last executing test programs: 13m19.481010822s ago: executing program 3 (id=32): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000070080000000000000000000850000006d00000095"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='mm_page_free\x00', r0}, 0x10) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="1801000001ffffeb00000000eb658e0d850000007b00000095"], &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0xfffffffffffffffc}, 0x18) r2 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r2, 0x107, 0xf, &(0x7f0000000140)=0x8, 0x4) sendto$packet(r2, &(0x7f00000000c0)="3f0336082608123a2c001e0089e9aaa911d7c2290f0086dd1327c9167c643c4a1b7880610cc96655b1b141ab059b24d0fbc50df71548a3f6c5609063382a0c152bfdf9435e3ffe46", 0xe90c, 0xa0c4, &(0x7f0000000540)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @multicast}, 0x14) mlock(&(0x7f00007d8000/0x800000)=nil, 0x800000) bpf$ENABLE_STATS(0x20, 0x0, 0x0) mbind(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x0, 0x0, 0x0, 0x2) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x3000003, 0x4031, 0xffffffffffffffff, 0x0) 13m19.253614941s ago: executing program 3 (id=34): setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) open(&(0x7f00000005c0)='./bus\x00', 0x66842, 0x0) r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae000000"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r1, 0x0, 0x7}, 0x18) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000001000)=@raw={'raw\x00', 0x8, 0x3, 0x338, 0x0, 0x43, 0xa0, 0x118, 0x98, 0x2a0, 0x178, 0x178, 0x2a0, 0x178, 0x49, 0x0, {[{{@ip={@empty=0x5107, @multicast2, 0xff000000, 0x0, 'veth0_to_bond\x00', 'ip6erspan0\x00', {0xff}, {}, 0x9}, 0x12a, 0xd0, 0x118, 0x0, {0x0, 0x7a010000}, [@inet=@rpfilter={{0x28}, {0x2}}, @common=@unspec=@connbytes={{0x38}, {[{}, {0xe}], 0x0, 0x2}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0xc, {0x80000001}}}}, {{@uncond, 0x0, 0x158, 0x188, 0x0, {}, [@common=@unspec=@conntrack2={{0xc0}, {{@ipv4=@rand_addr=0x64010101, [0x0, 0xffffff00, 0xff000000], @ipv4=@private=0xa010100, [0x0, 0x0, 0xffffff00, 0xff], @ipv4=@multicast1, [0xffffff00, 0xffffffff, 0x0, 0xffffffff], @ipv6=@loopback, [0xffffff00, 0xffffffff, 0x0, 0xffffff00], 0x7, 0xa, 0x5c, 0x4e24, 0x4e20, 0x4e23, 0x4e22, 0x40, 0xa2}, 0x80}}, @common=@icmp={{0x28}, {0x11, "bccf"}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x5}, {0x1, 0x4, 0x5}, 0xb}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x398) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x88}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{0x0}], 0x1, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r5, 0x0, r7, 0x0, 0xf3a, 0x0) tee(r6, r4, 0x8, 0x0) write$binfmt_script(r7, 0x0, 0xfffffe48) modify_ldt$read_default(0x2, &(0x7f00000013c0)=""/189, 0xbd) move_mount(0xffffffffffffffff, &(0x7f0000000040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0x0, 0x200) r8 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r8) 13m18.177101507s ago: executing program 3 (id=43): bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x14, &(0x7f0000000400)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000000085000000010000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000020850000000400000095"], 0x0, 0x0, 0x0, 0x0, 0x40f00, 0x40, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000180)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b70300000000a999850000000400000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='attr/prev\x00') read(r1, &(0x7f0000000140)=""/204, 0xfd) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400000002"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) socket$nl_netfilter(0x10, 0x3, 0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e22, 0xfffffffd, @empty, 0x4000006}, 0x1c) listen(r3, 0x0) r4 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r4, &(0x7f0000000000)={0x2, 0x4e22, @local}, 0x10) accept(r3, 0x0, 0x0) 13m18.105994177s ago: executing program 3 (id=45): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000005c0)={0x1, &(0x7f0000000200)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000440)=ANY=[@ANYBLOB="9feb01001800000000000000300000003000000006000000040000400000000700000000000000000000000b0100000000c8d9858ac400000001acbb10a5e2000005fdffffff00000000020000000000000000000000da00"], &(0x7f0000000340)=""/142, 0x4e, 0x8e, 0x1, 0x4, 0x0, @void, @value}, 0x28) syz_clone(0x28080, 0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) perf_event_open(&(0x7f0000000980)={0x2, 0x80, 0xb, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x11, 0x3f, &(0x7f0000000b80)=ANY=[@ANYBLOB="b702000000000000bfa300000000000007030000fdfdfff67a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040000010000400404000001000000b7050000deffffff6a0a00ff00000000850000002b000000b70000000000000095000000000000009cc6b3fcd62c7d376238975d43a4505f80fc88943c4f0cf08e467b592f868ee30a0e8c1bf176db2a6b2f01806fd3d5707bfd2d84aaa3b1d4e984c46ea7e2a447a36f5662403e1b2be4cc7c2683908a0d411a9872971c5c77f0979b34e1ad837ff0d10b97163c1d6d0e196bf02f46c7953ab1abda45cbe8d0d26b5069f8a98f7dc8f772fd0e17c9b9101644f8c06b74635fc9f9de9ca3c0ec0cb9bf4e418d076df4c7df0a70f2bdf4000000000000b0c2940dd8e263aa743f7555193161f45346b1004006000000e1ffff8816326d7d25c32aac1c7d5b5be399f6609876b5887437a172fbc02a74135b29194e533583f76e412dff048f0000000000000000b2728a0481e9f0da43bb6cfb851cd364ff19002cc93c1c13ca67fdc6c238342033070000004a9fb6a6991ddb737d527d6acb15426415b6e8b14fdfa2c6e94bd0339454c13ad3e328a100000000b5ffa1000000000000140eb2e9c15b6c8f6198282df27badac8500bc7d202e099009ca515007e5f009735200040000001896d46cdac0abb841d9f96e2e6a19b7bf661c01800000d77d6165f253683cd8dc926518c699a2b14fb2bb40425dee631368340711a8c47318d5d13085938c3ec5c39b540b34157b0330aa16bd0998607f0ecea84919712d36"], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x2a, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r0, 0xffff0000, 0xb, 0x0, &(0x7f0000001a40)="2b206d074843b397737ea4", 0x0, 0xf000, 0x720e, 0x0, 0x0, 0x0, 0x0}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000b80)=ANY=[@ANYBLOB="020004000400000000d3edad5c24cb2908e064bda9a68a9b4252ee000000006069194ec879e462edcf63bc3116ef97e3bc7a342c7d7a4d80d20500000000000000c4a11916452e27252120e357dff50029a1776e6800"/100, @ANYRES32, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002a20702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000083850000002d00000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x22, '\x00', 0x0, @fallback=0x35, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000540)={&(0x7f0000000000)='kfree\x00', r1}, 0x10) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x0, &(0x7f0000000180)={0x7, &(0x7f0000000000)=[{0x2006, 0x0, 0x0, 0x7ffc0006}, {0x6, 0x7, 0xf}, {0x5, 0x5, 0xf4, 0x7}, {0x6, 0x7, 0x0, 0x100}, {0x82, 0xb, 0xa, 0x80}, {0xbdb, 0x4, 0x2, 0x9}, {0x9, 0xf, 0xff, 0xd}]}) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000614000/0x4000)=nil, 0x4000, 0x4000, 0x0, 0x5, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xc0ed000e, &(0x7f00000001c0)={[{@jqfmt_vfsold}, {@data_err_abort}, {@debug}, {@noload}, {@mblk_io_submit}, {@commit={'commit', 0x3d, 0x5}}, {@nombcache}, {@debug}, {@minixdf}]}, 0xfe, 0x46d, &(0x7f0000000640)="$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") r2 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1b0068bfbcba5a204b6672c436000000000000000000000080"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000ac0)={0x11, 0xc, &(0x7f0000000600)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYRESHEX], &(0x7f0000000200)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r3 = accept4$llc(0xffffffffffffffff, 0x0, &(0x7f0000000040), 0x0) accept4$llc(r3, 0x0, &(0x7f0000000300), 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4c0000001000010800"/18, @ANYRES32=0x0, @ANYBLOB="0000040010"], 0x4c}, 0x1, 0x0, 0x0, 0x1}, 0x0) creat(&(0x7f00000000c0)='./bus\x00', 0x0) mount(&(0x7f0000000380)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x201000, 0x0) r4 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x0) preadv2(r4, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4096, 0x1000}], 0x2, 0x0, 0x0, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$KDSKBENT(r5, 0x4b47, &(0x7f0000000000)={0x5, 0xb7, 0xa}) 13m17.493132705s ago: executing program 3 (id=60): r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b702000002000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r2}, 0x10) fgetxattr(r1, &(0x7f00000003c0)=@known='system.advise\x00', 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000000)={'lo\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x3000002, 0x5d031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000800000/0x800000)=nil, 0x800000, 0x0, 0x600, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2, 0x31, 0xffffffffffffffff, 0x0) sendmsg$nl_route(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000180)=ANY=[@ANYBLOB="40000000100039042dbd7000feffffff00000000", @ANYRES32=r4, @ANYBLOB="00000000900000001800168014000180100006005fcdf0d23f0400000900000008001b"], 0x40}, 0x1, 0x0, 0x0, 0x8050}, 0x405c104) setsockopt$IPT_SO_SET_REPLACE(r0, 0x8001000000000000, 0x40, &(0x7f0000000000)=@raw={'raw\x00', 0x8, 0x3, 0x328, 0x190, 0x11, 0x148, 0x190, 0x0, 0x290, 0x2a8, 0x2a8, 0x290, 0x2a8, 0x3, 0x0, {[{{@ip={@private=0xa010101, @private=0xa010100, 0xff, 0xffffff00, 'veth0_to_hsr\x00', 'veth1_virt_wifi\x00', {}, {}, 0x21, 0x1, 0x10}, 0x0, 0x130, 0x190, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'ip_vti0\x00', {0x0, 0x0, 0x3f, 0x0, 0x0, 0x3, 0x7}}}, @common=@unspec=@physdev={{0x68}, {'veth0_macvtap\x00', {}, 'ip6erspan0\x00', {}, 0x0, 0xa}}]}, @common=@CLUSTERIP={0x60, 'CLUSTERIP\x00', 0x0, {0x0, @link_local, 0x0, 0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x30], 0x0, 0x0, 0x800000000000000}}}, {{@ip={@multicast2, @empty, 0x0, 0xffffffff, 'vlan0\x00', 'netdevsim0\x00'}, 0x0, 0xd0, 0x100, 0x0, {}, [@common=@ttl={{0x28}}, @common=@unspec=@statistic={{0x38}, {0x0, 0x0, 0x5}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x388) 13m16.758892202s ago: executing program 3 (id=70): r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) socket(0x10, 0x3, 0x0) open(&(0x7f00000005c0)='./bus\x00', 0x66842, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3, 0x0, 0x7}, 0x18) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000001000)=@raw={'raw\x00', 0x8, 0x3, 0x250, 0x0, 0x43, 0xa0, 0x118, 0x98, 0x2a0, 0x178, 0x178, 0x2a0, 0x178, 0x49, 0x0, {[{{@ip={@empty=0x5107, @multicast2, 0xff000000, 0x0, 'veth0_to_bond\x00', 'ip6erspan0\x00', {0xff}, {}, 0x9}, 0x12a, 0xa8, 0xf0, 0x0, {0x0, 0x7a010000}, [@common=@unspec=@connbytes={{0x38}, {[{}, {0xe}], 0x0, 0x2}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0xc, {0x80000001}}}}, {{@uncond, 0x0, 0x98, 0xc8, 0x0, {}, [@common=@icmp={{0x28}, {0x11, "bccf"}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x5}, {0x1, 0x4, 0x5}, 0xb}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2b0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffcf4}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r7, 0x0, 0xf3a, 0x0) write$binfmt_script(r7, 0x0, 0xfffffe48) modify_ldt$read_default(0x2, &(0x7f00000013c0)=""/189, 0xbd) move_mount(0xffffffffffffffff, &(0x7f0000000040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0x0, 0x200) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 13m16.737288981s ago: executing program 32 (id=70): r0 = socket$igmp6(0xa, 0x3, 0x2) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000b00)=@raw={'raw\x00', 0x8, 0x3, 0x428, 0xd0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x358, 0xffffffff, 0xffffffff, 0x358, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@private0, @mcast2, [], [], 'veth0_macvtap\x00', 'dvmrp1\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE0={0x28}}, {{@ipv6={@remote, @ipv4={'\x00', '\xff\xff', @dev}, [], [], 'wg1\x00', 'gre0\x00'}, 0x0, 0x258, 0x288, 0x0, {}, [@common=@inet=@hashlimit1={{0x58}, {'pim6reg\x00', {0x0, 0x0, 0x5, 0x0, 0x0, 0x7, 0x3ff}}}, @common=@inet=@hashlimit3={{0x158}, {'wg1\x00', {0x3, 0x0, 0x41, 0x0, 0x0, 0x1000, 0x6, 0x3}}}]}, @common=@unspec=@CONNMARK={0x30}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x7}}}}, 0x488) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) socket(0x10, 0x3, 0x0) open(&(0x7f00000005c0)='./bus\x00', 0x66842, 0x0) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f0000000180)=ANY=[@ANYBLOB="180100000100a7d9000000000020b200850000007b00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r3, 0x0, 0x7}, 0x18) r4 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r4, 0x0, 0x40, &(0x7f0000001000)=@raw={'raw\x00', 0x8, 0x3, 0x250, 0x0, 0x43, 0xa0, 0x118, 0x98, 0x2a0, 0x178, 0x178, 0x2a0, 0x178, 0x49, 0x0, {[{{@ip={@empty=0x5107, @multicast2, 0xff000000, 0x0, 'veth0_to_bond\x00', 'ip6erspan0\x00', {0xff}, {}, 0x9}, 0x12a, 0xa8, 0xf0, 0x0, {0x0, 0x7a010000}, [@common=@unspec=@connbytes={{0x38}, {[{}, {0xe}], 0x0, 0x2}}]}, @common=@unspec=@LED={0x48, 'LED\x00', 0x0, {'syz0\x00', 0x0, 0xc, {0x80000001}}}}, {{@uncond, 0x0, 0x98, 0xc8, 0x0, {}, [@common=@icmp={{0x28}, {0x11, "bccf"}}]}, @common=@inet=@SET2={0x30, 'SET\x00', 0x2, {{0x0, 0x5}, {0x1, 0x4, 0x5}, 0xb}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x2b0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) timer_settime(0x0, 0x0, &(0x7f0000000280)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000140)={&(0x7f0000000440)=@rxrpc=@in4={0x21, 0x0, 0x2, 0x10, {0x2, 0x0, @loopback}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000100)="a6", 0xfffffcf4}, {0x0}], 0x2, &(0x7f0000001a00)=ANY=[@ANYBLOB="180000000000000010010000010000007d95df16a39b1a6c900000000000000001000005040500002b24ec10064b6f2f000000fb718aef932f3889d1fdda5b00000009860f5878c37ffe36e1165814d435be5b317c6c8189767d2f97879f07a515bb7c169f46933d9338f4ab04834e6f618988c5944741afe403461323110f62055394412158e7a3adb164d641aa40d4ab077fe34232aa8b319d7666d0998a61d7da0c86d70000001010"], 0x10b8}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r6, 0x0, r7, 0x0, 0xf3a, 0x0) write$binfmt_script(r7, 0x0, 0xfffffe48) modify_ldt$read_default(0x2, &(0x7f00000013c0)=""/189, 0xbd) move_mount(0xffffffffffffffff, &(0x7f0000000040)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0xffffffffffffffff, 0x0, 0x200) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x100000, 0x0, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) 1m44.035649789s ago: executing program 5 (id=10080): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000007c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000030000000000000000000400b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x10) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={0x0, 0x7c}}, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r2, 0x1, 0x41, &(0x7f0000000080)=0x414e, 0x4) connect$inet(r2, &(0x7f0000000340)={0x2, 0x4e22, @local}, 0x10) sendmmsg(r2, &(0x7f0000007fc0), 0x800001d, 0x0) 1m43.994522139s ago: executing program 5 (id=10081): io_uring_enter(0xffffffffffffffff, 0x0, 0x2, 0xf, &(0x7f0000000000), 0x18) r0 = socket$inet6_sctp(0xa, 0x801, 0x84) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000380)=ANY=[@ANYRESOCT=r0, @ANYRES32=0x0, @ANYBLOB="4acb1caa407c8d87edb78fa3972103dcfa444a576db8a905a52f3598b33a2e932ad541a9a71924e15f05681bb39d22c0857166cf3dea6ff9c1caa4402f058de2a25586a5c7513495b2011737c7238c4fd2735081d1c97cea6b77282e6582fe9b65cc6fbbb2eebf489b29dfab0cfe6f", @ANYRES8=r0], 0xfc}}, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) bind$netlink(r2, &(0x7f0000000080)={0x10, 0x0, 0x0, 0xfffffffffffffffd}, 0xc) r3 = syz_open_dev$usbmon(&(0x7f00000005c0), 0x4, 0x200) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000003, 0x12, r3, 0x6b52a000) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') unshare(0x62040200) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000b, 0x8031, 0xffffffffffffffff, 0x0) bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000140)={0x2, 0x4, 0x8, 0x1, 0x80, 0x0, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3, 0x0, @void, @value, @void, @value}, 0x50) read(0xffffffffffffffff, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6e, @void, @value}, 0x94) creat(&(0x7f0000000040)='./bus\x00', 0x0) mount(0x0, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) creat(0x0, 0x0) r4 = open(&(0x7f0000000040)='./bus\x00', 0x44842, 0x0) pwritev2(r4, &(0x7f0000000240)=[{&(0x7f0000000000)='$', 0x100000}], 0x2, 0x1400, 0x0, 0x3) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010200000000000000000000000a20000000000a01010000000000000000010000000900010073797a300000000048000000030a01010000000000000000010000000900010073797a30000000000900030073797a3100000000080007006e617400140004800800014000000000080002"], 0xa4}, 0x1, 0x0, 0x0, 0x80}, 0x0) creat(&(0x7f0000000080)='./file1\x00', 0x69) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000640)='./file1\x00', 0x3014850, &(0x7f00000001c0)={[{@quota}, {@barrier_val={'barrier', 0x3d, 0x1000}}, {@grpjquota}, {@norecovery}, {@dioread_lock}]}, 0x3, 0x4d1, &(0x7f0000000b80)="$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") r6 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) openat$cgroup_ro(r6, &(0x7f0000000140)='cpuacct.stat\x00', 0x0, 0x0) r7 = socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)) setsockopt$inet6_int(r7, 0x29, 0x3, 0x0, 0x0) sendto$inet6(r0, &(0x7f0000000200)="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", 0x14f, 0x801, &(0x7f00000000c0)={0xa, 0x0, 0xffffff6c, @dev, 0x4}, 0x1c) 1m43.520227367s ago: executing program 5 (id=10092): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000840)=ANY=[@ANYRES64, @ANYRES64=r0, @ANYRES8=r0], 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='mm_page_alloc\x00', r1}, 0x10) r2 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r2}, 0x10) socketpair$unix(0x1, 0x2, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610419000000000095000000"], &(0x7f0000003ff6)='GPL\x00', 0x2, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x48) setsockopt$IPT_SO_SET_REPLACE(r3, 0x0, 0x40, &(0x7f0000000380)=@raw={'raw\x00', 0x2, 0x3, 0x290, 0xb, 0x0, 0xf0, 0xf8, 0xf0, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x1f8, 0x3, 0x0, {[{{@ip={@multicast1, @multicast1, 0x0, 0x0, 'ip6gretap0\x00', 'syzkaller1\x00', {}, {}, 0x11}, 0xb000000, 0xd8, 0xf8, 0x0, {}, [@common=@inet=@l2tp={{0x30}, {0x0, 0x0, 0x0, 0x0, 0x8}}, @common=@unspec=@quota={{0x38}}]}, @unspec=@NOTRACK={0x20}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'netbios-ns\x00', 'syz0\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28}}}}, 0x2f0) r4 = openat$sndtimer(0xffffffffffffff9c, 0x0, 0x129000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r4, 0x80e85411, &(0x7f0000000300)=""/69) r5 = socket(0xa, 0x40000000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r5, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000feffffff0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000ffffffff0200000005000000000000000000766574683098c76f5f7465616d00000064756d6d79300000000000000000000064756d0004300000000000000000000073797a6b616c6c8279a7e00000000000ffffffffffff000000000000ffffffff7fff00000000000000087000000070000000a000000072656469726563740000000000000000000000000000000000000000000000000800000000000000ffffffff000000000b00000000000000000073797a6b616c6c65723100000000000067726574617030000000000000000000766c616e30000000000000000000000064756d6d7930000000000000000000000180c2000000000000000000aaaaaaaaaabb00000000000000007000000070000000a8000000736e6174000000000000000000000000000000000000000001b700000000000010000000000000000000000000000000ffffffff00000000"]}, 0x280) 1m43.156248936s ago: executing program 5 (id=10102): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000ff0f000007"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) bpf$TOKEN_CREATE(0x24, &(0x7f0000000000)={0x0, r3}, 0x8) bpf$PROG_LOAD(0x5, &(0x7f0000000300)={0x11, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x15, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0xff8c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x5e) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000500)=ANY=[@ANYRESOCT=r1, @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000fcae68da850000008200000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r5}, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) r7 = syz_mount_image$iso9660(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x800000, &(0x7f0000000900)=ANY=[@ANYRES8=0x0, @ANYRESOCT, @ANYRESOCT, @ANYRES32, @ANYBLOB="b7ad7cd65c46a5be7840094fc88ed3944440d445ac89758d3aa4a6c77ea3e1e50196a99f88ba68f3377383de4de11c07aa5d22d9f4f3c58344d6011b6ea5ee82cf40e4ca5976370cb73c872e576f936791a0ffa5639ac237214be5926acea5405e00f1a144cf7a5240bc1e56ed617e19d6a5a268505f0012b4baf36d3a71eb34c8b67281dbba4b20c3d724ef150deff6f7d908bc72575a1f43b608e0d118", @ANYBLOB="a1fffd2e4c38a7b17fef1a78ad194301887b7711a1517cd8b4288a2fbb7d202d8c4a1809add074e6dde0703158125f2f114c49f5ee5f249d63ac0d851c212ccd8d82b7c694ead23c41f021e8bc78d646d07e3513568bb81d2179a012dcdcb845b0a58b6d5e46a177de56e3e77ed573967e4ebe299078019693ca486edbaa44e947802c7f46f1de18cf7f0e1af02964d04cc84d979855e8d3a3fda262f6a7d2b4b4849fd880c9b9af9be818ba05386754a3505e833ca0b95491ed", @ANYRES8=0x0], 0x3, 0x7cd, &(0x7f0000001780)="$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") r8 = openat$binfmt_register(0xffffff9c, &(0x7f0000000040), 0x1, 0x0) r9 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) getsockname(r9, 0x0, &(0x7f00000001c0)) r10 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f00000004c0)=ANY=[@ANYBLOB="180000000000000000000000000000008500000023000000850000000800000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000180)='kfree\x00', r10}, 0x10) r11 = io_uring_setup(0x410f, &(0x7f0000000200)) io_uring_register$IORING_REGISTER_BUFFERS2(r11, 0xf, &(0x7f0000001580)={0x2, 0x0, 0x0, &(0x7f0000000d00)=[{&(0x7f0000000000)=""/47, 0x2f}, {0x0}], 0x0}, 0x20) bpf$TOKEN_CREATE(0x24, &(0x7f0000000400)={0x0, r7}, 0x8) r12 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYRES16=r6], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='mm_page_free\x00', r12, 0x0, 0x7}, 0x18) syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f00000001c0)='./file2\x00', 0x404, &(0x7f0000000280)={[{@nogrpid}, {@jqfmt_vfsv0}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@debug}, {@nombcache}, {@quota}, {@nolazytime}]}, 