x3b99, 0x2, 0x4}, 0x70bd2d, 0x3505, 0xa, 0x1, 0x1, 0xf27aec1229832c14}, [@coaddr={0x14, 0xe, @in6=@ipv4={'\x00', '\xff\xff', @broadcast}}, @lastused={0xc, 0xf, 0x7}]}, 0x110}, 0x1, 0x0, 0x0, 0x4040844}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r11 = socket$inet6_udp(0xa, 0x2, 0x0) r12 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r12, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r11, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x8, 0x3, 0x460, 0xf0, 0xffffffff, 0xffffffff, 0xf0, 0xffffffff, 0x390, 0xffffffff, 0xffffffff, 0x390, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00', {}, {}, 0x2f, 0x0, 0x3}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'nicvf0\x00', {0x3f66}}}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3d}}, [0xffffffff], [], 'wg1\x00', 'gre0\x00', {}, {0xff}}, 0x0, 0x258, 0x2a0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x80ff, 0x0, 0x5, 0x563e4515, 0x0, 0x7, 0x3fc, 0x20}}}, @common=@inet=@hashlimit3={{0x158}, {'veth0_vlan\x00', {0x3, 0x0, 0x48, 0x0, 0x15ab, 0x1000, 0x6, 0x5}}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x2, 0x5, {0x6}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x4c0) socket$nl_generic(0x10, 0x3, 0x10) 8.3588238s ago: executing program 4 (id=8853): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1, 0x0, 0x2}, 0x18) syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8042, &(0x7f0000000480)={[{@grpjquota}, {@init_itable_val={'init_itable', 0x3d, 0x7}}, {@dioread_nolock}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7fffffff}}], [{@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@appraise}]}, 0x3, 0x4f3, &(0x7f00000012c0)="$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") (fail_nth: 1) 8.337548791s ago: executing program 4 (id=8855): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000001bc0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(r0, &(0x7f0000001d40)={0x0, 0x0, &(0x7f0000001d00)={&(0x7f0000001c00)={0x18, r1, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4008814}, 0x24008880) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080), 0x64, 0x53e, &(0x7f0000000740)="$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") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket(0x2000000015, 0x80005, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x200}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) getpeername$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) r5 = socket$kcm(0x2, 0xf, 0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x39, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r8 = geteuid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r7, {0x0, 0xffffffffffffffff}}, './file0\x00'}) setresuid(0x0, r8, r9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r10 = socket$nl_generic(0x10, 0x3, 0x10) r11 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(r10, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r11, @ANYBLOB="871000000000000000000100000008000300000001000500060000000000050005"], 0x30}, 0x1, 0x0, 0x0, 0x94}, 0x8808) 7.995883516s ago: executing program 6 (id=8858): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000380)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x5}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000d40)={0x0, 0x7000003, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) 7.923204667s ago: executing program 4 (id=8859): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000140)='kfree\x00', r1, 0x0, 0x2}, 0x18) syz_open_dev$sg(&(0x7f0000000000), 0x9, 0x80000) syz_mount_image$ext4(&(0x7f0000000700)='ext4\x00', &(0x7f0000000080)='./file0\x00', 0x8042, &(0x7f0000000480)={[{@dioread_nolock}, {@init_itable_val={'init_itable', 0x3d, 0x7}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x7fffffff}}, {@grpjquota}], [{@dont_appraise}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}, {@appraise}]}, 0x3, 0x4f3, &(0x7f00000012c0)="$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") 7.798377129s ago: executing program 4 (id=8861): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000001bc0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(r0, &(0x7f0000001d40)={0x0, 0x0, &(0x7f0000001d00)={&(0x7f0000001c00)={0x18, r1, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4008814}, 0x24008880) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080), 0x64, 0x53e, &(0x7f0000000740)="$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") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket(0x2000000015, 0x80005, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x200}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) getpeername$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) r6 = socket$kcm(0x2, 0xf, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x39, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) r9 = geteuid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r8, {0x0, 0xffffffffffffffff}}, './file0\x00'}) setresuid(0x0, r9, r10) sendmsg$nl_xfrm(r4, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f0000000c80)=@newsa={0x110, 0x10, 0x20, 0x70bd2c, 0x25dfdbfb, {{@in6=@remote, @in=@multicast2, 0x4e24, 0x2, 0x4e20, 0xff, 0xa, 0x80, 0x20, 0x2c, r5, r9}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d2, 0x33}, @in=@rand_addr=0x64010101, {0x9, 0x4, 0x45, 0x8, 0x0, 0x2000000, 0xffffffffffffffff, 0x8}, {0x100, 0x2, 0x81, 0x2}, {0x3b99, 0x2, 0x4}, 0x70bd2d, 0x3505, 0xa, 0x1, 0x1, 0xf27aec1229832c14}, [@coaddr={0x14, 0xe, @in6=@ipv4={'\x00', '\xff\xff', @broadcast}}, @lastused={0xc, 0xf, 0x7}]}, 0x110}, 0x1, 0x0, 0x0, 0x4040844}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r11 = socket$inet6_udp(0xa, 0x2, 0x0) r12 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r12, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r11, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x8, 0x3, 0x460, 0xf0, 0xffffffff, 0xffffffff, 0xf0, 0xffffffff, 0x390, 0xffffffff, 0xffffffff, 0x390, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00', {}, {}, 0x2f, 0x0, 0x3}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'nicvf0\x00', {0x3f66}}}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3d}}, [0xffffffff], [], 'wg1\x00', 'gre0\x00', {}, {0xff}}, 0x0, 0x258, 0x2a0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x80ff, 0x0, 0x5, 0x563e4515, 0x0, 0x7, 0x3fc, 0x20}}}, @common=@inet=@hashlimit3={{0x158}, {'veth0_vlan\x00', {0x3, 0x0, 0x48, 0x0, 0x15ab, 0x1000, 0x6, 0x5}}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x2, 0x5, {0x6}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x4c0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="871000000000000000000100000008000300000001000500060000000000050005"], 0x30}, 0x1, 0x0, 0x0, 0x94}, 0x8808) 7.633301911s ago: executing program 4 (id=8865): bpf$MAP_CREATE(0x0, &(0x7f0000000280)=@base={0x7, 0x4, 0x8, 0x1, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='sched_switch\x00', r0}, 0x18) r1 = socket$xdp(0x2c, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x400000000000004) setsockopt$XDP_RX_RING(r1, 0x11b, 0x2, &(0x7f00000004c0)=0x1000000, 0x4) writev(r2, &(0x7f0000000000)=[{&(0x7f0000000200)="480000001400190d7ebdeb75fd0d8c562c84d8c033ed7a80ffe0090f000000000000a2bc5603ca00000f7f89000000200000004a2471083ec6991778581acb6c0101ff0000000309", 0x48}], 0x1) 7.346688816s ago: executing program 4 (id=8867): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) r1 = socket$inet6(0xa, 0x3, 0xee) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xa}, 0x1c) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000780)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x40, @private2, 0xfffffffc}, {0xa, 0x4e21, 0x2, @remote, 0x2}, r3, 0x100}}, 0x48) r4 = syz_io_uring_setup(0x35c9, &(0x7f0000000380)={0x0, 0x1ffffc, 0x10100, 0x0, 0x2}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) r7 = io_uring_setup(0x2ed8, &(0x7f0000000280)={0x0, 0x683e, 0x800, 0x1, 0x12, 0x0, r4}) io_uring_register$IORING_REGISTER_IOWQ_AFF(r7, 0x11, &(0x7f0000000d40)="01", 0x1) syz_io_uring_submit(r5, r6, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {}, 0x1}) io_uring_enter(r4, 0x2ded, 0x4000, 0x20, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r3, 0x7f, "a6e17e", "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"}}, 0x110) r8 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x5, 0xa5d4}, 0x4c58, 0x5, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x13, r8, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x800004, &(0x7f0000001b40)={[{@dioread_lock}, {@jqfmt_vfsold}, {@journal_dev={'journal_dev', 0x3d, 0x5}}, {@data_err_ignore}, {@abort}, {@max_batch_time={'max_batch_time', 0x3d, 0x41}}]}, 0x3, 0x43a, &(0x7f0000000340)="$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") 7.346218066s ago: executing program 34 (id=8867): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) r1 = socket$inet6(0xa, 0x3, 0xee) setsockopt$inet6_int(r1, 0x29, 0x4e, &(0x7f0000000040)=0x9, 0x4) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x4e24, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xa}, 0x1c) r2 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000080), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x2, &(0x7f0000000180)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_IP(r2, &(0x7f0000000780)={0x3, 0x40, 0xfa00, {{0xa, 0x4e20, 0x40, @private2, 0xfffffffc}, {0xa, 0x4e21, 0x2, @remote, 0x2}, r3, 0x100}}, 0x48) r4 = syz_io_uring_setup(0x35c9, &(0x7f0000000380)={0x0, 0x1ffffc, 0x10100, 0x0, 0x2}, &(0x7f0000000180)=0x0, &(0x7f00000001c0)=0x0) r7 = io_uring_setup(0x2ed8, &(0x7f0000000280)={0x0, 0x683e, 0x800, 0x1, 0x12, 0x0, r4}) io_uring_register$IORING_REGISTER_IOWQ_AFF(r7, 0x11, &(0x7f0000000d40)="01", 0x1) syz_io_uring_submit(r5, r6, &(0x7f0000000040)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index=0x4, 0x0, 0x0, 0x0, {}, 0x1}) io_uring_enter(r4, 0x2ded, 0x4000, 0x20, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(r2, &(0x7f0000000380)={0x9, 0x108, 0xfa00, {r3, 0x7f, "a6e17e", "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"}}, 0x110) r8 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x5, 0xa5d4}, 0x4c58, 0x5, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x13, r8, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x800004, &(0x7f0000001b40)={[{@dioread_lock}, {@jqfmt_vfsold}, {@journal_dev={'journal_dev', 0x3d, 0x5}}, {@data_err_ignore}, {@abort}, {@max_batch_time={'max_batch_time', 0x3d, 0x41}}]}, 0x3, 0x43a, &(0x7f0000000340)="$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") 6.095310686s ago: executing program 3 (id=8876): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000001bc0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(r0, &(0x7f0000001d40)={0x0, 0x0, &(0x7f0000001d00)={&(0x7f0000001c00)={0x18, r1, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4008814}, 0x24008880) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080), 0x64, 0x53e, &(0x7f0000000740)="$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") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket(0x2000000015, 0x80005, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x200}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) getpeername$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) r6 = socket$kcm(0x2, 0xf, 0x2) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x39, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r8 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r7}, 0x10) r9 = geteuid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r6, 0xc018937b, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r8, {0x0, 0xffffffffffffffff}}, './file0\x00'}) setresuid(0x0, r9, r10) sendmsg$nl_xfrm(r4, &(0x7f0000000440)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000400)={&(0x7f0000000c80)=@newsa={0x110, 0x10, 0x20, 0x70bd2c, 0x25dfdbfb, {{@in6=@remote, @in=@multicast2, 0x4e24, 0x2, 0x4e20, 0xff, 0xa, 0x80, 0x20, 0x2c, r5, r9}, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x4d2, 0x33}, @in=@rand_addr=0x64010101, {0x9, 0x4, 0x45, 0x8, 0x0, 0x2000000, 0xffffffffffffffff, 0x8}, {0x100, 0x2, 0x81, 0x2}, {0x3b99, 0x2, 0x4}, 0x70bd2d, 0x3505, 0xa, 0x1, 0x1, 0xf27aec1229832c14}, [@coaddr={0x14, 0xe, @in6=@ipv4={'\x00', '\xff\xff', @broadcast}}, @lastused={0xc, 0xf, 0x7}]}, 0x110}, 0x1, 0x0, 0x0, 0x4040844}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r11 = socket$inet6_udp(0xa, 0x2, 0x0) r12 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r12, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r11, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x8, 0x3, 0x460, 0xf0, 0xffffffff, 0xffffffff, 0xf0, 0xffffffff, 0x390, 0xffffffff, 0xffffffff, 0x390, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00', {}, {}, 0x2f, 0x0, 0x3}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'nicvf0\x00', {0x3f66}}}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3d}}, [0xffffffff], [], 'wg1\x00', 'gre0\x00', {}, {0xff}}, 0x0, 0x258, 0x2a0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x80ff, 0x0, 0x5, 0x563e4515, 0x0, 0x7, 0x3fc, 0x20}}}, @common=@inet=@hashlimit3={{0x158}, {'veth0_vlan\x00', {0x3, 0x0, 0x48, 0x0, 0x15ab, 0x1000, 0x6, 0x5}}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x2, 0x5, {0x6}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x4c0) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16, @ANYBLOB="871000000000000000000100000008000300000001000500060000000000050005"], 0x30}, 0x1, 0x0, 0x0, 0x94}, 0x8808) 5.828923579s ago: executing program 3 (id=8877): prlimit64(0x0, 0x7, &(0x7f00000001c0)={0x8, 0x88}, 0x0) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = socket$inet6_mptcp(0xa, 0x1, 0x106) gettid() ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) timer_create(0x1, &(0x7f0000533fa0)={0x0, 0x24, 0x800000000004, @thr={&(0x7f0000000140)="7abe54420a731e0477e4ba800022ae38acb2ca4f9d102b6091cd059760a91391caafb6ab36cea454763ebf046fa46be93ab760516f8306aa15ce7e191312", &(0x7f0000000500)="73d3018e77e314f3e0092ee9accc10631c075ea3763209606c409c30293d2eadb755cea5796e6dee03d2ee859edc8ab5dd4bb31ce6fa8a88dcb876ead8fb795466740a89cc7bf7af62bd9db5ba353bb91ba8a2afc5d39a0feac757a6f583e8eb63ec67e8cb81fdb9094d108300d740aba11b5567b46174ce1396c029422b72e0532e5a9f502e6032221c63e4edc4aecf7a75c474fe1fff7b2fa33a801c9fd25314432ac3b88ba182f6eea0fab06ed04597ee26ed6c4db05b334dbe6f760c9c3a9f20f28a22f36077b85bc78fb2766a6a4011cd1082df05aa3d833b83096359bdac4a11c43e576854137af2a1ee292f00801a45383d"}}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff}) pipe(&(0x7f00000008c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r1, 0x0, r3, 0x0, 0x7, 0x9) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000200180000000000000000000850000007b00000095"], &(0x7f00000003c0)='GPL\x00', 0x4, 0x0, 0x0, 0x0, 0x2, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='sched_switch\x00', r4}, 0x10) write$P9_RWRITE(r3, &(0x7f0000000040)={0xb, 0x77, 0x87}, 0x10c00) read(r2, &(0x7f0000032440)=""/102364, 0x18fdc) socket$inet6(0xa, 0x1, 0x84) socket$nl_route(0x10, 0x3, 0x0) syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000003200)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b704000000000000850000005700000095"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x59dc6d71776a1654, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r6}, 0x10) r7 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f00000001c0), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r7, &(0x7f00000004c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000003c0), 0x111, 0x1}}, 0x20) r8 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) bind$llc(r8, &(0x7f0000000000)={0x1a, 0x0, 0x0, 0x0, 0x81, 0x42}, 0x10) r9 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fff7ffc}]}) close_range(r9, 0xffffffffffffffff, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x245600) socket$inet_udplite(0x2, 0x2, 0x88) 5.76262763s ago: executing program 3 (id=8878): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={0x0, r0, 0x0, 0xfffffffff7ffffec}, 0x18) prctl$PR_SET_NAME(0xf, &(0x7f0000000580)='ex\x00\xc1\"\xfe4\xf7\xaf2pd\x98\xfb~\xa3\xaa\xe5\xae\x00\x00') io_setup(0xdf14, &(0x7f0000000140)=0x0) io_getevents(r1, 0x6, 0x2, &(0x7f0000000180)=[{}, {}], &(0x7f00000001c0)={0x77359400}) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000040)={0x1d, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r3}, 0x10) fremovexattr(r3, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r4 = syz_open_dev$vcsa(&(0x7f0000000100), 0x1, 0x0) lseek(r4, 0x0, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000003840), 0xffffffffffffffff) r7 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REGISTER_BEACONS(r5, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="01002bbd7000fedbdf2555000000080001005c00000008000300", @ANYRES32=r7], 0x30}, 0x1, 0x0, 0x0, 0x40895}, 0x4044840) sendmsg$NL80211_CMD_DEAUTHENTICATE(r4, &(0x7f00000003c0)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000380)={&(0x7f0000000a00)=ANY=[@ANYRESDEC=r8, @ANYRES16=r6, @ANYBLOB="0004e1e51f27bd7000fbdbdf25270000000a000600505050505050000004005f0004005f001300b95e7d366debb888b02e4412df0cde11150004005f00a5002a00379f7f04afe063d944ec6e0c55788663cb6eca9f61ab82a12850dc2ec8393d338a2500241292000000a039574733c8c3f9ed0bcf83355355ea5ac19e6ee5574e4be6b95c0ca6ec4fef8372f7b9d5788b85bc2866010e0af2dd1f0e8b217d6e13f2f23b49020f9171866c7592afab730f54394246ad02073388fccbc7088b0321b275e3d357359909266adcd796013013b3af9909d6e2e4caffffe385d61b836ee700000004f450227f8e9bd5bbe659d8c1e1675a6917ede88a084c286adac5c4d8839b15b7a477e0ef97f35b42f48ca00daca72a985bd4d942f8dedbfe50ca94464ba2de278b2aa6ea07714019deb8b4bb8445a5cb25dc3ec3e35b7170c8b6b8eeb468d58ef898a5a60966e2e069b3e2eeeb4529f5745002e59d1e4f862f3bbff323d77ee8df6a01e12775529c76b83f94fc8b4799057b36626fa8c11403f3cc151212b3ae69a011ffe6700edb4132aa61badc47dd76c34e53314c556a96e3112505096e36dad72b3a6b91503e03176c65180ffb932d00"/449], 0xec}}, 0x40000) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x580, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4c58, 0x0, 0xffffffff, 0x1, 0x8, 0x2, 0xb, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_rx_ring(r9, 0x107, 0x5, &(0x7f0000000280)=@req3={0x1000, 0x3a, 0x1000, 0x3a, 0x400}, 0x1c) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000080000000000000000001d8500000007000000850000002a00000095"], &(0x7f0000000400)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000004c0)={&(0x7f0000000480)='devlink_hwerr\x00', r4, 0x0, 0x200000000000}, 0x18) clock_gettime(0x6, &(0x7f0000000280)) r10 = gettid() fcntl$lock(r3, 0x6, &(0x7f0000000000)={0xf4e144b458aeb5f, 0x3, 0x5, 0xfffffffffffffff1, r10}) openat$selinux_access(0xffffffffffffff9c, &(0x7f0000000500), 0x2, 0x0) 5.666199122s ago: executing program 3 (id=8879): r0 = socket$nl_audit(0x10, 0x3, 0x9) r1 = gettid() sendmsg$AUDIT_SET(r0, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x3c, 0x3e9, 0x400, 0x70bd26, 0x25dfdbfb, {0x57, 0x0, 0x2, r1, 0xc, 0x40, 0x903, 0x4, 0x0, 0x10001, 0x80000001}, ["", "", ""]}, 0x3c}, 0x1, 0x0, 0x0, 0x4044005}, 0x40000000) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r2 = bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) close(r2) r3 = socket$kcm(0x2, 0x200000000000001, 0x0) sendmsg$inet(r3, 0x0, 0x30004081) r4 = bpf$MAP_CREATE(0x0, 0x0, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000000c0)={{r4, 0xffffffffffffffff}, &(0x7f00000001c0), &(0x7f0000000080)=r2}, 0x20) recvmsg(r3, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000940)=[{0x0}], 0x1}, 0x2) close(r5) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000000c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r6 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0xd}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x4, 0x7ffc1ffb}]}) r7 = gettid() ppoll(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) tkill(r7, 0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x6a855000) madvise(&(0x7f0000000000/0x600000)=nil, 0x600002, 0x9) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0xf, 0xc, &(0x7f0000000740)=ANY=[@ANYRES32=r6, @ANYRES64=0x0], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) rmdir(0x0) 3.87711268s ago: executing program 6 (id=8908): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r1}, 0x10) r2 = io_uring_setup(0x792f, &(0x7f0000000600)={0x0, 0x2002, 0x2, 0x0, 0x4b1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) setrlimit(0x40000000000008, &(0x7f00000002c0)={0x0, 0x5}) syz_open_procfs(0x0, &(0x7f0000000180)='net/kcm\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000000080)=[{{&(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000012c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @private=0xa010102}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10000}}], 0x38}}], 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) unshare(0x26000400) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x602, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x0, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0x2}, 0x18) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$UHID_CREATE2(r5, 0x0, 0x8) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000003c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f00000004c0)="7cd1", 0x2}, {&(0x7f0000000540)}], 0x2, 0x0) 3.851979641s ago: executing program 35 (id=8908): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000000000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r1}, 0x10) r2 = io_uring_setup(0x792f, &(0x7f0000000600)={0x0, 0x2002, 0x2, 0x0, 0x4b1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) setrlimit(0x40000000000008, &(0x7f00000002c0)={0x0, 0x5}) syz_open_procfs(0x0, &(0x7f0000000180)='net/kcm\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000000080)=[{{&(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000012c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @private=0xa010102}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10000}}], 0x38}}], 0x1, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) unshare(0x26000400) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x602, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x0, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r4, 0x0, 0x2}, 0x18) r5 = openat$selinux_avc_cache_threshold(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$UHID_CREATE2(r5, 0x0, 0x8) r6 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r6}, &(0x7f0000bbdffc)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000003c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r7, &(0x7f0000000080)=[{&(0x7f00000004c0)="7cd1", 0x2}, {&(0x7f0000000540)}], 0x2, 0x0) 2.694976918s ago: executing program 1 (id=8920): r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000100), 0x8000) r1 = socket$qrtr(0x2a, 0x2, 0x0) connect$qrtr(r1, &(0x7f0000000040)={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0xc) r2 = bpf$PROG_LOAD(0x5, 0x0, 0x0) r3 = socket(0x1d, 0x2, 0x6) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, &(0x7f0000000600)={'vxcan0\x00', 0x0}) bind$can_j1939(r3, &(0x7f0000000380)={0x1d, r4, 0x1, {0x1, 0xf0, 0x3}, 0xfe}, 0x18) sendmmsg$sock(r1, &(0x7f0000003e00)=[{{0x0, 0x0, &(0x7f0000000080)}}, {{0x0, 0x0, &(0x7f0000000280)}}], 0x2, 0x0) syz_usb_connect$hid(0x0, 0x36, 0x0, 0x0) r5 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) perf_event_open(&(0x7f00000007c0)={0x1, 0x80, 0x65, 0xfc, 0x5, 0x0, 0x0, 0x7, 0x89000, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc42, 0x0, @perf_bp={0x0, 0x5}, 0x280, 0x8, 0x7ffffefc, 0x3, 0x5, 0x0, 0x0, 0x0, 0x100, 0x0, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x9) r6 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$UHID_CREATE(r6, &(0x7f0000002a00)={0x0, {'syz0\x00', 'syz1\x00', 'syz0\x00', &(0x7f0000000780)=""/28, 0x1c, 0x6, 0x0, 0x0, 0xffffff00, 0x800000}}, 0x120) r7 = bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000008c0)=@bpf_tracing={0x1a, 0x13, &(0x7f0000001b40)=ANY=[@ANYBLOB="1800000006000000000000001ee3000018110000", @ANYRES32=r5, @ANYBLOB="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"/272], &(0x7f0000000280)='GPL\x00', 0xbe, 0x1000, &(0x7f0000000b40)=""/4096, 0x40f00, 0x4, '\x00', r4, 0x19, 0xffffffffffffffff, 0x8, &(0x7f00000003c0)={0x0, 0x5}, 0x8, 0x10, &(0x7f0000000480)={0x2, 0x7, 0x1, 0xf4e}, 0x10, 0x2602c, r2, 0x4, &(0x7f00000004c0)=[r5, r5], &(0x7f0000000700)=[{0x0, 0x1, 0x10, 0x6}, {0x1, 0x1, 0x10, 0x8}, {0x0, 0x2, 0x8, 0xa}, {0x1, 0x5, 0xb, 0xd}], 0x10, 0x1, @void, @value}, 0x94) socketpair(0xf, 0x1, 0xd, &(0x7f0000000100)) bpf$MAP_CREATE(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="1b00000009"], 0x50) r8 = bpf$MAP_CREATE(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="0b00000000010000000100000900000001"], 0x50) bpf$MAP_UPDATE_BATCH(0x1a, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000680)="0f1531882bd5b785413e7ebf9bee8a0617f52daa2d2fd2828a0160ac2d1df23a1f063b65b180010446301cf4dd281101baffbb3e5bbc65b1f94f0c25a1cd09e000f45824a03443940f686b1afcbb10d76ccce96dd36462c6fce4b6021a3c551c21a5e7a80e0f8e850dcd89149f", &(0x7f0000000280), 0x8, r8, 0x4}, 0x38) bpf$MAP_LOOKUP_BATCH(0x1b, &(0x7f0000000400)={0x0, 0x0, &(0x7f0000000100), 0x0, 0x3, r8}, 0x38) write$UHID_DESTROY(r6, &(0x7f0000000080), 0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r5, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000440)={&(0x7f00000001c0)=ANY=[@ANYRESDEC=r7], 0x28}, 0x1, 0x0, 0x0, 0xc000}, 0x810) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000002c0)={&(0x7f0000000740)='global_dirty_state\x00', r2, 0x0, 0x1}, 0x18) fsmount(0xffffffffffffffff, 0x0, 0x8c) syz_io_uring_setup(0x494, &(0x7f0000000840)={0x0, 0x4661, 0x4, 0x3, 0x288}, &(0x7f0000000340)=0x0, &(0x7f0000000500)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r9, 0x104, &(0x7f0000000580)=0x4, 0x0, 0x4) syz_io_uring_submit(r9, r10, &(0x7f00000002c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r1, 0x0, 0x0}) bpf$MAP_UPDATE_CONST_STR(0x2, &(0x7f00000000c0)={{0x1, 0xffffffffffffffff}, &(0x7f0000000000), &(0x7f0000000080)='%-010d \x00'}, 0x20) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f0000000140)={r11}, 0x4) close_range(r0, r1, 0x0) 2.021310168s ago: executing program 0 (id=8925): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='\v\x00\x00\x00\b'], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8a, @void, @value}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', 0xffffffffffffffff, 0x0, 0x80000000000}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0900000000000000008dc2fa967089d32eed38e3404815b1b5de05650000994c4a7ebccac5bf88c7ded9db7b8270f00f808f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r4 = openat$nci(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) close_range(r4, 0xffffffffffffffff, 0x200000000000000) 1.95629216s ago: executing program 7 (id=8926): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000380)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x5}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000d40)={0x0, 0x7000003, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) 1.92950206s ago: executing program 7 (id=8927): bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r0}, 0x10) r1 = io_uring_setup(0x792f, &(0x7f0000000600)={0x0, 0x2002, 0x2, 0x0, 0x4b1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_BUFFERS(r1, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) setrlimit(0x40000000000008, &(0x7f00000002c0)={0x0, 0x5}) syz_open_procfs(0x0, &(0x7f0000000180)='net/kcm\x00') r2 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r2, &(0x7f0000000080)=[{{&(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000012c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @private=0xa010102}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10000}}], 0x38}}], 0x1, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000000040000000026e890d98490ad69cfc8000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], 0x0, 0xfb81, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) unshare(0x26000400) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) r4 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r4}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r5, &(0x7f0000000080)=[{&(0x7f00000004c0)="7cd1", 0x2}, {&(0x7f0000000540)}], 0x2, 0x0) 1.882903381s ago: executing program 1 (id=8928): r0 = socket(0x10, 0x3, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="0100000004000000e27f00000100000000", @ANYRES32=0x0, @ANYRES32], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r2}, 0x18) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000840)=@newqdisc={0x58, 0x24, 0xd0f, 0x70bd2d, 0x0, {0x60, 0x0, 0x0, r4, {0x0, 0xa}, {0xffff, 0xffff}, {0xf, 0xffff}}, [@qdisc_kind_options=@q_sfb={{0x8}, {0x2c, 0x2, @TCA_SFB_PARMS={0x28, 0x1, {0x9, 0x0, 0x9, 0x5, 0x5, 0x1, 0x1000, 0x7, 0x6}}}}]}, 0x58}}, 0x44080) 1.882038031s ago: executing program 0 (id=8929): syz_mount_image$vfat(&(0x7f00000005c0), &(0x7f00000002c0)='./file0\x00', 0xc80, &(0x7f0000020100)=ANY=[@ANYBLOB="00631dda01aef2456795dd9b26209f1c0f624854ea3dd5a00bd6df44035f5c3ae796fec6d633a0ffad0569794acfef7da01767fd4175f2cd82df769aa2ee7bfe3640554507d2e660c9f9e222a72e1e3e71145c480657d2864e5e276f028d64701ae31cde0ceaf408fdb05c0f4142da00e900000100000149e6d308cbe315789f4baffe39bbced9b1d421d2e290e9fc563b62225f002ee310e1fa7321000000000000d6231001a4b2d467825f3abb0c167e129cf1fa0e7854103f4bf2d3a0194983bc86cbd3d75ccef3c8ac4516dac102"], 0x1, 0x27c, &(0x7f0000000600)="$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") r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x34120, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) r2 = socket(0x10, 0x3, 0x0) r3 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x0) r4 = syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xe099, 0x0, 0x1, 0xb5}, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r5, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r5, r6, &(0x7f00000002c0)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3}) io_uring_enter(r4, 0x47f6, 0x0, 0x2, 0x0, 0x0) write$evdev(r3, &(0x7f0000000040)=[{{}, 0x0, 0x2}], 0x37) r7 = perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x400000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={&(0x7f0000000300), 0x4}, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000600)={0x7, 0xb, &(0x7f0000000040)=ANY=[@ANYBLOB="620ac4ff000000007110b300000000001801000020786c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000003000000850000000400000095"], &(0x7f0000000480)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r7, 0x40042408, r8) syz_open_procfs$namespace(0x0, &(0x7f0000000300)='ns/ipc\x00') sendmmsg(r2, &(0x7f0000000000), 0x4000000000001f2, 0x0) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000400)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000380)={&(0x7f0000000a00)={0x114, 0x0, 0x10, 0x80, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1d}, @IPVS_CMD_ATTR_SERVICE={0x28, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x35}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@dev={0xfe, 0x80, '\x00', 0x10}}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4800}, @IPVS_CMD_ATTR_DEST={0x40, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x6}, @IPVS_DEST_ATTR_ADDR={0x14, 0x1, @ipv6=@private0={0xfc, 0x0, '\x00', 0x1}}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0xf}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x1}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0xa}, @IPVS_DEST_ATTR_TUN_TYPE={0x5}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x8000}, @IPVS_CMD_ATTR_DEST={0x54, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x800}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x8bf}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0xe6}, @IPVS_DEST_ATTR_ADDR_FAMILY={0x6, 0xb, 0xa}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x6}, @IPVS_DEST_ATTR_PORT={0x6, 0x2, 0x4e21}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x5}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}]}]}, 0x114}, 0x1, 0x0, 0x0, 0x4048092}, 0x800) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x10, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000756c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000008500000072000000850000000f00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) perf_event_open(&(0x7f00000005c0)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x9, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r9 = syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x79af, 0x3180, 0x8000, 0x40024e}, &(0x7f0000000080)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r10, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r10, r11, &(0x7f00000002c0)=@IORING_OP_TIMEOUT={0xb, 0x11, 0x0, 0x0, 0x0, &(0x7f0000000100), 0x1, 0x40, 0x1}) io_uring_enter(r9, 0x627, 0xc1040000, 0x43, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x84042, 0x1fb) r12 = syz_open_procfs(0x0, &(0x7f00000003c0)='gid_map\x00') writev(r12, &(0x7f00000000c0)=[{&(0x7f0000000040)='1)', 0x2}], 0x1) 1.837935581s ago: executing program 1 (id=8930): bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r0}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) sendfile(r1, r1, 0x0, 0x40000f63c) 1.422884138s ago: executing program 0 (id=8931): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) r1 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) process_madvise(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}], 0x1, 0x13, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x44f0) 1.208012391s ago: executing program 0 (id=8932): r0 = openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) r1 = openat$selinux_policy(0xffffff9c, &(0x7f0000001040), 0x0, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x100000a, 0x12, r1, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x0, 0x0}) process_madvise(0xffffffffffffffff, &(0x7f0000000040)=[{0x0}], 0x1, 0x13, 0x0) write$selinux_load(r0, &(0x7f0000000000)=ANY=[], 0x44f0) (fail_nth: 1) 914.009086ms ago: executing program 1 (id=8933): r0 = fsopen(&(0x7f00000004c0)='vxfs\x00', 0x0) close(r0) 912.590776ms ago: executing program 7 (id=8934): bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r0 = fsopen(&(0x7f0000000100)='configfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) gettid() socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$ext4(&(0x7f0000000240)='ext4\x00', &(0x7f0000000280)='./mnt\x00', 0x0, &(0x7f00000002c0), 0x0, 0x235, &(0x7f0000000300)="$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") bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000000000000000000000000000850000006d00000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x5, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) prlimit64(0x0, 0x3, &(0x7f0000000140)={0x8, 0x87}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x1c, 0x1, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_STATUS={0x8}]}, 0x1c}}, 0x0) 832.440337ms ago: executing program 1 (id=8935): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="020000000400000008000000"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000900)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b705000008000000850000006900000095"], &(0x7f0000000380)='GPL\x00', 0x1, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000040)='kmem_cache_free\x00', r1, 0x0, 0x5}, 0x18) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r2, &(0x7f0000000d40)={0x0, 0x7000003, &(0x7f00000023c0)=[{&(0x7f0000000b40)='?', 0x1}, {0x0, 0x1}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x20001) 831.517207ms ago: executing program 7 (id=8936): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f0000001e80)=ANY=[@ANYBLOB='\v\x00\x00\x00\b'], 0x48) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x1, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x2, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x23, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0xe8a, @void, @value}, 0x94) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000940)={&(0x7f0000000040)='sys_enter\x00', r4, 0x0, 0x8}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000180)='kfree\x00', 0xffffffffffffffff, 0x0, 0x80000000000}, 0x18) bpf$MAP_CREATE(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="0900000000000000008dc2fa967089d32eed38e3404815b1b5de05650000994c4a7ebccac5bf88c7ded9db7b8270f00f808f", @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r5 = openat$nci(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) close_range(r5, 0xffffffffffffffff, 0x200000000000000) 805.455918ms ago: executing program 1 (id=8937): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000040000000800000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, 0x0, &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) io_setup(0x6, &(0x7f00000001c0)) r2 = syz_io_uring_setup(0x10b, &(0x7f0000000140)={0x0, 0x7f1a, 0x0, 0x0, 0x285}, &(0x7f0000000000)=0x0, &(0x7f0000000280)=0x0) r5 = gettid() r6 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) read$ptp(r6, 0x0, 0x0) timer_create(0x0, &(0x7f00000002c0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)=0x0) timer_settime(r7, 0x1, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x20000000) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f00000002c0)={0xffffffffffffffff, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x5, 0x12, 0xffffffffffffffff, 0x0) memfd_create(0x0, 0x6) socket(0x10, 0x803, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r3, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r3, r4, &(0x7f00000002c0)=@IORING_OP_CONNECT={0x10, 0xa, 0x0, 0xffffffffffffffff, 0x0, 0x0}) io_uring_enter(r2, 0x47f9, 0x0, 0x0, 0x0, 0x0) 274.634055ms ago: executing program 0 (id=8938): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$mptcp(&(0x7f0000001bc0), 0xffffffffffffffff) sendmsg$MPTCP_PM_CMD_SUBFLOW_CREATE(r0, &(0x7f0000001d40)={0x0, 0x0, &(0x7f0000001d00)={&(0x7f0000001c00)={0x18, r1, 0x1, 0x70bd2a, 0x25dfdbff, {}, [@MPTCP_PM_ATTR_ADDR={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x4008814}, 0x24008880) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000001c0)='./bus\x00', 0x41, &(0x7f0000000080), 0x64, 0x53e, &(0x7f0000000740)="$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") r2 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000017c0)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r2, @ANYBLOB="0000000004000000b705000008000000850000006a00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000300)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x4, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r4 = socket(0x2000000015, 0x80005, 0x0) bind$inet6(r4, &(0x7f0000000180)={0xa, 0x0, 0x0, @loopback, 0x200}, 0x1c) sendto$inet6(r4, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) getpeername$packet(r2, &(0x7f0000000380)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f00000003c0)=0x14) r5 = socket$kcm(0x2, 0xf, 0x2) r6 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000700)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x39, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, @void, @value}, 0x94) r7 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r6}, 0x10) r8 = geteuid() ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f00000005c0)={{0x1, 0x1, 0x18, r7, {0x0, 0xffffffffffffffff}}, './file0\x00'}) setresuid(0x0, r8, r9) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='sched_switch\x00', r3}, 0x10) r10 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) process_vm_writev(r10, &(0x7f0000001c80)=[{&(0x7f0000001bc0)=""/156, 0x9c}], 0x1, &(0x7f0000001d80)=[{&(0x7f0000001cc0)=""/116, 0x20001c34}], 0x1, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f00000004c0)=@raw={'raw\x00', 0x8, 0x3, 0x460, 0xf0, 0xffffffff, 0xffffffff, 0xf0, 0xffffffff, 0x390, 0xffffffff, 0xffffffff, 0x390, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00', {}, {}, 0x2f, 0x0, 0x3}, 0x0, 0xa8, 0xf0}, @common=@inet=@TEE={0x48, 'TEE\x00', 0x1, {@ipv4=@local, 'nicvf0\x00', {0x3f66}}}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0x3d}}, [0xffffffff], [], 'wg1\x00', 'gre0\x00', {}, {0xff}}, 0x0, 0x258, 0x2a0, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x80ff, 0x0, 0x5, 0x563e4515, 0x0, 0x7, 0x3fc, 0x20}}}, @common=@inet=@hashlimit3={{0x158}, {'veth0_vlan\x00', {0x3, 0x0, 0x48, 0x0, 0x15ab, 0x1000, 0x6, 0x5}}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x2, 0x5, {0x6}}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x4c0) 255.346666ms ago: executing program 7 (id=8939): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='memory.events\x00', 0x275a, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000003c0)=0x14) sendmsg$nl_route(r1, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) syz_clone(0x40200, 0x0, 0x49, 0x0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r2, &(0x7f0000000540), 0x84) perf_event_open(&(0x7f00000004c0)={0x8, 0x80, 0x0, 0xf, 0x0, 0x0, 0x82, 0x200000000, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={&(0x7f0000000080), 0x9}, 0x18204, 0x0, 0x3, 0x0, 0x0, 0x5338c7af, 0x0, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 218.491987ms ago: executing program 3 (id=8882): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c, @void, @value}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r2 = openat$nci(0xffffffffffffff9c, &(0x7f0000000240), 0x2, 0x0) close_range(r2, 0xffffffffffffffff, 0x200000000000000) 202.638116ms ago: executing program 0 (id=8940): r0 = perf_event_open(&(0x7f0000000bc0)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x8, 0xcc38b, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000, 0x0, @perf_config_ext={0x4, 0x100000003}, 0x8342, 0x4, 0x3, 0x0, 0x9, 0x800001, 0xfff7, 0x0, 0x400, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f0000000380)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000080)={&(0x7f0000000440)=ANY=[@ANYBLOB="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"], 0x130}, 0x1, 0x0, 0x0, 0x400d4}, 0x80) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r2}, 0x10) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000740)={{{@in=@initdev, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6}, 0x0, @in=@multicast2}}, &(0x7f00000005c0)=0xe8) mount$cgroup(0x0, &(0x7f0000000600)='.