0x3, 0x42f, &(0x7f0000000940)="$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") r13 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) pwrite64(r13, &(0x7f0000000140)='2', 0x1, 0x8000c61) r14 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0xc4042, 0x1ff) sendfile(r14, r13, 0x0, 0xfffe83) write$binfmt_register(r8, &(0x7f0000000100)={0x3a, 'syz3', 0x3a, 'E', 0x3a, 0x6, 0x3a, 'E', 0x3a, '@{@$\x9a$^', 0x3a, './file0', 0x3a, [0x50, 0x4f, 0x46, 0x50, 0x43]}, 0x34) openat$random(0xffffffffffffff9c, &(0x7f00000003c0), 0x4100, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='sys_enter\x00', r2}, 0x10) statx(0xffffffffffffffff, 0x0, 0x1000, 0x6000, 0x0) 1m42.739111684s ago: executing program 5 (id=10107): close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$unix(0x1, 0x5, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000040)={0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}], 0x7f, "7dae14dfaa032e"}) r2 = socket$inet6_sctp(0xa, 0x5, 0x84) r3 = socket(0x2, 0x80805, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r3, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x10, &(0x7f0000000380)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_MAX_BURST(r3, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000001080)=0x8) perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0x3d, 0x1, 0x0, 0x0, 0x0, 0x5, 0x62000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x15}, 0x1016c7, 0x8, 0x0, 0x6, 0x3, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) r5 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r5, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000008c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r5, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000002080)={{0x14}, [@NFT_MSG_NEWCHAIN={0x6c, 0x3, 0xa, 0x301, 0x0, 0x0, {0x5, 0x0, 0x2}, [@NFTA_CHAIN_COUNTERS={0x4c, 0x8, 0x0, 0x1, [@NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x7}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x7}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x8000}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x7}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x1}, @NFTA_COUNTER_BYTES={0xc, 0x1, 0x1, 0x0, 0x2}]}, @NFTA_CHAIN_TYPE={0xb, 0x7, 'filter\x00'}]}], {0x14}}, 0x94}}, 0x0) close(r5) r6 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x48) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000400)={{r6}, &(0x7f0000000000), &(0x7f00000003c0)}, 0x20) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x38, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000140)='kmem_cache_free\x00', r7}, 0x10) r8 = shmget$private(0x0, 0x3000, 0x10, &(0x7f0000ffb000/0x3000)=nil) shmctl$IPC_RMID(r8, 0x0) shmctl$SHM_STAT_ANY(r8, 0xf, 0x0) umount2(&(0x7f0000000180)='./file0\x00', 0x5) setsockopt$inet_sctp6_SCTP_MAX_BURST(r2, 0x84, 0x14, &(0x7f0000000000)=@assoc_value={r4, 0x400}, 0x8) ioctl$BTRFS_IOC_INO_LOOKUP(r0, 0xd0009412, &(0x7f0000001040)={r1, 0x91}) r9 = syz_open_dev$sg(&(0x7f0000000000), 0xf9ba, 0x80000) ioctl$SCSI_IOCTL_SEND_COMMAND(r9, 0x1, &(0x7f00000002c0)=ANY=[]) r10 = socket$packet(0x11, 0x2, 0x300) listen(r10, 0x15a8) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000002040)={'vcan0\x00', {0x2, 0x0, @empty}}) 1m42.722802504s ago: executing program 5 (id=10108): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000580)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000e40)=""/4096, 0x1000}], 0x1}, 0x0) 1m42.681746144s ago: executing program 33 (id=10108): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x16, 0x0, 0x4, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f00000003c0)={{r0}, 0x0, &(0x7f0000000580)}, 0x20) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x4, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$tipc(r3, &(0x7f0000000200)={0x0, 0x0, 0x0}, 0x0) recvmsg(r2, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000300)=[{&(0x7f0000000e40)=""/4096, 0x1000}], 0x1}, 0x0) 3.031133052s ago: executing program 0 (id=11573): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r1}, 0x18) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2000000, 0x0) r3 = io_uring_setup(0x1de0, &(0x7f0000000000)={0x0, 0x0, 0x40, 0x1000}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r3, 0xb, &(0x7f0000000080), 0x0) 2.114463568s ago: executing program 0 (id=11609): r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='rdma.current\x00', 0x275a, 0x0) fcntl$lock(r0, 0x26, &(0x7f0000000000)={0x1}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000570000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000008000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000000000008500000058"], 0x0, 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000100)='kmem_cache_free\x00', r2}, 0x18) fcntl$lock(r0, 0x25, &(0x7f00000000c0)={0x1, 0x2, 0x0, 0x200}) 2.113643958s ago: executing program 0 (id=11611): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="18010000670000000000000000000000850000006d00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r0}, 0x10) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2000000, 0x0) r1 = io_uring_setup(0x1de0, &(0x7f0000000000)={0x0, 0x0, 0x40, 0x1000}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r1, 0xb, &(0x7f0000000080), 0x0) 2.107157778s ago: executing program 2 (id=11612): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x20}}, 0x0) r2 = socket(0x2a, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000700), 0x8}, 0x13b3, 0x0, 0xfffffffe, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) pwrite64(r4, &(0x7f0000000080)='3', 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=@delchain={0x9c, 0x65, 0x1, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x8, 0x1}, {0x1, 0x9}, {0x6, 0x2}}, [@filter_kind_options=@f_flower={{0xb}, {0x54, 0x2, [@TCA_FLOWER_KEY_TCP_FLAGS={0x6, 0x47, 0x82}, @TCA_FLOWER_KEY_ENC_UDP_SRC_PORT_MASK={0x6}, @TCA_FLOWER_KEY_MPLS_TTL={0x5, 0x43, 0x3}, @TCA_FLOWER_KEY_ARP_SHA_MASK={0xa}, @TCA_FLOWER_KEY_MPLS_TTL={0x5, 0x43, 0x39}, @TCA_FLOWER_KEY_ENC_KEY_ID={0x8, 0x1a, 0x1}, @TCA_FLOWER_KEY_ARP_TIP={0x8, 0x3b, @dev={0xac, 0x14, 0x14, 0xf}}, @TCA_FLOWER_KEY_ENC_IPV6_DST={0x14, 0x21, @mcast2}]}}, @TCA_RATE={0x6, 0x5, {0x5, 0x1}}, @TCA_CHAIN={0x8, 0xb, 0x3}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}]}, 0x9c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newtfilter={0x9a0, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x5, 0xffe0}}, [@filter_kind_options=@f_basic={{0xa}, {0x970, 0x2, [@TCA_BASIC_POLICE={0x80, 0x4, [@TCA_POLICE_TBF={0x3c, 0x1, {0x8, 0x3, 0x8, 0x7, 0x7, {0xf, 0x1, 0xda, 0x5, 0x2, 0x59a6}, {0x8, 0x0, 0x1, 0x0, 0x8, 0x40}, 0x7fff, 0x4, 0x4}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x3}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x413}, @TCA_POLICE_RESULT={0x8, 0x5, 0xffffffff}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x4}, @TCA_POLICE_RATE64={0xc}, @TCA_POLICE_RATE64={0xc, 0x8, 0x334}]}, @TCA_BASIC_EMATCHES={0xa0, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x94, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x9f, 0x3, 0x6}, {0x8, 0x9, 0x4fd7, 0x2}}}, @TCF_EM_CONTAINER={0x44, 0x3, 0x0, 0x0, {{0x1ff, 0x0, 0x1}, "d79c925568bd6db7870009362631c19dcf8bb25538fe05ad370eae7a28d29ea55aaedb07879ff49cbbb677c740e361aa57c2ec90464e1c45"}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x2, 0x1, 0xa118}, {0x549e, 0x28, 0x3, 0x0, 0xa, 0x2, 0x1}}}, @TCF_EM_NBYTE={0x18, 0x2, 0x0, 0x0, {{0x7, 0x2, 0xfffb}, {0x6, 0x5, 0x0, "cadb93bc6f"}}}]}]}, @TCA_BASIC_EMATCHES={0x5b4, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x1bc, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xa8, 0x1, 0x0, 0x0, {{0x9, 0x0, 0x1}, "45da7fa5ef25f96eb07ca5e155b66d625c74c2721421d4157881ce723da67e2592e3336bbd88fdf98f6e44f4afd8fe7de5b0427e8568bf982ed4a924ef6c723de6e804717b6ae4eb0d6be3f24cee68b9a1d81d8a7c206c845f29081940e7387bf8d14c4839286ec2eac18f7c39a656b6fd30bcfcf29f33117fd3b69b8f10160e9aa00fbdf60166511f50da12b7e8570734a00afe32d2a8778f2aaf40"}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x8001, 0x7, 0x7}, {{0x1, 0x1, 0x1, 0x1}, {0x4, 0x1, 0x1, 0x1}}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x11d6, 0x1, 0x7fff}, {0xa, 0xfffffe01, 0xfe00, 0x0, 0xf, 0xfecad5a1302fdb45, 0x1}}}, @TCF_EM_IPT={0x54, 0x2, 0x0, 0x0, {{0x8, 0x9, 0x1000}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x5}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x4}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x4}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x1}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x9}]}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x1, 0x7, 0xd}, {{0x2, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x1, 0x1}}}}, @TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0xfff7, 0x2, 0x9}, {0x8, 0x6, 0x2, "f7cb8a21993b"}}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x63, 0x3, 0x8af2}, {0x3, 0x6, 0x6, 0xa}}}, @TCF_EM_NBYTE={0x1c, 0x2, 0x0, 0x0, {{0x2, 0x2, 0x1}, {0xe, 0xa, 0x2, "3f8ffcd26c1f169f3926"}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x9, 0x1, 0x4aee}, {0x4, 0x1, 0xffff, 0x3, 0x6, 0x1, 0x1}}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x2, 0x7, 0x141e}, {{0x1, 0x0, 0x1}, {0x4, 0x1}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x4}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x5a9}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}, @TCA_EMATCH_TREE_LIST={0x48, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x5, 0x3, 0xbc}, {0xc, 0xeb0b, 0xfffff001, 0xffff96a9}}}, @TCF_EM_IPT={0x28, 0x1, 0x0, 0x0, {{0x3, 0x9, 0x70}, [@TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xd}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x2}]}}]}, @TCA_EMATCH_TREE_LIST={0x27c, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0x9, 0x2, 0x1}, {0x1, 0x8, 0x1, "858e7cfadbf9f73d"}}}, @TCF_EM_CONTAINER={0xf4, 0x1, 0x0, 0x0, {{0x1, 0x0, 0x2}, "d49369de1f79b9970f55f5a6894748d2d37d81c6f546276697fe7e48cd11ed9e37ac0ca2ae7e26cc978632898946c457f51c9716bd4d401bedd64332ce4334692ab38dc20e51abd87576f9c980f8cc5a9072de4ff442ddd2a60aae978c674266bab4ee6bbaddd5c8b57862da3ce223077c37fbd2f20f474611a2ed2906af3aa0c055935474882d666f663e06300e2e97ed653e8f959c97016d36cc065a361c0573ace37c1819a01068efa5ead3162f7346573779956d3f8d96b45fac4819ab180ab449be7f330b2d2702d2f3c434724787baabe1d14c5570e46acb9619d16aab046044aa31"}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x9}, {0x0, 0x2c0, 0x5, 0x3}}}, @TCF_EM_META={0x70, 0x2, 0x0, 0x0, {{0x0, 0x4, 0xed}, [@TCA_EM_META_RVALUE={0x1a, 0x3, [@TCF_META_TYPE_VAR="13a0711b0aa9c337", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_VAR="207a658f2ecd"]}, @TCA_EM_META_RVALUE={0x7, 0x3, [@TCF_META_TYPE_VAR, @TCF_META_TYPE_VAR="de", @TCF_META_TYPE_VAR="19f6"]}, @TCA_EM_META_RVALUE={0xf, 0x3, [@TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="4a74b6fe63ad04"]}, @TCA_EM_META_LVALUE={0x8, 0x2, [@TCF_META_TYPE_INT=0x8]}, @TCA_EM_META_RVALUE={0x9, 0x3, [@TCF_META_TYPE_VAR="91b600ec75"]}, @TCA_EM_META_LVALUE={0x1a, 0x2, [@TCF_META_TYPE_VAR="0a34aae9", @TCF_META_TYPE_VAR="d7a7d28c3914", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="13a4", @TCF_META_TYPE_VAR="dcb4"]}]}}, @TCF_EM_NBYTE={0x18, 0x1, 0x0, 0x0, {{0x2c7, 0x2, 0xffff}, {0x4, 0x7, 0x2, "b842236720793e"}}}, @TCF_EM_META={0x18, 0x2, 0x0, 0x0, {{0x0, 0x4, 0x6}, [@TCA_EM_META_HDR={0xc, 0x1, {{0xfff8, 0x40, 0x1}, {0x3800, 0x0, 0x1}}}]}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x1, 0x1, 0x78b}, {0x3, 0x81, 0xfffb, 0x3, 0x4, 0x0, 0x1}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x4, 0x7, 0x2}, {{0x2}, {0x0, 0x1, 0x1}}}}, @TCF_EM_META={0x84, 0x3, 0x0, 0x0, {{0x4db, 0x4, 0x1}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x4, 0x5}, {0x87a, 0x56, 0x2}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x7, 0x8, 0x1}, {0x6, 0x8, 0x1}}}, @TCA_EM_META_LVALUE={0x15, 0x2, [@TCF_META_TYPE_VAR="9c", @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_INT, @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x2]}, @TCA_EM_META_LVALUE={0x1f, 0x2, [@TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="a121c85edc1b", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="f2c24d3ea1"]}, @TCA_EM_META_LVALUE={0x16, 0x2, [@TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_VAR="989661740204b9", @TCF_META_TYPE_VAR="993106649e1589"]}, @TCA_EM_META_LVALUE={0xe, 0x2, [@TCF_META_TYPE_VAR="2d1de83142821176b58f"]}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xdd}}, @TCA_EMATCH_TREE_LIST={0x108, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x14, 0x3fff, 0x0, 0x0, {{0xf1c, 0x2, 0x3ff}, {0x401, 0x1, 0x2, "bf"}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x5, 0x1, 0x7fff}, {0xffffffd8, 0xffffffff, 0xec, 0x4, 0x9, 0x1, 0x1}}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x18be, 0x3, 0x4}, {0x7fffffff, 0x8, 0xfffffffe, 0x101}}}, @TCF_EM_META={0x7c, 0x2, 0x0, 0x0, {{0x10, 0x4, 0x6}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x5, 0x9, 0x2}, {0x81, 0x8, 0x2}}}, @TCA_EM_META_RVALUE={0x14, 0x3, [@TCF_META_TYPE_VAR="fcee", @TCF_META_TYPE_VAR="f06e03ad", @TCF_META_TYPE_VAR='\'', @TCF_META_TYPE_VAR="e273f326819b5004f4"]}, @TCA_EM_META_RVALUE={0x17, 0x3, [@TCF_META_TYPE_VAR, @TCF_META_TYPE_VAR="21c876091402abd91b", @TCF_META_TYPE_VAR="d906", @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x7]}, @TCA_EM_META_RVALUE={0x8, 0x3, [@TCF_META_TYPE_VAR, @TCF_META_TYPE_INT=0x8]}, @TCA_EM_META_HDR={0xc, 0x1, {{0xec0, 0x0, 0x3}, {0xaf5a, 0x4, 0x2}}}, @TCA_EM_META_RVALUE={0x9, 0x3, [@TCF_META_TYPE_VAR="540f857f9e"]}, @TCA_EM_META_RVALUE={0x16, 0x3, [@TCF_META_TYPE_VAR="3b08ca7cdaec", @TCF_META_TYPE_VAR="a8350f5fe8c127", @TCF_META_TYPE_VAR="f9ef0dacd2"]}]}}, @TCF_EM_NBYTE={0x1c, 0x1, 0x0, 0x0, {{0xf}, {0x7, 0x9, 0x0, "ffe3a75b6a0b63a279"}}}, @TCF_EM_IPT={0x14, 0x2, 0x0, 0x0, {{0xb, 0x9, 0xfffc}, [@TCA_EM_IPT_NFPROTO={0x5}]}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0xf, 0x8, 0x7}, {0xffffffffffffffff, 0x6, 0x2}}}]}]}, @TCA_BASIC_EMATCHES={0xe4, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0xe0, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0xe, 0x7, 0x7ff}, {{0x1, 0x0, 0x1}, {0x1}}}}, @TCF_EM_META={0xc8, 0x1, 0x0, 0x0, {{0x7, 0x4, 0x352}, [@TCA_EM_META_LVALUE={0x1a, 0x2, [@TCF_META_TYPE_VAR="8ba5d49c85", @TCF_META_TYPE_VAR="68fbb0b8", @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_VAR="339aef", @TCF_META_TYPE_VAR="130147a5ddae"]}, @TCA_EM_META_RVALUE={0x12, 0x3, [@TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="f92c5fa89918"]}, @TCA_EM_META_LVALUE={0xe, 0x2, [@TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_VAR="eb03ad40ed3c"]}, @TCA_EM_META_RVALUE={0x23, 0x3, [@TCF_META_TYPE_VAR="7043e1e70c0d9433f681", @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="bffac846d6082a26a3", @TCF_META_TYPE_VAR="ce237c410ba0d538"]}, @TCA_EM_META_LVALUE={0xe, 0x2, [@TCF_META_TYPE_VAR="82c7f28ade1ef2b4fc43"]}, @TCA_EM_META_RVALUE={0x20, 0x3, [@TCF_META_TYPE_VAR="732d4a6a1cd2", @TCF_META_TYPE_VAR="7896a47bf0109f1f35b8", @TCF_META_TYPE_INT=0x4, @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x6, 0x2}, {0x3, 0xd}}}, @TCA_EM_META_RVALUE={0x1c, 0x3, [@TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_INT, @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_INT=0x6]}]}}]}]}, @TCA_BASIC_EMATCHES={0x1ac, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x9}}, @TCA_EMATCH_TREE_LIST={0x1a0, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x80, 0x2, 0x6}, {0x2, 0x2, 0x1, "ab5e"}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x978, 0x1, 0x4}, {0x7c0ffedb, 0xffffffff, 0x8244, 0x2, 0x8, 0x2, 0x1}}}, @TCF_EM_IPT={0xe4, 0x1, 0x0, 0x0, {{0x2, 0x9, 0x8}, [@TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x1}, @TCA_EM_IPT_MATCH_DATA={0xa3, 0x5, "8f0f127c616d3a4a54eca330f6badcc70a150debcd1e35c4549f74a9be3455787231da7d54490bfad33a7b79faaae79cb3db44714b0daccbed5fe090fba8dc9b1d044b20bc8a4f39c57eb90d7ef12d087e12ad8e444c2d8b84c63321f1671e87ece8a37c01bbe8eb082c9e844bcd4fb9cdd155d17775ad6e1864b12810a07767d120d485104392f24352f3218db8512c7b2b8ba5169e7a37867477db07750b"}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_NAME={0xb}]}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x5ae5, 0x3, 0x2}, {0x3, 0xdc, 0x8e3, 0x8}}}, @TCF_EM_NBYTE={0x14, 0x2, 0x0, 0x0, {{0x7fff, 0x2, 0x6}, {0x7, 0x3, 0x2, "90f5e9"}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x3, 0x8, 0x8}, {0x1, 0x4, 0x7}}}, @TCF_EM_META={0x4c, 0x3, 0x0, 0x0, {{0xfffe, 0x4, 0x7}, [@TCA_EM_META_LVALUE={0x27, 0x2, [@TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_VAR="30dcc824ec0417dde549", @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="7566670b11"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x6, 0x0, 0xdf43bc03b64c4713}, {0x0, 0x4, 0x2}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x33ad, 0x6, 0x2}, {0x40, 0xc, 0x1}}}]}}]}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0x9, 0x3}}]}}]}, 0x9a0}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000500), r2) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r5, &(0x7f0000000640)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="20000600000001000000040000001400018001000000", @ANYRES32=r3, @ANYBLOB="08000300e00000021c0001800800030000000000060005004e240000060001000a000000050005000e000000"], 0x4c}, 0x1, 0x0, 0x0, 0x24008881}, 0x4010) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000001780)={0x3, {{0x2, 0x5, @multicast1}}, {{0x2, 0x100, @remote}}}, 0x108) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='kfree_skb\x00', r7}, 0x18) io_uring_setup(0x172e, &(0x7f0000000680)={0x0, 0xcf, 0x2, 0x1, 0xe2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[], 0xa0}}, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f000000000000000002000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmmsg(0xffffffffffffffff, &(0x7f0000000000), 0x4000000000001f2, 0x0) 2.033854068s ago: executing program 2 (id=11614): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, @ethernet={0x6, @local}, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x80}, 0x6, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)='veth0_to_bond\x00', 0x592, 0x6, 0xf}) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f00000002c0)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000200)='netfs_rreq\x00', r2, 0x0, 0xfffffffffffffffc}, 0x18) socket(0x2c, 0x9, 0x8) io_uring_enter(0xffffffffffffffff, 0x0, 0x0, 0xf, 0x0, 0x0) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) splice(r4, 0x0, r6, 0x0, 0x39000, 0x0) splice(r5, 0x0, r4, 0x0, 0x408cd, 0x0) write$binfmt_elf64(r6, 0x0, 0xfffffe3e) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r7 = socket$inet(0x2, 0x3, 0x33) getsockopt$inet_mreqsrc(r7, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x2c) r8 = socket(0x40000000015, 0x5, 0x0) bind$inet6(r8, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}, 0x1c) write$UHID_INPUT(r1, &(0x7f0000001980)={0x9, {"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", 0x1000}}, 0x1006) syz_mount_image$ext4(&(0x7f0000000180)='ext4\x00', &(0x7f00000001c0)='./file1\x00', 0x800000, &(0x7f0000000380)={[{@mb_optimize_scan={'mb_optimize_scan', 0x3d, 0x1}}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x7f}}, {@nolazytime}, {@noload}, {@nombcache}, {@debug}]}, 0x6, 0x56a, &(0x7f00000015c0)="$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") r9 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$GIO_SCRNMAP(r9, 0x4b40, &(0x7f0000000d80)=""/51) 1.420460336s ago: executing program 1 (id=11636): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x20}}, 0x0) r2 = socket(0x2a, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000700), 0x8}, 0x13b3, 0x0, 0xfffffffe, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) pwrite64(r4, &(0x7f0000000080)='3', 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=@delchain={0x9c, 0x65, 0x1, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x8, 0x1}, {0x1, 0x9}, {0x6, 0x2}}, [@filter_kind_options=@f_flower={{0xb}, {0x54, 0x2, [@TCA_FLOWER_KEY_TCP_FLAGS={0x6, 0x47, 0x82}, @TCA_FLOWER_KEY_ENC_UDP_SRC_PORT_MASK={0x6}, @TCA_FLOWER_KEY_MPLS_TTL={0x5, 0x43, 0x3}, @TCA_FLOWER_KEY_ARP_SHA_MASK={0xa}, @TCA_FLOWER_KEY_MPLS_TTL={0x5, 0x43, 0x39}, @TCA_FLOWER_KEY_ENC_KEY_ID={0x8, 0x1a, 0x1}, @TCA_FLOWER_KEY_ARP_TIP={0x8, 0x3b, @dev={0xac, 0x14, 0x14, 0xf}}, @TCA_FLOWER_KEY_ENC_IPV6_DST={0x14, 0x21, @mcast2}]}}, @TCA_RATE={0x6, 0x5, {0x5, 0x1}}, @TCA_CHAIN={0x8, 0xb, 0x3}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}]}, 0x9c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newtfilter={0x9a0, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x5, 0xffe0}}, [@filter_kind_options=@f_basic={{0xa}, {0x970, 0x2, [@TCA_BASIC_POLICE={0x80, 0x4, [@TCA_POLICE_TBF={0x3c, 0x1, {0x8, 0x3, 0x8, 0x7, 0x7, {0xf, 0x1, 0xda, 0x5, 0x2, 0x59a6}, {0x8, 0x0, 0x1, 0x0, 0x8, 0x40}, 0x7fff, 0x4, 0x4}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x3}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x413}, @TCA_POLICE_RESULT={0x8, 0x5, 0xffffffff}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x4}, @TCA_POLICE_RATE64={0xc}, @TCA_POLICE_RATE64={0xc, 0x8, 0x334}]}, @TCA_BASIC_EMATCHES={0xa0, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x94, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x9f, 0x3, 0x6}, {0x8, 0x9, 0x4fd7, 0x2}}}, @TCF_EM_CONTAINER={0x44, 0x3, 0x0, 0x0, {{0x1ff, 0x0, 0x1}, "d79c925568bd6db7870009362631c19dcf8bb25538fe05ad370eae7a28d29ea55aaedb07879ff49cbbb677c740e361aa57c2ec90464e1c45"}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x2, 0x1, 0xa118}, {0x549e, 0x28, 0x3, 0x0, 0xa, 0x2, 0x1}}}, @TCF_EM_NBYTE={0x18, 0x2, 0x0, 0x0, {{0x7, 0x2, 0xfffb}, {0x6, 0x5, 0x0, "cadb93bc6f"}}}]}]}, @TCA_BASIC_EMATCHES={0x5b4, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x1bc, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xa8, 0x1, 0x0, 0x0, {{0x9, 0x0, 0x1}, "45da7fa5ef25f96eb07ca5e155b66d625c74c2721421d4157881ce723da67e2592e3336bbd88fdf98f6e44f4afd8fe7de5b0427e8568bf982ed4a924ef6c723de6e804717b6ae4eb0d6be3f24cee68b9a1d81d8a7c206c845f29081940e7387bf8d14c4839286ec2eac18f7c39a656b6fd30bcfcf29f33117fd3b69b8f10160e9aa00fbdf60166511f50da12b7e8570734a00afe32d2a8778f2aaf40"}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x8001, 0x7, 0x7}, {{0x1, 0x1, 0x1, 0x1}, {0x4, 0x1, 0x1, 0x1}}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x11d6, 0x1, 0x7fff}, {0xa, 0xfffffe01, 0xfe00, 0x0, 0xf, 0xfecad5a1302fdb45, 0x1}}}, @TCF_EM_IPT={0x54, 0x2, 0x0, 0x0, {{0x8, 0x9, 0x1000}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x5}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x4}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x4}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x1}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x9}]}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x1, 0x7, 0xd}, {{0x2, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x1, 0x1}}}}, @TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0xfff7, 0x2, 0x9}, {0x8, 0x6, 0x2, "f7cb8a21993b"}}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x63, 0x3, 0x8af2}, {0x3, 0x6, 0x6, 0xa}}}, @TCF_EM_NBYTE={0x1c, 0x2, 0x0, 0x0, {{0x2, 0x2, 0x1}, {0xe, 0xa, 0x2, "3f8ffcd26c1f169f3926"}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x9, 0x1, 0x4aee}, {0x4, 0x1, 0xffff, 0x3, 0x6, 0x1, 0x1}}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x2, 0x7, 0x141e}, {{0x1, 0x0, 0x1}, {0x4, 0x1}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x4}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x5a9}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}, @TCA_EMATCH_TREE_LIST={0x48, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x5, 0x3, 0xbc}, {0xc, 0xeb0b, 0xfffff001, 0xffff96a9}}}, @TCF_EM_IPT={0x28, 0x1, 0x0, 0x0, {{0x3, 0x9, 0x70}, [@TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xd}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x2}]}}]}, @TCA_EMATCH_TREE_LIST={0x27c, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0x9, 0x2, 0x1}, {0x1, 0x8, 0x1, "858e7cfadbf9f73d"}}}, @TCF_EM_CONTAINER={0xf4, 0x1, 0x0, 0x0, {{0x1, 0x0, 0x2}, "d49369de1f79b9970f55f5a6894748d2d37d81c6f546276697fe7e48cd11ed9e37ac0ca2ae7e26cc978632898946c457f51c9716bd4d401bedd64332ce4334692ab38dc20e51abd87576f9c980f8cc5a9072de4ff442ddd2a60aae978c674266bab4ee6bbaddd5c8b57862da3ce223077c37fbd2f20f474611a2ed2906af3aa0c055935474882d666f663e06300e2e97ed653e8f959c97016d36cc065a361c0573ace37c1819a01068efa5ead3162f7346573779956d3f8d96b45fac4819ab180ab449be7f330b2d2702d2f3c434724787baabe1d14c5570e46acb9619d16aab046044aa31"}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x9}, {0x0, 0x2c0, 0x5, 0x3}}}, @TCF_EM_META={0x70, 0x2, 0x0, 0x0, {{0x0, 0x4, 0xed}, [@TCA_EM_META_RVALUE={0x1a, 0x3, [@TCF_META_TYPE_VAR="13a0711b0aa9c337", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_VAR="207a658f2ecd"]}, @TCA_EM_META_RVALUE={0x7, 0x3, [@TCF_META_TYPE_VAR, @TCF_META_TYPE_VAR="de", @TCF_META_TYPE_VAR="19f6"]}, @TCA_EM_META_RVALUE={0xf, 0x3, [@TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="4a74b6fe63ad04"]}, @TCA_EM_META_LVALUE={0x8, 0x2, [@TCF_META_TYPE_INT=0x8]}, @TCA_EM_META_RVALUE={0x9, 0x3, [@TCF_META_TYPE_VAR="91b600ec75"]}, @TCA_EM_META_LVALUE={0x1a, 0x2, [@TCF_META_TYPE_VAR="0a34aae9", @TCF_META_TYPE_VAR="d7a7d28c3914", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="13a4", @TCF_META_TYPE_VAR="dcb4"]}]}}, @TCF_EM_NBYTE={0x18, 0x1, 0x0, 0x0, {{0x2c7, 0x2, 0xffff}, {0x4, 0x7, 0x2, "b842236720793e"}}}, @TCF_EM_META={0x18, 0x2, 0x0, 0x0, {{0x0, 0x4, 0x6}, [@TCA_EM_META_HDR={0xc, 0x1, {{0xfff8, 0x40, 0x1}, {0x3800, 0x0, 0x1}}}]}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x1, 0x1, 0x78b}, {0x3, 0x81, 0xfffb, 0x3, 0x4, 0x0, 0x1}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x4, 0x7, 0x2}, {{0x2}, {0x0, 0x1, 0x1}}}}, @TCF_EM_META={0x84, 0x3, 0x0, 0x0, {{0x4db, 0x4, 0x1}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x4, 0x5}, {0x87a, 0x56, 0x2}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x7, 0x8, 0x1}, {0x6, 0x8, 0x1}}}, @TCA_EM_META_LVALUE={0x15, 0x2, [@TCF_META_TYPE_VAR="9c", @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_INT, @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x2]}, @TCA_EM_META_LVALUE={0x1f, 0x2, [@TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="a121c85edc1b", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="f2c24d3ea1"]}, @TCA_EM_META_LVALUE={0x16, 0x2, [@TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_VAR="989661740204b9", @TCF_META_TYPE_VAR="993106649e1589"]}, @TCA_EM_META_LVALUE={0xe, 0x2, [@TCF_META_TYPE_VAR="2d1de83142821176b58f"]}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xdd}}, @TCA_EMATCH_TREE_LIST={0x108, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x14, 0x3fff, 0x0, 0x0, {{0xf1c, 0x2, 0x3ff}, {0x401, 0x1, 0x2, "bf"}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x5, 0x1, 0x7fff}, {0xffffffd8, 0xffffffff, 0xec, 0x4, 0x9, 0x1, 0x1}}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x18be, 0x3, 0x4}, {0x7fffffff, 0x8, 0xfffffffe, 0x101}}}, @TCF_EM_META={0x7c, 0x2, 0x0, 0x0, {{0x10, 0x4, 0x6}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x5, 0x9, 0x2}, {0x81, 0x8, 0x2}}}, @TCA_EM_META_RVALUE={0x14, 0x3, [@TCF_META_TYPE_VAR="fcee", @TCF_META_TYPE_VAR="f06e03ad", @TCF_META_TYPE_VAR='\'', @TCF_META_TYPE_VAR="e273f326819b5004f4"]}, @TCA_EM_META_RVALUE={0x17, 0x3, [@TCF_META_TYPE_VAR, @TCF_META_TYPE_VAR="21c876091402abd91b", @TCF_META_TYPE_VAR="d906", @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x7]}, @TCA_EM_META_RVALUE={0x8, 0x3, [@TCF_META_TYPE_VAR, @TCF_META_TYPE_INT=0x8]}, @TCA_EM_META_HDR={0xc, 0x1, {{0xec0, 0x0, 0x3}, {0xaf5a, 0x4, 0x2}}}, @TCA_EM_META_RVALUE={0x9, 0x3, [@TCF_META_TYPE_VAR="540f857f9e"]}, @TCA_EM_META_RVALUE={0x16, 0x3, [@TCF_META_TYPE_VAR="3b08ca7cdaec", @TCF_META_TYPE_VAR="a8350f5fe8c127", @TCF_META_TYPE_VAR="f9ef0dacd2"]}]}}, @TCF_EM_NBYTE={0x1c, 0x1, 0x0, 0x0, {{0xf}, {0x7, 0x9, 0x0, "ffe3a75b6a0b63a279"}}}, @TCF_EM_IPT={0x14, 0x2, 0x0, 0x0, {{0xb, 0x9, 0xfffc}, [@TCA_EM_IPT_NFPROTO={0x5}]}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0xf, 0x8, 0x7}, {0xffffffffffffffff, 0x6, 0x2}}}]}]}, @TCA_BASIC_EMATCHES={0xe4, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0xe0, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0xe, 0x7, 0x7ff}, {{0x1, 0x0, 0x1}, {0x1}}}}, @TCF_EM_META={0xc8, 0x1, 0x0, 0x0, {{0x7, 0x4, 0x352}, [@TCA_EM_META_LVALUE={0x1a, 0x2, [@TCF_META_TYPE_VAR="8ba5d49c85", @TCF_META_TYPE_VAR="68fbb0b8", @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_VAR="339aef", @TCF_META_TYPE_VAR="130147a5ddae"]}, @TCA_EM_META_RVALUE={0x12, 0x3, [@TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="f92c5fa89918"]}, @TCA_EM_META_LVALUE={0xe, 0x2, [@TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_VAR="eb03ad40ed3c"]}, @TCA_EM_META_RVALUE={0x23, 0x3, [@TCF_META_TYPE_VAR="7043e1e70c0d9433f681", @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="bffac846d6082a26a3", @TCF_META_TYPE_VAR="ce237c410ba0d538"]}, @TCA_EM_META_LVALUE={0xe, 0x2, [@TCF_META_TYPE_VAR="82c7f28ade1ef2b4fc43"]}, @TCA_EM_META_RVALUE={0x20, 0x3, [@TCF_META_TYPE_VAR="732d4a6a1cd2", @TCF_META_TYPE_VAR="7896a47bf0109f1f35b8", @TCF_META_TYPE_INT=0x4, @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x6, 0x2}, {0x3, 0xd}}}, @TCA_EM_META_RVALUE={0x1c, 0x3, [@TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_INT, @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_INT=0x6]}]}}]}]}, @TCA_BASIC_EMATCHES={0x1ac, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x9}}, @TCA_EMATCH_TREE_LIST={0x1a0, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x80, 0x2, 0x6}, {0x2, 0x2, 0x1, "ab5e"}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x978, 0x1, 0x4}, {0x7c0ffedb, 0xffffffff, 0x8244, 0x2, 0x8, 0x2, 0x1}}}, @TCF_EM_IPT={0xe4, 0x1, 0x0, 0x0, {{0x2, 0x9, 0x8}, [@TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x1}, @TCA_EM_IPT_MATCH_DATA={0xa3, 0x5, "8f0f127c616d3a4a54eca330f6badcc70a150debcd1e35c4549f74a9be3455787231da7d54490bfad33a7b79faaae79cb3db44714b0daccbed5fe090fba8dc9b1d044b20bc8a4f39c57eb90d7ef12d087e12ad8e444c2d8b84c63321f1671e87ece8a37c01bbe8eb082c9e844bcd4fb9cdd155d17775ad6e1864b12810a07767d120d485104392f24352f3218db8512c7b2b8ba5169e7a37867477db07750b"}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_NAME={0xb}]}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x5ae5, 0x3, 0x2}, {0x3, 0xdc, 0x8e3, 0x8}}}, @TCF_EM_NBYTE={0x14, 0x2, 0x0, 0x0, {{0x7fff, 0x2, 0x6}, {0x7, 0x3, 0x2, "90f5e9"}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x3, 0x8, 0x8}, {0x1, 0x4, 0x7}}}, @TCF_EM_META={0x4c, 0x3, 0x0, 0x0, {{0xfffe, 0x4, 0x7}, [@TCA_EM_META_LVALUE={0x27, 0x2, [@TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_VAR="30dcc824ec0417dde549", @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="7566670b11"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x6, 0x0, 0xdf43bc03b64c4713}, {0x0, 0x4, 0x2}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x33ad, 0x6, 0x2}, {0x40, 0xc, 0x1}}}]}}]}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0x9, 0x3}}]}}]}, 0x9a0}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000500), r2) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r5, &(0x7f0000000640)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="20000600000001000000040000001400018001000000", @ANYRES32=r3, @ANYBLOB="08000300e00000021c0001800800030000000000060005004e240000060001000a000000050005000e000000"], 0x4c}, 0x1, 0x0, 0x0, 0x24008881}, 0x4010) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000001780)={0x3, {{0x2, 0x5, @multicast1}}, {{0x2, 0x100, @remote}}}, 0x108) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='kfree_skb\x00', r7}, 0x18) r8 = io_uring_setup(0x172e, &(0x7f0000000680)={0x0, 0xcf, 0x2, 0x1, 0xe2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[], 0xa0}}, 0x0) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f000000000000000002000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmmsg(r9, &(0x7f0000000000), 0x4000000000001f2, 0x0) socket$inet(0x2, 0x4000000000000001, 0x100) io_uring_register$IORING_REGISTER_BUFFERS(r8, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_mr_cache\x00') syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 1.374495065s ago: executing program 4 (id=11639): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f00000007c0)={0x0, 0x60, &(0x7f0000000780)={&(0x7f0000000e80)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0103000000000000000001"], 0x30}}, 0x0) 1.329901345s ago: executing program 4 (id=11642): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000b00)=ANY=[], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x0, 0xc, &(0x7f0000000840)=ANY=[@ANYRES64, @ANYRES64=r0, @ANYRES8=r0], 0x0, 0x0, 0x62, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x5, &(0x7f0000000000)=ANY=[@ANYBLOB="18000000006900000000000001000000940000000fad413e850000000700000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x80) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='sched_switch\x00', r1}, 0x10) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) r2 = openat$sndtimer(0xffffffffffffff9c, &(0x7f00000002c0), 0x129000) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) ioctl$SNDRV_TIMER_IOCTL_INFO(r2, 0x80e85411, &(0x7f0000000300)=""/69) r3 = socket(0xa, 0x40000000002, 0x0) setsockopt$EBT_SO_SET_ENTRIES(r3, 0x0, 0x80, &(0x7f0000000280)=@nat={'nat\x00', 0x19, 0x2, 0x208, [0x20000600, 0x0, 0x0, 0x20000630, 0x20000660], 0x0, 0x0, &(0x7f0000000600)=ANY=[]}, 0x78) 1.270128105s ago: executing program 1 (id=11643): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r1, &(0x7f0000000600)={&(0x7f0000000280)={0x2, 0xffff, @remote}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f00000005c0)="72addd", 0x3}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) 1.237991675s ago: executing program 0 (id=11644): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000840)=@base={0xb, 0x5, 0x2, 0x2, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000fcffffff7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000012c0)='scsi_dispatch_cmd_start\x00', r1}, 0x10) madvise(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x15) 1.214025925s ago: executing program 1 (id=11645): bpf$PROG_LOAD(0x5, 0x0, 0x0) write$cgroup_subtree(0xffffffffffffffff, 0x0, 0xfdef) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) r1 = syz_io_uring_setup(0x5579, &(0x7f0000000300)={0x0, 0xfe40, 0x1}, &(0x7f0000000000)=0x0, &(0x7f0000000200)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000380)=@IORING_OP_POLL_ADD={0x6, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, {0x244}}) io_uring_enter(r1, 0x2def, 0x0, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) r4 = getpid() sched_setaffinity(0x0, 0x0, 0x0) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000040)='cgroup2\x00', 0x200000, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r5, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x5f, 0xffffffffffffffff, {0x29}}, './file0\x00'}) sched_setscheduler(r4, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r6, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r7, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r6, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=@base={0x17, 0x0, 0x3, 0xff, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000006c0)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r8, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000500)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000040)='sched_switch\x00', r9}, 0x10) mremap(&(0x7f0000000000/0x9000)=nil, 0x600002, 0x600002, 0x7, &(0x7f0000a00000/0x600000)=nil) unshare(0x64000600) write$binfmt_script(r0, &(0x7f0000000780)={'#! ', './file0', [{0x20, 'context'}, {0x20, ')@+#'}, {0x20, '['}, {0x20, ')*)+'}, {0x20, 'context'}], 0xa, "6daf6fa154740ab02d987933a0a9672e65bbdf7eb24104fed6ef5cf4e433c002f725fd98ab82f58c8ec8e8b997012f23285b5dbd5ea3cb4c42ed07f5af6f68353a248de256d670"}, 0x6e) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f00000000c0)='kmem_cache_free\x00', 0xffffffffffffffff, 0x0, 0x1}, 0x18) 1.185452915s ago: executing program 0 (id=11646): socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=@base={0xf, 0x4, 0x4, 0x12, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000340)={0xe, 0x4, &(0x7f0000000400)=ANY=[@ANYBLOB="18020000801000000000000004000000850000002f00000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_PROG_DETACH(0x8, &(0x7f0000000080)={@map=r1, r2, 0x5, 0x0, 0x0, @void, @value}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) sendmsg$inet(r0, &(0x7f0000000980)={0x0, 0x6000, &(0x7f0000000900)=[{&(0x7f0000000640)='U', 0xa00120}], 0x1}, 0x3) 1.173344945s ago: executing program 2 (id=11647): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x11, 0x4, &(0x7f00000002c0)=ANY=[@ANYBLOB="180100001c0000000000000000000000850000"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000140)='kmem_cache_free\x00', r0}, 0x18) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000640)={&(0x7f00000001c0)='signal_generate\x00', r0}, 0x10) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000280)=[{0x200000000006, 0x0, 0xfd, 0x7ffc0002}]}) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) 1.089367184s ago: executing program 2 (id=11648): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1801000021000000000000003b810000850000006d0000000700000000"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=ANY=[@ANYBLOB="18000000ed7f0000000000000000000018010000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_SURVEY(r2, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000100)=ANY=[@ANYBLOB="1c000000", @ANYBLOB="a903000000003349000032"], 0x1c}, 0x1, 0x0, 0x0, 0x804}, 0x0) r3 = socket(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r3, 0x10e, 0xc, &(0x7f0000000040)={0x5}, 0x10) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x13, &(0x7f0000000280)=ANY=[@ANYBLOB="180200000000000000000000000000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb704000008000000b703000000000000850000002d0000001801000020756c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f00000005c0)='kfree\x00', r4}, 0x18) r5 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r5, 0x6, 0x13, &(0x7f0000000000)=0x1, 0xfef2) connect$inet(r5, &(0x7f00000000c0)={0x2, 0x4e27, @dev={0xac, 0x14, 0x14, 0x13}}, 0x10) sendmsg$nl_route(r3, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=ANY=[@ANYBLOB="2c0000001a000100000000000000000002000000000000000000000008"], 0x2c}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000880)={&(0x7f0000000a80)='kfree\x00', r0}, 0x10) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b00000000000000000000000000040000000000", @ANYRES32=0x0, @ANYBLOB="0200000000000019000400"/20, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00'/28], 0x50) r6 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0xed, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, r6, 0x0) r7 = perf_event_open(&(0x7f0000000200)={0x1, 0x80, 0x8c, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0x6}, 0x44, 0x9}, 0x0, 0xffffffffffffffff, r6, 0x8) close(r7) socket$kcm(0x2, 0x1000000000000002, 0x0) socket$tipc(0x1e, 0x2, 0x0) r8 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r8, 0x10f, 0x87, &(0x7f0000000100)={0x43, 0x0, 0x3, 0x3}, 0x10) r9 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f0000000280)=[{0x6, 0x98, 0x0, 0x7fff000a}]}) close_range(r9, 0xffffffffffffffff, 0x0) 812.502463ms ago: executing program 6 (id=11649): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000680), r0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000180)={'wpan1\x00', 0x0}) r3 = getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r1, @ANYBLOB="010000000000000000001400000008000300", @ANYRES32=r2, @ANYBLOB="08001c00", @ANYRES32=r3], 0x24}}, 0x0) 763.164873ms ago: executing program 4 (id=11650): r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f00000004c0)={0x0, @ax25={0x3, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x6}, @ethernet={0x6, @local}, @rc={0x1f, @fixed={'\xaa\xaa\xaa\xaa\xaa', 0x11}, 0x80}, 0x6, 0x0, 0x0, 0x0, 0x3, &(0x7f0000000280)='veth0_to_bond\x00', 0x592, 0x6, 0xf}) socket$inet_tcp(0x2, 0x1, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="16000000000000000400", @ANYRES32=0x1, @ANYRES32=0x0, @ANYRES32, @ANYBLOB], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) ioctl$TIOCGWINSZ(r1, 0x5413, &(0x7f00000002c0)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)) r2 = socket$inet(0x2, 0x3, 0x33) getsockopt$inet_mreqsrc(r2, 0x0, 0x53, &(0x7f0000000000)={@dev, @local, @broadcast}, &(0x7f0000000040)=0x2c) 741.214423ms ago: executing program 2 (id=11651): r0 = socket$kcm(0x10, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xb, 0x7, 0x8, 0x8, 0x5, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000280)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r1}, {0x7, 0x0, 0xb, 0x8, 0x0, 0x0, 0x9}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000240)={&(0x7f00000003c0)='kfree\x00', r2}, 0x10) sendmsg$kcm(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000009c0)=[{&(0x7f0000000140)="d800000018007b29e00212ba0d8105040a601800fe0f040b067c55a1bc000900b80006990600000015000500fe800000000000000300014002000c0901ac04000bd67f6f94007100a007a290457f0189b316277ce06bbace8017cbec4c2ee5a7cef4090000001fb791643a5e", 0x6c}], 0x1, 0x0, 0x0, 0x2663}, 0x0) 560.690802ms ago: executing program 6 (id=11652): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="02000000040000"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000005000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r2}, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), r0) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f00000007c0)={0x0, 0x60, &(0x7f0000000780)={&(0x7f0000000e80)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="0103000000000000000001"], 0x30}}, 0x0) 534.534022ms ago: executing program 2 (id=11653): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x82, 0x2}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff, 0x0, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r2 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r2, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=ANY=[@ANYBLOB="0207a20802"], 0x10}}, 0x0) syz_open_dev$usbmon(&(0x7f0000000180), 0x800000000000000, 0x0) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f00000006c0)=ANY=[@ANYBLOB="18000000000000000000000095980000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f0ffffffb702000005000000b703000000000000850000007300000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x27, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000000)='kfree\x00', r3}, 0x10) openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/attr/current\x00', 0x2, 0x0) mmap(&(0x7f0000000000/0xc00000)=nil, 0xc00000, 0x1000002, 0x12, r1, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x3, 0x200000005c832, 0xffffffffffffffff, 0x0) bind$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @local}, 0x10) connect$inet(r0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000001680)={0x1, 0xe, &(0x7f0000000740)=ANY=[@ANYBLOB="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"], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000200), 0x8, 0x10, &(0x7f0000000000)={0x2, 0x40000, 0x1, 0xe}, 0xffffffffffffff7d, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x2, @void, @value}, 0x15) setsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000080)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xee00}, {0x0, 0x9}, {}, 0x0, 0x0, 0x1}, {{@in=@loopback, 0x4d5, 0x32}, 0x0, @in6=@mcast1, 0x0, 0x0, 0x0, 0xb7}}, 0xe8) sendmmsg(r0, &(0x7f0000000180), 0x400000000000077, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00'}, 0x10) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x21081e, &(0x7f0000000780)={[{@grpquota}, {@nombcache}, {@minixdf}]}, 0x1, 0x502, &(0x7f0000000fc0)="$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") openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) 501.146192ms ago: executing program 4 (id=11654): r0 = socket(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000240)={0xffffffffffffffff}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x161281, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r1, 0x8933, &(0x7f0000000140)={'vxcan1\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000380)=@newqdisc={0x110, 0x24, 0xd0f, 0x470bd2d, 0xfffffffd, {0x60, 0x0, 0x0, r2, {0x0, 0xfff2}, {0xfff1, 0xffff}, {0x0, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}, @TCA_STAB={0xd8, 