\x00', &(0x7f0000000640), 0x2008000, &(0x7f0000000840)={[{@none}, {}], [{@hash}, {@euid_gt={'euid>', r3}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@fsuuid={'fsuuid', 0x3d, {[0x66, 0x38, 0x37, 0x61, 0x39, 0x61, 0x32, 0x38], 0x2d, [0x30, 0x62, 0x63, 0x30], 0x2d, [0x0, 0x61, 0x65, 0x63], 0x2d, [0x34, 0xee, 0x30, 0x64], 0x2d, [0x35, 0x63, 0x66, 0x38, 0x65, 0x61, 0x64, 0x66]}}}]}) r4 = socket$kcm(0x10, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0xf, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000000000000000000000018000000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000003000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000240)=ANY=[], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0xf, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r6 = socket(0x40000000015, 0x5, 0x0) bind$inet(r6, &(0x7f00008a5ff0)={0x2, 0x0, @loopback}, 0x10) recvmmsg(r6, &(0x7f0000004900)=[{{0x0, 0x0, 0x0}, 0xd57e}, {{0x0, 0x0, 0x0}, 0x85ae}], 0x2, 0x60010020, 0x0) sendto$inet(r6, 0x0, 0x0, 0x0, &(0x7f0000000200)={0x2, 0x0, @loopback}, 0x10) setsockopt$SO_J1939_PROMISC(r6, 0x6b, 0x2, &(0x7f0000000680), 0x4) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000400)={&(0x7f00000003c0)='sched_switch\x00', r5}, 0x10) bpf$MAP_CREATE(0x0, &(0x7f00000006c0)=@base={0xe, 0x4, 0x4, 0x20002, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x2, 0x0, 0x0, @void, @value, @void, @value}, 0x50) keyctl$join(0x1, &(0x7f0000000580)={'syz', 0x1}) sendmsg$kcm(r4, &(0x7f00000006c0)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f00000001c0)="d8000000180081064e81f782db4cb904021d080006007c09e8fe55a10a0015000600142603600e1208000f0000000401a80016002000024006000200035c0461c1d60008000000000000fb8000a0e408e8d8ef52a98516277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5ee4ce1b14d6d930dfe1d9d322fe7c9f8775730d16a4683f5aeb4edbb57a5025ccca9e00360db70100000040fad95667e006dcdf63951f0f49e119c849ea6e5a0fc55e4cde205a214d6102d6dcbf33fb5ce3bb9ad809d5e1cace81ed0bffece0b42a9ecbee5de6cc", 0xd8}], 0x1}, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000200)={'netdevsim0\x00', 0x1000}) ioctl$TUNSETOWNER(r1, 0x400454cc, 0x0) r7 = socket(0x2, 0x80805, 0x0) getsockopt$WPAN_SECURITY_LEVEL(r7, 0x0, 0x2, 0x0, &(0x7f0000000200)) close(r1) 82.881898ms ago: executing program 8 (id=8909): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[@ANYBLOB="1b00"/11], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000000)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b702000003000000850000008600000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x30, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r1}, 0x10) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000340)={0x1c, 0x1, 0x1, 0x201, 0x0, 0x0, {}, [@CTA_STATUS={0x8}]}, 0x1c}}, 0x0) 72.193729ms ago: executing program 3 (id=8941): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000008c0)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b7030000000000fc850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0xfffffffffffffffc}, 0x18) bind$inet6(0xffffffffffffffff, 0x0, 0x0) write$RDMA_USER_CM_CMD_REJECT(0xffffffffffffffff, 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x3c, 0x1, 0x0, 0x0, 0x0, 0x7, 0x590, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x5, 0xa5d4}, 0x4c58, 0x5, 0x0, 0x1, 0x8, 0x20002, 0xb, 0x0, 0x0, 0x0, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x3000003, 0x13, r1, 0x0) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x800004, &(0x7f0000001b40)={[{@dioread_lock}, {@jqfmt_vfsold}, {@journal_dev={'journal_dev', 0x3d, 0x5}}, {@data_err_ignore}, {@abort}, {@max_batch_time={'max_batch_time', 0x3d, 0x41}}]}, 0x3, 0x43a, &(0x7f0000000340)="$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") 906.89µs ago: executing program 8 (id=8942): bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000980)='mm_page_free\x00', r0}, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x2002, 0x0) sendfile(r1, r1, 0x0, 0x40000f63c) 0s ago: executing program 7 (id=8943): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x50) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000480)='kfree\x00', r1}, 0x10) r2 = io_uring_setup(0x792f, &(0x7f0000000600)={0x0, 0x2002, 0x2, 0x0, 0x4b1}) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0x0, 0x0, &(0x7f0000000300)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0xe, '\x00', 0x0, @fallback=0x14, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) io_uring_register$IORING_REGISTER_BUFFERS(r2, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) setrlimit(0x40000000000008, &(0x7f00000002c0)={0x0, 0x5}) syz_open_procfs(0x0, &(0x7f0000000180)='net/kcm\x00') r3 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$inet(r3, &(0x7f0000000080)=[{{&(0x7f0000000200)={0x2, 0x4e20, @multicast1}, 0x10, 0x0, 0x0, &(0x7f00000012c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @empty, @private=0xa010102}}}, @ip_ttl={{0x14, 0x0, 0x2, 0x10000}}], 0x38}}], 0x1, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a000000010000"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="180000000000040000000026e890d98490ad69cfc8000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000001000000"], &(0x7f0000000240)='GPL\x00', 0xfb81, 0x0, 0x0, 0x0, 0x10, '\x00', 0x0, @fallback=0x10, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r5 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) unshare(0x26000400) setsockopt$XDP_UMEM_COMPLETION_RING(0xffffffffffffffff, 0x11b, 0x6, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="8627a5ae189fb7f1fb93de54dc74bdd809477fd9440200000021526fe4764fb98d1a00"/47, @ANYRES16=r5, @ANYRES32=r1, @ANYRES64, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x602, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000"], 0x48) r6 = bpf$PROG_LOAD(0x5, &(0x7f0000000640)={0x11, 0x0, 0x0, &(0x7f0000000480)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x1c, '\x00', 0x0, @fallback=0x2a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r6, 0x0, 0x2}, 0x18) r7 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r7}, &(0x7f0000bbdffc)) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000003c0)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0xfffffffd, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x2e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) pipe(&(0x7f00000002c0)={0xffffffffffffffff}) vmsplice(r8, &(0x7f0000000080)=[{&(0x7f00000004c0)="7cd1", 0x2}, {&(0x7f0000000540)}], 0x2, 0x0) kernel console output (not intermixed with test programs): UID: 0 PID: 30965 Comm: syz.5.8463 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 558.113191][T30965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 558.113208][T30965] Call Trace: [ 558.113217][T30965] [ 558.113227][T30965] __dump_stack+0x1d/0x30 [ 558.113270][T30965] dump_stack_lvl+0xe8/0x140 [ 558.113297][T30965] dump_stack+0x15/0x1b [ 558.113319][T30965] should_fail_ex+0x265/0x280 [ 558.113340][T30965] should_failslab+0x8c/0xb0 [ 558.113409][T30965] __kmalloc_noprof+0xa5/0x3e0 [ 558.113516][T30965] ? ext4_find_extent+0x16b/0x7a0 [ 558.113557][T30965] ext4_find_extent+0x16b/0x7a0 [ 558.113596][T30965] ext4_move_extents+0x381/0x710 [ 558.113667][T30965] ext4_ioctl+0x1c07/0x2080 [ 558.113704][T30965] ? ioctl_has_perm+0x257/0x2a0 [ 558.113775][T30965] ? do_vfs_ioctl+0x943/0x11d0 [ 558.113817][T30965] ? selinux_file_ioctl+0x2e3/0x370 [ 558.113919][T30965] ? __fget_files+0x184/0x1c0 [ 558.113950][T30965] ? __pfx_ext4_ioctl+0x10/0x10 [ 558.113983][T30965] __se_sys_ioctl+0xcb/0x140 [ 558.114032][T30965] __x64_sys_ioctl+0x43/0x50 [ 558.114073][T30965] x64_sys_call+0x19a8/0x2fb0 [ 558.114173][T30965] do_syscall_64+0xd2/0x200 [ 558.114195][T30965] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 558.114226][T30965] ? clear_bhb_loop+0x40/0x90 [ 558.114281][T30965] ? clear_bhb_loop+0x40/0x90 [ 558.114312][T30965] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 558.114333][T30965] RIP: 0033:0x7fbb34efe929 [ 558.114348][T30965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 558.114366][T30965] RSP: 002b:00007fbb33546038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 558.114447][T30965] RAX: ffffffffffffffda RBX: 00007fbb35126080 RCX: 00007fbb34efe929 [ 558.114462][T30965] RDX: 0000200000000240 RSI: 00000000c028660f RDI: 0000000000000005 [ 558.114476][T30965] RBP: 00007fbb33546090 R08: 0000000000000000 R09: 0000000000000000 [ 558.114488][T30965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 558.114499][T30965] R13: 0000000000000001 R14: 00007fbb35126080 R15: 00007ffdbdd4ebf8 [ 558.114518][T30965] [ 558.564139][T30971] loop4: detected capacity change from 0 to 2048 [ 558.597620][T28588] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 558.609660][T30971] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 558.682124][T30971] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 281 free clusters [ 558.731781][T30971] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 1 with error 28 [ 558.744218][T30971] EXT4-fs (loop4): This should not happen!! Data will be lost [ 558.744218][T30971] [ 558.754071][T30971] EXT4-fs (loop4): Total free blocks count 0 [ 558.760096][T30971] EXT4-fs (loop4): Free/Dirty block details [ 558.766022][T30971] EXT4-fs (loop4): free_blocks=4096 [ 558.771284][T30971] EXT4-fs (loop4): dirty_blocks=512 [ 558.776544][T30971] EXT4-fs (loop4): Block reservation details [ 558.782594][T30971] EXT4-fs (loop4): i_reserved_data_blocks=32 [ 558.921887][ T37] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 18 with max blocks 480 with error 28 [ 559.042715][T30991] loop4: detected capacity change from 0 to 527 [ 559.058740][T30991] EXT4-fs (loop4): failed to parse options in superblock:  [ 559.071900][T30991] EXT4-fs (loop4): Unsupported encryption level 4 [ 559.320743][T30999] wireguard0: entered promiscuous mode [ 559.326355][T30999] wireguard0: entered allmulticast mode [ 559.364825][T31002] loop4: detected capacity change from 0 to 527 [ 559.373348][T31002] EXT4-fs (loop4): failed to parse options in superblock:  [ 559.386326][T31002] EXT4-fs (loop4): Unsupported encryption level 4 [ 559.539200][T31014] __nla_validate_parse: 1 callbacks suppressed [ 559.539221][T31014] netlink: 16 bytes leftover after parsing attributes in process `syz.4.8483'. [ 559.698240][T31039] wireguard0: entered promiscuous mode [ 559.703912][T31039] wireguard0: entered allmulticast mode [ 559.732789][ T29] kauditd_printk_skb: 633 callbacks suppressed [ 559.732808][ T29] audit: type=1326 audit(1749332470.835:65097): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.4.8494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa54adce929 code=0x7ffc0000 [ 559.764357][ T29] audit: type=1326 audit(1749332470.835:65098): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.4.8494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa54adce929 code=0x7ffc0000 [ 559.788585][ T29] audit: type=1326 audit(1749332470.835:65099): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.4.8494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa54adce929 code=0x7ffc0000 [ 559.812558][ T29] audit: type=1326 audit(1749332470.835:65100): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.4.8494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa54adce929 code=0x7ffc0000 [ 559.836312][ T29] audit: type=1326 audit(1749332470.835:65101): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.4.8494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa54adce929 code=0x7ffc0000 [ 559.860372][ T29] audit: type=1326 audit(1749332470.835:65102): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.4.8494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa54adce929 code=0x7ffc0000 [ 559.862283][T31047] loop5: detected capacity change from 0 to 512 [ 559.884094][ T29] audit: type=1326 audit(1749332470.835:65103): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.4.8494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa54adce929 code=0x7ffc0000 [ 559.892984][T31047] EXT4-fs (loop5): encrypted files will use data=ordered instead of data journaling mode [ 559.914579][ T29] audit: type=1326 audit(1749332470.835:65104): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.4.8494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa54adce929 code=0x7ffc0000 [ 559.949113][ T29] audit: type=1326 audit(1749332470.945:65105): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.4.8494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa54adce929 code=0x7ffc0000 [ 559.972910][ T29] audit: type=1326 audit(1749332470.945:65106): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31042 comm="syz.4.8494" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa54adce929 code=0x7ffc0000 [ 559.999994][T31047] EXT4-fs (loop5): 1 truncate cleaned up [ 560.008710][T31047] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 560.042296][T31050] netlink: 16 bytes leftover after parsing attributes in process `syz.4.8495'. [ 560.072122][T28588] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 560.117957][T31058] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 560.126626][T31058] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 560.663876][T31072] FAULT_INJECTION: forcing a failure. [ 560.663876][T31072] name failslab, interval 1, probability 0, space 0, times 0 [ 560.676661][T31072] CPU: 1 UID: 0 PID: 31072 Comm: syz.4.8504 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 560.676691][T31072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 560.676778][T31072] Call Trace: [ 560.676786][T31072] [ 560.676793][T31072] __dump_stack+0x1d/0x30 [ 560.676878][T31072] dump_stack_lvl+0xe8/0x140 [ 560.676969][T31072] dump_stack+0x15/0x1b [ 560.676987][T31072] should_fail_ex+0x265/0x280 [ 560.677048][T31072] should_failslab+0x8c/0xb0 [ 560.677138][T31072] kmem_cache_alloc_noprof+0x50/0x310 [ 560.677170][T31072] ? audit_log_start+0x365/0x6c0 [ 560.677203][T31072] audit_log_start+0x365/0x6c0 [ 560.677336][T31072] audit_seccomp+0x48/0x100 [ 560.677363][T31072] ? __seccomp_filter+0x68c/0x10d0 [ 560.677387][T31072] __seccomp_filter+0x69d/0x10d0 [ 560.677440][T31072] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 560.677466][T31072] ? vfs_write+0x75e/0x8e0 [ 560.677492][T31072] __secure_computing+0x82/0x150 [ 560.677518][T31072] syscall_trace_enter+0xcf/0x1e0 [ 560.677543][T31072] do_syscall_64+0xac/0x200 [ 560.677577][T31072] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 560.677640][T31072] ? clear_bhb_loop+0x40/0x90 [ 560.677667][T31072] ? clear_bhb_loop+0x40/0x90 [ 560.677695][T31072] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 560.677718][T31072] RIP: 0033:0x7fa54adce929 [ 560.677739][T31072] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 560.677762][T31072] RSP: 002b:00007fa549437038 EFLAGS: 00000246 ORIG_RAX: 00000000000000be [ 560.677783][T31072] RAX: ffffffffffffffda RBX: 00007fa54aff5fa0 RCX: 00007fa54adce929 [ 560.677798][T31072] RDX: 0000200000000040 RSI: 00002000000000c0 RDI: 000000000000000a [ 560.677819][T31072] RBP: 00007fa549437090 R08: 0000000000000000 R09: 0000000000000000 [ 560.677833][T31072] R10: 000000000000001e R11: 0000000000000246 R12: 0000000000000001 [ 560.677845][T31072] R13: 0000000000000000 R14: 00007fa54aff5fa0 R15: 00007fff43358b98 [ 560.677864][T31072] [ 560.942102][T31078] loop4: detected capacity change from 0 to 527 [ 560.952435][T31078] EXT4-fs (loop4): failed to parse options in superblock:  [ 560.965653][T31078] EXT4-fs (loop4): Unsupported encryption level 4 [ 560.989364][T31083] loop5: detected capacity change from 0 to 2048 [ 561.001925][T31083] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 561.069622][T31083] EXT4-fs error (device loop5): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 281 free clusters [ 561.084457][T31083] EXT4-fs (loop5): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 1 with error 28 [ 561.096754][T31083] EXT4-fs (loop5): This should not happen!! Data will be lost [ 561.096754][T31083] [ 561.106556][T31083] EXT4-fs (loop5): Total free blocks count 0 [ 561.112681][T31083] EXT4-fs (loop5): Free/Dirty block details [ 561.118597][T31083] EXT4-fs (loop5): free_blocks=4096 [ 561.124012][T31083] EXT4-fs (loop5): dirty_blocks=944 [ 561.129362][T31083] EXT4-fs (loop5): Block reservation details [ 561.135375][T31083] EXT4-fs (loop5): i_reserved_data_blocks=59 [ 561.168128][T17685] EXT4-fs (loop5): Delayed block allocation failed for inode 15 at logical offset 18 with max blocks 912 with error 28 [ 561.201283][T31099] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8515'. [ 561.262431][T31105] 9pnet_fd: Insufficient options for proto=fd [ 561.310694][T31114] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 561.345642][T31114] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 561.364897][T31114] loop5: detected capacity change from 0 to 512 [ 561.371798][T31114] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 561.398849][T31114] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 561.423079][T31114] ext4 filesystem being mounted at /192/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 561.635008][T31132] netlink: 20 bytes leftover after parsing attributes in process `syz.3.8526'. [ 561.685121][T31134] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8527'. [ 561.803652][T31141] wireguard0: entered promiscuous mode [ 561.809226][T31141] wireguard0: entered allmulticast mode [ 561.975016][T28588] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 562.016491][T31148] FAULT_INJECTION: forcing a failure. [ 562.016491][T31148] name failslab, interval 1, probability 0, space 0, times 0 [ 562.029327][T31148] CPU: 1 UID: 0 PID: 31148 Comm: syz.1.8532 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 562.029425][T31148] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 562.029438][T31148] Call Trace: [ 562.029445][T31148] [ 562.029469][T31148] __dump_stack+0x1d/0x30 [ 562.029495][T31148] dump_stack_lvl+0xe8/0x140 [ 562.029596][T31148] dump_stack+0x15/0x1b [ 562.029650][T31148] should_fail_ex+0x265/0x280 [ 562.029674][T31148] should_failslab+0x8c/0xb0 [ 562.029698][T31148] kmem_cache_alloc_lru_noprof+0x55/0x310 [ 562.029732][T31148] ? __d_alloc+0x3d/0x350 [ 562.029776][T31148] __d_alloc+0x3d/0x350 [ 562.029809][T31148] d_alloc_pseudo+0x1e/0x80 [ 562.029851][T31148] alloc_file_pseudo+0x71/0x160 [ 562.029944][T31148] aio_setup_ring+0x133/0x760 [ 562.029971][T31148] ioctx_alloc+0x2c4/0x4e0 [ 562.029997][T31148] ? fput+0x8f/0xc0 [ 562.030047][T31148] __se_sys_io_setup+0x6b/0x1b0 [ 562.030072][T31148] __x64_sys_io_setup+0x31/0x40 [ 562.030130][T31148] x64_sys_call+0x2f0e/0x2fb0 [ 562.030152][T31148] do_syscall_64+0xd2/0x200 [ 562.030178][T31148] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 562.030285][T31148] ? clear_bhb_loop+0x40/0x90 [ 562.030307][T31148] ? clear_bhb_loop+0x40/0x90 [ 562.030328][T31148] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 562.030369][T31148] RIP: 0033:0x7f99f9a6e929 [ 562.030385][T31148] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 562.030408][T31148] RSP: 002b:00007f99f80d7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ce [ 562.030430][T31148] RAX: ffffffffffffffda RBX: 00007f99f9c95fa0 RCX: 00007f99f9a6e929 [ 562.030484][T31148] RDX: 0000000000000000 RSI: 0000200000000680 RDI: 0000000000002004 [ 562.030496][T31148] RBP: 00007f99f80d7090 R08: 0000000000000000 R09: 0000000000000000 [ 562.030509][T31148] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 562.030593][T31148] R13: 0000000000000000 R14: 00007f99f9c95fa0 R15: 00007fff83af45e8 [ 562.030616][T31148] [ 562.294402][T31150] loop4: detected capacity change from 0 to 527 [ 562.310125][T31163] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8537'. [ 562.330729][T31165] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8536'. [ 562.340042][T31150] EXT4-fs (loop4): failed to parse options in superblock:  [ 562.353101][T31150] EXT4-fs (loop4): Unsupported encryption level 4 [ 562.399908][T31167] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8539'. [ 562.453221][T31179] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 562.480905][T31179] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 562.514722][T31179] loop5: detected capacity change from 0 to 512 [ 562.529761][T31179] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 562.574648][T31179] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 562.595622][T31179] ext4 filesystem being mounted at /196/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 562.954132][T31205] netlink: 12 bytes leftover after parsing attributes in process `ex'. [ 563.195541][T31209] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8554'. [ 563.292194][T31215] loop4: detected capacity change from 0 to 527 [ 563.314886][T31215] EXT4-fs (loop4): failed to parse options in superblock:  [ 563.327858][T31215] EXT4-fs (loop4): Unsupported encryption level 4 [ 563.411041][T31221] xt_hashlimit: size too large, truncated to 1048576 [ 563.417867][T31221] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 563.450516][T28588] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 563.685595][T31249] FAULT_INJECTION: forcing a failure. [ 563.685595][T31249] name failslab, interval 1, probability 0, space 0, times 0 [ 563.686901][T31253] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 563.698505][T31249] CPU: 1 UID: 0 PID: 31249 Comm: syz.1.8570 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 563.698547][T31249] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 563.698603][T31249] Call Trace: [ 563.698612][T31249] [ 563.698624][T31249] __dump_stack+0x1d/0x30 [ 563.698655][T31249] dump_stack_lvl+0xe8/0x140 [ 563.698684][T31249] dump_stack+0x15/0x1b [ 563.698734][T31249] should_fail_ex+0x265/0x280 [ 563.698764][T31249] should_failslab+0x8c/0xb0 [ 563.698800][T31249] kmem_cache_alloc_node_noprof+0x57/0x320 [ 563.698843][T31249] ? __alloc_skb+0x101/0x320 [ 563.698871][T31249] __alloc_skb+0x101/0x320 [ 563.698896][T31249] ? audit_log_start+0x365/0x6c0 [ 563.698945][T31249] audit_log_start+0x380/0x6c0 [ 563.698995][T31249] audit_seccomp+0x48/0x100 [ 563.699125][T31249] ? __seccomp_filter+0x68c/0x10d0 [ 563.699162][T31249] __seccomp_filter+0x69d/0x10d0 [ 563.699222][T31249] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 