0x8, 0x0, 0x1, [{{0x1c, 0x1, {0x5, 0x18, 0x5, 0x9, 0x1, 0x6, 0x7, 0x4}}, {0xc, 0x2, [0x4000, 0x9, 0xfa1, 0x0]}}, {{0x1c, 0x1, {0x1, 0x8, 0xc94, 0x8, 0x2, 0x0, 0x1, 0x8}}, {0x14, 0x2, [0x888f, 0x9, 0x0, 0x1, 0x6, 0xecd2, 0x3, 0x5]}}, {{0x1c, 0x1, {0x5, 0x9, 0x3, 0x9, 0x1, 0x800, 0x5}}, {0x4}}, {{0x1c, 0x1, {0x6, 0x6, 0x6, 0x7, 0x2, 0x7, 0x3, 0x7}}, {0x12, 0x2, [0x70c4, 0x101, 0x5, 0x6, 0x8, 0x0, 0x4]}}, {{0x1c, 0x1, {0xd, 0x0, 0x9, 0x24, 0x1, 0xd6, 0x0, 0x6}}, {0x10, 0x2, [0x5, 0x8000, 0x0, 0xff, 0x80, 0x60a]}}]}, @TCA_EGRESS_BLOCK={0x8, 0xe, 0xf}]}, 0x110}}, 0x44080) 457.508192ms ago: executing program 6 (id=11655): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='memory.events\x00', 0x275a, 0x0) mmap(&(0x7f00001d8000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000100)='memory.events\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000540), 0x84) perf_event_open(&(0x7f0000000140)={0x8, 0x80, 0x0, 0x0, 0x0, 0x3, 0x82, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xf}, 0x8080, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) 431.928752ms ago: executing program 4 (id=11656): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000002c0)={0x1b, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x40, '\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value, @void, @value}, 0x50) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f00000009c0)=ANY=[@ANYBLOB="620af8ffa1dc0021bfa100000000000007010000f8ffffffb702000007000000bd120000000000008500000010000000b70000000000000095000000000000003faf4f2aa3d9b18ed812a2e2c49e8020a6f4e0e4a9446c7670568982b4e020f698393aa0f3881f9c24561f1b2607995daa56f151905ea23c22624c9f87f9793f3bbb546040677b0c5077da80fb982c1e9400e693146cea484a415b76966118b64b751a0f241b072e90080008002d75593a286cecc93e64c227c95aa0b784625704f07372c29184ff7f4a7c0000070000006056feb4cc664c0af9360a1f7a5e6b607130c89f18c0c1089d8b8588d72ec29c48b45e0000000000000401d01aa27ae8b09e00e79ab20b0b8ed8fb7a68000000000000000000006fa03c6468978089b302d7ff6023cdcedb5e0125ebbcebdde510cb2364149215108337719acd97cfa107d40224edc5465a932b77a74e802a0dc6bf25d8a242bc6099ad2300000480006ef6c1ff0900ff0000000010c63a949e8b7955394ffaff03000000000000ab87b1bfeda7be586602d985430cea080000000000000026abfb0767192361448279b05d96a703a660581eecdbf5bcd3de227a167ca17a0faf60fd6ad9b97aa5fa68480366c9c6fd6fa5043aa3926b81e3b59c9b081d6a08000000ea2b1a52496dfcaf99431412fd134a996382a1a04d5bb924cfe5f3185418d605ffff9c4d2ec7c32f2095e63c80af740b5b7632d5933a1c1fa5605bd7603f2ba2a790d62d6faec2fed44da4928b30142ba1fde5c5d50b83bae616b5054d1e7c13b1355d6f4a8245ffa4997da9c77af4c0cb97fca585ec6bf58351d578be00d952aab9c71764b0a8a7583c90b3433b809bdb9fbd48bc877505ebf6c9d13330ca006bce1a84521f14518c9b476fccbd6c712016219848624b87cec2dbe98223d8d9e86c5ea06d108d8f80a0eb4fa39f6b5c02e6d6d90756ff578f57000000009700cf0b4b8bc229413300000000000000000003000000000000000000000000001000000000559711e6e8fcffffffffffffffb2d02edc3e01dd271c896249ed85b980680b09000000000f0000169cdcacc413b48dafb7a2c8cb482bac0ac502d9ba96ffffffd897ef3b7cda42f93d53046da21b40216e14ba2d6af8656b01e17addaedab25b30002abbba7fa725f38400be7c1f001b2cd3170400000085be9e48dccf1f9f3282830689da6b53b263339863297771d74732d400003341bf4a00fc9fec2271ff01589646efd1cf870cd7bb2366fde4a594290c405ff870ce5dfd3467decb05cfd9fcb32c8ed1dbd9d30a64c108285e71b5565b1768ee58969c41595229df17bcad70fb4021428ce970275d13b78249788f11f761038b75d4fe32b561d46ea3abe0fa4d30dc94ef241875f3b4b6ab7929a57affe760e717a04becff0f719197724f4fce1093b62d7e8c7123d890cec55bf404e4e1f74b7eed82571be54c72d978cf906df08f11f1c4042e36acd37d7f9e109f2c06f815312e0cfe222a06f56dd022c074eb8a322fb0bf47c0a8d154b405c37feaf3dd95f6ef2acd1fe582786105c70600000000000000b7561301bb997316dbf17866fb84d4173731efe895ff2e1c5560926e90109b598502d3e959efc71f665c542c9062ece84c99a061887a20639b41c8c12ee86c50804042b3eac1f871b136345cf67ca3fb5aac518a75f9e7d7101da841735e186c489b3a06fb99e0347f23a054de2f4d92d6bd72ee2c9f0390a6f01e3e483b4ad05573af403269b4a39ce40293947d9a631bcbf3583784acbda216550d7aec6b79e30cbd128f91e358c3b377327ac9ecc34f24c9ae153ec60ac0694da85bff9f5f4df90400000000000000d6b2c5eaff07000000000000b99c9cc0ad1857216f000000009191ae954febb3df464bfe0f7f3ee9afe7befb89d2777399f5874c553aeb3729cffe86e669261192899d4562db0e22d564ae09bb6d163118e401e024fd452277c3887d6116c6cc9d8046c216c1f895778cb26e22a2a798de44aeadea2a40da8daccf080842a486721737390cbf3a74cb2003016f1514216bdf57d2a40d40b51ab63e96ec8485b3b8a8c9ae3d14f93100c2e0893862eef552fcde2981f48c482bde8a168c3f5db2fea6f26e4a4304e50c349f4f9ecee27defc93871c5f99a3594191e104d417e60fc3541a2c905a1a95e9571bf38ae1981c4238ecaee6f75cd0a6881bd1517a8250df98674152f94e32409e2a3bce109b6000000000000a1fec9000000d694210d7560eb92d6a97a27602b81f76386f1535bef1497f92186086e29c6bc5a1fad6ec9a31137ab79a404abde7750898b59270b939b81367ac91bd627e87306703be8672d70d1ab57075228a9f46ed9bd1f00fb8191bbab2dc591dda61f0868afc4294859323e7a45319f18101288a0268893373750d1a8fe64680b0a3fc22dd704e4214de5946912d6c98cd1a9fbe1e7d58c08acaf30065b928a31d2eca55f74a23641f61f2d5b308cf01cfaed9ef0ce21d69993e9960ff5f76015e6009756237badf4e7965bbe2777e808fcba821a00e8c5c39609ff854356cb490000000000c1fee30a3f7a85d1b29e58c77685efc0ceb1c8e5729c66018d169fc03aa188546bb2e51935ab9067ec3ad2a182068e1e3a0e2505bc7f41019645466ac96e0d0b3bc19faa5449209b085f3c334b47f067bbab40743b2a428f1da1f626602111b40e761fd21081920382f14d12ca3c471c7868e7da7eaa69eb7f7f80572fdd11bb1d070080fbc22bf73468788df51710eb0b428ee751c47d8e894f745a868404a0bf35f0121008b722b1eaa6aedfa1bf2e7ccb2d61d5d76331ff5e20fa26b8471d9e1cc9eb3d541e407cc2dae5e690cd628ab84875f2c50ba830d3f474b079b407000000deff000040430a537a395dc73bda367bf12cb7d81691a5fe8c47be395656a297e9df902aeec50e71b967ce7daac4be290159f6bcd75f0dda9de5532e66ae9e48b0ed1254a81faae79b6af6fbb869604d51de44c4e0973171ad47d6c00ebc7603093f000000fdec743af930cd6db49a47613808bad959719c0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f15d6533f78a1f4e2df4ca23d867693fd42de9b49a1b36d48a44ba6a4530e59bec53e876dc660dd6d89f80a4377b1b1292a893a516dab183ee65744fb8fc4f9ce2242e0f000000000100000000d77480e0345effff6413258d1f6eb190aa28cbb4bafe3436b176c7ed4b132fb805d5edd9d188daf28d89c014c3ecca10ae55704544673e1fb03b84f63e022fe755f4007a4a899eaf52c4f491f1e97c862e29e4570600000091c691faee1e0c8fe056a07474e6e5490a7d3c3402000000b60600d837c6befc63ddf2f594ad7cbc56a1e44d218c956a5392a995f1fae8e9f206efbb33854dc70104d74dc07748f9745cb796da2dfb714a0500000000000000faed94fc39acfb3fd25dfa8116a154cd1226e1bb72b59fed817072a0da60160761fd3dffda0f7c592eabd8ab68334d2a1693cb187539049e331272bf5135044df8161400211b8012b6eb1ed5656e83f65509bb4b323c5bd61bff949d3bade2f6ffda1360c2786e16937ab61d6dcafed319c7167d0885f9c6d1f442954c167dd9b4acd9468ce3674c82bbb2e31389179b025dbe063b7f906217b2cf8410c7023aa3e5cc3ba1000000000000000000000000000000006ae6301a2da44394275c582a6516bb92ea1980a0a659f2f1811c8b281c209647c4241f292b20508b215dde27bb2487a6e2b5e4a8ccfab90c23827ef06cbe364073005f8a6d1456aaeb85ffb7858f24eced67a67ab825e863928ed64c83f62ffdaa997657335b63c6b4163aff094059e626766845fd779c9e6cdbbd64c2499ce3ffe2fef03f7cdd0d90f3a7579579a142c0f7b318264d5c13c31cf475829528267ead38523cab7e1664e8426cfce471fef821c8a02a7e7d954d05b68a9c28f79429b09e2bb3681ae2b831e27c735123361c193d66ed4d71f19b199d371ec6bfada7cd370e3fdd3cd980fa1e145fd3f3e96b1feb53c865e1ada08f5d16ed652ee0c7f45352222692fbd679212c225d097aa90f7e1fb1f983415f43e75a19ecf7fd21bfa150ef563aa72ba3c43c5f3d9be128ec26b691f31f9cab931631606a81622f120675c962be2d3b5e95f74f0b209e42e6bdd76e6e725295b1d78d928f6f63e4581d5cc41cbde2ba66adc1168070c8c6e18a6a234f5f9311ef0f78924b68dbb4712efdb6974667bdb54f16fd2061b9ba93638dd177227e94e4ebd0ec1d437db948062bf41742000000000000000000305f70dd02fa0c61d5fe6d8ff35389246037e18d34c1375ae04f44f0c2543c772c5ccb137be7dc1874c514b37c668554d77d4ea5ed144a648257f4a0301067bbcd9b91072659d872f26b796e2b81025edb5f45f785e2c2602b248ecdd80f019ca659be7e8ae953325a27564f33c9d458a60be3dab38baab7eb1a66ab1ffd6308f7fd51beb356fe75eb985b7581bb5584c53984ba9c3340f97e8d3825681c53de5f554e595b00000000000000006a8fa9f05d64c4be42f981f00051a39938613067dbd1427e01bfec016e51844cefa8a855bf23ac887b4a88eed6d9443857242f28e31a41d20105fbf3394ff910e734b4d9101265ff729c426e01c1ab13dda8c388b909006f19eecb87e39175e85e17000000000000000000009431807e43886903526074e6b40244c938a4c68a38c25ddd7c143b3f1400010000ec66815cf8d1f56aa1424bc9b5d58790298e5b310969e50c222563b54e60854e1b0100448aca8c5ccbf5546ce4c3cd5a733fec25fb94e1e0f966bcbd28a4d8fe4f556eaa1104a793006619700798354c6ae05025040965e3083562bfa20968c04007d21dc02c9fd1f75e1ff40f439bdde4e784012e52049b483d02f81b88f5f57816b3fecec79cfca8d37203e769759d6b6a56b7605ced8ee18475a77ff0963a565fb6021d216c01b1098e40550a1cfd80e918d685a7b099a4f8ed654cd76ca61fe5ad8a31ec558fdbfa706d5e738bceae81fe777c307d5bc72183a4c2d35732ab916a781b9912160a3fd2a2e74dd690c57bdfdc1f069f949170ef8cb9c13c12138116bca7a8c59363799be7005c51bc25a8bbe2cf5ddf6aa161693782b0e7feb8a768f391b49d4c978c96dbb52f21c122eba9f17c8bed10591958cf06321a248b5f76ceedfe0d080d6aeadc11b237b3326dd04b86ac37c0d131544888db9e128d059761ad9a393e96c3b41c13c5a381bff187a75de560ba6eb3faa5ff8d2bb3c88f8de5efc2fb2200cfda6d07ceae22577064334fbf76a23e62e6059211d995b879f6b7d3f7fcf03652b81e6b7cdeff947ad185d3c6269ca247b429c3b872a8f1ef60407d29a874f4ec31c9effed55543a65a6b4d778cebcd43b7905f3960140bd783540a7353014bda8e9c7a34a5f428fd1f8eb11e837dd9d586487fdebcb1ecd3a003ff0fda4be617fecf1ff0ef2c74664d60a4b9423f3297bc8eb91b4ee1d73272abbef3e7a828a7d7ab055a8eb58fe379de85338304e26e3620941b463e9049fd105c74c91cc4d71b0f76e2c2e4825106aa7ce2a3adbbc7a0443ece58e752b47e6f677eff7c5c568a89d6e36b165c39132a0f27080ece2a94c320b002c77f82662675a7713c7067081cac15994698c41ff4754268ae1676384ff799783f55d7e5a1a0920300000000000000d98440c355927629f2bcf9dc405a18ca0264400abf38e90000000000000000008faf2cddffbfa69bf32eb718e88ec75603ed7c7a8825ce0f27a114bd7a4ab74d0c7b8d90ccc1c3ca6620def782e24d75aed70eb676437f62677a69e0994cd82d72e95493c830fe9515329f40b7025326dec33a527c5d999298eaa3690fd0d38a02fc6e0bc16dbe19f353027edc014411e1138087221492f5d5e5cc9d0a1acd3f581eda9a807aa0e609f935f626d96351e0ff116686cbeb8939feecd5dac8cf45101942cc7cec21b7f337df5431bcf7e504b7c427f70a10e1cb8993a661306a0576b638a0171e6800b5b35589d676eb30ed1a72e8f7b057eb281c4504195635b6b285ebaba019913a2520e43ed790231f047f7d3789c10ae7d724929f77aec1d33d9587580268ee14396f71e7ef588cb2560d6bd0795a9b97281229eb16de086553469fad7214ffc3e416f8b8e442dce1d37f9b1c88a5d8a8d9f2fe45bd8df213ecb4194c8554aea13cadcd502e51f6fec80418e772b5bd8d0228949058038b185909ee542848680f9ad43f4057d676d5e21ae3d7e0e4a28c04f112a94707f032b35915e42993ff148291b8babe026646ee41905992db217561b90811c4702a14f312fe5d2ae7257db6be1034cc1c346b76a853ce274bf0435e18f7e86c660c18c80f30505dd4cf2ae2a1893b83c62d61bfeadc1f913e4cab2b897e096dd3fe3525090410cb23bab36cdf200a36014032cf6e5121803c5a0c4a273a19f340163fc6265425d513a1294b8439276394945d94a589708e32a1cb30f1fa4b2f08e01dc5e8c6732e6dc59b5c8cb400000000000000592c9b68f09c8f5ddb20b4ae08b4d9df548e5ed6cd47b91a4bea8b6aa52edf64576aef1e43f2958437fdc20fbbd0d4e13d8cce1193b2f9b4f107e25af178d056e1b1e40bd75b013f7484fae0bc447b1ffaf34819fe3ad1a634c94345e26e1e68dec08723a37b05d1594a66a4718a51d4d67fc880c9d640f4eacc509873f1a103c87f69"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x41) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r2}, 0x10) prctl$PR_SET_NAME(0xf, &(0x7f0000000140)='+}[@\x00') bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x11, 0xf, &(0x7f0000000340)=@ringbuf={{}, {{0x18, 0x1, 0x1, 0x0, r1}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x85}}}, &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="170000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000005900000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x25, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x90) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000100)='kmem_cache_free\x00', r4}, 0x10) socket$igmp6(0xa, 0x3, 0x2) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000001c0)={0xd, 0x4, &(0x7f0000001300)=@framed={{}, [@ldst={0x1, 0x2, 0x3, 0x0, 0x1, 0xad}]}, &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) r5 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000400), 0xffffffffffffffff) sendmsg$TIPC_NL_KEY_SET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000840)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="0100000000000000000003000000400001802c0004001400010002000000ac1414aa000000000000000014000200020000006401010100000000000000000d0001007564703a73"], 0x54}}, 0x0) 379.194672ms ago: executing program 6 (id=11657): r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x11, 0x8, &(0x7f0000000480)=ANY=[@ANYBLOB="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"], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000040)='kmem_cache_free\x00', r0}, 0x10) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='cpuacct.usage_all\x00', 0x275a, 0x0) fcntl$lock(r1, 0x24, &(0x7f0000000000)={0x0, 0x1, 0x7fffffffffffffff, 0x80000000}) 364.515102ms ago: executing program 4 (id=11658): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r0, @ANYBLOB], 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000880)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x28, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r2) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00'}, 0x10) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000380)={&(0x7f0000000340)='io_uring_register\x00', r1}, 0x18) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2000000, 0x0) r3 = io_uring_setup(0x1de0, &(0x7f0000000000)={0x0, 0x0, 0x40, 0x1000}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r3, 0xb, &(0x7f0000000080), 0x0) 304.413211ms ago: executing program 1 (id=11659): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x20}}, 0x0) r2 = socket(0x2a, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000700), 0x8}, 0x13b3, 0x0, 0xfffffffe, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) pwrite64(r4, &(0x7f0000000080)='3', 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=@delchain={0x9c, 0x65, 0x1, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x8, 0x1}, {0x1, 0x9}, {0x6, 0x2}}, [@filter_kind_options=@f_flower={{0xb}, {0x54, 0x2, [@TCA_FLOWER_KEY_TCP_FLAGS={0x6, 0x47, 0x82}, @TCA_FLOWER_KEY_ENC_UDP_SRC_PORT_MASK={0x6}, @TCA_FLOWER_KEY_MPLS_TTL={0x5, 0x43, 0x3}, @TCA_FLOWER_KEY_ARP_SHA_MASK={0xa}, @TCA_FLOWER_KEY_MPLS_TTL={0x5, 0x43, 0x39}, @TCA_FLOWER_KEY_ENC_KEY_ID={0x8, 0x1a, 0x1}, @TCA_FLOWER_KEY_ARP_TIP={0x8, 0x3b, @dev={0xac, 0x14, 0x14, 0xf}}, @TCA_FLOWER_KEY_ENC_IPV6_DST={0x14, 0x21, @mcast2}]}}, @TCA_RATE={0x6, 0x5, {0x5, 0x1}}, @TCA_CHAIN={0x8, 0xb, 0x3}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}]}, 0x9c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newtfilter={0x9a0, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x5, 0xffe0}}, [@filter_kind_options=@f_basic={{0xa}, {0x970, 0x2, [@TCA_BASIC_POLICE={0x80, 0x4, [@TCA_POLICE_TBF={0x3c, 0x1, {0x8, 0x3, 0x8, 0x7, 0x7, {0xf, 0x1, 0xda, 0x5, 0x2, 0x59a6}, {0x8, 0x0, 0x1, 0x0, 0x8, 0x40}, 0x7fff, 0x4, 0x4}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x3}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x413}, @TCA_POLICE_RESULT={0x8, 0x5, 0xffffffff}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x4}, @TCA_POLICE_RATE64={0xc}, @TCA_POLICE_RATE64={0xc, 0x8, 0x334}]}, @TCA_BASIC_EMATCHES={0xa0, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x94, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x9f, 0x3, 0x6}, {0x8, 0x9, 0x4fd7, 0x2}}}, @TCF_EM_CONTAINER={0x44, 0x3, 0x0, 0x0, {{0x1ff, 0x0, 0x1}, "d79c925568bd6db7870009362631c19dcf8bb25538fe05ad370eae7a28d29ea55aaedb07879ff49cbbb677c740e361aa57c2ec90464e1c45"}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x2, 0x1, 0xa118}, {0x549e, 0x28, 0x3, 0x0, 0xa, 0x2, 0x1}}}, @TCF_EM_NBYTE={0x18, 0x2, 0x0, 0x0, {{0x7, 0x2, 0xfffb}, {0x6, 0x5, 0x0, "cadb93bc6f"}}}]}]}, @TCA_BASIC_EMATCHES={0x5b4, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x1bc, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xa8, 0x1, 0x0, 0x0, {{0x9, 0x0, 0x1}, "45da7fa5ef25f96eb07ca5e155b66d625c74c2721421d4157881ce723da67e2592e3336bbd88fdf98f6e44f4afd8fe7de5b0427e8568bf982ed4a924ef6c723de6e804717b6ae4eb0d6be3f24cee68b9a1d81d8a7c206c845f29081940e7387bf8d14c4839286ec2eac18f7c39a656b6fd30bcfcf29f33117fd3b69b8f10160e9aa00fbdf60166511f50da12b7e8570734a00afe32d2a8778f2aaf40"}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x8001, 0x7, 0x7}, {{0x1, 0x1, 0x1, 0x1}, {0x4, 0x1, 0x1, 0x1}}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x11d6, 0x1, 0x7fff}, {0xa, 0xfffffe01, 0xfe00, 0x0, 0xf, 0xfecad5a1302fdb45, 0x1}}}, @TCF_EM_IPT={0x54, 0x2, 0x0, 0x0, {{0x8, 0x9, 0x1000}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x5}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x4}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x4}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x1}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x9}]}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x1, 0x7, 0xd}, {{0x2, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x1, 0x1}}}}, @TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0xfff7, 0x2, 0x9}, {0x8, 0x6, 0x2, "f7cb8a21993b"}}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x63, 0x3, 0x8af2}, {0x3, 0x6, 0x6, 0xa}}}, @TCF_EM_NBYTE={0x1c, 0x2, 0x0, 0x0, {{0x2, 0x2, 0x1}, {0xe, 0xa, 0x2, "3f8ffcd26c1f169f3926"}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x9, 0x1, 0x4aee}, {0x4, 0x1, 0xffff, 0x3, 0x6, 0x1, 0x1}}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x2, 0x7, 0x141e}, {{0x1, 0x0, 0x1}, {0x4, 0x1}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x4}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x5a9}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}, @TCA_EMATCH_TREE_LIST={0x48, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x5, 0x3, 0xbc}, {0xc, 0xeb0b, 0xfffff001, 0xffff96a9}}}, @TCF_EM_IPT={0x28, 0x1, 0x0, 0x0, {{0x3, 0x9, 0x70}, [@TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xd}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x2}]}}]}, @TCA_EMATCH_TREE_LIST={0x27c, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0x9, 0x2, 0x1}, {0x1, 0x8, 0x1, "858e7cfadbf9f73d"}}}, @TCF_EM_CONTAINER={0xf4, 0x1, 0x0, 0x0, {{0x1, 0x0, 0x2}, "d49369de1f79b9970f55f5a6894748d2d37d81c6f546276697fe7e48cd11ed9e37ac0ca2ae7e26cc978632898946c457f51c9716bd4d401bedd64332ce4334692ab38dc20e51abd87576f9c980f8cc5a9072de4ff442ddd2a60aae978c674266bab4ee6bbaddd5c8b57862da3ce223077c37fbd2f20f474611a2ed2906af3aa0c055935474882d666f663e06300e2e97ed653e8f959c97016d36cc065a361c0573ace37c1819a01068efa5ead3162f7346573779956d3f8d96b45fac4819ab180ab449be7f330b2d2702d2f3c434724787baabe1d14c5570e46acb9619d16aab046044aa31"}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x9}, {0x0, 0x2c0, 0x5, 0x3}}}, @TCF_EM_META={0x70, 0x2, 0x0, 0x0, {{0x0, 0x4, 0xed}, [@TCA_EM_META_RVALUE={0x1a, 0x3, [@TCF_META_TYPE_VAR="13a0711b0aa9c337", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_VAR="207a658f2ecd"]}, @TCA_EM_META_RVALUE={0x7, 0x3, [@TCF_META_TYPE_VAR, @TCF_META_TYPE_VAR="de", @TCF_META_TYPE_VAR="19f6"]}, @TCA_EM_META_RVALUE={0xf, 0x3, [@TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="4a74b6fe63ad04"]}, @TCA_EM_META_LVALUE={0x8, 0x2, [@TCF_META_TYPE_INT=0x8]}, @TCA_EM_META_RVALUE={0x9, 0x3, [@TCF_META_TYPE_VAR="91b600ec75"]}, @TCA_EM_META_LVALUE={0x1a, 0x2, [@TCF_META_TYPE_VAR="0a34aae9", @TCF_META_TYPE_VAR="d7a7d28c3914", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="13a4", @TCF_META_TYPE_VAR="dcb4"]}]}}, @TCF_EM_NBYTE={0x18, 0x1, 0x0, 0x0, {{0x2c7, 0x2, 0xffff}, {0x4, 0x7, 0x2, "b842236720793e"}}}, @TCF_EM_META={0x18, 0x2, 0x0, 0x0, {{0x0, 0x4, 0x6}, [@TCA_EM_META_HDR={0xc, 0x1, {{0xfff8, 0x40, 0x1}, {0x3800, 0x0, 0x1}}}]}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x1, 0x1, 0x78b}, {0x3, 0x81, 0xfffb, 0x3, 0x4, 0x0, 0x1}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x4, 0x7, 0x2}, {{0x2}, {0x0, 0x1, 0x1}}}}, @TCF_EM_META={0x84, 0x3, 0x0, 0x0, {{0x4db, 0x4, 0x1}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x4, 0x5}, {0x87a, 0x56, 0x2}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x7, 0x8, 0x1}, {0x6, 0x8, 0x1}}}, @TCA_EM_META_LVALUE={0x15, 0x2, [@TCF_META_TYPE_VAR="9c", @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_INT, @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x2]}, @TCA_EM_META_LVALUE={0x1f, 0x2, [@TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="a121c85edc1b", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="f2c24d3ea1"]}, @TCA_EM_META_LVALUE={0x16, 0x2, [@TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_VAR="989661740204b9", @TCF_META_TYPE_VAR="993106649e1589"]}, @TCA_EM_META_LVALUE={0xe, 0x2, [@TCF_META_TYPE_VAR="2d1de83142821176b58f"]}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xdd}}, @TCA_EMATCH_TREE_LIST={0x108, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x14, 0x3fff, 0x0, 0x0, {{0xf1c, 0x2, 0x3ff}, {0x401, 0x1, 0x2, "bf"}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x5, 0x1, 0x7fff}, {0xffffffd8, 0xffffffff, 0xec, 0x4, 0x9, 0x1, 0x1}}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x18be, 0x3, 0x4}, {0x7fffffff, 0x8, 0xfffffffe, 0x101}}}, @TCF_EM_META={0x7c, 0x2, 0x0, 0x0, {{0x10, 0x4, 0x6}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x5, 0x9, 0x2}, {0x81, 0x8, 0x2}}}, @TCA_EM_META_RVALUE={0x14, 0x3, [@TCF_META_TYPE_VAR="fcee", @TCF_META_TYPE_VAR="f06e03ad", @TCF_META_TYPE_VAR='\'', @TCF_META_TYPE_VAR="e273f326819b5004f4"]}, @TCA_EM_META_RVALUE={0x17, 0x3, [@TCF_META_TYPE_VAR, @TCF_META_TYPE_VAR="21c876091402abd91b", @TCF_META_TYPE_VAR="d906", @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x7]}, @TCA_EM_META_RVALUE={0x8, 0x3, [@TCF_META_TYPE_VAR, @TCF_META_TYPE_INT=0x8]}, @TCA_EM_META_HDR={0xc, 0x1, {{0xec0, 0x0, 0x3}, {0xaf5a, 0x4, 0x2}}}, @TCA_EM_META_RVALUE={0x9, 0x3, [@TCF_META_TYPE_VAR="540f857f9e"]}, @TCA_EM_META_RVALUE={0x16, 0x3, [@TCF_META_TYPE_VAR="3b08ca7cdaec", @TCF_META_TYPE_VAR="a8350f5fe8c127", @TCF_META_TYPE_VAR="f9ef0dacd2"]}]}}, @TCF_EM_NBYTE={0x1c, 0x1, 0x0, 0x0, {{0xf}, {0x7, 0x9, 0x0, "ffe3a75b6a0b63a279"}}}, @TCF_EM_IPT={0x14, 0x2, 0x0, 0x0, {{0xb, 0x9, 0xfffc}, [@TCA_EM_IPT_NFPROTO={0x5}]}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0xf, 0x8, 0x7}, {0xffffffffffffffff, 0x6, 0x2}}}]}]}, @TCA_BASIC_EMATCHES={0xe4, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0xe0, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0xe, 0x7, 0x7ff}, {{0x1, 0x0, 0x1}, {0x1}}}}, @TCF_EM_META={0xc8, 0x1, 0x0, 0x0, {{0x7, 0x4, 0x352}, [@TCA_EM_META_LVALUE={0x1a, 0x2, [@TCF_META_TYPE_VAR="8ba5d49c85", @TCF_META_TYPE_VAR="68fbb0b8", @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_VAR="339aef", @TCF_META_TYPE_VAR="130147a5ddae"]}, @TCA_EM_META_RVALUE={0x12, 0x3, [@TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="f92c5fa89918"]}, @TCA_EM_META_LVALUE={0xe, 0x2, [@TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_VAR="eb03ad40ed3c"]}, @TCA_EM_META_RVALUE={0x23, 0x3, [@TCF_META_TYPE_VAR="7043e1e70c0d9433f681", @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="bffac846d6082a26a3", @TCF_META_TYPE_VAR="ce237c410ba0d538"]}, @TCA_EM_META_LVALUE={0xe, 0x2, [@TCF_META_TYPE_VAR="82c7f28ade1ef2b4fc43"]}, @TCA_EM_META_RVALUE={0x20, 0x3, [@TCF_META_TYPE_VAR="732d4a6a1cd2", @TCF_META_TYPE_VAR="7896a47bf0109f1f35b8", @TCF_META_TYPE_INT=0x4, @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x6, 0x2}, {0x3, 0xd}}}, @TCA_EM_META_RVALUE={0x1c, 0x3, [@TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_INT, @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_INT=0x6]}]}}]}]}, @TCA_BASIC_EMATCHES={0x1ac, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x9}}, @TCA_EMATCH_TREE_LIST={0x1a0, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x80, 0x2, 0x6}, {0x2, 0x2, 0x1, "ab5e"}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x978, 0x1, 0x4}, {0x7c0ffedb, 0xffffffff, 0x8244, 0x2, 0x8, 0x2, 0x1}}}, @TCF_EM_IPT={0xe4, 0x1, 0x0, 0x0, {{0x2, 0x9, 0x8}, [@TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x1}, @TCA_EM_IPT_MATCH_DATA={0xa3, 0x5, "8f0f127c616d3a4a54eca330f6badcc70a150debcd1e35c4549f74a9be3455787231da7d54490bfad33a7b79faaae79cb3db44714b0daccbed5fe090fba8dc9b1d044b20bc8a4f39c57eb90d7ef12d087e12ad8e444c2d8b84c63321f1671e87ece8a37c01bbe8eb082c9e844bcd4fb9cdd155d17775ad6e1864b12810a07767d120d485104392f24352f3218db8512c7b2b8ba5169e7a37867477db07750b"}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_NAME={0xb}]}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x5ae5, 0x3, 0x2}, {0x3, 0xdc, 0x8e3, 0x8}}}, @TCF_EM_NBYTE={0x14, 0x2, 0x0, 0x0, {{0x7fff, 0x2, 0x6}, {0x7, 0x3, 0x2, "90f5e9"}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x3, 0x8, 0x8}, {0x1, 0x4, 0x7}}}, @TCF_EM_META={0x4c, 0x3, 0x0, 0x0, {{0xfffe, 0x4, 0x7}, [@TCA_EM_META_LVALUE={0x27, 0x2, [@TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_VAR="30dcc824ec0417dde549", @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="7566670b11"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x6, 0x0, 0xdf43bc03b64c4713}, {0x0, 0x4, 0x2}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x33ad, 0x6, 0x2}, {0x40, 0xc, 0x1}}}]}}]}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0x9, 0x3}}]}}]}, 0x9a0}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000500), r2) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r5, &(0x7f0000000640)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="20000600000001000000040000001400018001000000", @ANYRES32=r3, @ANYBLOB="08000300e00000021c0001800800030000000000060005004e240000060001000a000000050005000e000000"], 0x4c}, 0x1, 0x0, 0x0, 0x24008881}, 0x4010) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000001780)={0x3, {{0x2, 0x5, @multicast1}}, {{0x2, 0x100, @remote}}}, 0x108) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='kfree_skb\x00', r7}, 0x18) r8 = io_uring_setup(0x172e, &(0x7f0000000680)={0x0, 0xcf, 0x2, 0x1, 0xe2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[], 0xa0}}, 0x0) r9 = socket(0x10, 0x3, 0x0) sendmsg$nl_route(r9, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)=ANY=[@ANYBLOB="240000006800019f000000000000000002000000000000000800010001000000040004"], 0x24}, 0x1, 0x0, 0x0, 0x4}, 0x0) sendmmsg(r9, &(0x7f0000000000), 0x4000000000001f2, 0x0) socket$inet(0x2, 0x4000000000000001, 0x100) io_uring_register$IORING_REGISTER_BUFFERS(r8, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) preadv(0xffffffffffffffff, &(0x7f0000000200)=[{&(0x7f0000000280)=""/89, 0x59}, {&(0x7f0000000040)=""/86, 0x56}], 0x2, 0x9, 0x2) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) 274.908471ms ago: executing program 0 (id=11660): r0 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) bpf$MAP_CREATE(0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0500000004000000990000000b"], 0x48) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000440), 0x0, 0x0) r2 = dup(r1) ioctl$PTP_EXTTS_REQUEST2(r2, 0x43403d05, 0x0) ioctl$GIO_UNISCRNMAP(r2, 0x4b69, &(0x7f0000000080)=""/96) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0x7, 0x0, 0x0) r3 = epoll_create1(0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r6 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r5, &(0x7f0000000100)={0x20000014}) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r3, &(0x7f0000000000)={0xa0000001}) getgid() ppoll(&(0x7f0000000200)=[{r6, 0x1}], 0x1, 0x0, 0x0, 0x3) epoll_wait(r6, &(0x7f0000000040)=[{}], 0x1, 0x400) syz_usb_connect$printer(0x5, 0x0, 0x0, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) r7 = getpid() sched_setscheduler(r7, 0x2, &(0x7f0000000200)=0x4) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r8, &(0x7f00000bd000), 0x318, 0x0) r9 = syz_clone3(&(0x7f0000001880)={0x100000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) tgkill(r9, r9, 0x21) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e21, 0x2, @loopback, 0xace}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000500)={0xa, 0x0, 0xc684, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) keyctl$restrict_keyring(0xa, r0, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000000)='id:cb2e') 274.064901ms ago: executing program 6 (id=11661): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000700)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000002d00000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r0}, 0x10) r1 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r1, &(0x7f0000000600)={&(0x7f0000000280)={0x2, 0xffff, @remote}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000400)='\b\x00', 0x2}, {&(0x7f00000005c0)="72addd", 0x3}], 0x2, &(0x7f0000000100)=ANY=[@ANYBLOB="1c000000000000000000000007000000890b040a0101027f00000100000000001c000000000000000000000008"], 0x40}, 0x20000000) 238.572051ms ago: executing program 6 (id=11662): bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, 0x0, &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) futex(&(0x7f000000cffc), 0x80000000000b, 0x0, 0x0, &(0x7f0000048000)=0x2000000, 0x0) r1 = io_uring_setup(0x1de0, &(0x7f0000000000)={0x0, 0x0, 0x40, 0x1000}) io_uring_register$IORING_REGISTER_RESTRICTIONS(r1, 0xb, &(0x7f0000000080), 0x0) 105.412361ms ago: executing program 1 (id=11663): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000021) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x73b, 0x200}, 0x280, 0x0, 0xfffffffe, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="020000000400000008000000060000000010"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000700000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000080)='kfree\x00', r1}, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000680), r2) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000180)={'wpan1\x00', 0x0}) r5 = socket$nl_route(0x10, 0x3, 0x0) r6 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_SIOCGIFINDEX(r6, 0x8933, &(0x7f0000000040)={'lo\x00', 0x0}) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000240)=ANY=[@ANYBLOB="1800000000000002000000000000000018090000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000002000000b704000000000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x90) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f00000006c0)=ANY=[@ANYRES64, @ANYRESHEX=r0, @ANYRESDEC=0x0, @ANYBLOB="b5350353e2758a612426956bdf743f60dd0cd4cd8833009995e48fac644b7fb26eeda1845b6b54a3dd", @ANYBLOB="bfbd016ace2502dd7db746d9c5317c5710525a5839521ea0ef0a00d37584850d59049b9f9c7aa27301a26006352e2f2b7b8344997fad58de7a4763f6724c441ad800e58a92a307572c09ecf0cd6574de7e39f0fbebff545c2d1f2cd4ea0da0211c38c23edb9f501ecd11bc1f9fbb8cf1a854535a869753aef7c529a90b280872067cc445a9a63200407039f9be0b6b4b10c2a065c457cb2d877bbfa3f99a1acab51ee106920992b95d9c"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @void, @value}, 0x94) fcntl$getownex(r8, 0x10, &(0x7f0000000300)={0x0, 0x0}) sched_getparam(r10, &(0x7f0000000380)) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000002080)={&(0x7f0000000340)='kfree\x00', r9, 0x0, 0x4}, 0x18) shmdt(0x0) sendmsg$nl_route_sched(r5, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f00000046c0)=@newqdisc={0x45c, 0x24, 0x4ee4e6a52ff56541, 0x8000000, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xffff, 0xffff}}, [@qdisc_kind_options=@q_tbf={{0x8}, {0x430, 0x2, [@TCA_TBF_PTAB={0x404, 0x3, [0x2, 0x0, 0x0, 0x0, 0x10000000, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x0, 0x2, 0x0, 0x20, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x5d2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x800000, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x1007, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x40000, 0xfffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd2d1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x7, 0xc3f3, 0x1, 0x0, 0x0, 0x9, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x100, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0xffffffff]}, @TCA_TBF_PARMS={0x28, 0x1, {{0x0, 0x3, 0x0, 0x0, 0x0, 0xc0000000}, {0x2, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x7}}]}}]}, 0x45c}}, 0x0) r11 = getpid() sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r2, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000004c0)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r3, @ANYBLOB="010000000000000000001400000008000300", @ANYRES32=r4, @ANYBLOB="08001c00", @ANYRES32=r11], 0x24}}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r12 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_SIOCGIFVLAN_ADD_VLAN_CMD(r12, 0x8982, &(0x7f0000000400)={0x0, 'vlan0\x00', {0xffffffff}, 0x1}) mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0x1000001, 0x5d031, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) r13 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r13, 0x8933, &(0x7f0000000000)={'veth1_macvtap\x00', 0x0}) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f00000002c0)={r1, r14, 0x25, 0x1, @void}, 0x10) 0s ago: executing program 1 (id=11664): r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000514ff4)={0x10, 0x0, 0x0, 0x2ffffffff}, 0xc) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000400)={&(0x7f00000005c0)=@newqdisc={0x24}, 0x20}}, 0x0) r2 = socket(0x2a, 0x2, 0x0) getsockname$packet(r2, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x67, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000700), 0x8}, 0x13b3, 0x0, 0xfffffffe, 0x0, 0x3, 0x0, 0x5, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) pwrite64(r4, &(0x7f0000000080)='3', 0x1, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000440)=@delchain={0x9c, 0x65, 0x1, 0x70bd2c, 0x25dfdbfb, {0x0, 0x0, 0x0, r3, {0x8, 0x1}, {0x1, 0x9}, {0x6, 0x2}}, [@filter_kind_options=@f_flower={{0xb}, {0x54, 0x2, [@TCA_FLOWER_KEY_TCP_FLAGS={0x6, 0x47, 0x82}, @TCA_FLOWER_KEY_ENC_UDP_SRC_PORT_MASK={0x6}, @TCA_FLOWER_KEY_MPLS_TTL={0x5, 0x43, 0x3}, @TCA_FLOWER_KEY_ARP_SHA_MASK={0xa}, @TCA_FLOWER_KEY_MPLS_TTL={0x5, 0x43, 0x39}, @TCA_FLOWER_KEY_ENC_KEY_ID={0x8, 0x1a, 0x1}, @TCA_FLOWER_KEY_ARP_TIP={0x8, 0x3b, @dev={0xac, 0x14, 0x14, 0xf}}, @TCA_FLOWER_KEY_ENC_IPV6_DST={0x14, 0x21, @mcast2}]}}, @TCA_RATE={0x6, 0x5, {0x5, 0x1}}, @TCA_CHAIN={0x8, 0xb, 0x3}, @TCA_RATE={0x6, 0x5, {0x0, 0x6}}]}, 0x9c}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000002700)=@newtfilter={0x9a0, 0x2c, 0xd27, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {}, {0x5, 0xffe0}}, [@filter_kind_options=@f_basic={{0xa}, {0x970, 0x2, [@TCA_BASIC_POLICE={0x80, 0x4, [@TCA_POLICE_TBF={0x3c, 0x1, {0x8, 0x3, 0x8, 0x7, 0x7, {0xf, 0x1, 0xda, 0x5, 0x2, 0x59a6}, {0x8, 0x0, 0x1, 0x0, 0x8, 0x40}, 0x7fff, 0x4, 0x4}}, @TCA_POLICE_AVRATE={0x8, 0x4, 0x3}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x413}, @TCA_POLICE_RESULT={0x8, 0x5, 0xffffffff}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x4}, @TCA_POLICE_RATE64={0xc}, @TCA_POLICE_RATE64={0xc, 0x8, 0x334}]}, @TCA_BASIC_EMATCHES={0xa0, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x6}}, @TCA_EMATCH_TREE_LIST={0x94, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x9f, 0x3, 0x6}, {0x8, 0x9, 0x4fd7, 0x2}}}, @TCF_EM_CONTAINER={0x44, 0x3, 0x0, 0x0, {{0x1ff, 0x0, 0x1}, "d79c925568bd6db7870009362631c19dcf8bb25538fe05ad370eae7a28d29ea55aaedb07879ff49cbbb677c740e361aa57c2ec90464e1c45"}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x2, 0x1, 0xa118}, {0x549e, 0x28, 0x3, 0x0, 0xa, 0x2, 0x1}}}, @TCF_EM_NBYTE={0x18, 0x2, 0x0, 0x0, {{0x7, 0x2, 0xfffb}, {0x6, 0x5, 0x0, "cadb93bc6f"}}}]}]}, @TCA_BASIC_EMATCHES={0x5b4, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0x1bc, 0x2, 0x0, 0x1, [@TCF_EM_CONTAINER={0xa8, 0x1, 0x0, 0x0, {{0x9, 0x0, 0x1}, "45da7fa5ef25f96eb07ca5e155b66d625c74c2721421d4157881ce723da67e2592e3336bbd88fdf98f6e44f4afd8fe7de5b0427e8568bf982ed4a924ef6c723de6e804717b6ae4eb0d6be3f24cee68b9a1d81d8a7c206c845f29081940e7387bf8d14c4839286ec2eac18f7c39a656b6fd30bcfcf29f33117fd3b69b8f10160e9aa00fbdf60166511f50da12b7e8570734a00afe32d2a8778f2aaf40"}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x8001, 0x7, 0x7}, {{0x1, 0x1, 0x1, 0x1}, {0x4, 0x1, 0x1, 0x1}}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x11d6, 0x1, 0x7fff}, {0xa, 0xfffffe01, 0xfe00, 0x0, 0xf, 0xfecad5a1302fdb45, 0x1}}}, @TCF_EM_IPT={0x54, 0x2, 0x0, 0x0, {{0x8, 0x9, 0x1000}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x5}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x4}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x4}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x1}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x9}]}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x1, 0x7, 0xd}, {{0x2, 0x0, 0x0, 0x1}, {0x0, 0x1, 0x1, 0x1}}}}, @TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0xfff7, 0x2, 0x9}, {0x8, 0x6, 0x2, "f7cb8a21993b"}}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x63, 0x3, 0x8af2}, {0x3, 0x6, 0x6, 0xa}}}, @TCF_EM_NBYTE={0x1c, 0x2, 0x0, 0x0, {{0x2, 0x2, 0x1}, {0xe, 0xa, 0x2, "3f8ffcd26c1f169f3926"}}}, @TCF_EM_CMP={0x18, 0x1, 0x0, 0x0, {{0x9, 0x1, 0x4aee}, {0x4, 0x1, 0xffff, 0x3, 0x6, 0x1, 0x1}}}, @TCF_EM_CANID={0x14, 0x1, 0x0, 0x0, {{0x2, 0x7, 0x141e}, {{0x1, 0x0, 0x1}, {0x4, 0x1}}}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x4}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x7}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x5a9}}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x1}}, @TCA_EMATCH_TREE_LIST={0x48, 0x2, 0x0, 0x1, [@TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x5, 0x3, 0xbc}, {0xc, 0xeb0b, 0xfffff001, 0xffff96a9}}}, @TCF_EM_IPT={0x28, 0x1, 0x0, 0x0, {{0x3, 0x9, 0x70}, [@TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0xd}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x2}]}}]}, @TCA_EMATCH_TREE_LIST={0x27c, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x18, 0x3, 0x0, 0x0, {{0x9, 0x2, 0x1}, {0x1, 0x8, 0x1, "858e7cfadbf9f73d"}}}, @TCF_EM_CONTAINER={0xf4, 0x1, 0x0, 0x0, {{0x1, 0x0, 0x2}, "d49369de1f79b9970f55f5a6894748d2d37d81c6f546276697fe7e48cd11ed9e37ac0ca2ae7e26cc978632898946c457f51c9716bd4d401bedd64332ce4334692ab38dc20e51abd87576f9c980f8cc5a9072de4ff442ddd2a60aae978c674266bab4ee6bbaddd5c8b57862da3ce223077c37fbd2f20f474611a2ed2906af3aa0c055935474882d666f663e06300e2e97ed653e8f959c97016d36cc065a361c0573ace37c1819a01068efa5ead3162f7346573779956d3f8d96b45fac4819ab180ab449be7f330b2d2702d2f3c434724787baabe1d14c5570e46acb9619d16aab046044aa31"}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x9}, {0x0, 0x2c0, 0x5, 0x3}}}, @TCF_EM_META={0x70, 0x2, 0x0, 0x0, {{0x0, 0x4, 0xed}, [@TCA_EM_META_RVALUE={0x1a, 0x3, [@TCF_META_TYPE_VAR="13a0711b0aa9c337", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_VAR="207a658f2ecd"]}, @TCA_EM_META_RVALUE={0x7, 0x3, [@TCF_META_TYPE_VAR, @TCF_META_TYPE_VAR="de", @TCF_META_TYPE_VAR="19f6"]}, @TCA_EM_META_RVALUE={0xf, 0x3, [@TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="4a74b6fe63ad04"]}, @TCA_EM_META_LVALUE={0x8, 0x2, [@TCF_META_TYPE_INT=0x8]}, @TCA_EM_META_RVALUE={0x9, 0x3, [@TCF_META_TYPE_VAR="91b600ec75"]}, @TCA_EM_META_LVALUE={0x1a, 0x2, [@TCF_META_TYPE_VAR="0a34aae9", @TCF_META_TYPE_VAR="d7a7d28c3914", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="13a4", @TCF_META_TYPE_VAR="dcb4"]}]}}, @TCF_EM_NBYTE={0x18, 0x1, 0x0, 0x0, {{0x2c7, 0x2, 0xffff}, {0x4, 0x7, 0x2, "b842236720793e"}}}, @TCF_EM_META={0x18, 0x2, 0x0, 0x0, {{0x0, 0x4, 0x6}, [@TCA_EM_META_HDR={0xc, 0x1, {{0xfff8, 0x40, 0x1}, {0x3800, 0x0, 0x1}}}]}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x1, 0x1, 0x78b}, {0x3, 0x81, 0xfffb, 0x3, 0x4, 0x0, 0x1}}}, @TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0x4, 0x7, 0x2}, {{0x2}, {0x0, 0x1, 0x1}}}}, @TCF_EM_META={0x84, 0x3, 0x0, 0x0, {{0x4db, 0x4, 0x1}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x4, 0x5}, {0x87a, 0x56, 0x2}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x7, 0x8, 0x1}, {0x6, 0x8, 0x1}}}, @TCA_EM_META_LVALUE={0x15, 0x2, [@TCF_META_TYPE_VAR="9c", @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_INT, @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x2]}, @TCA_EM_META_LVALUE={0x1f, 0x2, [@TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="a121c85edc1b", @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x7, @TCF_META_TYPE_VAR="f2c24d3ea1"]}, @TCA_EM_META_LVALUE={0x16, 0x2, [@TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_VAR="989661740204b9", @TCF_META_TYPE_VAR="993106649e1589"]}, @TCA_EM_META_LVALUE={0xe, 0x2, [@TCF_META_TYPE_VAR="2d1de83142821176b58f"]}]}}]}, @TCA_EMATCH_TREE_HDR={0x8, 0x1, {0xdd}}, @TCA_EMATCH_TREE_LIST={0x108, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x14, 0x3fff, 0x0, 0x0, {{0xf1c, 0x2, 0x3ff}, {0x401, 0x1, 0x2, "bf"}}}, @TCF_EM_CMP={0x18, 0x2, 0x0, 0x0, {{0x5, 0x1, 0x7fff}, {0xffffffd8, 0xffffffff, 0xec, 0x4, 0x9, 0x1, 0x1}}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x18be, 0x3, 0x4}, {0x7fffffff, 0x8, 0xfffffffe, 0x101}}}, @TCF_EM_META={0x7c, 0x2, 0x0, 0x0, {{0x10, 0x4, 0x6}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x5, 0x9, 0x2}, {0x81, 0x8, 0x2}}}, @TCA_EM_META_RVALUE={0x14, 0x3, [@TCF_META_TYPE_VAR="fcee", @TCF_META_TYPE_VAR="f06e03ad", @TCF_META_TYPE_VAR='\'', @TCF_META_TYPE_VAR="e273f326819b5004f4"]}, @TCA_EM_META_RVALUE={0x17, 0x3, [@TCF_META_TYPE_VAR, @TCF_META_TYPE_VAR="21c876091402abd91b", @TCF_META_TYPE_VAR="d906", @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x7]}, @TCA_EM_META_RVALUE={0x8, 0x3, [@TCF_META_TYPE_VAR, @TCF_META_TYPE_INT=0x8]}, @TCA_EM_META_HDR={0xc, 0x1, {{0xec0, 0x0, 0x3}, {0xaf5a, 0x4, 0x2}}}, @TCA_EM_META_RVALUE={0x9, 0x3, [@TCF_META_TYPE_VAR="540f857f9e"]}, @TCA_EM_META_RVALUE={0x16, 0x3, [@TCF_META_TYPE_VAR="3b08ca7cdaec", @TCF_META_TYPE_VAR="a8350f5fe8c127", @TCF_META_TYPE_VAR="f9ef0dacd2"]}]}}, @TCF_EM_NBYTE={0x1c, 0x1, 0x0, 0x0, {{0xf}, {0x7, 0x9, 0x0, "ffe3a75b6a0b63a279"}}}, @TCF_EM_IPT={0x14, 0x2, 0x0, 0x0, {{0xb, 0x9, 0xfffc}, [@TCA_EM_IPT_NFPROTO={0x5}]}}, @TCF_EM_IPSET={0x10, 0x3, 0x0, 0x0, {{0xf, 0x8, 0x7}, {0xffffffffffffffff, 0x6, 0x2}}}]}]}, @TCA_BASIC_EMATCHES={0xe4, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_LIST={0xe0, 0x2, 0x0, 0x1, [@TCF_EM_CANID={0x14, 0x2, 0x0, 0x0, {{0xe, 0x7, 0x7ff}, {{0x1, 0x0, 0x1}, {0x1}}}}, @TCF_EM_META={0xc8, 0x1, 0x0, 0x0, {{0x7, 0x4, 0x352}, [@TCA_EM_META_LVALUE={0x1a, 0x2, [@TCF_META_TYPE_VAR="8ba5d49c85", @TCF_META_TYPE_VAR="68fbb0b8", @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_VAR="339aef", @TCF_META_TYPE_VAR="130147a5ddae"]}, @TCA_EM_META_RVALUE={0x12, 0x3, [@TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="f92c5fa89918"]}, @TCA_EM_META_LVALUE={0xe, 0x2, [@TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_VAR="eb03ad40ed3c"]}, @TCA_EM_META_RVALUE={0x23, 0x3, [@TCF_META_TYPE_VAR="7043e1e70c0d9433f681", @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="bffac846d6082a26a3", @TCF_META_TYPE_VAR="ce237c410ba0d538"]}, @TCA_EM_META_LVALUE={0xe, 0x2, [@TCF_META_TYPE_VAR="82c7f28ade1ef2b4fc43"]}, @TCA_EM_META_RVALUE={0x20, 0x3, [@TCF_META_TYPE_VAR="732d4a6a1cd2", @TCF_META_TYPE_VAR="7896a47bf0109f1f35b8", @TCF_META_TYPE_INT=0x4, @TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x6, 0x2}, {0x3, 0xd}}}, @TCA_EM_META_RVALUE={0x1c, 0x3, [@TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_INT=0x9, @TCF_META_TYPE_INT, @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_INT=0x5, @TCF_META_TYPE_INT=0x6]}]}}]}]}, @TCA_BASIC_EMATCHES={0x1ac, 0x2, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x9}}, @TCA_EMATCH_TREE_LIST={0x1a0, 0x2, 0x0, 0x1, [@TCF_EM_NBYTE={0x14, 0x3, 0x0, 0x0, {{0x80, 0x2, 0x6}, {0x2, 0x2, 0x1, "ab5e"}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0x978, 0x1, 0x4}, {0x7c0ffedb, 0xffffffff, 0x8244, 0x2, 0x8, 0x2, 0x1}}}, @TCF_EM_IPT={0xe4, 0x1, 0x0, 0x0, {{0x2, 0x9, 0x8}, [@TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x1}, @TCA_EM_IPT_MATCH_DATA={0xa3, 0x5, "8f0f127c616d3a4a54eca330f6badcc70a150debcd1e35c4549f74a9be3455787231da7d54490bfad33a7b79faaae79cb3db44714b0daccbed5fe090fba8dc9b1d044b20bc8a4f39c57eb90d7ef12d087e12ad8e444c2d8b84c63321f1671e87ece8a37c01bbe8eb082c9e844bcd4fb9cdd155d17775ad6e1864b12810a07767d120d485104392f24352f3218db8512c7b2b8ba5169e7a37867477db07750b"}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_MATCH_NAME={0xb}]}}, @TCF_EM_U32={0x1c, 0x3, 0x0, 0x0, {{0x5ae5, 0x3, 0x2}, {0x3, 0xdc, 0x8e3, 0x8}}}, @TCF_EM_NBYTE={0x14, 0x2, 0x0, 0x0, {{0x7fff, 0x2, 0x6}, {0x7, 0x3, 0x2, "90f5e9"}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x3, 0x8, 0x8}, {0x1, 0x4, 0x7}}}, @TCF_EM_META={0x4c, 0x3, 0x0, 0x0, {{0xfffe, 0x4, 0x7}, [@TCA_EM_META_LVALUE={0x27, 0x2, [@TCF_META_TYPE_INT=0x2, @TCF_META_TYPE_INT=0x1, @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_INT=0xa, @TCF_META_TYPE_VAR="30dcc824ec0417dde549", @TCF_META_TYPE_INT=0x8, @TCF_META_TYPE_VAR="7566670b11"]}, @TCA_EM_META_HDR={0xc, 