563.699287][T31249] ? vfs_write+0x75e/0x8e0 [ 563.699316][T31249] ? __rcu_read_unlock+0x4f/0x70 [ 563.699350][T31249] ? __fget_files+0x184/0x1c0 [ 563.699437][T31249] __secure_computing+0x82/0x150 [ 563.699471][T31249] syscall_trace_enter+0xcf/0x1e0 [ 563.699513][T31249] do_syscall_64+0xac/0x200 [ 563.699595][T31249] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 563.699632][T31249] ? clear_bhb_loop+0x40/0x90 [ 563.699663][T31249] ? clear_bhb_loop+0x40/0x90 [ 563.699694][T31249] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 563.699732][T31249] RIP: 0033:0x7f99f9a6e929 [ 563.699753][T31249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 563.699779][T31249] RSP: 002b:00007f99f80d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000067 [ 563.699806][T31249] RAX: ffffffffffffffda RBX: 00007f99f9c95fa0 RCX: 00007f99f9a6e929 [ 563.699824][T31249] RDX: 00000000000000ba RSI: 0000200000000240 RDI: 0000000000000000 [ 563.699842][T31249] RBP: 00007f99f80d7090 R08: 0000000000000000 R09: 0000000000000000 [ 563.699860][T31249] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 563.699923][T31249] R13: 0000000000000000 R14: 00007f99f9c95fa0 R15: 00007fff83af45e8 [ 563.699950][T31249] [ 563.930220][T31253] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 563.947197][T31251] loop4: detected capacity change from 0 to 512 [ 563.955861][T31251] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 563.966129][T31253] loop5: detected capacity change from 0 to 512 [ 563.979178][T31253] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 564.160119][T31251] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz.4.8571: bad orphan inode 11 [ 564.170802][T31251] ext4_test_bit(bit=10, block=4) = 1 [ 564.176143][T31251] is_bad_inode(inode)=0 [ 564.180456][T31251] NEXT_ORPHAN(inode)=2080374784 [ 564.185358][T31251] max_ino=32 [ 564.188567][T31251] i_nlink=0 [ 564.192054][T31251] EXT4-fs (loop4): 1 truncate cleaned up [ 564.198254][T31251] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 564.212344][T31253] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 564.236680][T31253] ext4 filesystem being mounted at /199/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 564.273986][T23540] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 564.308120][ T9] IPVS: starting estimator thread 0... [ 564.328529][T31276] FAULT_INJECTION: forcing a failure. [ 564.328529][T31276] name failslab, interval 1, probability 0, space 0, times 0 [ 564.341386][T31276] CPU: 0 UID: 0 PID: 31276 Comm: syz.4.8577 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 564.341421][T31276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 564.341438][T31276] Call Trace: [ 564.341446][T31276] [ 564.341456][T31276] __dump_stack+0x1d/0x30 [ 564.341477][T31276] dump_stack_lvl+0xe8/0x140 [ 564.341533][T31276] dump_stack+0x15/0x1b [ 564.341549][T31276] should_fail_ex+0x265/0x280 [ 564.341570][T31276] should_failslab+0x8c/0xb0 [ 564.341599][T31276] kmem_cache_alloc_node_noprof+0x57/0x320 [ 564.341700][T31276] ? __alloc_skb+0x101/0x320 [ 564.341725][T31276] __alloc_skb+0x101/0x320 [ 564.341756][T31276] ? audit_log_start+0x365/0x6c0 [ 564.341825][T31276] audit_log_start+0x380/0x6c0 [ 564.341861][T31276] audit_seccomp+0x48/0x100 [ 564.341888][T31276] ? __seccomp_filter+0x68c/0x10d0 [ 564.341962][T31276] __seccomp_filter+0x69d/0x10d0 [ 564.341993][T31276] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 564.342043][T31276] ? vfs_write+0x75e/0x8e0 [ 564.342063][T31276] ? __rcu_read_unlock+0x4f/0x70 [ 564.342146][T31276] ? __fget_files+0x184/0x1c0 [ 564.342172][T31276] __secure_computing+0x82/0x150 [ 564.342201][T31276] syscall_trace_enter+0xcf/0x1e0 [ 564.342232][T31276] do_syscall_64+0xac/0x200 [ 564.342264][T31276] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 564.342362][T31276] ? clear_bhb_loop+0x40/0x90 [ 564.342384][T31276] ? clear_bhb_loop+0x40/0x90 [ 564.342408][T31276] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 564.342431][T31276] RIP: 0033:0x7fa54adce929 [ 564.342482][T31276] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 564.342503][T31276] RSP: 002b:00007fa549437038 EFLAGS: 00000246 ORIG_RAX: 000000000000001e [ 564.342521][T31276] RAX: ffffffffffffffda RBX: 00007fa54aff5fa0 RCX: 00007fa54adce929 [ 564.342548][T31276] RDX: 0000000000005000 RSI: 0000200000ffc000 RDI: 0000000000000000 [ 564.342562][T31276] RBP: 00007fa549437090 R08: 0000000000000000 R09: 0000000000000000 [ 564.342576][T31276] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 564.342591][T31276] R13: 0000000000000000 R14: 00007fa54aff5fa0 R15: 00007fff43358b98 [ 564.342643][T31276] [ 564.571464][T31277] IPVS: using max 1968 ests per chain, 98400 per kthread [ 564.649108][ T9] IPVS: starting estimator thread 0... [ 564.685490][T31286] xt_hashlimit: size too large, truncated to 1048576 [ 564.692397][T31286] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 564.749119][T31284] IPVS: using max 2352 ests per chain, 117600 per kthread [ 564.883545][T28588] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 564.919431][T31299] IPVS: sync thread started: state = BACKUP, mcast_ifn = vlan0, syncid = 3, id = 0 [ 564.943199][ T29] kauditd_printk_skb: 776 callbacks suppressed [ 564.943217][ T29] audit: type=1326 audit(1749332476.045:65877): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31297 comm="syz.5.8587" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7fbb34efe929 code=0x0 [ 564.983175][T31302] FAULT_INJECTION: forcing a failure. [ 564.983175][T31302] name failslab, interval 1, probability 0, space 0, times 0 [ 564.995669][ T29] audit: type=1326 audit(1749332476.085:65878): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31301 comm="syz.3.8588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa14cc9e929 code=0x7ffc0000 [ 564.996104][T31302] CPU: 0 UID: 0 PID: 31302 Comm: syz.3.8588 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 564.996145][T31302] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 564.996163][T31302] Call Trace: [ 564.996174][T31302] [ 564.996186][T31302] __dump_stack+0x1d/0x30 [ 564.996225][T31302] dump_stack_lvl+0xe8/0x140 [ 564.996253][T31302] dump_stack+0x15/0x1b [ 564.996277][T31302] should_fail_ex+0x265/0x280 [ 564.996307][T31302] should_failslab+0x8c/0xb0 [ 564.996354][T31302] kmem_cache_alloc_noprof+0x50/0x310 [ 564.996394][T31302] ? audit_log_start+0x365/0x6c0 [ 564.996451][T31302] audit_log_start+0x365/0x6c0 [ 564.996557][T31302] audit_seccomp+0x48/0x100 [ 564.996596][T31302] ? __seccomp_filter+0x68c/0x10d0 [ 564.996631][T31302] __seccomp_filter+0x69d/0x10d0 [ 564.996667][T31302] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 564.996704][T31302] ? vfs_write+0x75e/0x8e0 [ 564.996732][T31302] ? __rcu_read_unlock+0x4f/0x70 [ 564.996765][T31302] ? __fget_files+0x184/0x1c0 [ 564.996854][T31302] __secure_computing+0x82/0x150 [ 564.996888][T31302] syscall_trace_enter+0xcf/0x1e0 [ 564.996923][T31302] do_syscall_64+0xac/0x200 [ 564.996956][T31302] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 564.997025][T31302] ? clear_bhb_loop+0x40/0x90 [ 564.997085][T31302] ? clear_bhb_loop+0x40/0x90 [ 564.997117][T31302] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 564.997148][T31302] RIP: 0033:0x7fa14cc9e929 [ 564.997171][T31302] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 564.997198][T31302] RSP: 002b:00007fa14b307038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b6 [ 564.997285][T31302] RAX: ffffffffffffffda RBX: 00007fa14cec5fa0 RCX: 00007fa14cc9e929 [ 564.997303][T31302] RDX: 0000000000000000 RSI: ffffffffffffffff RDI: ffffffffffffffff [ 564.997388][T31302] RBP: 00007fa14b307090 R08: 0000000000000000 R09: 0000000000000000 [ 564.997407][T31302] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 564.997425][T31302] R13: 0000000000000000 R14: 00007fa14cec5fa0 R15: 00007ffea7016418 [ 564.997455][T31302] [ 564.997465][T31302] audit: audit_lost=24 audit_rate_limit=0 audit_backlog_limit=64 [ 565.019610][ T29] audit: type=1326 audit(1749332476.085:65879): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31301 comm="syz.3.8588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa14cc9e929 code=0x7ffc0000 [ 565.019646][ T29] audit: type=1326 audit(1749332476.085:65880): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31301 comm="syz.3.8588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa14cc9e929 code=0x7ffc0000 [ 565.019673][ T29] audit: type=1326 audit(1749332476.085:65881): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31301 comm="syz.3.8588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa14cc9e929 code=0x7ffc0000 [ 565.019699][ T29] audit: type=1326 audit(1749332476.085:65882): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31301 comm="syz.3.8588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa14cc9e929 code=0x7ffc0000 [ 565.031893][T31302] audit: out of memory in audit_log_start [ 565.041999][ T29] audit: type=1326 audit(1749332476.085:65883): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31301 comm="syz.3.8588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa14cc9e929 code=0x7ffc0000 [ 565.365257][ T29] audit: type=1326 audit(1749332476.085:65884): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31301 comm="syz.3.8588" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa14cc9e929 code=0x7ffc0000 [ 565.995658][T31347] xt_hashlimit: size too large, truncated to 1048576 [ 566.003091][T31347] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 566.595970][T31414] __nla_validate_parse: 2 callbacks suppressed [ 566.595991][T31414] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8634'. [ 566.602074][T31420] FAULT_INJECTION: forcing a failure. [ 566.602074][T31420] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 566.624247][T31420] CPU: 1 UID: 0 PID: 31420 Comm: syz.1.8636 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 566.624284][T31420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 566.624298][T31420] Call Trace: [ 566.624305][T31420] [ 566.624314][T31420] __dump_stack+0x1d/0x30 [ 566.624363][T31420] dump_stack_lvl+0xe8/0x140 [ 566.624384][T31420] dump_stack+0x15/0x1b [ 566.624401][T31420] should_fail_ex+0x265/0x280 [ 566.624430][T31420] should_fail+0xb/0x20 [ 566.624503][T31420] should_fail_usercopy+0x1a/0x20 [ 566.624526][T31420] strncpy_from_user+0x25/0x230 [ 566.624557][T31420] ? kmem_cache_alloc_noprof+0x186/0x310 [ 566.624586][T31420] ? getname_flags+0x80/0x3b0 [ 566.624693][T31420] getname_flags+0xae/0x3b0 [ 566.624771][T31420] user_path_at+0x28/0x130 [ 566.624804][T31420] do_fchownat+0xb0/0x210 [ 566.624834][T31420] __x64_sys_chown+0x47/0x60 [ 566.624863][T31420] x64_sys_call+0x800/0x2fb0 [ 566.624894][T31420] do_syscall_64+0xd2/0x200 [ 566.624933][T31420] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 566.624960][T31420] ? clear_bhb_loop+0x40/0x90 [ 566.624982][T31420] ? clear_bhb_loop+0x40/0x90 [ 566.625006][T31420] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 566.625081][T31420] RIP: 0033:0x7f99f9a6e929 [ 566.625173][T31420] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 566.625209][T31420] RSP: 002b:00007f99f80d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000005c [ 566.625228][T31420] RAX: ffffffffffffffda RBX: 00007f99f9c95fa0 RCX: 00007f99f9a6e929 [ 566.625241][T31420] RDX: 0000000000000000 RSI: 000000000000ee00 RDI: 0000200000000240 [ 566.625325][T31420] RBP: 00007f99f80d7090 R08: 0000000000000000 R09: 0000000000000000 [ 566.625338][T31420] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 566.625350][T31420] R13: 0000000000000000 R14: 00007f99f9c95fa0 R15: 00007fff83af45e8 [ 566.625370][T31420] [ 567.445851][T31466] xt_hashlimit: size too large, truncated to 1048576 [ 567.452747][T31466] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 567.653062][T31482] lo speed is unknown, defaulting to 1000 [ 567.667193][T31482] xfrm0 speed is unknown, defaulting to 1000 [ 567.725560][T31486] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 567.733608][T31482] lo speed is unknown, defaulting to 1000 [ 567.734133][T31486] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 567.755718][T31486] loop4: detected capacity change from 0 to 512 [ 567.766484][T31486] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 567.801466][T31486] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 567.814674][T31486] ext4 filesystem being mounted at /520/file0 supports timestamps until 2038-01-19 (0x7fffffff) [ 567.875772][T31492] FAULT_INJECTION: forcing a failure. [ 567.875772][T31492] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 567.889563][T31492] CPU: 0 UID: 0 PID: 31492 Comm: syz.3.8660 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 567.889601][T31492] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 567.889617][T31492] Call Trace: [ 567.889625][T31492] [ 567.889636][T31492] __dump_stack+0x1d/0x30 [ 567.889658][T31492] dump_stack_lvl+0xe8/0x140 [ 567.889706][T31492] dump_stack+0x15/0x1b [ 567.889726][T31492] should_fail_ex+0x265/0x280 [ 567.889752][T31492] should_fail+0xb/0x20 [ 567.889792][T31492] should_fail_usercopy+0x1a/0x20 [ 567.889887][T31492] _copy_to_user+0x20/0xa0 [ 567.889920][T31492] simple_read_from_buffer+0xb5/0x130 [ 567.890009][T31492] proc_fail_nth_read+0x100/0x140 [ 567.890097][T31492] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 567.890124][T31492] vfs_read+0x19d/0x6f0 [ 567.890226][T31492] ? __rcu_read_unlock+0x4f/0x70 [ 567.890255][T31492] ? __fget_files+0x184/0x1c0 [ 567.890288][T31492] ? __sys_setsockopt+0x18e/0x200 [ 567.890316][T31492] ksys_read+0xda/0x1a0 [ 567.890389][T31492] __x64_sys_read+0x40/0x50 [ 567.890414][T31492] x64_sys_call+0x2d77/0x2fb0 [ 567.890435][T31492] do_syscall_64+0xd2/0x200 [ 567.890457][T31492] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 567.890492][T31492] ? clear_bhb_loop+0x40/0x90 [ 567.890575][T31492] ? clear_bhb_loop+0x40/0x90 [ 567.890597][T31492] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 567.890617][T31492] RIP: 0033:0x7fa14cc9d33c [ 567.890709][T31492] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 567.890733][T31492] RSP: 002b:00007fa14b307030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 567.890756][T31492] RAX: ffffffffffffffda RBX: 00007fa14cec5fa0 RCX: 00007fa14cc9d33c [ 567.890769][T31492] RDX: 000000000000000f RSI: 00007fa14b3070a0 RDI: 0000000000000006 [ 567.890781][T31492] RBP: 00007fa14b307090 R08: 0000000000000000 R09: 0000000000000000 [ 567.890795][T31492] R10: 0000200000000100 R11: 0000000000000246 R12: 0000000000000001 [ 567.890882][T31492] R13: 0000000000000000 R14: 00007fa14cec5fa0 R15: 00007ffea7016418 [ 567.890907][T31492] [ 568.165563][T31500] loop5: detected capacity change from 0 to 128 [ 568.173308][T31500] EXT4-fs warning (device loop5): ext4_init_metadata_csum:4622: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 568.186992][T31500] EXT4-fs (loop5): Couldn't mount because of unsupported optional features (fffc1829) [ 568.222479][T31502] netlink: 8 bytes leftover after parsing attributes in process `ex'. [ 568.252446][T31505] netlink: 8 bytes leftover after parsing attributes in process `syz.1.8666'. [ 568.308234][T31509] netlink: 'syz.1.8668': attribute type 3 has an invalid length. [ 568.534305][T23540] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 568.639438][T31539] loop4: detected capacity change from 0 to 512 [ 568.646506][T31539] EXT4-fs: Ignoring removed mblk_io_submit option [ 568.654591][T31539] EXT4-fs (loop4): encrypted files will use data=ordered instead of data journaling mode [ 568.667805][T31539] EXT4-fs (loop4): 1 truncate cleaned up [ 568.679461][T31539] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 569.256115][T31564] FAULT_INJECTION: forcing a failure. [ 569.256115][T31564] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 569.269929][T31564] CPU: 0 UID: 0 PID: 31564 Comm: syz.1.8683 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 569.269988][T31564] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 569.270006][T31564] Call Trace: [ 569.270013][T31564] [ 569.270023][T31564] __dump_stack+0x1d/0x30 [ 569.270050][T31564] dump_stack_lvl+0xe8/0x140 [ 569.270092][T31564] dump_stack+0x15/0x1b [ 569.270108][T31564] should_fail_ex+0x265/0x280 [ 569.270133][T31564] should_fail_alloc_page+0xf2/0x100 [ 569.270168][T31564] __alloc_frozen_pages_noprof+0xff/0x360 [ 569.270221][T31564] alloc_pages_mpol+0xb3/0x250 [ 569.270360][T31564] vma_alloc_folio_noprof+0x1aa/0x300 [ 569.270405][T31564] handle_mm_fault+0xec2/0x2be0 [ 569.270468][T31564] ? mas_walk+0xf2/0x120 [ 569.270502][T31564] do_user_addr_fault+0x636/0x1090 [ 569.270549][T31564] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 569.270611][T31564] exc_page_fault+0x62/0xa0 [ 569.270656][T31564] asm_exc_page_fault+0x26/0x30 [ 569.270707][T31564] RIP: 0033:0x7f99f9a1bf4b [ 569.270727][T31564] Code: c0 8b 87 c0 00 00 00 66 0f 6c c0 85 c0 0f 85 44 01 00 00 c7 87 c0 00 00 00 ff ff ff ff 48 8d 84 24 20 21 00 00 48 8d 7c 24 20 <0f> 29 44 24 40 49 89 e4 48 89 44 24 50 8b 43 74 48 89 9c 24 00 01 [ 569.270750][T31564] RSP: 002b:00007f99f80d4e10 EFLAGS: 00010246 [ 569.270770][T31564] RAX: 00007f99f80d6f30 RBX: 00007f99f9c64620 RCX: 0000000000000000 [ 569.270787][T31564] RDX: 00007f99f80d6f78 RSI: 00007f99f9acdbf8 RDI: 00007f99f80d4e30 [ 569.270803][T31564] RBP: 0000000000000009 R08: 0000000000000000 R09: 0000000000000000 [ 569.270818][T31564] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 569.270870][T31564] R13: 0000000000000000 R14: 00007f99f9c95fa0 R15: 00007fff83af45e8 [ 569.270895][T31564] [ 569.270909][T31564] Huh VM_FAULT_OOM leaked out to the #PF handler. Retrying PF [ 569.474417][T23540] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 569.500943][T31572] wireguard0: entered promiscuous mode [ 569.506480][T31572] wireguard0: entered allmulticast mode [ 569.523502][T31575] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=16 sclass=netlink_audit_socket pid=31575 comm=syz.4.8686 [ 569.536143][T31575] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=17 sclass=netlink_audit_socket pid=31575 comm=syz.4.8686 [ 569.955188][ T29] kauditd_printk_skb: 819 callbacks suppressed [ 569.955208][ T29] audit: type=1326 audit(1749332481.055:66704): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31565 comm="syz.5.8684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fbb34ef58e7 code=0x7ffc0000 [ 569.985324][ T29] audit: type=1326 audit(1749332481.055:66705): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31565 comm="syz.5.8684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fbb34e9ab19 code=0x7ffc0000 [ 570.009087][ T29] audit: type=1326 audit(1749332481.055:66706): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31565 comm="syz.5.8684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7fbb34efe929 code=0x7ffc0000 [ 570.032839][ T29] audit: type=1326 audit(1749332481.055:66707): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31603 comm="syz.1.8698" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f99f9a658e7 code=0x7ffc0000 [ 570.056433][ T29] audit: type=1326 audit(1749332481.055:66708): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31603 comm="syz.1.8698" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f99f9a0ab19 code=0x7ffc0000 [ 570.080353][ T29] audit: type=1326 audit(1749332481.055:66709): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31603 comm="syz.1.8698" exe="/root/syz-executor" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f99f9a6e929 code=0x7ffc0000 [ 570.104086][ T29] audit: type=1326 audit(1749332481.065:66710): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31565 comm="syz.5.8684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fbb34ef58e7 code=0x7ffc0000 [ 570.127800][ T29] audit: type=1326 audit(1749332481.065:66711): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31565 comm="syz.5.8684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fbb34e9ab19 code=0x7ffc0000 [ 570.152156][ T29] audit: type=1326 audit(1749332481.065:66712): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31565 comm="syz.5.8684" exe="/root/syz-executor" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7fbb34efe929 code=0x7ffc0000 [ 570.175769][ T29] audit: type=1326 audit(1749332481.065:66713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31603 comm="syz.1.8698" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f99f9a658e7 code=0x7ffc0000 [ 570.240814][T31620] loop5: detected capacity change from 0 to 512 [ 570.248689][T31620] EXT4-fs (loop5): orphan cleanup on readonly fs [ 570.256344][T31620] EXT4-fs error (device loop5): ext4_orphan_get:1419: comm syz.5.8703: bad orphan inode 13 [ 570.267478][T31620] ext4_test_bit(bit=12, block=18) = 1 [ 570.272998][T31620] is_bad_inode(inode)=0 [ 570.277216][T31620] NEXT_ORPHAN(inode)=2130706432 [ 570.282136][T31620] max_ino=32 [ 570.285399][T31620] i_nlink=1 [ 570.289169][T31620] EXT4-fs (loop5): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 570.309063][T31620] netlink: 4 bytes leftover after parsing attributes in process `syz.5.8703'. [ 570.331831][T28588] EXT4-fs error (device loop5): ext4_lookup:1791: inode #2: comm syz-executor: deleted inode referenced: 12 [ 570.345231][T28588] EXT4-fs error (device loop5): ext4_lookup:1791: inode #2: comm syz-executor: deleted inode referenced: 12 [ 570.383240][T31624] loop4: detected capacity change from 0 to 2048 [ 570.401214][T31624] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 570.430384][T31622] EXT4-fs (loop5): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 570.452845][T31624] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 281 free clusters [ 570.469422][T31624] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 1 with error 28 [ 570.481798][T31624] EXT4-fs (loop4): This should not happen!! Data will be lost [ 570.481798][T31624] [ 570.491531][T31624] EXT4-fs (loop4): Total free blocks count 0 [ 570.497557][T31624] EXT4-fs (loop4): Free/Dirty block details [ 570.503629][T31624] EXT4-fs (loop4): free_blocks=4096 [ 570.508931][T31624] EXT4-fs (loop4): dirty_blocks=800 [ 570.514236][T31624] EXT4-fs (loop4): Block reservation details [ 570.520291][T31624] EXT4-fs (loop4): i_reserved_data_blocks=50 [ 570.545952][ T37] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 18 with max blocks 768 with error 28 [ 570.631213][T31639] netlink: 28 bytes leftover after parsing attributes in process `+}[@'. [ 570.639890][T31639] netlink: 108 bytes leftover after parsing attributes in process `+}[@'. [ 570.658190][T31643] netlink: 12 bytes leftover after parsing attributes in process `ex'. [ 570.658461][T31639] netlink: 28 bytes leftover after parsing attributes in process `+}[@'. [ 570.675567][T31639] netlink: 108 bytes leftover after parsing attributes in process `+}[@'. [ 570.684322][T31639] netlink: 84 bytes leftover after parsing attributes in process `+}[@'. [ 570.725433][T31629] lo speed is unknown, defaulting to 1000 [ 570.744911][T31629] xfrm0 speed is unknown, defaulting to 1000 [ 570.769534][T17699] bridge_slave_1: left allmulticast mode [ 570.775312][T17699] bridge_slave_1: left promiscuous mode [ 570.780999][T17699] bridge0: port 2(bridge_slave_1) entered disabled state [ 570.799310][T17699] bridge_slave_0: left allmulticast mode [ 570.805029][T17699] bridge_slave_0: left promiscuous mode [ 570.810815][T17699] bridge0: port 1(bridge_slave_0) entered disabled state [ 570.833982][T31653] loop4: detected capacity change from 0 to 527 [ 570.843390][T31653] EXT4-fs (loop4): failed to parse options in superblock:  [ 570.856310][T31653] EXT4-fs (loop4): Unsupported encryption level 4 [ 570.928942][T31661] loop4: detected capacity change from 0 to 2048 [ 570.940559][T31661] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 570.955340][T17699] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 570.975314][T17699] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 570.984778][T17699] bond0 (unregistering): Released all slaves [ 570.988742][T31661] EXT4-fs error (device loop4): ext4_mb_generate_buddy:1220: group 0, block bitmap and bg descriptor inconsistent: 25 vs 281 free clusters [ 571.005522][T31661] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 0 with max blocks 1 with error 28 [ 571.005836][T17699] bond1 (unregistering): (slave veth0_to_bond): Releasing backup interface [ 571.017771][T31661] EXT4-fs (loop4): This should not happen!! Data will be lost [ 571.017771][T31661] [ 571.017789][T31661] EXT4-fs (loop4): Total free blocks count 0 [ 571.042388][T31661] EXT4-fs (loop4): Free/Dirty block details [ 571.048299][T31661] EXT4-fs (loop4): free_blocks=4096 [ 571.053575][T31661] EXT4-fs (loop4): dirty_blocks=640 [ 571.058793][T31661] EXT4-fs (loop4): Block reservation details [ 571.064808][T31661] EXT4-fs (loop4): i_reserved_data_blocks=40 [ 571.071934][T17699] bond1 (unregistering): Released all slaves [ 571.080883][T31629] lo speed is unknown, defaulting to 1000 [ 571.090341][T31658] wireguard0: entered promiscuous mode [ 571.091580][T17685] EXT4-fs (loop4): Delayed block allocation failed for inode 15 at logical offset 18 with max blocks 608 with error 28 [ 571.096168][T31658] wireguard0: entered allmulticast mode [ 571.138970][T17699] IPVS: stopping backup sync thread 31299 ... [ 571.196809][T17699] hsr_slave_0: left promiscuous mode [ 571.204367][T17699] hsr_slave_1: left promiscuous mode [ 571.213385][T17699] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 571.231196][T17699] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 571.315902][T31684] lo speed is unknown, defaulting to 1000 [ 571.322981][T31684] xfrm0 speed is unknown, defaulting to 1000 [ 571.336135][T31629] chnl_net:caif_netlink_parms(): no params data found [ 571.345238][T31687] FAULT_INJECTION: forcing a failure. [ 571.345238][T31687] name failslab, interval 1, probability 0, space 0, times 0 [ 571.358108][T31687] CPU: 1 UID: 0 PID: 31687 Comm: syz.1.8726 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 571.358137][T31687] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 571.358149][T31687] Call Trace: [ 571.358157][T31687] [ 571.358198][T31687] __dump_stack+0x1d/0x30 [ 571.358239][T31687] dump_stack_lvl+0xe8/0x140 [ 571.358265][T31687] dump_stack+0x15/0x1b [ 571.358287][T31687] should_fail_ex+0x265/0x280 [ 571.358313][T31687] should_failslab+0x8c/0xb0 [ 571.358400][T31687] kmem_cache_alloc_node_noprof+0x57/0x320 [ 571.358438][T31687] ? __alloc_skb+0x101/0x320 [ 571.358458][T31687] __alloc_skb+0x101/0x320 [ 571.358477][T31687] netlink_alloc_large_skb+0xba/0xf0 [ 571.358574][T31687] netlink_sendmsg+0x3cf/0x6b0 [ 571.358601][T31687] ? __pfx_netlink_sendmsg+0x10/0x10 [ 571.358627][T31687] __sock_sendmsg+0x142/0x180 [ 571.358736][T31687] ____sys_sendmsg+0x31e/0x4e0 [ 571.358769][T31687] ___sys_sendmsg+0x17b/0x1d0 [ 571.358822][T31687] __x64_sys_sendmsg+0xd4/0x160 [ 571.358849][T31687] x64_sys_call+0x2999/0x2fb0 [ 571.358942][T31687] do_syscall_64+0xd2/0x200 [ 571.358970][T31687] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 571.359005][T31687] ? clear_bhb_loop+0x40/0x90 [ 571.359085][T31687] ? clear_bhb_loop+0x40/0x90 [ 571.359115][T31687] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 571.359143][T31687] RIP: 0033:0x7f99f9a6e929 [ 571.359162][T31687] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 571.359232][T31687] RSP: 002b:00007f99f80d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 571.359254][T31687] RAX: ffffffffffffffda RBX: 00007f99f9c95fa0 RCX: 00007f99f9a6e929 [ 571.359271][T31687] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000009 [ 571.359287][T31687] RBP: 00007f99f80d7090 R08: 0000000000000000 R09: 0000000000000000 [ 571.359303][T31687] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 571.359318][T31687] R13: 0000000000000000 R14: 00007f99f9c95fa0 R15: 00007fff83af45e8 [ 571.359342][T31687] [ 571.381353][T31684] lo speed is unknown, defaulting to 1000 [ 571.609584][T31693] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 571.618297][T31693] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 571.634328][T31629] bridge0: port 1(bridge_slave_0) entered blocking state [ 571.641580][T31629] bridge0: port 1(bridge_slave_0) entered disabled state [ 571.649370][T31629] bridge_slave_0: entered allmulticast mode [ 571.656474][T31629] bridge_slave_0: entered promiscuous mode [ 571.668797][T31629] bridge0: port 2(bridge_slave_1) entered blocking state [ 571.676016][T31629] bridge0: port 2(bridge_slave_1) entered disabled state [ 571.683354][T31629] bridge_slave_1: entered allmulticast mode [ 571.690197][T31629] bridge_slave_1: entered promiscuous mode [ 571.710242][T31629] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 571.721034][T31629] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 571.752745][T31629] team0: Port device team_slave_0 added [ 571.767337][T31629] team0: Port device team_slave_1 added [ 571.800418][T31629] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 571.807477][T31629] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 571.834823][T31629] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 571.872265][T31629] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 571.879297][T31629] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 571.905341][T31629] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 571.937592][T31629] hsr_slave_0: entered promiscuous mode [ 571.948149][T31629] hsr_slave_1: entered promiscuous mode [ 571.958791][T31629] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 571.971920][T31629] Cannot create hsr debugfs directory [ 572.143843][T31629] netdevsim netdevsim6 netdevsim0: renamed from eth0 [ 572.166546][T31629] netdevsim netdevsim6 netdevsim1: renamed from eth1 [ 572.185776][T31629] netdevsim netdevsim6 netdevsim2: renamed from eth2 [ 572.207336][T31629] netdevsim netdevsim6 netdevsim3: renamed from eth3 [ 572.243765][T31629] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.250921][T31629] bridge0: port 2(bridge_slave_1) entered forwarding state [ 572.258344][T31629] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.265481][T31629] bridge0: port 1(bridge_slave_0) entered forwarding state [ 572.296844][T31629] 8021q: adding VLAN 0 to HW filter on device bond0 [ 572.479361][T17699] bridge0: port 1(bridge_slave_0) entered disabled state [ 572.492849][T17699] bridge0: port 2(bridge_slave_1) entered disabled state [ 572.508983][T31629] 8021q: adding VLAN 0 to HW filter on device team0 [ 572.528263][T17685] bridge0: port 1(bridge_slave_0) entered blocking state [ 572.535509][T17685] bridge0: port 1(bridge_slave_0) entered forwarding state [ 572.576269][T17685] bridge0: port 2(bridge_slave_1) entered blocking state [ 572.583401][T17685] bridge0: port 2(bridge_slave_1) entered forwarding state [ 572.636780][T31629] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 572.767708][T31629] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 572.897740][T31629] veth0_vlan: entered promiscuous mode [ 572.905700][T31629] veth1_vlan: entered promiscuous mode [ 572.924809][T31629] veth0_macvtap: entered promiscuous mode [ 572.932723][T31629] veth1_macvtap: entered promiscuous mode [ 572.944615][T31629] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 572.956390][T31629] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 572.973901][T31629] netdevsim netdevsim6 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 572.983430][T31629] netdevsim netdevsim6 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 572.992398][T31629] netdevsim netdevsim6 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 573.001231][T31629] netdevsim netdevsim6 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 573.085929][T31759] loop4: detected capacity change from 0 to 512 [ 573.095358][T31759] EXT4-fs: Quota format mount options ignored when QUOTA feature is enabled [ 573.112655][T31759] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 573.113375][T31761] netlink: 44 bytes leftover after parsing attributes in process `syz.6.8707'. [ 573.125461][T31759] ext4 filesystem being mounted at /540/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 573.134396][T31761] netlink: 44 bytes leftover after parsing attributes in process `syz.6.8707'. [ 573.165323][T31761] netlink: 44 bytes leftover after parsing attributes in process `syz.6.8707'. [ 573.174507][T31761] netlink: 44 bytes leftover after parsing attributes in process `syz.6.8707'. [ 573.202959][T31771] EXT4-fs error (device loop4): ext4_lookup:1787: inode #12: comm syz.4.8742: iget: bad i_size value: 2533274857506816 [ 573.218366][T31761] netlink: 44 bytes leftover after parsing attributes in process `syz.6.8707'. [ 573.227605][T31761] netlink: 44 bytes leftover after parsing attributes in process `syz.6.8707'. [ 573.325781][T31773] loop6: detected capacity change from 0 to 2048 [ 573.341538][T31773] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 573.369546][T31629] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 573.514584][T31790] loop6: detected capacity change from 0 to 512 [ 573.523144][T31790] EXT4-fs (loop6): encrypted files will use data=ordered instead of data journaling mode [ 573.536539][T31790] EXT4-fs error (device loop6): xattr_find_entry:333: inode #15: comm syz.6.8748: corrupted xattr entries [ 573.548316][T31790] EXT4-fs (loop6): Remounting filesystem read-only [ 573.555315][T31790] EXT4-fs (loop6): 1 truncate cleaned up [ 573.561956][T31790] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 573.583768][T31790] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 573.611382][T31794] netlink: 12 bytes leftover after parsing attributes in process `syz.1.8749'. [ 573.715655][T31796] netlink: 'syz.6.8748': attribute type 21 has an invalid length. [ 573.735237][T31796] netlink: 132 bytes leftover after parsing attributes in process `syz.6.8748'. [ 573.782623][T31629] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 573.803043][T31800] netlink: 4 bytes leftover after parsing attributes in process `syz.1.8752'. [ 573.829576][T31802] netlink: 12 bytes leftover after parsing attributes in process `syz.6.8751'. [ 573.931814][T23540] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 574.022092][T31820] FAULT_INJECTION: forcing a failure. [ 574.022092][T31820] name failslab, interval 1, probability 0, space 0, times 0 [ 574.034993][T31820] CPU: 1 UID: 0 PID: 31820 Comm: syz.0.8758 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 574.035023][T31820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 574.035036][T31820] Call Trace: [ 574.035042][T31820] [ 574.035050][T31820] __dump_stack+0x1d/0x30 [ 574.035070][T31820] dump_stack_lvl+0xe8/0x140 [ 574.035113][T31820] dump_stack+0x15/0x1b [ 574.035136][T31820] should_fail_ex+0x265/0x280 [ 574.035159][T31820] ? audit_log_d_path+0x8d/0x150 [ 574.035191][T31820] should_failslab+0x8c/0xb0 [ 574.035258][T31820] __kmalloc_cache_noprof+0x4c/0x320 [ 574.035315][T31820] audit_log_d_path+0x8d/0x150 [ 574.035355][T31820] audit_log_d_path_exe+0x42/0x70 [ 574.035388][T31820] audit_log_task+0x1e9/0x250 [ 574.035506][T31820] audit_seccomp+0x61/0x100 [ 574.035539][T31820] ? __seccomp_filter+0x68c/0x10d0 [ 574.035570][T31820] __seccomp_filter+0x69d/0x10d0 [ 574.035596][T31820] ? __pfx_kernfs_fop_write_iter+0x10/0x10 [ 574.035659][T31820] ? vfs_write+0x75e/0x8e0 [ 574.035693][T31820] __secure_computing+0x82/0x150 [ 574.035719][T31820] syscall_trace_enter+0xcf/0x1e0 [ 574.035759][T31820] do_syscall_64+0xac/0x200 [ 574.035785][T31820] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 574.035911][T31820] ? clear_bhb_loop+0x40/0x90 [ 574.035940][T31820] ? clear_bhb_loop+0x40/0x90 [ 574.036045][T31820] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 574.036073][T31820] RIP: 0033:0x7fc91c20d33c [ 574.036140][T31820] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 574.036202][T31820] RSP: 002b:00007fc91a877030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 574.036220][T31820] RAX: ffffffffffffffda RBX: 00007fc91c435fa0 RCX: 00007fc91c20d33c [ 574.036232][T31820] RDX: 000000000000000f RSI: 00007fc91a8770a0 RDI: 0000000000000009 [ 574.036322][T31820] RBP: 00007fc91a877090 R08: 0000000000000000 R09: 0000000000000000 [ 574.036339][T31820] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 574.036354][T31820] R13: 0000000000000000 R14: 00007fc91c435fa0 R15: 00007ffde1d4f0e8 [ 574.036373][T31820] [ 574.364754][T31827] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 574.616093][T31852] FAULT_INJECTION: forcing a failure. [ 574.616093][T31852] name failslab, interval 1, probability 0, space 0, times 0 [ 574.628920][T31852] CPU: 0 UID: 0 PID: 31852 Comm: syz.3.8770 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 574.629010][T31852] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 574.629030][T31852] Call Trace: [ 574.629039][T31852] [ 574.629049][T31852] __dump_stack+0x1d/0x30 [ 574.629124][T31852] dump_stack_lvl+0xe8/0x140 [ 574.629172][T31852] dump_stack+0x15/0x1b [ 574.629194][T31852] should_fail_ex+0x265/0x280 [ 574.629215][T31852] should_failslab+0x8c/0xb0 [ 574.629245][T31852] kmem_cache_alloc_noprof+0x50/0x310 [ 574.629305][T31852] ? audit_log_start+0x365/0x6c0 [ 574.629359][T31852] audit_log_start+0x365/0x6c0 [ 574.629467][T31852] audit_seccomp+0x48/0x100 [ 574.629495][T31852] ? __seccomp_filter+0x68c/0x10d0 [ 574.629519][T31852] __seccomp_filter+0x69d/0x10d0 [ 574.629543][T31852] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 574.629653][T31852] ? vfs_write+0x75e/0x8e0 [ 574.629679][T31852] ? __rcu_read_unlock+0x4f/0x70 [ 574.629712][T31852] ? __fget_files+0x184/0x1c0 [ 574.629745][T31852] __secure_computing+0x82/0x150 [ 574.629770][T31852] syscall_trace_enter+0xcf/0x1e0 [ 574.629815][T31852] do_syscall_64+0xac/0x200 [ 574.629879][T31852] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 574.629905][T31852] ? clear_bhb_loop+0x40/0x90 [ 574.629925][T31852] ? clear_bhb_loop+0x40/0x90 [ 574.630024][T31852] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 574.630052][T31852] RIP: 0033:0x7fa14cc9e929 [ 574.630098][T31852] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 574.630116][T31852] RSP: 002b:00007fa14b307038 EFLAGS: 00000246 ORIG_RAX: 00000000000001b1 [ 574.630155][T31852] RAX: ffffffffffffffda RBX: 00007fa14cec5fa0 RCX: 00007fa14cc9e929 [ 574.630172][T31852] RDX: 0000000000000000 RSI: 0000200000000000 RDI: ffffffffffffff9c [ 574.630188][T31852] RBP: 00007fa14b307090 R08: 0000000000000000 R09: 0000000000000000 [ 574.630205][T31852] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 574.630220][T31852] R13: 0000000000000000 R14: 00007fa14cec5fa0 R15: 00007ffea7016418 [ 574.630245][T31852] [ 574.930955][T31860] loop6: detected capacity change from 0 to 2049 [ 574.941103][T31860] EXT4-fs warning (device loop6): read_mmp_block:115: Error -117 while reading MMP block 64 [ 574.963182][ T29] kauditd_printk_skb: 1099 callbacks suppressed [ 574.963200][ T29] audit: type=1326 audit(1749332486.065:67811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31829 comm="syz.1.8763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f99f9a658e7 code=0x7ffc0000 [ 574.993254][ T29] audit: type=1326 audit(1749332486.065:67812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31829 comm="syz.1.8763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f99f9a0ab19 code=0x7ffc0000 [ 575.017588][ T29] audit: type=1326 audit(1749332486.065:67813): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31829 comm="syz.1.8763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f99f9a6e929 code=0x7ffc0000 [ 575.044939][ T29] audit: type=1326 audit(1749332486.145:67814): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31829 comm="syz.1.8763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f99f9a658e7 code=0x7ffc0000 [ 575.068560][ T29] audit: type=1326 audit(1749332486.145:67815): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31829 comm="syz.1.8763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f99f9a0ab19 code=0x7ffc0000 [ 575.092891][ T29] audit: type=1326 audit(1749332486.145:67816): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31829 comm="syz.1.8763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f99f9a6e929 code=0x7ffc0000 [ 575.117158][ T29] audit: type=1326 audit(1749332486.175:67817): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31829 comm="syz.1.8763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f99f9a658e7 code=0x7ffc0000 [ 575.140984][ T29] audit: type=1326 audit(1749332486.175:67818): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31829 comm="syz.1.8763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f99f9a0ab19 code=0x7ffc0000 [ 575.164928][ T29] audit: type=1326 audit(1749332486.175:67819): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31829 comm="syz.1.8763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7f99f9a6e929 code=0x7ffc0000 [ 575.188788][ T29] audit: type=1326 audit(1749332486.185:67820): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=31829 comm="syz.1.8763" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f99f9a658e7 code=0x7ffc0000 [ 575.222959][T31870] sg_write: data in/out 524252/17 bytes for SCSI command 0x1-- guessing data in; [ 575.222959][T31870] program syz.0.8778 not setting count and/or reply_len properly [ 575.375961][T31880] IPVS: Error joining to the multicast group [ 575.403211][T31888] FAULT_INJECTION: forcing a failure. [ 575.403211][T31888] name failslab, interval 1, probability 0, space 0, times 0 [ 575.415963][T31888] CPU: 0 UID: 0 PID: 31888 Comm: syz.6.8783 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 575.415997][T31888] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 575.416013][T31888] Call Trace: [ 575.416022][T31888] [ 575.416032][T31888] __dump_stack+0x1d/0x30 [ 575.416058][T31888] dump_stack_lvl+0xe8/0x140 [ 575.416105][T31888] dump_stack+0x15/0x1b [ 575.416125][T31888] should_fail_ex+0x265/0x280 [ 575.416151][T31888] should_failslab+0x8c/0xb0 [ 575.416180][T31888] kmem_cache_alloc_node_noprof+0x57/0x320 [ 575.416234][T31888] ? __alloc_skb+0x101/0x320 [ 575.416259][T31888] __alloc_skb+0x101/0x320 [ 575.416278][T31888] netlink_alloc_large_skb+0xba/0xf0 [ 575.416314][T31888] netlink_sendmsg+0x3cf/0x6b0 [ 575.416443][T31888] ? __pfx_netlink_sendmsg+0x10/0x10 [ 575.416474][T31888] __sock_sendmsg+0x142/0x180 [ 575.416521][T31888] ____sys_sendmsg+0x31e/0x4e0 [ 575.416547][T31888] ___sys_sendmsg+0x17b/0x1d0 [ 575.416586][T31888] __x64_sys_sendmsg+0xd4/0x160 [ 575.416614][T31888] x64_sys_call+0x2999/0x2fb0 [ 575.416701][T31888] do_syscall_64+0xd2/0x200 [ 575.416725][T31888] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 575.416753][T31888] ? clear_bhb_loop+0x40/0x90 [ 575.416777][T31888] ? clear_bhb_loop+0x40/0x90 [ 575.416810][T31888] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 575.416847][T31888] RIP: 0033:0x7fd5a517e929 [ 575.416863][T31888] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 575.416934][T31888] RSP: 002b:00007fd5a37e7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 