0x1, {{0x6, 0x0, 0xdf43bc03b64c4713}, {0x0, 0x4, 0x2}}}, @TCA_EM_META_HDR={0xc, 0x1, {{0x33ad, 0x6, 0x2}, {0x40, 0xc, 0x1}}}]}}]}]}, @TCA_BASIC_CLASSID={0x8, 0x1, {0x9, 0x3}}]}}]}, 0x9a0}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r5, &(0x7f00000002c0), 0x40000000000009f, 0x0) r6 = syz_genetlink_get_family_id$mptcp(&(0x7f0000000500), r2) sendmsg$MPTCP_PM_CMD_FLUSH_ADDRS(r5, &(0x7f0000000640)={&(0x7f00000003c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000600)={&(0x7f0000000540)=ANY=[@ANYBLOB='L\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="20000600000001000000040000001400018001000000", @ANYRES32=r3, @ANYBLOB="08000300e00000021c0001800800030000000000060005004e240000060001000a000000050005000e000000"], 0x4c}, 0x1, 0x0, 0x0, 0x24008881}, 0x4010) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f00000000c0)={0x2, {{0x2, 0x0, @multicast1}}, {{0x2, 0x4e22, @multicast1}}}, 0x108) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000001780)={0x3, {{0x2, 0x5, @multicast1}}, {{0x2, 0x100, @remote}}}, 0x108) r7 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000300)={0x18, 0x5, &(0x7f00000000c0)=ANY=[@ANYBLOB="180000001400000000000000ff000000850000000e000000850000000700000095"], &(0x7f0000000280)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x24, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x0, @void, @value}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000240)='kfree_skb\x00', r7}, 0x18) io_uring_setup(0x172e, &(0x7f0000000680)={0x0, 0xcf, 0x2, 0x1, 0xe2}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000200)=ANY=[], 0xa0}}, 0x0) r8 = socket(0x10, 0x3, 0x0) sendmmsg(r8, &(0x7f0000000000), 0x4000000000001f2, 0x0) kernel console output (not intermixed with test programs): de=0x7ffc0000 [ 750.822834][ T551] audit_log_start+0x34c/0x6b0 [ 750.908375][ T551] audit_seccomp+0x4b/0x130 [ 750.912890][ T551] __seccomp_filter+0x6fa/0x1180 [ 750.917891][ T551] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 750.923542][ T551] ? vfs_write+0x596/0x920 [ 750.928007][ T551] ? putname+0xcf/0xf0 [ 750.932084][ T551] __secure_computing+0x9f/0x1c0 [ 750.937043][ T551] syscall_trace_enter+0xd1/0x1f0 [ 750.942130][ T551] ? fpregs_assert_state_consistent+0x83/0xa0 [ 750.948236][ T551] do_syscall_64+0xaa/0x1c0 [ 750.952746][ T551] ? clear_bhb_loop+0x55/0xb0 [ 750.957431][ T551] ? clear_bhb_loop+0x55/0xb0 [ 750.962112][ T551] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 750.968026][ T551] RIP: 0033:0x7f333c765d29 [ 750.972442][ T551] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 750.992057][ T551] RSP: 002b:00007f333add7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000113 [ 751.000538][ T551] RAX: ffffffffffffffda RBX: 00007f333c955fa0 RCX: 00007f333c765d29 [ 751.008516][ T551] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffffffffffffff [ 751.016535][ T551] RBP: 00007f333add7090 R08: 0000000000400000 R09: 0100000000000000 [ 751.024571][ T551] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 751.032620][ T551] R13: 0000000000000000 R14: 00007f333c955fa0 R15: 00007ffc9bd6dd28 [ 751.040604][ T551] [ 751.043994][ T551] audit: audit_lost=11 audit_rate_limit=0 audit_backlog_limit=64 [ 751.052036][ T551] audit: out of memory in audit_log_start [ 751.250308][ T547] netdevsim netdevsim0 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 751.259642][ T547] netdevsim netdevsim0 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 751.268867][ T547] netdevsim netdevsim0 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 751.277955][ T547] netdevsim netdevsim0 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 751.302607][ T547] macvlan2: left promiscuous mode [ 751.308456][ T547] bridge_slave_0: left allmulticast mode [ 751.314149][ T547] vlan2: left allmulticast mode [ 751.403710][T28343] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 751.516299][ T592] netlink: 4 bytes leftover after parsing attributes in process `syz.0.10322'. [ 752.255820][ T618] netlink: 60 bytes leftover after parsing attributes in process `syz.2.10333'. [ 752.355191][ T622] rdma_op ffff88812f505580 conn xmit_rdma 0000000000000000 [ 752.456351][ T630] syz.1.10339[630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 752.456519][ T630] syz.1.10339[630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 752.468606][ T630] syz.1.10339[630] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 752.482193][ T630] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10339'. [ 752.652513][ T637] loop1: detected capacity change from 0 to 164 [ 752.666781][ T637] rock: corrupted directory entry. extent=41, offset=65536, size=8 [ 752.872135][ T650] xt_CT: You must specify a L4 protocol and not use inversions on it [ 752.972517][ T654] syz.6.10350[654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 752.972645][ T654] syz.6.10350[654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 752.984630][ T654] syz.6.10350[654] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 752.997969][ T654] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10350'. [ 753.114943][ T664] netlink: 4 bytes leftover after parsing attributes in process `syz.6.10351'. [ 753.177232][ T673] netlink: 28 bytes leftover after parsing attributes in process `syz.6.10355'. [ 753.186459][ T673] netlink: 52 bytes leftover after parsing attributes in process `syz.6.10355'. [ 753.368635][ T686] syz.2.10362[686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 753.368888][ T686] syz.2.10362[686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 753.380598][ T686] syz.2.10362[686] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 753.860244][ T708] loop0: detected capacity change from 0 to 1024 [ 753.901778][ T708] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 753.993487][ T718] syz.1.10374[718] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 754.754095][ T744] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 754.877144][T28343] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 755.198192][ T761] xt_CT: You must specify a L4 protocol and not use inversions on it [ 755.216061][ T754] loop0: detected capacity change from 0 to 512 [ 755.307816][ T754] EXT4-fs (loop0): couldn't mount as ext2 due to feature incompatibilities [ 755.565575][ T789] loop1: detected capacity change from 0 to 1024 [ 755.625527][ T794] loop0: detected capacity change from 0 to 512 [ 755.644675][ T29] kauditd_printk_skb: 2378 callbacks suppressed [ 755.644691][ T29] audit: type=1326 audit(1734905956.895:183236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=796 comm="syz.4.10395" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 755.684469][ T794] EXT4-fs (loop0): ext4_check_descriptors: Checksum for group 0 failed (17031!=33349) [ 755.697726][ T29] audit: type=1326 audit(1734905956.925:183237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=796 comm="syz.4.10395" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 755.721501][ T29] audit: type=1400 audit(1734905956.925:183238): avc: denied { write } for pid=796 comm="syz.4.10395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=llc_socket permissive=1 [ 755.741068][ T29] audit: type=1326 audit(1734905956.925:183239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=796 comm="syz.4.10395" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 755.764906][ T29] audit: type=1326 audit(1734905956.925:183240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=796 comm="syz.4.10395" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 755.788577][ T29] audit: type=1326 audit(1734905956.925:183241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=796 comm="syz.4.10395" exe="/root/syz-executor" sig=0 arch=c000003e syscall=272 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 755.797879][ T789] EXT4-fs (loop1): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 755.854469][ T794] [EXT4 FS bs=1024, gc=1, bpg=8192, ipg=32, mo=a842e01c, mo2=0002] [ 755.874350][ T794] System zones: 1-12 [ 755.883986][ T794] EXT4-fs (loop0): orphan cleanup on readonly fs [ 755.891120][ T794] EXT4-fs error (device loop0): ext4_validate_block_bitmap:441: comm syz.0.10394: bg 0: block 361: padding at end of block bitmap is not set [ 755.919692][ T794] EXT4-fs error (device loop0) in ext4_mb_clear_bb:6550: Corrupt filesystem [ 755.939451][ T29] audit: type=1326 audit(1734905957.185:183242): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=788 comm="syz.1.10393" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f333c765d29 code=0x7ffc0000 [ 755.959237][ T794] EXT4-fs error (device loop0): ext4_clear_blocks:876: inode #11: comm syz.0.10394: attempt to clear invalid blocks 33619980 len 1 [ 755.964567][ T29] audit: type=1326 audit(1734905957.185:183243): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=788 comm="syz.1.10393" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f333c765d29 code=0x7ffc0000 [ 756.000182][ T29] audit: type=1326 audit(1734905957.195:183244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=788 comm="syz.1.10393" exe="/root/syz-executor" sig=0 arch=c000003e syscall=186 compat=0 ip=0x7f333c765d29 code=0x7ffc0000 [ 756.018377][ T794] EXT4-fs error (device loop0): ext4_free_branches:1023: inode #11: comm syz.0.10394: invalid indirect mapped block 1811939328 (level 0) [ 756.023793][ T29] audit: type=1326 audit(1734905957.195:183245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=788 comm="syz.1.10393" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f333c765d29 code=0x7ffc0000 [ 756.083801][ T794] EXT4-fs error (device loop0): ext4_free_branches:1023: inode #11: comm syz.0.10394: invalid indirect mapped block 2 (level 2) [ 756.103239][ T794] EXT4-fs (loop0): 1 truncate cleaned up [ 756.111837][ T794] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000007 ro without journal. Quota mode: none. [ 756.148335][ T794] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 756.215756][T28343] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000007. [ 756.262692][ T848] __nla_validate_parse: 4 callbacks suppressed [ 756.262710][ T848] netlink: 4 bytes leftover after parsing attributes in process `syz.0.10396'. [ 756.568061][T30361] EXT4-fs (loop1): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 756.583714][ T922] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10402'. [ 756.784538][ T948] xt_CT: You must specify a L4 protocol and not use inversions on it [ 756.854077][ T949] ALSA: seq fatal error: cannot create timer (-19) [ 756.875799][ T949] SELinux: Context –ÁNÅAΙNˆsÀm#ƒ ù+ot”sæïÃr”‘ [ 760.195852][ T1338] dump_stack_lvl+0xf2/0x150 [ 760.200501][ T1338] dump_stack+0x15/0x1a [ 760.204674][ T1338] should_fail_ex+0x223/0x230 [ 760.209390][ T1338] should_fail+0xb/0x10 [ 760.213572][ T1338] should_fail_usercopy+0x1a/0x20 [ 760.218639][ T1338] _copy_to_user+0x20/0xa0 [ 760.223081][ T1338] simple_read_from_buffer+0xa0/0x110 [ 760.228484][ T1338] proc_fail_nth_read+0xf9/0x140 [ 760.233446][ T1338] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 760.239025][ T1338] vfs_read+0x1a2/0x700 [ 760.243220][ T1338] ? __rcu_read_unlock+0x4e/0x70 [ 760.248201][ T1338] ? __fget_files+0x17c/0x1c0 [ 760.252937][ T1338] ksys_read+0xe8/0x1b0 [ 760.257180][ T1338] __x64_sys_read+0x42/0x50 [ 760.261725][ T1338] x64_sys_call+0x2874/0x2dc0 [ 760.266448][ T1338] do_syscall_64+0xc9/0x1c0 [ 760.271123][ T1338] ? clear_bhb_loop+0x55/0xb0 [ 760.275867][ T1338] ? clear_bhb_loop+0x55/0xb0 [ 760.280569][ T1338] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 760.286524][ T1338] RIP: 0033:0x7f506be6473c [ 760.291030][ T1338] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 760.310670][ T1338] RSP: 002b:00007f506a4d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 760.319148][ T1338] RAX: ffffffffffffffda RBX: 00007f506c055fa0 RCX: 00007f506be6473c [ 760.327129][ T1338] RDX: 000000000000000f RSI: 00007f506a4d70a0 RDI: 0000000000000007 [ 760.335127][ T1338] RBP: 00007f506a4d7090 R08: 0000000000000000 R09: 0000000000000000 [ 760.343110][ T1338] R10: 000000000000fed7 R11: 0000000000000246 R12: 0000000000000001 [ 760.351119][ T1338] R13: 0000000000000000 R14: 00007f506c055fa0 R15: 00007fff8c648588 [ 760.359191][ T1338] [ 760.658013][ T29] kauditd_printk_skb: 2100 callbacks suppressed [ 760.658030][ T29] audit: type=1326 audit(1734905961.905:185346): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1297 comm="syz.2.10470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f09ac2bcce7 code=0x7ffc0000 [ 760.701184][ T29] audit: type=1326 audit(1734905961.935:185347): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1297 comm="syz.2.10470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f09ac261f29 code=0x7ffc0000 [ 760.724949][ T29] audit: type=1326 audit(1734905961.935:185348): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1297 comm="syz.2.10470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f09ac2bcce7 code=0x7ffc0000 [ 760.748639][ T29] audit: type=1326 audit(1734905961.935:185349): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1297 comm="syz.2.10470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f09ac261f29 code=0x7ffc0000 [ 760.772405][ T29] audit: type=1326 audit(1734905961.935:185350): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1297 comm="syz.2.10470" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 760.796253][ T29] audit: type=1326 audit(1734905961.935:185351): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1319 comm="syz.4.10479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa3eb99cce7 code=0x7ffc0000 [ 760.820096][ T29] audit: type=1326 audit(1734905961.935:185352): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1319 comm="syz.4.10479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa3eb941f29 code=0x7ffc0000 [ 760.843697][ T29] audit: type=1326 audit(1734905961.935:185353): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1319 comm="syz.4.10479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 760.867251][ T29] audit: type=1326 audit(1734905961.935:185354): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1319 comm="syz.4.10479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7fa3eb99cce7 code=0x7ffc0000 [ 760.890959][ T29] audit: type=1326 audit(1734905961.935:185355): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1319 comm="syz.4.10479" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7fa3eb941f29 code=0x7ffc0000 [ 761.753026][ T1479] x_tables: duplicate underflow at hook 2 [ 761.920480][ T1505] __nla_validate_parse: 9 callbacks suppressed [ 761.920496][ T1505] netlink: 8 bytes leftover after parsing attributes in process `syz.4.10517'. [ 761.942234][ T1505] bond0: entered promiscuous mode [ 761.947433][ T1505] bond0: entered allmulticast mode [ 761.953118][ T1505] 8021q: adding VLAN 0 to HW filter on device bond0 [ 762.038085][ T1505] hsr0: entered promiscuous mode [ 762.043159][ T1505] macsec1: entered allmulticast mode [ 762.048526][ T1505] hsr0: entered allmulticast mode [ 762.053575][ T1505] hsr_slave_0: entered allmulticast mode [ 762.059292][ T1505] hsr_slave_1: entered allmulticast mode [ 762.153556][ T1555] xt_CT: You must specify a L4 protocol and not use inversions on it [ 762.193750][ T1505] hsr0: left allmulticast mode [ 762.198573][ T1505] hsr_slave_0: left allmulticast mode [ 762.203960][ T1505] hsr_slave_1: left allmulticast mode [ 762.399528][ T1575] SELinux: security_context_str_to_sid (root) failed with errno=-22 [ 762.518527][ T1584] FAULT_INJECTION: forcing a failure. [ 762.518527][ T1584] name failslab, interval 1, probability 0, space 0, times 0 [ 762.531566][ T1584] CPU: 0 UID: 0 PID: 1584 Comm: syz.4.10529 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 762.542371][ T1584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 762.552529][ T1584] Call Trace: [ 762.555853][ T1584] [ 762.558840][ T1584] dump_stack_lvl+0xf2/0x150 [ 762.563511][ T1584] dump_stack+0x15/0x1a [ 762.567730][ T1584] should_fail_ex+0x223/0x230 [ 762.572450][ T1584] should_failslab+0x8f/0xb0 [ 762.577088][ T1584] kmem_cache_alloc_noprof+0x52/0x320 [ 762.582702][ T1584] ? audit_log_start+0x34c/0x6b0 [ 762.587675][ T1584] audit_log_start+0x34c/0x6b0 [ 762.592477][ T1584] audit_seccomp+0x4b/0x130 [ 762.597017][ T1584] __seccomp_filter+0x6fa/0x1180 [ 762.602066][ T1584] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 762.607749][ T1584] ? vfs_write+0x596/0x920 [ 762.612271][ T1584] ? putname+0xcf/0xf0 [ 762.616392][ T1584] __secure_computing+0x9f/0x1c0 [ 762.621381][ T1584] syscall_trace_enter+0xd1/0x1f0 [ 762.626463][ T1584] ? fpregs_assert_state_consistent+0x83/0xa0 [ 762.632700][ T1584] do_syscall_64+0xaa/0x1c0 [ 762.637246][ T1584] ? clear_bhb_loop+0x55/0xb0 [ 762.641951][ T1584] ? clear_bhb_loop+0x55/0xb0 [ 762.646724][ T1584] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 762.652678][ T1584] RIP: 0033:0x7fa3eb9a5d29 [ 762.657138][ T1584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 762.677040][ T1584] RSP: 002b:00007fa3ea011038 EFLAGS: 00000246 ORIG_RAX: 0000000000000095 [ 762.685529][ T1584] RAX: ffffffffffffffda RBX: 00007fa3ebb95fa0 RCX: 00007fa3eb9a5d29 [ 762.693596][ T1584] RDX: 0000000000000000 RSI: 0000000000800000 RDI: 00000000207d8000 [ 762.701642][ T1584] RBP: 00007fa3ea011090 R08: 0000000000000000 R09: 0000000000000000 [ 762.709644][ T1584] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 762.717644][ T1584] R13: 0000000000000000 R14: 00007fa3ebb95fa0 R15: 00007fff573fd018 [ 762.725650][ T1584] [ 763.449280][ T1655] syz.2.10537[1655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 763.449426][ T1655] syz.2.10537[1655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 763.461003][ T1655] syz.2.10537[1655] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 763.567706][ T1655] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10537'. [ 766.428834][ T29] kauditd_printk_skb: 684 callbacks suppressed [ 766.428849][ T29] audit: type=1400 audit(1734905967.675:186038): avc: denied { connect } for pid=1880 comm="syz.4.10561" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 766.455052][ T29] audit: type=1400 audit(1734905967.675:186039): avc: denied { name_connect } for pid=1880 comm="syz.4.10561" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:port_t tclass=dccp_socket permissive=1 [ 766.517044][ T1885] FAULT_INJECTION: forcing a failure. [ 766.517044][ T1885] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 766.530516][ T1885] CPU: 0 UID: 0 PID: 1885 Comm: syz.0.10562 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 766.541354][ T1885] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 766.551447][ T1885] Call Trace: [ 766.554747][ T1885] [ 766.557694][ T1885] dump_stack_lvl+0xf2/0x150 [ 766.562413][ T1885] dump_stack+0x15/0x1a [ 766.566678][ T1885] should_fail_ex+0x223/0x230 [ 766.571387][ T1885] should_fail+0xb/0x10 [ 766.575579][ T1885] should_fail_usercopy+0x1a/0x20 [ 766.580670][ T1885] _copy_to_user+0x20/0xa0 [ 766.585132][ T1885] simple_read_from_buffer+0xa0/0x110 [ 766.590595][ T1885] proc_fail_nth_read+0xf9/0x140 [ 766.595820][ T1885] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 766.601486][ T1885] vfs_read+0x1a2/0x700 [ 766.605688][ T1885] ? __rcu_read_unlock+0x4e/0x70 [ 766.610658][ T1885] ? __fget_files+0x17c/0x1c0 [ 766.615392][ T1885] ksys_read+0xe8/0x1b0 [ 766.619649][ T1885] __x64_sys_read+0x42/0x50 [ 766.624189][ T1885] x64_sys_call+0x2874/0x2dc0 [ 766.628885][ T1885] do_syscall_64+0xc9/0x1c0 [ 766.633424][ T1885] ? clear_bhb_loop+0x55/0xb0 [ 766.638116][ T1885] ? clear_bhb_loop+0x55/0xb0 [ 766.642907][ T1885] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 766.648836][ T1885] RIP: 0033:0x7f506be6473c [ 766.653336][ T1885] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 766.672966][ T1885] RSP: 002b:00007f506a4d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 766.681469][ T1885] RAX: ffffffffffffffda RBX: 00007f506c055fa0 RCX: 00007f506be6473c [ 766.689449][ T1885] RDX: 000000000000000f RSI: 00007f506a4d70a0 RDI: 0000000000000007 [ 766.697444][ T1885] RBP: 00007f506a4d7090 R08: 0000000000000000 R09: 0000000000000000 [ 766.705421][ T1885] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 766.713553][ T1885] R13: 0000000000000000 R14: 00007f506c055fa0 R15: 00007fff8c648588 [ 766.721538][ T1885] [ 766.799382][ T1886] hsr0: entered promiscuous mode [ 766.811885][ T1886] macsec1: entered allmulticast mode [ 766.817275][ T1886] hsr0: entered allmulticast mode [ 766.822407][ T1886] hsr_slave_0: entered allmulticast mode [ 766.828140][ T1886] hsr_slave_1: entered allmulticast mode [ 766.844279][ T1886] hsr0: left allmulticast mode [ 766.849231][ T1886] hsr_slave_0: left allmulticast mode [ 766.854791][ T1886] hsr_slave_1: left allmulticast mode [ 766.983287][ T1903] xt_CT: You must specify a L4 protocol and not use inversions on it [ 767.460196][ T1924] 9pnet_fd: Insufficient options for proto=fd [ 767.570284][ T29] audit: type=1326 audit(1734905968.815:186040): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1934 comm="syz.4.10579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 767.594326][ T29] audit: type=1326 audit(1734905968.815:186041): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1934 comm="syz.4.10579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=114 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 767.618071][ T29] audit: type=1326 audit(1734905968.815:186042): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1934 comm="syz.4.10579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 767.641784][ T29] audit: type=1326 audit(1734905968.815:186043): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1934 comm="syz.4.10579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 767.665850][ T29] audit: type=1326 audit(1734905968.815:186044): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1934 comm="syz.4.10579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 767.689731][ T29] audit: type=1326 audit(1734905968.815:186045): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1934 comm="syz.4.10579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 767.713509][ T29] audit: type=1326 audit(1734905968.815:186046): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1934 