575.416954][T31888] RAX: ffffffffffffffda RBX: 00007fd5a53a5fa0 RCX: 00007fd5a517e929 [ 575.416967][T31888] RDX: 0000000004000054 RSI: 0000200000000000 RDI: 0000000000000003 [ 575.417030][T31888] RBP: 00007fd5a37e7090 R08: 0000000000000000 R09: 0000000000000000 [ 575.417043][T31888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 575.417055][T31888] R13: 0000000000000000 R14: 00007fd5a53a5fa0 R15: 00007fffd7feabc8 [ 575.417074][T31888] [ 575.417925][T31887] loop4: detected capacity change from 0 to 256 [ 576.202838][T31947] FAULT_INJECTION: forcing a failure. [ 576.202838][T31947] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 576.216255][T31947] CPU: 1 UID: 0 PID: 31947 Comm: syz.0.8803 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 576.216296][T31947] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 576.216309][T31947] Call Trace: [ 576.216315][T31947] [ 576.216323][T31947] __dump_stack+0x1d/0x30 [ 576.216346][T31947] dump_stack_lvl+0xe8/0x140 [ 576.216390][T31947] dump_stack+0x15/0x1b [ 576.216412][T31947] should_fail_ex+0x265/0x280 [ 576.216510][T31947] should_fail+0xb/0x20 [ 576.216532][T31947] should_fail_usercopy+0x1a/0x20 [ 576.216580][T31947] _copy_from_user+0x1c/0xb0 [ 576.216612][T31947] ___sys_sendmsg+0xc1/0x1d0 [ 576.216661][T31947] __x64_sys_sendmsg+0xd4/0x160 [ 576.216725][T31947] x64_sys_call+0x2999/0x2fb0 [ 576.216752][T31947] do_syscall_64+0xd2/0x200 [ 576.216777][T31947] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 576.216838][T31947] ? clear_bhb_loop+0x40/0x90 [ 576.216864][T31947] ? clear_bhb_loop+0x40/0x90 [ 576.216893][T31947] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 576.216914][T31947] RIP: 0033:0x7fc91c20e929 [ 576.216936][T31947] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 576.216958][T31947] RSP: 002b:00007fc91a856038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 576.216979][T31947] RAX: ffffffffffffffda RBX: 00007fc91c436080 RCX: 00007fc91c20e929 [ 576.216992][T31947] RDX: 0000000000000006 RSI: 0000200000000400 RDI: 0000000000000005 [ 576.217005][T31947] RBP: 00007fc91a856090 R08: 0000000000000000 R09: 0000000000000000 [ 576.217017][T31947] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 576.217030][T31947] R13: 0000000000000000 R14: 00007fc91c436080 R15: 00007ffde1d4f0e8 [ 576.217054][T31947] [ 576.498566][T31955] sg_write: data in/out 524252/17 bytes for SCSI command 0x1-- guessing data in; [ 576.498566][T31955] program syz.6.8807 not setting count and/or reply_len properly [ 576.588354][T31965] FAULT_INJECTION: forcing a failure. [ 576.588354][T31965] name failslab, interval 1, probability 0, space 0, times 0 [ 576.601091][T31965] CPU: 0 UID: 0 PID: 31965 Comm: syz.1.8810 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 576.601178][T31965] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 576.601193][T31965] Call Trace: [ 576.601199][T31965] [ 576.601207][T31965] __dump_stack+0x1d/0x30 [ 576.601234][T31965] dump_stack_lvl+0xe8/0x140 [ 576.601338][T31965] dump_stack+0x15/0x1b [ 576.601361][T31965] should_fail_ex+0x265/0x280 [ 576.601386][T31965] should_failslab+0x8c/0xb0 [ 576.601416][T31965] kmem_cache_alloc_noprof+0x50/0x310 [ 576.601495][T31965] ? io_submit_one+0xb8/0x11d0 [ 576.601527][T31965] io_submit_one+0xb8/0x11d0 [ 576.601567][T31965] __se_sys_io_submit+0xfb/0x280 [ 576.601611][T31965] __x64_sys_io_submit+0x43/0x50 [ 576.601691][T31965] x64_sys_call+0xfc4/0x2fb0 [ 576.601720][T31965] do_syscall_64+0xd2/0x200 [ 576.601787][T31965] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 576.601821][T31965] ? clear_bhb_loop+0x40/0x90 [ 576.601850][T31965] ? clear_bhb_loop+0x40/0x90 [ 576.601950][T31965] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 576.602016][T31965] RIP: 0033:0x7f99f9a6e929 [ 576.602080][T31965] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 576.602103][T31965] RSP: 002b:00007f99f80d7038 EFLAGS: 00000246 ORIG_RAX: 00000000000000d1 [ 576.602145][T31965] RAX: ffffffffffffffda RBX: 00007f99f9c95fa0 RCX: 00007f99f9a6e929 [ 576.602163][T31965] RDX: 0000200000002340 RSI: 0000000000000001 RDI: 00007f99fa7d2000 [ 576.602179][T31965] RBP: 00007f99f80d7090 R08: 0000000000000000 R09: 0000000000000000 [ 576.602195][T31965] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 576.602209][T31965] R13: 0000000000000000 R14: 00007f99f9c95fa0 R15: 00007fff83af45e8 [ 576.602233][T31965] [ 576.806770][T31967] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 576.815503][T31967] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 576.827991][T31967] loop6: detected capacity change from 0 to 1024 [ 576.860938][T31967] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 576.873151][T31967] ext4 filesystem being mounted at /14/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 576.904593][T31967] kernel read not supported for file /policy (pid: 31967 comm: syz.6.8811) [ 576.915956][T31974] bond0: option ad_user_port_key: mode dependency failed, not supported in mode balance-rr(0) [ 576.980188][T31977] xt_hashlimit: size too large, truncated to 1048576 [ 576.986998][T31977] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 577.015038][T31985] FAULT_INJECTION: forcing a failure. [ 577.015038][T31985] name failslab, interval 1, probability 0, space 0, times 0 [ 577.027796][T31985] CPU: 0 UID: 0 PID: 31985 Comm: syz.3.8817 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 577.027837][T31985] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 577.027853][T31985] Call Trace: [ 577.027861][T31985] [ 577.027871][T31985] __dump_stack+0x1d/0x30 [ 577.027896][T31985] dump_stack_lvl+0xe8/0x140 [ 577.027940][T31985] dump_stack+0x15/0x1b [ 577.027957][T31985] should_fail_ex+0x265/0x280 [ 577.028032][T31985] should_failslab+0x8c/0xb0 [ 577.028104][T31985] kmem_cache_alloc_node_noprof+0x57/0x320 [ 577.028143][T31985] ? __alloc_skb+0x101/0x320 [ 577.028169][T31985] __alloc_skb+0x101/0x320 [ 577.028195][T31985] netlink_alloc_large_skb+0xba/0xf0 [ 577.028293][T31985] netlink_sendmsg+0x3cf/0x6b0 [ 577.028325][T31985] ? __pfx_netlink_sendmsg+0x10/0x10 [ 577.028432][T31985] __sock_sendmsg+0x142/0x180 [ 577.028468][T31985] ____sys_sendmsg+0x31e/0x4e0 [ 577.028499][T31985] ___sys_sendmsg+0x17b/0x1d0 [ 577.028545][T31985] __x64_sys_sendmsg+0xd4/0x160 [ 577.028589][T31985] x64_sys_call+0x2999/0x2fb0 [ 577.028616][T31985] do_syscall_64+0xd2/0x200 [ 577.028685][T31985] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 577.028724][T31985] ? clear_bhb_loop+0x40/0x90 [ 577.028752][T31985] ? clear_bhb_loop+0x40/0x90 [ 577.028779][T31985] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 577.028874][T31985] RIP: 0033:0x7fa14cc9e929 [ 577.028893][T31985] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 577.028916][T31985] RSP: 002b:00007fa14b307038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 577.028940][T31985] RAX: ffffffffffffffda RBX: 00007fa14cec5fa0 RCX: 00007fa14cc9e929 [ 577.028956][T31985] RDX: 0000000004000054 RSI: 0000200000000000 RDI: 0000000000000003 [ 577.028971][T31985] RBP: 00007fa14b307090 R08: 0000000000000000 R09: 0000000000000000 [ 577.029037][T31985] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 577.029053][T31985] R13: 0000000000000000 R14: 00007fa14cec5fa0 R15: 00007ffea7016418 [ 577.029073][T31985] [ 577.458465][T32013] FAULT_INJECTION: forcing a failure. [ 577.458465][T32013] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 577.471653][T32013] CPU: 0 UID: 0 PID: 32013 Comm: syz.1.8825 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 577.471742][T32013] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 577.471759][T32013] Call Trace: [ 577.471767][T32013] [ 577.471777][T32013] __dump_stack+0x1d/0x30 [ 577.471804][T32013] dump_stack_lvl+0xe8/0x140 [ 577.471849][T32013] dump_stack+0x15/0x1b [ 577.471868][T32013] should_fail_ex+0x265/0x280 [ 577.471894][T32013] should_fail+0xb/0x20 [ 577.471915][T32013] should_fail_usercopy+0x1a/0x20 [ 577.472015][T32013] _copy_from_user+0x1c/0xb0 [ 577.472045][T32013] do_ipv6_setsockopt+0x220/0x22e0 [ 577.472075][T32013] ? kstrtoull+0x111/0x140 [ 577.472219][T32013] ? __rcu_read_unlock+0x4f/0x70 [ 577.472249][T32013] ? avc_has_perm_noaudit+0x1b1/0x200 [ 577.472288][T32013] ? selinux_netlbl_socket_setsockopt+0x1f9/0x2d0 [ 577.472405][T32013] ipv6_setsockopt+0x59/0x130 [ 577.472442][T32013] tcp_setsockopt+0x95/0xb0 [ 577.472471][T32013] sock_common_setsockopt+0x66/0x80 [ 577.472541][T32013] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 577.472580][T32013] __sys_setsockopt+0x181/0x200 [ 577.472609][T32013] __x64_sys_setsockopt+0x64/0x80 [ 577.472636][T32013] x64_sys_call+0x2bd5/0x2fb0 [ 577.472664][T32013] do_syscall_64+0xd2/0x200 [ 577.472790][T32013] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 577.472824][T32013] ? clear_bhb_loop+0x40/0x90 [ 577.472851][T32013] ? clear_bhb_loop+0x40/0x90 [ 577.472879][T32013] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 577.472962][T32013] RIP: 0033:0x7f99f9a6e929 [ 577.472983][T32013] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 577.473007][T32013] RSP: 002b:00007f99f80d7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 577.473031][T32013] RAX: ffffffffffffffda RBX: 00007f99f9c95fa0 RCX: 00007f99f9a6e929 [ 577.473048][T32013] RDX: 0000000000000040 RSI: 0000000000000029 RDI: 0000000000000004 [ 577.473064][T32013] RBP: 00007f99f80d7090 R08: 00000000000003d8 R09: 0000000000000000 [ 577.473080][T32013] R10: 00002000000007c0 R11: 0000000000000246 R12: 0000000000000001 [ 577.473157][T32013] R13: 0000000000000000 R14: 00007f99f9c95fa0 R15: 00007fff83af45e8 [ 577.473186][T32013] [ 577.781928][T32023] loop4: detected capacity change from 0 to 527 [ 577.789210][T32023] EXT4-fs (loop4): failed to parse options in superblock:  [ 577.802141][T32023] EXT4-fs (loop4): Unsupported encryption level 4 [ 577.820978][T31629] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 577.870946][T32030] lo speed is unknown, defaulting to 1000 [ 577.877901][T32030] xfrm0 speed is unknown, defaulting to 1000 [ 577.901270][T32035] loop4: detected capacity change from 0 to 128 [ 577.916949][T32035] EXT4-fs warning (device loop4): ext4_init_metadata_csum:4622: metadata_csum and uninit_bg are redundant flags; please run fsck. [ 577.926452][T32030] lo speed is unknown, defaulting to 1000 [ 577.930800][T32035] EXT4-fs (loop4): Couldn't mount because of unsupported optional features (fffc1829) [ 577.996288][T32038] netdevsim netdevsim6 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 578.029967][T32040] lo speed is unknown, defaulting to 1000 [ 578.036449][T32040] xfrm0 speed is unknown, defaulting to 1000 [ 578.051171][T32043] 0ªî{X¹¦: renamed from gretap0 (while UP) [ 578.067593][T32043] 0ªî{X¹¦: entered allmulticast mode [ 578.082713][T32043] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 578.126204][T32040] lo speed is unknown, defaulting to 1000 [ 578.135427][T32038] netdevsim netdevsim6 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 578.185506][T32038] netdevsim netdevsim6 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 578.263568][T32038] netdevsim netdevsim6 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 578.285450][T32063] FAULT_INJECTION: forcing a failure. [ 578.285450][T32063] name failslab, interval 1, probability 0, space 0, times 0 [ 578.298462][T32063] CPU: 0 UID: 0 PID: 32063 Comm: syz.3.8839 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 578.298583][T32063] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 578.298599][T32063] Call Trace: [ 578.298608][T32063] [ 578.298618][T32063] __dump_stack+0x1d/0x30 [ 578.298645][T32063] dump_stack_lvl+0xe8/0x140 [ 578.298776][T32063] dump_stack+0x15/0x1b [ 578.298798][T32063] should_fail_ex+0x265/0x280 [ 578.298824][T32063] ? __se_sys_memfd_create+0x1cc/0x590 [ 578.298850][T32063] should_failslab+0x8c/0xb0 [ 578.298883][T32063] __kmalloc_cache_noprof+0x4c/0x320 [ 578.298942][T32063] ? fput+0x8f/0xc0 [ 578.298973][T32063] __se_sys_memfd_create+0x1cc/0x590 [ 578.299000][T32063] __x64_sys_memfd_create+0x31/0x40 [ 578.299030][T32063] x64_sys_call+0x122f/0x2fb0 [ 578.299122][T32063] do_syscall_64+0xd2/0x200 [ 578.299151][T32063] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 578.299178][T32063] ? clear_bhb_loop+0x40/0x90 [ 578.299200][T32063] ? clear_bhb_loop+0x40/0x90 [ 578.299303][T32063] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 578.299332][T32063] RIP: 0033:0x7fa14cc9e929 [ 578.299348][T32063] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 578.299369][T32063] RSP: 002b:00007fa14b306e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 578.299399][T32063] RAX: ffffffffffffffda RBX: 00000000000005b1 RCX: 00007fa14cc9e929 [ 578.299412][T32063] RDX: 00007fa14b306ef0 RSI: 0000000000000000 RDI: 00007fa14cd214cc [ 578.299426][T32063] RBP: 0000200000001000 R08: 00007fa14b306bb7 R09: 00007fa14b306e40 [ 578.299441][T32063] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000000 [ 578.299456][T32063] R13: 00007fa14b306ef0 R14: 00007fa14b306eb0 R15: 00002000000002c0 [ 578.299520][T32063] [ 578.510254][T32057] __nla_validate_parse: 4 callbacks suppressed [ 578.510271][T32057] netlink: 28 bytes leftover after parsing attributes in process `+}[@'. [ 578.525080][T32057] netlink: 108 bytes leftover after parsing attributes in process `+}[@'. [ 578.549369][T32057] netlink: 28 bytes leftover after parsing attributes in process `+}[@'. [ 578.558005][T32057] netlink: 108 bytes leftover after parsing attributes in process `+}[@'. [ 578.566770][T32057] netlink: 84 bytes leftover after parsing attributes in process `+}[@'. [ 578.646197][T32038] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 578.668988][T32084] FAULT_INJECTION: forcing a failure. [ 578.668988][T32084] name failslab, interval 1, probability 0, space 0, times 0 [ 578.680641][T32038] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 578.681811][T32084] CPU: 1 UID: 0 PID: 32084 Comm: syz.4.8843 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 578.681922][T32084] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 578.681999][T32084] Call Trace: [ 578.682008][T32084] [ 578.682020][T32084] __dump_stack+0x1d/0x30 [ 578.682050][T32084] dump_stack_lvl+0xe8/0x140 [ 578.682078][T32084] dump_stack+0x15/0x1b [ 578.682102][T32084] should_fail_ex+0x265/0x280 [ 578.682131][T32084] should_failslab+0x8c/0xb0 [ 578.682168][T32084] kmem_cache_alloc_noprof+0x50/0x310 [ 578.682207][T32084] ? getname_flags+0x80/0x3b0 [ 578.682245][T32084] getname_flags+0x80/0x3b0 [ 578.682322][T32084] user_path_at+0x28/0x130 [ 578.682366][T32084] __se_sys_quotactl+0xb6/0x670 [ 578.682422][T32084] __x64_sys_quotactl+0x55/0x70 [ 578.682465][T32084] x64_sys_call+0x2886/0x2fb0 [ 578.682574][T32084] do_syscall_64+0xd2/0x200 [ 578.682642][T32084] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 578.682679][T32084] ? clear_bhb_loop+0x40/0x90 [ 578.682846][T32084] ? clear_bhb_loop+0x40/0x90 [ 578.682878][T32084] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 578.682907][T32084] RIP: 0033:0x7fa54adce929 [ 578.682929][T32084] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 578.682955][T32084] RSP: 002b:00007fa549437038 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 578.683053][T32084] RAX: ffffffffffffffda RBX: 00007fa54aff5fa0 RCX: 00007fa54adce929 [ 578.683071][T32084] RDX: 0000000000000000 RSI: 0000200000000b80 RDI: ffffffff80000200 [ 578.683089][T32084] RBP: 00007fa549437090 R08: 0000000000000000 R09: 0000000000000000 [ 578.683106][T32084] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 578.683122][T32084] R13: 0000000000000000 R14: 00007fa54aff5fa0 R15: 00007fff43358b98 [ 578.683149][T32084] [ 578.688543][T32083] netlink: 4 bytes leftover after parsing attributes in process `syz.3.8845'. [ 578.741812][T32038] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 578.902439][T32038] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 578.928049][T32099] (unnamed net_device) (uninitialized): Unable to set up delay as MII monitoring is disabled [ 578.980889][T32107] loop6: detected capacity change from 0 to 512 [ 579.011630][T32114] FAULT_INJECTION: forcing a failure. [ 579.011630][T32114] name failslab, interval 1, probability 0, space 0, times 0 [ 579.024512][T32114] CPU: 1 UID: 0 PID: 32114 Comm: syz.4.8853 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 579.024546][T32114] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 579.024595][T32114] Call Trace: [ 579.024604][T32114] [ 579.024614][T32114] __dump_stack+0x1d/0x30 [ 579.024641][T32114] dump_stack_lvl+0xe8/0x140 [ 579.024665][T32114] dump_stack+0x15/0x1b [ 579.024681][T32114] should_fail_ex+0x265/0x280 [ 579.024718][T32114] ? __se_sys_memfd_create+0x1cc/0x590 [ 579.024744][T32114] should_failslab+0x8c/0xb0 [ 579.024787][T32114] __kmalloc_cache_noprof+0x4c/0x320 [ 579.024822][T32114] ? fput+0x8f/0xc0 [ 579.024857][T32114] __se_sys_memfd_create+0x1cc/0x590 [ 579.024884][T32114] __x64_sys_memfd_create+0x31/0x40 [ 579.024951][T32114] x64_sys_call+0x122f/0x2fb0 [ 579.024980][T32114] do_syscall_64+0xd2/0x200 [ 579.025008][T32114] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 579.025041][T32114] ? clear_bhb_loop+0x40/0x90 [ 579.025107][T32114] ? clear_bhb_loop+0x40/0x90 [ 579.025135][T32114] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 579.025196][T32114] RIP: 0033:0x7fa54adce929 [ 579.025215][T32114] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 579.025238][T32114] RSP: 002b:00007fa549436e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 579.025266][T32114] RAX: ffffffffffffffda RBX: 00000000000004f3 RCX: 00007fa54adce929 [ 579.025287][T32114] RDX: 00007fa549436ef0 RSI: 0000000000000000 RDI: 00007fa54ae514cc [ 579.025302][T32114] RBP: 00002000000012c0 R08: 00007fa549436bb7 R09: 00007fa549436e40 [ 579.025319][T32114] R10: 000000000000000a R11: 0000000000000202 R12: 0000200000000080 [ 579.025352][T32114] R13: 00007fa549436ef0 R14: 00007fa549436eb0 R15: 0000200000000480 [ 579.025375][T32114] [ 579.026384][T32107] EXT4-fs (loop6): orphan cleanup on readonly fs [ 579.082095][T32119] loop4: detected capacity change from 0 to 512 [ 579.092680][T32107] EXT4-fs error (device loop6): ext4_orphan_get:1419: comm syz.6.8851: bad orphan inode 13 [ 579.131140][T32119] EXT4-fs (loop4): orphan cleanup on readonly fs [ 579.138826][T32107] ext4_test_bit(bit=12, block=18) = 1 [ 579.173333][T32119] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz.4.8855: bad orphan inode 13 [ 579.177678][T32107] is_bad_inode(inode)=0 [ 579.177690][T32107] NEXT_ORPHAN(inode)=2130706432 [ 579.177700][T32107] max_ino=32 [ 579.202793][T32119] ext4_test_bit(bit=12, block=18) = 1 [ 579.209908][T32107] i_nlink=1 [ 579.212306][T32107] EXT4-fs (loop6): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 579.213066][T32119] is_bad_inode(inode)=0 [ 579.296560][T32119] NEXT_ORPHAN(inode)=2130706432 [ 579.301542][T32119] max_ino=32 [ 579.304814][T32119] i_nlink=1 [ 579.316343][T32119] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 579.338599][T32107] xt_hashlimit: size too large, truncated to 1048576 [ 579.345475][T32107] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 579.405938][T31629] EXT4-fs error (device loop6): ext4_lookup:1791: inode #2: comm syz-executor: deleted inode referenced: 12 [ 579.411488][T32119] netlink: 4 bytes leftover after parsing attributes in process `syz.4.8855'. [ 579.426770][T32141] wireguard0: entered promiscuous mode [ 579.432487][T32141] wireguard0: entered allmulticast mode [ 579.440656][T31629] EXT4-fs error (device loop6): ext4_lookup:1791: inode #2: comm syz-executor: deleted inode referenced: 12 [ 579.480309][T23540] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 579.511638][T32153] loop4: detected capacity change from 0 to 512 [ 579.518348][T32153] SELinux: security_context_str_to_sid (user_u) failed with errno=-22 [ 579.577470][T32164] loop4: detected capacity change from 0 to 512 [ 579.596642][T32164] EXT4-fs (loop4): orphan cleanup on readonly fs [ 579.606565][T32164] EXT4-fs error (device loop4): ext4_orphan_get:1419: comm syz.4.8861: bad orphan inode 13 [ 579.618284][T32164] ext4_test_bit(bit=12, block=18) = 1 [ 579.623844][T32164] is_bad_inode(inode)=0 [ 579.628066][T32164] NEXT_ORPHAN(inode)=2130706432 [ 579.633184][T32164] max_ino=32 [ 579.636439][T32164] i_nlink=1 [ 579.641525][T32164] EXT4-fs (loop4): mounted filesystem 00000000-0000-0000-0000-000000000000 ro without journal. Quota mode: writeback. [ 579.725419][T32164] xt_hashlimit: size too large, truncated to 1048576 [ 579.732769][T32164] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 579.772278][T23540] EXT4-fs error (device loop4): ext4_lookup:1791: inode #2: comm syz-executor: deleted inode referenced: 12 [ 579.797532][T23540] EXT4-fs error (device loop4): ext4_lookup:1791: inode #2: comm syz-executor: deleted inode referenced: 12 [ 579.918850][T26844] EXT4-fs (loop4): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 579.970298][ T29] kauditd_printk_skb: 175 callbacks suppressed [ 579.970361][ T29] audit: type=1326 audit(1749332491.075:67996): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32195 comm="syz.0.8866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fc91c2058e7 code=0x7ffc0000 [ 580.001445][ T29] audit: type=1326 audit(1749332491.105:67997): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32195 comm="syz.0.8866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fc91c1aab19 code=0x7ffc0000 [ 580.025121][ T29] audit: type=1326 audit(1749332491.105:67998): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32195 comm="syz.0.8866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fc91c2058e7 code=0x7ffc0000 [ 580.048917][ T29] audit: type=1326 audit(1749332491.105:67999): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32195 comm="syz.0.8866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fc91c1aab19 code=0x7ffc0000 [ 580.072771][ T29] audit: type=1326 audit(1749332491.105:68000): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32195 comm="syz.0.8866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7fc91c20e929 code=0x7ffc0000 [ 580.107311][ T29] audit: type=1326 audit(1749332491.185:68001): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32195 comm="syz.0.8866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fc91c2058e7 code=0x7ffc0000 [ 580.130990][ T29] audit: type=1326 audit(1749332491.185:68002): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32195 comm="syz.0.8866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fc91c1aab19 code=0x7ffc0000 [ 580.154864][ T29] audit: type=1326 audit(1749332491.185:68003): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32195 comm="syz.0.8866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=278 compat=0 ip=0x7fc91c20e929 code=0x7ffc0000 [ 580.179411][ T29] audit: type=1326 audit(1749332491.185:68004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32195 comm="syz.0.8866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fc91c2058e7 code=0x7ffc0000 [ 580.203233][ T29] audit: type=1326 audit(1749332491.185:68005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32195 comm="syz.0.8866" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fc91c1aab19 code=0x7ffc0000 [ 580.309570][T32212] lo speed is unknown, defaulting to 1000 [ 580.315776][T32212] xfrm0 speed is unknown, defaulting to 1000 [ 580.360878][T32212] lo speed is unknown, defaulting to 1000 [ 580.439446][T17690] bridge_slave_1: left allmulticast mode [ 580.445515][T17690] bridge_slave_1: left promiscuous mode [ 580.451305][T17690] bridge0: port 2(bridge_slave_1) entered disabled state [ 580.459377][T17690] bridge_slave_0: left allmulticast mode [ 580.465178][T17690] bridge_slave_0: left promiscuous mode [ 580.470987][T17690] bridge0: port 1(bridge_slave_0) entered disabled state [ 580.701229][T17690] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 580.715035][T17690] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 580.724754][T17690] bond0 (unregistering): (slave dummy0): Releasing backup interface [ 580.734683][T17690] bond0 (unregistering): Released all slaves [ 580.743843][T17690] bond1 (unregistering): Released all slaves [ 580.753923][T32256] netlink: 28 bytes leftover after parsing attributes in process `+}[@'. [ 580.762596][T32256] netlink: 108 bytes leftover after parsing attributes in process `+}[@'. [ 580.771805][T32256] netlink: 28 bytes leftover after parsing attributes in process `+}[@'. [ 580.791957][T32212] chnl_net:caif_netlink_parms(): no params data found [ 580.888263][T17690] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 580.896102][T17690] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 580.958615][T32212] bridge0: port 1(bridge_slave_0) entered blocking state [ 580.965845][T32212] bridge0: port 1(bridge_slave_0) entered disabled state [ 580.973773][T32212] bridge_slave_0: entered allmulticast mode [ 580.981672][T32212] bridge_slave_0: entered promiscuous mode [ 580.989145][T32212] bridge0: port 2(bridge_slave_1) entered blocking state [ 580.996239][T32212] bridge0: port 2(bridge_slave_1) entered disabled state [ 581.006897][T32212] bridge_slave_1: entered allmulticast mode [ 581.013421][T32212] bridge_slave_1: entered promiscuous mode [ 581.048356][T32212] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 581.070322][T32212] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 581.094124][T32212] team0: Port device team_slave_0 added [ 581.103747][T32212] team0: Port device team_slave_1 added [ 581.127188][T32212] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 581.134268][T32212] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 581.160720][T32212] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 581.172218][T32212] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 581.179264][T32212] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 581.208159][T32212] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 581.254333][T32212] hsr_slave_0: entered promiscuous mode [ 581.260885][T32212] hsr_slave_1: entered promiscuous mode [ 581.266920][T32212] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 581.275132][T32212] Cannot create hsr debugfs directory [ 581.286388][T17690] IPVS: stop unused estimator thread 0... [ 581.371617][T32212] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 581.382552][T32212] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 581.392220][T32212] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 581.403370][T32212] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 581.446563][T32212] 8021q: adding VLAN 0 to HW filter on device bond0 [ 581.462429][T32212] 8021q: adding VLAN 0 to HW filter on device team0 [ 581.473333][T17690] bridge0: port 1(bridge_slave_0) entered blocking state [ 581.480464][T17690] bridge0: port 1(bridge_slave_0) entered forwarding state [ 581.493305][ T3721] bridge0: port 2(bridge_slave_1) entered blocking state [ 581.500451][ T3721] bridge0: port 2(bridge_slave_1) entered forwarding state [ 581.543630][T32282] xt_hashlimit: size too large, truncated to 1048576 [ 581.550473][T32282] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 581.579853][T32212] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 581.702668][T32212] veth0_vlan: entered promiscuous mode [ 581.711024][T32212] veth1_vlan: entered promiscuous mode [ 581.728496][T32212] veth0_macvtap: entered promiscuous mode [ 581.737550][T32212] veth1_macvtap: entered promiscuous mode [ 581.751613][T32212] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 581.763755][T32212] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 581.773788][T32212] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 581.782711][T32212] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 581.791665][T32212] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 581.800489][T32212] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 581.935647][T32316] loop7: detected capacity change from 0 to 527 [ 581.943010][T32316] EXT4-fs (loop7): failed to parse options in superblock: tttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttttt [ 581.955951][T32316] EXT4-fs (loop7): Unsupported encryption level 116 [ 581.967498][T32318] FAULT_INJECTION: forcing a failure. [ 581.967498][T32318] name failslab, interval 1, probability 0, space 0, times 0 [ 581.980248][T32318] CPU: 1 UID: 0 PID: 32318 Comm: syz.1.8880 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 581.980282][T32318] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 581.980298][T32318] Call Trace: [ 581.980306][T32318] [ 581.980314][T32318] __dump_stack+0x1d/0x30 [ 581.980339][T32318] dump_stack_lvl+0xe8/0x140 [ 581.980363][T32318] dump_stack+0x15/0x1b [ 581.980385][T32318] should_fail_ex+0x265/0x280 [ 581.980407][T32318] should_failslab+0x8c/0xb0 [ 581.980432][T32318] kmem_cache_alloc_noprof+0x50/0x310 [ 581.980459][T32318] ? vm_area_dup+0x33/0x2c0 [ 581.980498][T32318] vm_area_dup+0x33/0x2c0 [ 581.980532][T32318] __split_vma+0xe9/0x650 [ 581.980559][T32318] ? mas_find+0x4ea/0x610 [ 581.980581][T32318] vms_gather_munmap_vmas+0x2a5/0x7a0 [ 581.980613][T32318] mmap_region+0x4ce/0x1560 [ 581.980646][T32318] ? mntput_no_expire+0x6f/0x3c0 [ 581.980681][T32318] ? mntput+0x4b/0x80 [ 581.980723][T32318] do_mmap+0x9b3/0xbe0 [ 581.980760][T32318] vm_mmap_pgoff+0x17a/0x2e0 [ 581.980807][T32318] ksys_mmap_pgoff+0xc2/0x310 [ 581.980829][T32318] ? __x64_sys_mmap+0x49/0x70 [ 581.980856][T32318] x64_sys_call+0x1602/0x2fb0 [ 581.980880][T32318] do_syscall_64+0xd2/0x200 [ 581.980905][T32318] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 581.980944][T32318] ? clear_bhb_loop+0x40/0x90 [ 581.980970][T32318] ? clear_bhb_loop+0x40/0x90 [ 581.980998][T32318] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 581.981024][T32318] RIP: 0033:0x7f99f9a6e929 [ 581.981043][T32318] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 581.981066][T32318] RSP: 002b:00007f99f80b6038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 581.981088][T32318] RAX: ffffffffffffffda RBX: 00007f99f9c96080 RCX: 00007f99f9a6e929 [ 581.981104][T32318] RDX: 0000000000000002 RSI: 0000000000b36000 RDI: 0000200000000000 [ 581.981119][T32318] RBP: 00007f99f80b6090 R08: ffffffffffffffff R09: 000000006a855000 [ 581.981134][T32318] R10: 0000000000008031 R11: 0000000000000246 R12: 0000000000000001 [ 581.981149][T32318] R13: 0000000000000000 R14: 00007f99f9c96080 R15: 00007fff83af45e8 [ 581.981170][T32318] [ 582.336956][T32328] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=16 sclass=netlink_tcpdiag_socket pid=32328 comm=syz.1.8884 [ 582.455938][T32322] xfrm0 speed is unknown, defaulting to 1000 [ 582.476095][T32347] IPVS: length: 158 != 8 [ 582.523345][T32322] lo speed is unknown, defaulting to 1000 [ 582.609697][T32322] chnl_net:caif_netlink_parms(): no params data found [ 582.698613][T32322] bridge0: port 1(bridge_slave_0) entered blocking state [ 582.705795][T32322] bridge0: port 1(bridge_slave_0) entered disabled state [ 582.715855][T32370] FAULT_INJECTION: forcing a failure. [ 582.715855][T32370] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 582.729162][T32370] CPU: 1 UID: 0 PID: 32370 Comm: syz.0.8897 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 582.729199][T32370] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 582.729216][T32370] Call Trace: [ 582.729223][T32370] [ 582.729231][T32370] __dump_stack+0x1d/0x30 [ 582.729252][T32370] dump_stack_lvl+0xe8/0x140 [ 582.729279][T32370] dump_stack+0x15/0x1b [ 582.729307][T32370] should_fail_ex+0x265/0x280 [ 582.729327][T32370] should_fail+0xb/0x20 [ 582.729345][T32370] should_fail_usercopy+0x1a/0x20 [ 582.729371][T32370] strncpy_from_user+0x25/0x230 [ 582.729457][T32370] ? __fget_files+0x184/0x1c0 [ 582.729489][T32370] __se_sys_add_key+0x86/0x350 [ 582.729523][T32370] __x64_sys_add_key+0x67/0x80 [ 582.729563][T32370] x64_sys_call+0x1d0d/0x2fb0 [ 582.729590][T32370] do_syscall_64+0xd2/0x200 [ 582.729619][T32370] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 582.729652][T32370] ? clear_bhb_loop+0x40/0x90 [ 582.729675][T32370] ? clear_bhb_loop+0x40/0x90 [ 582.729762][T32370] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 582.729837][T32370] RIP: 0033:0x7fc91c20e929 [ 582.729868][T32370] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 582.729890][T32370] RSP: 002b:00007fc91a877038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 582.729911][T32370] RAX: ffffffffffffffda RBX: 00007fc91c435fa0 RCX: 00007fc91c20e929 [ 582.729927][T32370] RDX: 00002000000000c0 RSI: 0000000000000000 RDI: 0000200000000040 [ 582.730010][T32370] RBP: 00007fc91a877090 R08: fffffffffffffffd R09: 0000000000000000 [ 582.730025][T32370] R10: 000000000000001c R11: 0000000000000246 R12: 0000000000000001 [ 582.730040][T32370] R13: 0000000000000000 R14: 00007fc91c435fa0 R15: 00007ffde1d4f0e8 [ 582.730064][T32370] [ 582.769394][T32322] bridge_slave_0: entered allmulticast mode [ 582.950569][T32322] bridge_slave_0: entered promiscuous mode [ 582.966246][T17690] bridge_slave_1: left allmulticast mode [ 582.972169][T17690] bridge_slave_1: left promiscuous mode [ 582.977954][T17690] bridge0: port 2(bridge_slave_1) entered disabled state [ 582.987124][T32376] xt_TPROXY: Can be used only with -p tcp or -p udp [ 582.995749][T17690] bridge_slave_0: left allmulticast mode [ 583.001604][T17690] bridge_slave_0: left promiscuous mode [ 583.007346][T17690] bridge0: port 1(bridge_slave_0) entered disabled state [ 583.029624][T32380] Driver unsupported XDP return value 0 on prog (id 5851) dev N/A, expect packet loss! [ 583.052021][T17687] smc: removing ib device syz1 [ 583.152275][T17690] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 583.173329][T17690] bond_slave_0: left allmulticast mode [ 583.180807][T32385] xt_hashlimit: size too large, truncated to 1048576 [ 583.187576][T32385] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 583.195352][T17690] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 583.206292][T17690] bond_slave_1: left allmulticast mode [ 583.213937][T17690] bond0 (unregistering): Released all slaves [ 583.230460][T32322] bridge0: port 2(bridge_slave_1) entered blocking state [ 583.237681][T32322] bridge0: port 2(bridge_slave_1) entered disabled state [ 583.266767][T32322] bridge_slave_1: entered allmulticast mode [ 583.300148][T32322] bridge_slave_1: entered promiscuous mode [ 583.326861][T32376] wireguard0: entered promiscuous mode [ 583.377552][T32322] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 583.389295][T32322] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 583.418967][T17690] hsr_slave_0: left promiscuous mode [ 583.431071][T17690] hsr_slave_1: left promiscuous mode [ 583.438410][T17690] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 583.446574][T17690] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 583.510039][T31629] EXT4-fs (loop6): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 583.585272][T32322] team0: Port device team_slave_0 added [ 583.594520][T32322] team0: Port device team_slave_1 added [ 583.639878][T32322] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 583.647102][T32322] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 583.674286][T32322] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 583.696766][T32322] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 583.703866][T32322] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 583.730299][T32322] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 583.786835][T32408] xt_hashlimit: size too large, truncated to 1048576 [ 583.793653][T32408] xt_hashlimit: Unknown mode mask 80FF, kernel too old? [ 583.839313][T32322] hsr_slave_0: entered promiscuous mode [ 583.853968][T32322] hsr_slave_1: entered promiscuous mode [ 583.867598][T32322] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 583.881122][T32322] Cannot create hsr debugfs directory [ 584.017874][T17690] IPVS: stop unused estimator thread 0... [ 584.037965][T32426] wireguard0: entered promiscuous mode [ 584.043559][T32426] wireguard0: entered allmulticast mode [ 584.057060][T32400] chnl_net:caif_netlink_parms(): no params data found [ 584.104621][T32400] bridge0: port 1(bridge_slave_0) entered blocking state [ 584.111937][T32400] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.120972][T32400] bridge_slave_0: entered allmulticast mode [ 584.128564][T32400] bridge_slave_0: entered promiscuous mode [ 584.141940][T32400] bridge0: port 2(bridge_slave_1) entered blocking state [ 584.149209][T32400] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.157078][T32400] bridge_slave_1: entered allmulticast mode [ 584.182949][T32400] bridge_slave_1: entered promiscuous mode [ 584.192896][T17690] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 584.213310][T32433] __nla_validate_parse: 21 callbacks suppressed [ 584.213324][T32433] netlink: 28 bytes leftover after parsing attributes in process `+}[@'. [ 584.228264][T32433] netlink: 108 bytes leftover after parsing attributes in process `+}[@'. [ 584.237197][T32433] netlink: 28 bytes leftover after parsing attributes in process `+}[@'. [ 584.246245][T32433] netlink: 108 bytes leftover after parsing attributes in process `+}[@'. [ 584.254928][T32433] netlink: 84 bytes leftover after parsing attributes in process `+}[@'. [ 584.272422][T17690] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 584.285863][T32400] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 584.297030][T32400] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 584.326012][T32400] team0: Port device team_slave_0 added [ 584.335350][T32400] team0: Port device team_slave_1 added [ 584.353438][T32400] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 584.360499][T32400] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 584.386608][T32400] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 584.398804][T17690] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 584.411613][T32400] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 584.418640][T32400] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 584.444697][T32400] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 584.496679][T17690] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 584.511629][T32400] hsr_slave_0: entered promiscuous mode [ 584.517881][T32400] hsr_slave_1: entered promiscuous mode [ 584.524026][T32400] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 584.533049][T32400] Cannot create hsr debugfs directory [ 584.539696][T32322] netdevsim netdevsim3 netdevsim0: renamed from eth0 [ 584.556268][T32322] netdevsim netdevsim3 netdevsim1: renamed from eth1 [ 584.586457][T32322] netdevsim netdevsim3 netdevsim2: renamed from eth2 [ 584.616824][T17690] bridge_slave_1: left allmulticast mode [ 584.622646][T17690] bridge_slave_1: left promiscuous mode [ 584.628484][T17690] bridge0: port 2(bridge_slave_1) entered disabled state [ 584.638892][T17690] bridge_slave_0: left allmulticast mode [ 584.644670][T17690] bridge_slave_0: left promiscuous mode [ 584.650452][T17690] bridge0: port 1(bridge_slave_0) entered disabled state [ 584.723535][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.731132][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.738584][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.746054][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.753503][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.761009][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.768408][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.775958][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.783482][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.790971][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.798392][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.805978][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.817616][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.825071][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.832819][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.840492][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.847993][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.855486][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.863022][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.870478][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.877921][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.885389][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.892847][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.900545][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.907984][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.915474][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.922991][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.930661][ T10] hid-generic 0006:0000:0000.0010: unknown main item tag 0x0 [ 584.938940][ T10] hid-generic 0006:0000:0000.0010: hidraw0: VIRTUAL HID vffffff.00 Device [syz0] on syz1 [ 584.952743][T17690] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 584.964324][T17690] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 584.974261][T17690] bond0 (unregistering): Released all slaves [ 584.991009][T32322] netdevsim netdevsim3 netdevsim3: renamed from eth3 [ 585.001387][ T29] kauditd_printk_skb: 797 callbacks suppressed [ 585.001401][ T29] audit: type=1326 audit(1749332496.105:68803): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32448 comm="ex" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f364b1de929 code=0x7ffc0000 [ 585.034385][T32449] netlink: 12 bytes leftover after parsing attributes in process `ex'. [ 585.045330][ T29] audit: type=1326 audit(1749332496.135:68804): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32448 comm="ex" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f364b1dd290 code=0x7ffc0000 [ 585.068403][ T29] audit: type=1326 audit(1749332496.135:68805): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32448 comm="ex" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f364b1de929 code=0x7ffc0000 [ 585.091329][ T29] audit: type=1326 audit(1749332496.135:68806): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32448 comm="ex" exe="/root/syz-executor" sig=0 arch=c000003e syscall=8 compat=0 ip=0x7f364b1de929 code=0x7ffc0000 [ 585.114110][ T29] audit: type=1326 audit(1749332496.135:68807): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32448 comm="ex" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f364b1de929 code=0x7ffc0000 [ 585.137076][ T29] audit: type=1326 audit(1749332496.135:68808): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32448 comm="ex" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f364b1de929 code=0x7ffc0000 [ 585.159979][ T29] audit: type=1326 audit(1749332496.135:68809): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32448 comm="ex" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f364b1de929 code=0x7ffc0000 [ 585.182965][ T29] audit: type=1326 audit(1749332496.135:68810): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32448 comm="ex" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f364b1e0847 code=0x7ffc0000 [ 585.205803][ T29] audit: type=1326 audit(1749332496.135:68811): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32448 comm="ex" exe="/root/syz-executor" sig=0 arch=c000003e syscall=44 compat=0 ip=0x7f364b1e07bc code=0x7ffc0000 [ 585.228746][ T29] audit: type=1326 audit(1749332496.135:68812): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=32448 comm="ex" exe="/root/syz-executor" sig=0 arch=c000003e syscall=45 compat=0 ip=0x7f364b1e06f4 code=0x7ffc0000 [ 585.268250][T17690] hsr_slave_0: left promiscuous mode [ 585.274924][T17690] hsr_slave_1: left promiscuous mode [ 585.283678][T17690] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 585.291413][T17690] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 585.299173][T17690] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 585.306581][T17690] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 585.319492][T17690] veth1_macvtap: left promiscuous mode [ 585.325239][T17690] veth0_macvtap: left promiscuous mode [ 585.332666][T17690] veth1_vlan: left promiscuous mode [ 585.338000][T17690] veth0_vlan: left promiscuous mode [ 585.357182][T32469] netlink: 4 bytes leftover after parsing attributes in process `syz.0.8924'. [ 585.417261][T17690] team0 (unregistering): Port device team_slave_1 removed [ 585.433333][T17690] team0 (unregistering): Port device team_slave_0 removed [ 585.552449][T32400] netdevsim netdevsim8 netdevsim0: renamed from eth0 [ 585.564135][T32400] netdevsim netdevsim8 netdevsim1: renamed from eth1 [ 585.586212][T32400] netdevsim netdevsim8 netdevsim2: renamed from eth2 [ 585.601014][T32486] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=32486 comm=syz.0.8929 [ 585.621030][T32322] 8021q: adding VLAN 0 to HW filter on device bond0 [ 585.638877][T32400] netdevsim netdevsim8 netdevsim3: renamed from eth3 [ 585.665271][T32322] 8021q: adding VLAN 0 to HW filter on device team0 [ 585.686551][T17698] bridge0: port 1(bridge_slave_0) entered blocking state [ 585.693824][T17698] bridge0: port 1(bridge_slave_0) entered forwarding state [ 585.797972][T32322] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 585.808442][T32322] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 585.851285][T17698] bridge0: port 2(bridge_slave_1) entered blocking state [ 585.858955][T17698] bridge0: port 2(bridge_slave_1) entered forwarding state [ 585.996721][T32322] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 586.036907][T32400] 8021q: adding VLAN 0 to HW filter on device bond0 [ 586.067052][T32400] 8021q: adding VLAN 0 to HW filter on device team0 [ 586.088348][T32500] SELinux: unknown common r [ 586.102126][T32500] SELinux: failed to load policy [ 586.134720][ T380] bridge0: port 1(bridge_slave_0) entered blocking state [ 586.141941][ T380] bridge0: port 1(bridge_slave_0) entered forwarding state [ 586.161657][ T380] bridge0: port 2(bridge_slave_1) entered blocking state [ 586.168801][ T380] bridge0: port 2(bridge_slave_1) entered forwarding state [ 586.216053][T32400] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 586.239777][T32509] FAULT_INJECTION: forcing a failure. [ 586.239777][T32509] name failslab, interval 1, probability 0, space 0, times 0 [ 586.252520][T32509] CPU: 0 UID: 0 PID: 32509 Comm: syz.0.8932 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 586.252599][T32509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 586.252617][T32509] Call Trace: [ 586.252625][T32509] [ 586.252636][T32509] __dump_stack+0x1d/0x30 [ 586.252719][T32509] dump_stack_lvl+0xe8/0x140 [ 586.252747][T32509] dump_stack+0x15/0x1b [ 586.252769][T32509] should_fail_ex+0x265/0x280 [ 586.252803][T32509] should_failslab+0x8c/0xb0 [ 586.252873][T32509] __kmalloc_cache_node_noprof+0x54/0x320 [ 586.252914][T32509] ? __get_vm_area_node+0x106/0x1d0 [ 586.252957][T32509] __get_vm_area_node+0x106/0x1d0 [ 586.253011][T32509] __vmalloc_node_range_noprof+0x273/0xe00 [ 586.253050][T32509] ? sel_write_load+0x158/0x380 [ 586.253208][T32509] ? __rcu_read_unlock+0x4f/0x70 [ 586.253319][T32509] ? sel_write_load+0x158/0x380 [ 586.253358][T32509] vmalloc_noprof+0x82/0xc0 [ 586.253397][T32509] ? sel_write_load+0x158/0x380 [ 586.253493][T32509] sel_write_load+0x158/0x380 [ 586.253533][T32509] ? __pfx_sel_write_load+0x10/0x10 [ 586.253572][T32509] vfs_write+0x269/0x8e0 [ 586.253673][T32509] ? __rcu_read_unlock+0x4f/0x70 [ 586.253702][T32509] ? __fget_files+0x184/0x1c0 [ 586.253735][T32509] ksys_write+0xda/0x1a0 [ 586.253764][T32509] __x64_sys_write+0x40/0x50 [ 586.253864][T32509] x64_sys_call+0x2cdd/0x2fb0 [ 586.253922][T32509] do_syscall_64+0xd2/0x200 [ 586.253948][T32509] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 586.254036][T32509] ? clear_bhb_loop+0x40/0x90 [ 586.254065][T32509] ? clear_bhb_loop+0x40/0x90 [ 586.254127][T32509] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 586.254156][T32509] RIP: 0033:0x7fc91c20e929 [ 586.254176][T32509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 586.254201][T32509] RSP: 002b:00007fc91a856038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 586.254225][T32509] RAX: ffffffffffffffda RBX: 00007fc91c436080 RCX: 00007fc91c20e929 [ 586.254242][T32509] RDX: 00000000000044f0 RSI: 0000200000000000 RDI: 0000000000000003 [ 586.254322][T32509] RBP: 00007fc91a856090 R08: 0000000000000000 R09: 0000000000000000 [ 586.254338][T32509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 586.254354][T32509] R13: 0000000000000000 R14: 00007fc91c436080 R15: 00007ffde1d4f0e8 [ 586.254414][T32509] [ 586.254425][T32509] syz.0.8932: vmalloc error: size 17648, vm_struct allocation failed, mode:0xcc0(GFP_KERNEL), nodemask=(null) [ 586.292003][T32400] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 586.292358][T32509] ,cpuset=/,mems_allowed=0 [ 586.515072][T32509] CPU: 0 UID: 0 PID: 32509 Comm: syz.0.8932 Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) [ 586.515178][T32509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 586.515192][T32509] Call Trace: [ 586.515200][T32509] [ 586.515211][T32509] __dump_stack+0x1d/0x30 [ 586.515238][T32509] dump_stack_lvl+0xe8/0x140 [ 586.515263][T32509] dump_stack+0x15/0x1b [ 586.515354][T32509] warn_alloc+0x12b/0x1a0 [ 586.515403][T32509] __vmalloc_node_range_noprof+0x297/0xe00 [ 586.515453][T32509] ? __rcu_read_unlock+0x4f/0x70 [ 586.515505][T32509] ? sel_write_load+0x158/0x380 [ 586.515546][T32509] vmalloc_noprof+0x82/0xc0 [ 586.515604][T32509] ? sel_write_load+0x158/0x380 [ 586.515643][T32509] sel_write_load+0x158/0x380 [ 586.515761][T32509] ? __pfx_sel_write_load+0x10/0x10 [ 586.515879][T32509] vfs_write+0x269/0x8e0 [ 586.515906][T32509] ? __rcu_read_unlock+0x4f/0x70 [ 586.515935][T32509] ? __fget_files+0x184/0x1c0 [ 586.516027][T32509] ksys_write+0xda/0x1a0 [ 586.516056][T32509] __x64_sys_write+0x40/0x50 [ 586.516180][T32509] x64_sys_call+0x2cdd/0x2fb0 [ 586.516277][T32509] do_syscall_64+0xd2/0x200 [ 586.516325][T32509] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 586.516360][T32509] ? clear_bhb_loop+0x40/0x90 [ 586.516387][T32509] ? clear_bhb_loop+0x40/0x90 [ 586.516413][T32509] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 586.516520][T32509] RIP: 0033:0x7fc91c20e929 [ 586.516539][T32509] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 586.516558][T32509] RSP: 002b:00007fc91a856038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 586.516577][T32509] RAX: ffffffffffffffda RBX: 00007fc91c436080 RCX: 00007fc91c20e929 [ 586.516598][T32509] RDX: 00000000000044f0 RSI: 0000200000000000 RDI: 0000000000000003 [ 586.516629][T32509] RBP: 00007fc91a856090 R08: 0000000000000000 R09: 0000000000000000 [ 586.516645][T32509] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 586.516662][T32509] R13: 0000000000000000 R14: 00007fc91c436080 R15: 00007ffde1d4f0e8 [ 586.516685][T32509] [ 586.516694][T32509] Mem-Info: [ 586.679802][T32322] veth0_vlan: entered promiscuous mode [ 586.684621][T32509] active_anon:16739 inactive_anon:9 isolated_anon:0 [ 586.684621][T32509] active_file:8915 inactive_file:20873 isolated_file:0 [ 586.684621][T32509] unevictable:0 dirty:608 writeback:0 [ 586.684621][T32509] slab_reclaimable:3523 slab_unreclaimable:16614 [ 586.684621][T32509] mapped:29896 shmem:5498 pagetables:1780 [ 586.684621][T32509] sec_pagetables:0 bounce:0 [ 586.684621][T32509] kernel_misc_reclaimable:0 [ 586.684621][T32509] free:1838678 free_pcp:23340 free_cma:0 [ 586.769759][T32322] veth1_vlan: entered promiscuous mode [ 586.781485][T32509] Node 0 active_anon:66972kB inactive_anon:36kB active_file:35768kB inactive_file:83496kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:119644kB dirty:2516kB writeback:0kB shmem:21992kB writeback_tmp:0kB kernel_stack:4272kB pagetables:7312kB sec_pagetables:0kB all_unreclaimable? no Balloon:0kB [ 586.816133][T32509] Node 0 DMA free:15360kB boost:0kB min:20kB low:32kB high:44kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 586.841559][T32322] veth0_macvtap: entered promiscuous mode [ 586.844890][T32509] lowmem_reserve[]: 0 2882 7861 7861 [ 586.856267][T32509] Node 0 DMA32 free:2947936kB boost:0kB min:4132kB low:7060kB high:9988kB reserved_highatomic:0KB free_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:3129332kB managed:2951464kB mlocked:0kB bounce:0kB free_pcp:3528kB local_pcp:3528kB free_cma:0kB [ 586.884075][T32322] veth1_macvtap: entered promiscuous mode [ 586.891089][T32509] lowmem_reserve[]: 0 0 4978 4978 [ 586.897541][T32509] Node 0 Normal free:4394412kB boost:0kB min:7188kB low:12284kB high:17380kB reserved_highatomic:0KB free_highatomic:0KB active_anon:66972kB inactive_anon:36kB active_file:35768kB inactive_file:83496kB unevictable:0kB writepending:2516kB present:5242880kB managed:5098232kB mlocked:0kB bounce:0kB free_pcp:86296kB local_pcp:23320kB free_cma:0kB [ 586.929743][T32509] lowmem_reserve[]: 0 0 0 0 [ 586.934318][T32509] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 586.935063][T32322] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 586.947186][T32509] Node 0 DMA32: 4*4kB (M) 4*8kB (M) 3*16kB (M) 4*32kB (M) 2*64kB (M) 2*128kB (M) 3*256kB (M) 3*512kB (M) 4*1024kB (M) 2*2048kB (M) 717*4096kB (M) = 2947936kB [ 586.970869][T32509] Node 0 Normal: 2786*4kB (UE) 1167*8kB (U) 372*16kB (U) 1889*32kB (UME) 1496*64kB (UME) 921*128kB (UME) 556*256kB (UM) 208*512kB (UME) 103*1024kB (UM) 70*2048kB (UM) 878*4096kB (UM) = 4394464kB [ 586.973471][T32400] veth0_vlan: entered promiscuous mode [ 586.990406][T32509] Node 0 hugepages_total=4 hugepages_free=4 hugepages_surp=0 hugepages_size=2048kB [ 586.990431][T32509] 35292 total pagecache pages [ 587.010007][T32509] 3 pages in swap cache [ 587.013656][T32322] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 587.014175][T32509] Free swap = 123052kB [ 587.025701][T32509] Total swap = 124996kB [ 587.026667][T32322] netdevsim netdevsim3 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.029913][T32509] 2097051 pages RAM [ 587.029923][T32509] 0 pages HighMem/MovableOnly [ 587.038710][T32322] netdevsim netdevsim3 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.042770][T32509] 80787 pages reserved [ 587.047316][T32322] netdevsim netdevsim3 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.069199][T32322] netdevsim netdevsim3 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.091735][T32400] veth1_vlan: entered promiscuous mode [ 587.115672][T32400] veth0_macvtap: entered promiscuous mode [ 587.130336][T32400] veth1_macvtap: entered promiscuous mode [ 587.153813][T32400] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 587.184926][T32400] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 587.216181][T32400] netdevsim netdevsim8 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.225059][T32400] netdevsim netdevsim8 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.234022][T32400] netdevsim netdevsim8 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.243387][T32400] netdevsim netdevsim8 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 587.272503][T32563] SELinux: security_context_str_to_sid (staff_u) failed with errno=-22 [ 587.350756][T32212] ================================================================== [ 587.358920][T32212] BUG: KCSAN: data-race in generic_fillattr / inode_add_bytes [ 587.366431][T32212] [ 587.368774][T32212] read-write to 0xffff88810469c6d8 of 8 bytes by task 32557 on cpu 1: [ 587.376960][T32212] inode_add_bytes+0x47/0xe0 [ 587.381613][T32212] __dquot_alloc_space+0x180/0x8a0 [ 587.386858][T32212] shmem_inode_acct_blocks+0x129/0x240 [ 587.392375][T32212] shmem_get_folio_gfp+0x5a7/0xd60 [ 587.397528][T32212] shmem_write_begin+0xa8/0x190 [ 587.402435][T32212] generic_perform_write+0x181/0x490 [ 587.407751][T32212] shmem_file_write_iter+0xc5/0xf0 [ 587.412894][T32212] __kernel_write_iter+0x253/0x4c0 [ 587.418078][T32212] dump_user_range+0x407/0x8c0 [ 587.422867][T32212] elf_core_dump+0x1dc2/0x1f80 [ 587.427658][T32212] do_coredump+0x1dfd/0x27b0 [ 587.432268][T32212] get_signal+0xd85/0xf70 [ 587.436630][T32212] arch_do_signal_or_restart+0x96/0x480 [ 587.442239][T32212] irqentry_exit_to_user_mode+0x5e/0xa0 [ 587.447955][T32212] irqentry_exit+0x12/0x50 [ 587.452435][T32212] asm_exc_page_fault+0x26/0x30 [ 587.457318][T32212] [ 587.459683][T32212] read to 0xffff88810469c6d8 of 8 bytes by task 32212 on cpu 0: [ 587.467329][T32212] generic_fillattr+0x27d/0x340 [ 587.472204][T32212] shmem_getattr+0x181/0x200 [ 587.476902][T32212] vfs_getattr_nosec+0x143/0x1e0 [ 587.481862][T32212] vfs_statx+0x113/0x390 [ 587.486144][T32212] vfs_fstatat+0x115/0x170 [ 587.490582][T32212] __se_sys_newfstatat+0x55/0x260 [ 587.495667][T32212] __x64_sys_newfstatat+0x55/0x70 [ 587.500717][T32212] x64_sys_call+0x2c22/0x2fb0 [ 587.505423][T32212] do_syscall_64+0xd2/0x200 [ 587.510049][T32212] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 587.515956][T32212] [ 587.518310][T32212] value changed: 0x0000000000004b08 -> 0x0000000000004b10 [ 587.525424][T32212] [ 587.527778][T32212] Reported by Kernel Concurrency Sanitizer on: [ 587.533940][T32212] CPU: 0 UID: 0 PID: 32212 Comm: syz-executor Not tainted 6.15.0-syzkaller-13659-g5b032cac6225 #0 PREEMPT(voluntary) SYZFAIL: failed to recv rpc fd=3 want=4 recv=0 n=0 (errno 9: Bad file descriptor) [ 587.546281][T32212] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 05/07/2025 [ 587.556350][T32212] ================================================================== [ 588.262020][T17687] bridge_slave_1: left allmulticast mode [ 588.267706][T17687] bridge_slave_1: left promiscuous mode [ 588.273520][T17687] bridge0: port 2(bridge_slave_1) entered disabled state [ 588.281391][T17687] bridge_slave_0: left allmulticast mode [ 588.287038][T17687] bridge_slave_0: left promiscuous mode [ 588.292835][T17687] bridge0: port 1(bridge_slave_0) entered disabled state [ 588.351975][T17687] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 588.361385][T17687] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 588.370554][T17687] bond0 (unregistering): Released all slaves [ 588.379332][T17687] bond1 (unregistering): (slave veth0_to_bond): Releasing backup interface [ 588.389424][T17687] bond1 (unregistering): Released all slaves [ 588.413314][T17687] hsr_slave_0: left promiscuous mode [ 588.418935][T17687] hsr_slave_1: left promiscuous mode [ 588.424590][T17687] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 588.432087][T17687] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 588.781917][T17687] IPVS: stop unused estimator thread 0... [ 588.833044][T17687] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 588.882775][T17687] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 588.931994][T17687] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 588.971690][T17687] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 589.054226][T17687] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 589.100593][T17687] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 589.160737][T17687] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 589.210432][T17687] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 589.272544][T17687] bridge_slave_1: left allmulticast mode [ 589.278248][T17687] bridge_slave_1: left promiscuous mode [ 589.284071][T17687] bridge0: port 2(bridge_slave_1) entered disabled state [ 589.292186][T17687] bridge_slave_0: left allmulticast mode [ 589.297847][T17687] bridge_slave_0: left promiscuous mode [ 589.303771][T17687] bridge0: port 1(bridge_slave_0) entered disabled state [ 589.411598][T17687] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 589.421472][T17687] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 589.431405][T17687] bond0 (unregistering): Released all slaves [ 589.610718][T17687] bond0 (unregistering): Released all slaves [ 589.651877][T17687] tipc: Disabling bearer [ 589.656869][T17687] tipc: Left network mode [ 589.664363][T17687] hsr_slave_0: left promiscuous mode [ 589.670049][T17687] hsr_slave_1: left promiscuous mode [ 589.675606][T17687] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 589.683058][T17687] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 589.691528][T17687] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 589.698993][T17687] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 589.707996][T17687] hsr_slave_0: left promiscuous mode [ 589.714197][T17687] hsr_slave_1: left promiscuous mode [ 589.724511][T17687] veth1_macvtap: left promiscuous mode [ 589.730245][T17687] veth0_macvtap: left promiscuous mode [ 589.735819][T17687] veth1_vlan: left promiscuous mode [ 589.741097][T17687] veth0_vlan: left promiscuous mode [ 589.746857][T17687] veth1_macvtap: left promiscuous mode [ 589.752401][T17687] veth0_macvtap: left promiscuous mode [ 589.758014][T17687] veth1_vlan: left promiscuous mode [ 589.763474][T17687] veth0_vlan: left promiscuous mode [ 589.850992][T17687] team0 (unregistering): Port device team_slave_1 removed [ 589.861353][T17687] team0 (unregistering): Port device team_slave_0 removed [ 590.414043][T17687] IPVS: stop unused estimator thread 0... [ 590.483852][T17687] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 590.651631][T17687] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 590.691738][T17687] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 590.731992][T17687] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 590.784440][T17687] netdevsim netdevsim8 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 590.841366][T17687] netdevsim netdevsim8 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 590.891747][T17687] netdevsim netdevsim8 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 590.941691][T17687] netdevsim netdevsim8 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 591.013762][T17687] bridge_slave_1: left allmulticast mode [ 591.019499][T17687] bridge_slave_1: left promiscuous mode [ 591.026393][T17687] bridge0: port 2(bridge_slave_1) entered disabled state [ 591.034463][T17687] bridge_slave_0: left allmulticast mode [ 591.040205][T17687] bridge_slave_0: left promiscuous mode [ 591.046236][T17687] bridge0: port 1(bridge_slave_0) entered disabled state [ 591.055409][T17687] bridge_slave_1: left allmulticast mode [ 591.061303][T17687] bridge_slave_1: left promiscuous mode [ 591.067213][T17687] bridge0: port 2(bridge_slave_1) entered disabled state [ 591.075580][T17687] bridge_slave_0: left allmulticast mode [ 591.081533][T17687] bridge_slave_0: left promiscuous mode [ 591.088058][T17687] bridge0: port 1(bridge_slave_0) entered disabled state [ 591.211073][T17687] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 591.221123][T17687] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 591.230809][T17687] bond0 (unregistering): Released all slaves [ 591.311411][T17687] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 591.321450][T17687] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 591.330750][T17687] bond0 (unregistering): Released all slaves [ 591.383335][T17687] hsr_slave_0: left promiscuous mode [ 591.389098][T17687] hsr_slave_1: left promiscuous mode [ 591.394734][T17687] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 591.402235][T17687] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 591.409825][T17687] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 591.417235][T17687] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 591.426420][T17687] hsr_slave_0: left promiscuous mode [ 591.432095][T17687] hsr_slave_1: left promiscuous mode [ 591.437697][T17687] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 591.445262][T17687] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 591.452951][T17687] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 591.460432][T17687] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 591.472852][T17687] veth1_macvtap: left promiscuous mode [ 591.478450][T17687] veth0_macvtap: left promiscuous mode [ 591.484103][T17687] veth1_vlan: left promiscuous mode [ 591.489368][T17687] veth0_vlan: left promiscuous mode [ 591.495077][T17687] veth1_macvtap: left promiscuous mode [ 591.500694][T17687] veth0_macvtap: left promiscuous mode [ 591.506215][T17687] veth1_vlan: left promiscuous mode [ 591.511571][T17687] veth0_vlan: left promiscuous mode [ 591.610850][T17687] team0 (unregistering): Port device team_slave_1 removed [ 591.620370][T17687] team0 (unregistering): Port device team_slave_0 removed [ 591.676109][T17687] team0 (unregistering): Port device team_slave_1 removed [ 591.686105][T17687] team0 (unregistering): Port device team_slave_0 removed