comm="syz.4.10579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 767.737306][ T29] audit: type=1326 audit(1734905968.815:186047): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=1934 comm="syz.4.10579" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 767.865516][ T1947] syz.4.10584[1947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.865593][ T1947] syz.4.10584[1947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.877194][ T1947] syz.4.10584[1947] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 767.891230][ T1947] netlink: 8 bytes leftover after parsing attributes in process `syz.4.10584'. [ 767.959638][ T1950] xt_CT: You must specify a L4 protocol and not use inversions on it [ 768.071392][ T1960] 9pnet_fd: Insufficient options for proto=fd [ 768.339876][ T1994] netlink: 16 bytes leftover after parsing attributes in process `+}[@'. [ 769.499541][ T2127] macsec1: entered allmulticast mode [ 769.504928][ T2127] hsr0: entered allmulticast mode [ 769.509980][ T2127] hsr_slave_0: entered allmulticast mode [ 769.515787][ T2127] hsr_slave_1: entered allmulticast mode [ 769.522281][ T2127] hsr0: left allmulticast mode [ 769.527228][ T2127] hsr_slave_0: left allmulticast mode [ 769.532620][ T2127] hsr_slave_1: left allmulticast mode [ 770.969668][ T2258] netlink: 112 bytes leftover after parsing attributes in process `syz.4.10623'. [ 770.996265][ T2271] xt_CT: You must specify a L4 protocol and not use inversions on it [ 771.224958][ T2299] syz.6.10633[2299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 771.225051][ T2299] syz.6.10633[2299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 771.238687][ T2299] syz.6.10633[2299] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 771.272282][ T2299] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10633'. [ 772.290050][ T2389] xt_CT: You must specify a L4 protocol and not use inversions on it [ 772.526395][ T2416] syz.1.10647[2416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 772.526479][ T2416] syz.1.10647[2416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 772.538247][ T2416] syz.1.10647[2416] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 772.554276][ T29] kauditd_printk_skb: 417 callbacks suppressed [ 772.571990][ T29] audit: type=1326 audit(1734905973.795:186465): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2417 comm="syz.0.10648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 772.595720][ T29] audit: type=1326 audit(1734905973.795:186466): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2417 comm="syz.0.10648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 772.619451][ T29] audit: type=1326 audit(1734905973.795:186467): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2417 comm="syz.0.10648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 772.621679][ T2416] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10647'. [ 772.643424][ T29] audit: type=1326 audit(1734905973.805:186468): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2417 comm="syz.0.10648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 772.676001][ T29] audit: type=1326 audit(1734905973.805:186469): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2417 comm="syz.0.10648" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 772.699840][ T29] audit: type=1326 audit(1734905973.805:186470): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2409 comm="syz.2.10645" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 772.723593][ T29] audit: type=1326 audit(1734905973.805:186471): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2409 comm="syz.2.10645" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 772.747312][ T29] audit: type=1326 audit(1734905973.805:186472): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2409 comm="syz.2.10645" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 772.771192][ T29] audit: type=1326 audit(1734905973.805:186473): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2409 comm="syz.2.10645" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 772.795033][ T29] audit: type=1326 audit(1734905973.805:186474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2409 comm="syz.2.10645" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 774.881355][ T2604] syz.6.10666[2604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 774.881424][ T2604] syz.6.10666[2604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 774.943765][ T2604] syz.6.10666[2604] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 774.958005][ T2604] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10666'. [ 775.258818][ T2631] netlink: 112 bytes leftover after parsing attributes in process `syz.0.10674'. [ 775.337483][ T2645] FAULT_INJECTION: forcing a failure. [ 775.337483][ T2645] name failslab, interval 1, probability 0, space 0, times 0 [ 775.350308][ T2645] CPU: 0 UID: 0 PID: 2645 Comm: syz.1.10680 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 775.361107][ T2645] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 775.371343][ T2645] Call Trace: [ 775.374699][ T2645] [ 775.377690][ T2645] dump_stack_lvl+0xf2/0x150 [ 775.382318][ T2645] dump_stack+0x15/0x1a [ 775.386522][ T2645] should_fail_ex+0x223/0x230 [ 775.391219][ T2645] should_failslab+0x8f/0xb0 [ 775.395858][ T2645] kmem_cache_alloc_noprof+0x52/0x320 [ 775.401251][ T2645] ? audit_log_start+0x34c/0x6b0 [ 775.406278][ T2645] audit_log_start+0x34c/0x6b0 [ 775.411130][ T2645] audit_seccomp+0x4b/0x130 [ 775.415641][ T2645] __seccomp_filter+0x6fa/0x1180 [ 775.420605][ T2645] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 775.426261][ T2645] ? vfs_write+0x596/0x920 [ 775.430711][ T2645] ? kmem_cache_free+0xdc/0x2d0 [ 775.435576][ T2645] __secure_computing+0x9f/0x1c0 [ 775.440602][ T2645] syscall_trace_enter+0xd1/0x1f0 [ 775.445701][ T2645] ? fpregs_assert_state_consistent+0x83/0xa0 [ 775.451871][ T2645] do_syscall_64+0xaa/0x1c0 [ 775.456497][ T2645] ? clear_bhb_loop+0x55/0xb0 [ 775.461182][ T2645] ? clear_bhb_loop+0x55/0xb0 [ 775.465877][ T2645] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 775.471797][ T2645] RIP: 0033:0x7f333c765d29 [ 775.476308][ T2645] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 775.495970][ T2645] RSP: 002b:00007f333add7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000042 [ 775.504466][ T2645] RAX: ffffffffffffffda RBX: 00007f333c955fa0 RCX: 00007f333c765d29 [ 775.512443][ T2645] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 0000000000000000 [ 775.520436][ T2645] RBP: 00007f333add7090 R08: 0000000000000000 R09: 0000000000000000 [ 775.528445][ T2645] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 775.536486][ T2645] R13: 0000000000000000 R14: 00007f333c955fa0 R15: 00007ffc9bd6dd28 [ 775.544472][ T2645] [ 775.742799][ T2663] syz.4.10689[2663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 775.742949][ T2663] syz.4.10689[2663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 775.756399][ T2663] syz.4.10689[2663] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 775.921437][ T2686] xt_CT: You must specify a L4 protocol and not use inversions on it [ 776.050473][ T2702] SELinux: syz.6.10706 (2702) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 777.516627][ T2796] netlink: 8 bytes leftover after parsing attributes in process `syz.0.10742'. [ 777.592449][ T29] kauditd_printk_skb: 1007 callbacks suppressed [ 777.592468][ T29] audit: type=1400 audit(1734905978.835:187480): avc: denied { watch_reads } for pid=2799 comm="syz.0.10744" path="/434" dev="tmpfs" ino=2277 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=dir permissive=1 [ 777.626750][ T2804] FAULT_INJECTION: forcing a failure. [ 777.626750][ T2804] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 777.639976][ T2804] CPU: 1 UID: 0 PID: 2804 Comm: syz.1.10746 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 777.650790][ T2804] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 777.651629][ T2806] 9pnet_fd: Insufficient options for proto=fd [ 777.660923][ T2804] Call Trace: [ 777.660996][ T2804] [ 777.661006][ T2804] dump_stack_lvl+0xf2/0x150 [ 777.677924][ T2804] dump_stack+0x15/0x1a [ 777.682188][ T2804] should_fail_ex+0x223/0x230 [ 777.686926][ T2804] should_fail+0xb/0x10 [ 777.691262][ T2804] should_fail_usercopy+0x1a/0x20 [ 777.696513][ T2804] _copy_from_user+0x1e/0xb0 [ 777.701137][ T2804] copy_msghdr_from_user+0x54/0x2a0 [ 777.706392][ T2804] ? __fget_files+0x17c/0x1c0 [ 777.711086][ T2804] __sys_sendmsg+0x13e/0x230 [ 777.715694][ T2804] __x64_sys_sendmsg+0x46/0x50 [ 777.720469][ T2804] x64_sys_call+0x2734/0x2dc0 [ 777.725152][ T2804] do_syscall_64+0xc9/0x1c0 [ 777.729656][ T2804] ? clear_bhb_loop+0x55/0xb0 [ 777.734343][ T2804] ? clear_bhb_loop+0x55/0xb0 [ 777.739020][ T2804] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 777.744994][ T2804] RIP: 0033:0x7f333c765d29 [ 777.749426][ T2804] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 777.769586][ T2804] RSP: 002b:00007f333add7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 777.778040][ T2804] RAX: ffffffffffffffda RBX: 00007f333c955fa0 RCX: 00007f333c765d29 [ 777.786017][ T2804] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000003 [ 777.794007][ T2804] RBP: 00007f333add7090 R08: 0000000000000000 R09: 0000000000000000 [ 777.802043][ T2804] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 777.810081][ T2804] R13: 0000000000000000 R14: 00007f333c955fa0 R15: 00007ffc9bd6dd28 [ 777.818075][ T2804] [ 777.831879][ T29] audit: type=1326 audit(1734905979.075:187481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2792 comm="syz.4.10741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 777.855816][ T29] audit: type=1326 audit(1734905979.075:187482): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2792 comm="syz.4.10741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 777.879592][ T29] audit: type=1326 audit(1734905979.075:187483): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2792 comm="syz.4.10741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 777.903255][ T29] audit: type=1326 audit(1734905979.075:187484): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2792 comm="syz.4.10741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 777.908001][ T2808] FAULT_INJECTION: forcing a failure. [ 777.908001][ T2808] name failslab, interval 1, probability 0, space 0, times 0 [ 777.939601][ T2808] CPU: 1 UID: 0 PID: 2808 Comm: syz.2.10748 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 777.950385][ T2808] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 777.960521][ T2808] Call Trace: [ 777.963876][ T2808] [ 777.966841][ T2808] dump_stack_lvl+0xf2/0x150 [ 777.971518][ T2808] dump_stack+0x15/0x1a [ 777.975702][ T2808] should_fail_ex+0x223/0x230 [ 777.980445][ T2808] should_failslab+0x8f/0xb0 [ 777.985057][ T2808] kmem_cache_alloc_noprof+0x52/0x320 [ 777.990439][ T2808] ? dst_alloc+0xc0/0x100 [ 777.994861][ T2808] ? __pfx_ip6_dst_gc+0x10/0x10 [ 777.999746][ T2808] dst_alloc+0xc0/0x100 [ 778.003971][ T2808] ip6_pol_route+0x6ff/0xb90 [ 778.008581][ T2808] ? ip6_pol_route+0x385/0xb90 [ 778.013454][ T2808] ip6_pol_route_input+0x40/0x50 [ 778.018455][ T2808] ? __pfx_ip6_pol_route_input+0x10/0x10 [ 778.024102][ T2808] fib6_rule_lookup+0x364/0x4e0 [ 778.028987][ T2808] ? __pfx_ip6_pol_route_input+0x10/0x10 [ 778.034643][ T2808] ? nf_nat_ipv6_fn+0x9f/0x1d0 [ 778.039435][ T2808] ip6_route_input+0x41e/0x4f0 [ 778.044319][ T2808] ip6_sublist_rcv+0x4f7/0xa40 [ 778.049169][ T2808] ? __pfx_ip6_rcv_finish+0x10/0x10 [ 778.054384][ T2808] ipv6_list_rcv+0x265/0x2a0 [ 778.058986][ T2808] ? __pfx_ipv6_list_rcv+0x10/0x10 [ 778.064181][ T2808] __netif_receive_skb_list_core+0x3c4/0x520 [ 778.070187][ T2808] netif_receive_skb_list_internal+0x4e4/0x660 [ 778.076364][ T2808] napi_complete_done+0x1b4/0x440 [ 778.081504][ T2808] ? tun_get_user+0x1da3/0x25c0 [ 778.086475][ T2808] tun_get_user+0x1dc0/0x25c0 [ 778.091175][ T2808] ? _parse_integer+0x27/0x30 [ 778.095874][ T2808] ? ref_tracker_alloc+0x1f5/0x2f0 [ 778.101004][ T2808] tun_chr_write_iter+0x188/0x240 [ 778.106043][ T2808] vfs_write+0x77f/0x920 [ 778.110324][ T2808] ? __pfx_tun_chr_write_iter+0x10/0x10 [ 778.115890][ T2808] ksys_write+0xe8/0x1b0 [ 778.120152][ T2808] __x64_sys_write+0x42/0x50 [ 778.124847][ T2808] x64_sys_call+0x287e/0x2dc0 [ 778.129594][ T2808] do_syscall_64+0xc9/0x1c0 [ 778.134160][ T2808] ? clear_bhb_loop+0x55/0xb0 [ 778.138889][ T2808] ? clear_bhb_loop+0x55/0xb0 [ 778.143616][ T2808] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 778.149632][ T2808] RIP: 0033:0x7f09ac2c5d29 [ 778.154173][ T2808] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 778.173793][ T2808] RSP: 002b:00007f09aa931038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 778.182311][ T2808] RAX: ffffffffffffffda RBX: 00007f09ac4b5fa0 RCX: 00007f09ac2c5d29 [ 778.190289][ T2808] RDX: 000000000000fdef RSI: 0000000020000440 RDI: 0000000000000003 [ 778.198490][ T2808] RBP: 00007f09aa931090 R08: 0000000000000000 R09: 0000000000000000 [ 778.206471][ T2808] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 778.214469][ T2808] R13: 0000000000000000 R14: 00007f09ac4b5fa0 R15: 00007ffc032fce78 [ 778.222451][ T2808] [ 778.235153][ T29] audit: type=1326 audit(1734905979.075:187485): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2792 comm="syz.4.10741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 778.259026][ T29] audit: type=1326 audit(1734905979.075:187486): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2792 comm="syz.4.10741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 778.282788][ T29] audit: type=1326 audit(1734905979.075:187487): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2792 comm="syz.4.10741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 778.306570][ T29] audit: type=1326 audit(1734905979.075:187488): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2792 comm="syz.4.10741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 778.330311][ T29] audit: type=1326 audit(1734905979.075:187489): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=2792 comm="syz.4.10741" exe="/root/syz-executor" sig=0 arch=c000003e syscall=282 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 779.621099][ T2924] msdos: Unknown parameter '18446744073709551615Oþø¥þ›ŸG5”û©s+01777777777777777777777ÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿÿ¨ÐÊ3†…ƒPq{ÚP [ 779.621099][ T2924] n'º|$@OOݱµ’-®+·el' [ 779.713069][ T2927] netlink: 8 bytes leftover after parsing attributes in process `syz.4.10766'. [ 779.748074][ T2927] bond1: entered promiscuous mode [ 779.753198][ T2927] bond1: entered allmulticast mode [ 779.759969][ T2927] 8021q: adding VLAN 0 to HW filter on device bond1 [ 779.768107][ T2924] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10765'. [ 779.832851][ T2942] netlink: 8 bytes leftover after parsing attributes in process `syz.0.10771'. [ 779.858737][ T2938] macsec1: entered allmulticast mode [ 779.864095][ T2938] hsr0: entered allmulticast mode [ 779.869216][ T2938] hsr_slave_0: entered allmulticast mode [ 779.874984][ T2938] hsr_slave_1: entered allmulticast mode [ 779.889311][ T2938] hsr0: left allmulticast mode [ 779.894216][ T2938] hsr_slave_0: left allmulticast mode [ 779.899807][ T2938] hsr_slave_1: left allmulticast mode [ 781.505895][ T3082] sit0: entered allmulticast mode [ 781.646679][ T3082] sit0: entered promiscuous mode [ 783.284122][ T3218] netlink: 4 bytes leftover after parsing attributes in process `syz.4.10798'. [ 783.293369][ T29] kauditd_printk_skb: 624 callbacks suppressed [ 783.293387][ T29] audit: type=1400 audit(1734905984.525:188114): avc: denied { create } for pid=3217 comm="syz.4.10798" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 783.319719][ T29] audit: type=1400 audit(1734905984.525:188115): avc: denied { read write } for pid=3217 comm="syz.4.10798" name="rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 783.343255][ T29] audit: type=1400 audit(1734905984.525:188116): avc: denied { open } for pid=3217 comm="syz.4.10798" path="/dev/infiniband/rdma_cm" dev="devtmpfs" ino=251 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=chr_file permissive=1 [ 783.367721][ T29] audit: type=1326 audit(1734905984.525:188117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3217 comm="syz.4.10798" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 783.391504][ T29] audit: type=1326 audit(1734905984.525:188118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3217 comm="syz.4.10798" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 783.415337][ T29] audit: type=1326 audit(1734905984.525:188119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3217 comm="syz.4.10798" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 783.439543][ T29] audit: type=1326 audit(1734905984.525:188120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3217 comm="syz.4.10798" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 783.463253][ T29] audit: type=1326 audit(1734905984.525:188121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3217 comm="syz.4.10798" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 783.487129][ T29] audit: type=1326 audit(1734905984.525:188122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3217 comm="syz.4.10798" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 783.510815][ T29] audit: type=1326 audit(1734905984.525:188123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3217 comm="syz.4.10798" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 784.610648][ T3250] netlink: 8 bytes leftover after parsing attributes in process `syz.4.10808'. [ 784.778984][ T3256] netlink: 'syz.2.10810': attribute type 13 has an invalid length. [ 784.786963][ T3256] netlink: 152 bytes leftover after parsing attributes in process `syz.2.10810'. [ 786.531818][ T3304] wireguard0: entered promiscuous mode [ 786.537454][ T3304] wireguard0: entered allmulticast mode [ 787.535479][ T3444] netlink: 8 bytes leftover after parsing attributes in process `syz.4.10834'. [ 787.550790][ T3444] bond2: entered promiscuous mode [ 787.556025][ T3444] bond2: entered allmulticast mode [ 787.561402][ T3444] 8021q: adding VLAN 0 to HW filter on device bond2 [ 787.582391][ T3444] macsec1: entered allmulticast mode [ 787.587821][ T3444] hsr0: entered allmulticast mode [ 787.592956][ T3444] hsr_slave_0: entered allmulticast mode [ 787.598637][ T3444] hsr_slave_1: entered allmulticast mode [ 787.605885][ T3444] hsr0: left allmulticast mode [ 787.610728][ T3444] hsr_slave_0: left allmulticast mode [ 787.616214][ T3444] hsr_slave_1: left allmulticast mode [ 787.961732][ T3514] sctp: [Deprecated]: syz.2.10840 (pid 3514) Use of struct sctp_assoc_value in delayed_ack socket option. [ 787.961732][ T3514] Use struct sctp_sack_info instead [ 788.294512][ T29] kauditd_printk_skb: 1262 callbacks suppressed [ 788.294527][ T29] audit: type=1326 audit(1734905989.535:189386): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3438 comm="syz.1.10833" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f333c75cce7 code=0x7ffc0000 [ 788.324523][ T29] audit: type=1326 audit(1734905989.545:189387): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3438 comm="syz.1.10833" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f333c701f29 code=0x7ffc0000 [ 788.348174][ T29] audit: type=1326 audit(1734905989.545:189388): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3438 comm="syz.1.10833" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f333c765d29 code=0x7ffc0000 [ 788.371763][ T29] audit: type=1326 audit(1734905989.545:189389): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3438 comm="syz.1.10833" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f333c75cce7 code=0x7ffc0000 [ 788.395619][ T29] audit: type=1326 audit(1734905989.545:189390): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3438 comm="syz.1.10833" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f333c701f29 code=0x7ffc0000 [ 788.419305][ T29] audit: type=1326 audit(1734905989.545:189391): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3438 comm="syz.1.10833" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f333c765d29 code=0x7ffc0000 [ 788.442852][ T29] audit: type=1326 audit(1734905989.545:189392): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3438 comm="syz.1.10833" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f333c75cce7 code=0x7ffc0000 [ 788.466828][ T29] audit: type=1326 audit(1734905989.545:189393): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3438 comm="syz.1.10833" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f333c701f29 code=0x7ffc0000 [ 788.490575][ T29] audit: type=1326 audit(1734905989.545:189394): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3438 comm="syz.1.10833" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f333c765d29 code=0x7ffc0000 [ 788.514158][ T29] audit: type=1326 audit(1734905989.545:189395): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3438 comm="syz.1.10833" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f333c75cce7 code=0x7ffc0000 [ 788.743577][ T3603] @: renamed from vlan0 (while UP) [ 788.756331][ T3606] loop0: detected capacity change from 0 to 128 [ 788.772793][ T3606] vfat: Unknown parameter '00000000000000000000000' [ 788.780649][ T3603] syz.6.10842[3603] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 788.780779][ T3603] syz.6.10842[3603] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 788.812762][ T3603] syz.6.10842[3603] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 788.849298][ T3603] IPVS: Error connecting to the multicast addr [ 789.050640][ T3636] syz.4.10852[3636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 789.050703][ T3636] syz.4.10852[3636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 789.063672][ T3636] syz.4.10852[3636] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 789.267760][ T3645] netlink: 8 bytes leftover after parsing attributes in process `syz.4.10856'. [ 789.328549][ T3646] macsec1: entered allmulticast mode [ 789.333933][ T3646] hsr0: entered allmulticast mode [ 789.339180][ T3646] hsr_slave_0: entered allmulticast mode [ 789.344880][ T3646] hsr_slave_1: entered allmulticast mode [ 789.366509][ T3646] hsr0: left allmulticast mode [ 789.371323][ T3646] hsr_slave_0: left allmulticast mode [ 789.376781][ T3646] hsr_slave_1: left allmulticast mode [ 789.428245][ T3645] bond3: entered promiscuous mode [ 789.433332][ T3645] bond3: entered allmulticast mode [ 789.454509][ T3645] 8021q: adding VLAN 0 to HW filter on device bond3 [ 789.695980][ T3654] FAULT_INJECTION: forcing a failure. [ 789.695980][ T3654] name failslab, interval 1, probability 0, space 0, times 0 [ 789.708697][ T3654] CPU: 1 UID: 0 PID: 3654 Comm: syz.4.10859 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 789.719532][ T3654] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 789.729646][ T3654] Call Trace: [ 789.732945][ T3654] [ 789.735912][ T3654] dump_stack_lvl+0xf2/0x150 [ 789.740567][ T3654] dump_stack+0x15/0x1a [ 789.744961][ T3654] should_fail_ex+0x223/0x230 [ 789.749719][ T3654] should_failslab+0x8f/0xb0 [ 789.754404][ T3654] kmem_cache_alloc_noprof+0x52/0x320 [ 789.759800][ T3654] ? alloc_empty_file+0xd0/0x200 [ 789.764780][ T3654] alloc_empty_file+0xd0/0x200 [ 789.769569][ T3654] path_openat+0x6a/0x1fa0 [ 789.774063][ T3654] ? send_signal_locked+0x28f/0x3a0 [ 789.779372][ T3654] ? _parse_integer_limit+0x167/0x180 [ 789.784755][ T3654] ? _parse_integer+0x27/0x30 [ 789.789455][ T3654] ? kstrtoull+0x110/0x140 [ 789.793878][ T3654] ? kstrtouint+0x77/0xc0 [ 789.798217][ T3654] ? kstrtouint_from_user+0xb0/0xe0 [ 789.803493][ T3654] do_filp_open+0x107/0x230 [ 789.808074][ T3654] do_sys_openat2+0xab/0x120 [ 789.812694][ T3654] __x64_sys_openat+0xf3/0x120 [ 789.817490][ T3654] x64_sys_call+0x2b30/0x2dc0 [ 789.822186][ T3654] do_syscall_64+0xc9/0x1c0 [ 789.826721][ T3654] ? clear_bhb_loop+0x55/0xb0 [ 789.831428][ T3654] ? clear_bhb_loop+0x55/0xb0 [ 789.836184][ T3654] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 789.842100][ T3654] RIP: 0033:0x7fa3eb9a4690 [ 789.846588][ T3654] Code: 48 89 44 24 20 75 93 44 89 54 24 0c e8 49 94 02 00 44 8b 54 24 0c 89 da 48 89 ee 41 89 c0 bf 9c ff ff ff b8 01 01 00 00 0f 05 <48> 3d 00 f0 ff ff 77 38 44 89 c7 89 44 24 0c e8 9c 94 02 00 8b 44 [ 789.866233][ T3654] RSP: 002b:00007fa3ea010f10 EFLAGS: 00000293 ORIG_RAX: 0000000000000101 [ 789.874704][ T3654] RAX: ffffffffffffffda RBX: 0000000000000002 RCX: 00007fa3eb9a4690 [ 789.882682][ T3654] RDX: 0000000000000002 RSI: 00007fa3ea010fa0 RDI: 00000000ffffff9c [ 789.890722][ T3654] RBP: 00007fa3ea010fa0 R08: 0000000000000000 R09: 00007fa3ea010cd5 [ 789.898703][ T3654] R10: 0000000000000000 R11: 0000000000000293 R12: 0000000000000001 [ 789.906728][ T3654] R13: 0000000000000000 R14: 00007fa3ebb95fa0 R15: 00007fff573fd018 [ 789.914711][ T3654] [ 789.954505][ T3652] FAULT_INJECTION: forcing a failure. [ 789.954505][ T3652] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 789.967620][ T3652] CPU: 0 UID: 0 PID: 3652 Comm: syz.0.10858 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 789.978513][ T3652] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 789.988603][ T3652] Call Trace: [ 789.992013][ T3652] [ 789.995021][ T3652] dump_stack_lvl+0xf2/0x150 [ 789.999765][ T3652] dump_stack+0x15/0x1a [ 790.003964][ T3652] should_fail_ex+0x223/0x230 [ 790.008728][ T3652] should_fail+0xb/0x10 [ 790.012919][ T3652] should_fail_usercopy+0x1a/0x20 [ 790.017989][ T3652] _copy_to_user+0x20/0xa0 [ 790.022443][ T3652] simple_read_from_buffer+0xa0/0x110 [ 790.027849][ T3652] proc_fail_nth_read+0xf9/0x140 [ 790.032829][ T3652] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 790.038421][ T3652] vfs_read+0x1a2/0x700 [ 790.042644][ T3652] ? __rcu_read_unlock+0x4e/0x70 [ 790.047665][ T3652] ? __fget_files+0x17c/0x1c0 [ 790.052415][ T3652] ksys_read+0xe8/0x1b0 [ 790.056612][ T3652] __x64_sys_read+0x42/0x50 [ 790.061205][ T3652] x64_sys_call+0x2874/0x2dc0 [ 790.065904][ T3652] do_syscall_64+0xc9/0x1c0 [ 790.070465][ T3652] ? clear_bhb_loop+0x55/0xb0 [ 790.075239][ T3652] ? clear_bhb_loop+0x55/0xb0 [ 790.079948][ T3652] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 790.085930][ T3652] RIP: 0033:0x7f506be6473c [ 790.090401][ T3652] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 790.110096][ T3652] RSP: 002b:00007f506a4d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 790.118619][ T3652] RAX: ffffffffffffffda RBX: 00007f506c055fa0 RCX: 00007f506be6473c [ 790.126616][ T3652] RDX: 000000000000000f RSI: 00007f506a4d70a0 RDI: 0000000000000005 [ 790.134644][ T3652] RBP: 00007f506a4d7090 R08: 0000000000000000 R09: 0000000000000000 [ 790.142643][ T3652] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 790.150823][ T3652] R13: 0000000000000000 R14: 00007f506c055fa0 R15: 00007fff8c648588 [ 790.158830][ T3652] [ 790.222947][ T3687] netlink: 8 bytes leftover after parsing attributes in process `syz.4.10873'. [ 790.223943][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.239526][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.246955][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.254398][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.261798][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.269291][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.276758][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.284225][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.291744][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.299171][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.306603][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.314002][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.321437][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.328872][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.336450][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.343878][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.351349][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.358769][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.366185][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.373599][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.381146][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.388670][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.396122][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.403518][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.410933][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.418362][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.425827][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.433265][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.440693][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.448158][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.455595][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.462999][ T8] hid-generic 0000:0000:0000.0005: unknown main item tag 0x0 [ 790.480696][ T3691] loop0: detected capacity change from 0 to 2048 [ 790.487294][ T8] hid-generic 0000:0000:0000.0005: hidraw0: HID v0.00 Device [syz0] on syz0 [ 790.499079][ T3691] EXT4-fs: Mount option(s) incompatible with ext3 [ 790.511530][ T3683] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10871'. [ 790.542062][ T3683] bond0: entered promiscuous mode [ 790.547197][ T3683] bond0: entered allmulticast mode [ 790.552610][ T3683] 8021q: adding VLAN 0 to HW filter on device bond0 [ 790.571194][ T3683] hsr0: entered promiscuous mode [ 790.576495][ T3683] macsec1: entered allmulticast mode [ 790.581835][ T3683] hsr0: entered allmulticast mode [ 790.586908][ T3683] hsr_slave_0: entered allmulticast mode [ 790.592580][ T3683] hsr_slave_1: entered allmulticast mode [ 790.601126][ T3683] hsr0: left allmulticast mode [ 790.606077][ T3683] hsr_slave_0: left allmulticast mode [ 790.611543][ T3683] hsr_slave_1: left allmulticast mode [ 790.705003][ T3700] syz.6.10875[3700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 790.705138][ T3700] syz.6.10875[3700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 790.744409][ T3700] syz.6.10875[3700] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 790.767376][ T3713] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10877'. [ 792.550767][ T3889] sit0: left promiscuous mode [ 792.707383][ T3909] loop0: detected capacity change from 0 to 512 [ 792.724823][ T3912] syz.2.10900[3912] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 792.748114][ T3909] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 792.784009][ T3909] ext4 filesystem being mounted at /460/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 793.085247][ T3952] sit0: entered allmulticast mode [ 793.312287][ T29] kauditd_printk_skb: 848 callbacks suppressed [ 793.312312][ T29] audit: type=1326 audit(1734905994.555:190244): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3872 comm="syz.6.10890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 793.343688][ T29] audit: type=1326 audit(1734905994.565:190245): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3872 comm="syz.6.10890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6a6ecd1f29 code=0x7ffc0000 [ 793.367416][ T29] audit: type=1326 audit(1734905994.565:190246): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3872 comm="syz.6.10890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6a6ed35d29 code=0x7ffc0000 [ 793.391107][ T29] audit: type=1326 audit(1734905994.585:190247): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3872 comm="syz.6.10890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 793.414701][ T29] audit: type=1326 audit(1734905994.585:190248): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3872 comm="syz.6.10890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6a6ecd1f29 code=0x7ffc0000 [ 793.438344][ T29] audit: type=1326 audit(1734905994.585:190249): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3872 comm="syz.6.10890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6a6ed35d29 code=0x7ffc0000 [ 793.586056][T28343] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 793.612462][ T29] audit: type=1326 audit(1734905994.595:190250): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3872 comm="syz.6.10890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 793.612565][ T4033] netlink: 8 bytes leftover after parsing attributes in process `syz.1.10913'. [ 793.636275][ T29] audit: type=1326 audit(1734905994.595:190251): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3872 comm="syz.6.10890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6a6ecd1f29 code=0x7ffc0000 [ 793.669260][ T29] audit: type=1326 audit(1734905994.595:190252): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3872 comm="syz.6.10890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6a6ed35d29 code=0x7ffc0000 [ 793.693088][ T29] audit: type=1326 audit(1734905994.605:190253): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=3872 comm="syz.6.10890" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 793.779206][ T4047] macsec1: entered allmulticast mode [ 793.784644][ T4047] hsr0: entered allmulticast mode [ 793.789762][ T4047] hsr_slave_0: entered allmulticast mode [ 793.795578][ T4047] hsr_slave_1: entered allmulticast mode [ 793.818527][ T4045] 9pnet_fd: Insufficient options for proto=fd [ 793.828622][ T4047] hsr0: left allmulticast mode [ 793.833503][ T4047] hsr_slave_0: left allmulticast mode [ 793.839000][ T4047] hsr_slave_1: left allmulticast mode [ 794.054075][ T4077] netlink: 28 bytes leftover after parsing attributes in process `syz.1.10923'. [ 794.091749][ T4097] sit0: entered allmulticast mode [ 795.033207][ T4188] netlink: 8 bytes leftover after parsing attributes in process `syz.4.10932'. [ 795.073817][ T4191] 9pnet_fd: Insufficient options for proto=fd [ 795.108699][ T4188] bond4: entered promiscuous mode [ 795.113793][ T4188] bond4: entered allmulticast mode [ 795.119357][ T4188] 8021q: adding VLAN 0 to HW filter on device bond4 [ 795.137674][ T4196] macsec1: entered allmulticast mode [ 795.143048][ T4196] hsr0: entered allmulticast mode [ 795.148510][ T4196] hsr_slave_0: entered allmulticast mode [ 795.154197][ T4196] hsr_slave_1: entered allmulticast mode [ 795.211889][ T4196] hsr0: left allmulticast mode [ 795.216807][ T4196] hsr_slave_0: left allmulticast mode [ 795.222234][ T4196] hsr_slave_1: left allmulticast mode [ 795.293279][ T3376] IPVS: starting estimator thread 0... [ 795.384988][ T4209] IPVS: using max 2256 ests per chain, 112800 per kthread [ 796.168066][ T4247] netlink: 8 bytes leftover after parsing attributes in process `syz.2.10952'. [ 796.183084][ T4247] bond0: entered promiscuous mode [ 796.188195][ T4247] bond0: entered allmulticast mode [ 796.193504][ T4247] 8021q: adding VLAN 0 to HW filter on device bond0 [ 796.210004][ T4247] hsr0: entered promiscuous mode [ 796.219602][ T4247] macsec1: entered allmulticast mode [ 796.224977][ T4247] hsr0: entered allmulticast mode [ 796.230051][ T4247] hsr_slave_0: entered allmulticast mode [ 796.235762][ T4247] hsr_slave_1: entered allmulticast mode [ 796.247021][ T4247] hsr0: left allmulticast mode [ 796.251853][ T4247] hsr_slave_0: left allmulticast mode [ 796.257345][ T4247] hsr_slave_1: left allmulticast mode [ 796.401554][ T4266] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10960'. [ 796.407370][ T4268] netlink: 8 bytes leftover after parsing attributes in process `syz.4.10961'. [ 796.742757][ T4286] 9pnet_fd: Insufficient options for proto=fd [ 797.393797][ T4294] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 797.466925][ T4294] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 797.484162][ T4296] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10972'. [ 797.720473][ T4317] 9pnet_fd: Insufficient options for proto=fd [ 798.103500][ T4331] netlink: 8 bytes leftover after parsing attributes in process `syz.6.10984'. [ 798.537166][ T29] kauditd_printk_skb: 1013 callbacks suppressed [ 798.537180][ T29] audit: type=1326 audit(1734905999.785:191267): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4340 comm="syz.2.10989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 798.567191][ T29] audit: type=1326 audit(1734905999.785:191268): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4340 comm="syz.2.10989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 798.661690][ T29] audit: type=1326 audit(1734905999.845:191269): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4340 comm="syz.2.10989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 798.685425][ T29] audit: type=1326 audit(1734905999.845:191270): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4340 comm="syz.2.10989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 798.709377][ T29] audit: type=1326 audit(1734905999.845:191271): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4340 comm="syz.2.10989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 798.733128][ T29] audit: type=1326 audit(1734905999.855:191272): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4340 comm="syz.2.10989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 798.756879][ T29] audit: type=1326 audit(1734905999.865:191273): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4340 comm="syz.2.10989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 798.780668][ T29] audit: type=1326 audit(1734905999.865:191274): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4340 comm="syz.2.10989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 798.804509][ T29] audit: type=1326 audit(1734905999.865:191275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4340 comm="syz.2.10989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 798.828518][ T29] audit: type=1326 audit(1734905999.865:191276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4340 comm="syz.2.10989" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 798.916314][ T4364] 9pnet_fd: Insufficient options for proto=fd [ 801.594723][ T4521] FAULT_INJECTION: forcing a failure. [ 801.594723][ T4521] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 801.607831][ T4521] CPU: 1 UID: 0 PID: 4521 Comm: syz.0.11020 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 801.618655][ T4521] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 801.628814][ T4521] Call Trace: [ 801.632119][ T4521] [ 801.635070][ T4521] dump_stack_lvl+0xf2/0x150 [ 801.639709][ T4521] dump_stack+0x15/0x1a [ 801.643908][ T4521] should_fail_ex+0x223/0x230 [ 801.648696][ T4521] should_fail+0xb/0x10 [ 801.652882][ T4521] should_fail_usercopy+0x1a/0x20 [ 801.657945][ T4521] _copy_from_iter+0xd5/0xd00 [ 801.662711][ T4521] ? kmalloc_reserve+0x16e/0x190 [ 801.667753][ T4521] ? __build_skb_around+0x196/0x1f0 [ 801.673011][ T4521] ? __alloc_skb+0x21f/0x310 [ 801.677647][ T4521] ? __virt_addr_valid+0x1ed/0x250 [ 801.682825][ T4521] ? __check_object_size+0x364/0x520 [ 801.688149][ T4521] netlink_sendmsg+0x460/0x6e0 [ 801.692986][ T4521] ? __pfx_netlink_sendmsg+0x10/0x10 [ 801.698341][ T4521] __sock_sendmsg+0x140/0x180 [ 801.703136][ T4521] ____sys_sendmsg+0x312/0x410 [ 801.707933][ T4521] __sys_sendmsg+0x19d/0x230 [ 801.712609][ T4521] __x64_sys_sendmsg+0x46/0x50 [ 801.717401][ T4521] x64_sys_call+0x2734/0x2dc0 [ 801.722179][ T4521] do_syscall_64+0xc9/0x1c0 [ 801.726800][ T4521] ? clear_bhb_loop+0x55/0xb0 [ 801.731508][ T4521] ? clear_bhb_loop+0x55/0xb0 [ 801.736268][ T4521] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 801.742210][ T4521] RIP: 0033:0x7f506be65d29 [ 801.746714][ T4521] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 801.766347][ T4521] RSP: 002b:00007f506a4d7038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 801.774813][ T4521] RAX: ffffffffffffffda RBX: 00007f506c055fa0 RCX: 00007f506be65d29 [ 801.782853][ T4521] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000000000007 [ 801.790855][ T4521] RBP: 00007f506a4d7090 R08: 0000000000000000 R09: 0000000000000000 [ 801.798879][ T4521] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 801.806873][ T4521] R13: 0000000000000000 R14: 00007f506c055fa0 R15: 00007fff8c648588 [ 801.814877][ T4521] [ 803.454244][ T4653] netlink: 8 bytes leftover after parsing attributes in process `syz.2.11039'. [ 803.574475][ T4639] FAULT_INJECTION: forcing a failure. [ 803.574475][ T4639] name failslab, interval 1, probability 0, space 0, times 0 [ 803.587158][ T4639] CPU: 0 UID: 0 PID: 4639 Comm: syz.1.11034 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 803.598026][ T4639] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 803.608187][ T4639] Call Trace: [ 803.611524][ T4639] [ 803.614460][ T4639] dump_stack_lvl+0xf2/0x150 [ 803.619106][ T4639] dump_stack+0x15/0x1a [ 803.623363][ T4639] should_fail_ex+0x223/0x230 [ 803.628088][ T4639] should_failslab+0x8f/0xb0 [ 803.632730][ T4639] kmem_cache_alloc_noprof+0x52/0x320 [ 803.633687][ T29] kauditd_printk_skb: 727 callbacks suppressed [ 803.633704][ T29] audit: type=1326 audit(1734906004.725:192004): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4651 comm="syz.0.11040" exe="/root/syz-executor" sig=0 arch=c000003e syscall=144 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 803.638174][ T4639] ? __mpol_dup+0x43/0x1b0 [ 803.644440][ T29] audit: type=1326 audit(1734906004.725:192005): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4651 comm="syz.0.11040" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 803.667949][ T4639] __mpol_dup+0x43/0x1b0 [ 803.667984][ T4639] mbind_range+0x208/0x490 [ 803.672413][ T29] audit: type=1326 audit(1734906004.725:192006): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4651 comm="syz.0.11040" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 803.672442][ T29] audit: type=1326 audit(1734906004.725:192007): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4651 comm="syz.0.11040" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 803.696029][ T4639] __se_sys_mbind+0x915/0x1160 [ 803.696072][ T4639] __x64_sys_mbind+0x78/0x90 [ 803.696169][ T4639] x64_sys_call+0x2662/0x2dc0 [ 803.700328][ T29] audit: type=1326 audit(1734906004.825:192008): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4651 comm="syz.0.11040" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 803.704718][ T4639] do_syscall_64+0xc9/0x1c0 [ 803.728360][ T29] audit: type=1326 audit(1734906004.825:192009): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4651 comm="syz.0.11040" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 803.751745][ T4639] ? clear_bhb_loop+0x55/0xb0 [ 803.751774][ T4639] ? clear_bhb_loop+0x55/0xb0 [ 803.756542][ T29] audit: type=1326 audit(1734906004.835:192010): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4621 comm="syz.6.11028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 803.761096][ T4639] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 803.765784][ T29] audit: type=1326 audit(1734906004.835:192011): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4621 comm="syz.6.11028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6a6ecd1f29 code=0x7ffc0000 [ 803.789345][ T4639] RIP: 0033:0x7f333c765d29 [ 803.789369][ T4639] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 803.789392][ T4639] RSP: 002b:00007f333add7038 EFLAGS: 00000246 [ 803.793880][ T29] audit: type=1326 audit(1734906004.835:192012): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4621 comm="syz.6.11028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6a6ed35d29 code=0x7ffc0000 [ 803.817454][ T4639] ORIG_RAX: 00000000000000ed [ 803.817466][ T4639] RAX: ffffffffffffffda RBX: 00007f333c955fa0 RCX: 00007f333c765d29 [ 803.817484][ T4639] RDX: 0000000000000004 RSI: 0000000000800000 RDI: 0000000020001000 [ 803.822170][ T29] audit: type=1326 audit(1734906004.835:192013): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4621 comm="syz.6.11028" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 803.826835][ T4639] RBP: 00007f333add7090 R08: 0000000000000000 R09: 0000000000000002 [ 803.826857][ T4639] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 803.994201][ T4639] R13: 0000000000000001 R14: 00007f333c955fa0 R15: 00007ffc9bd6dd28 [ 804.002340][ T4639] [ 804.019103][ T4653] bond1: entered promiscuous mode [ 804.024186][ T4653] bond1: entered allmulticast mode [ 804.053675][ T4653] 8021q: adding VLAN 0 to HW filter on device bond1 [ 804.115877][ T4655] macsec1: entered allmulticast mode [ 804.121227][ T4655] hsr0: entered allmulticast mode [ 804.126614][ T4655] hsr_slave_0: entered allmulticast mode [ 804.132288][ T4655] hsr_slave_1: entered allmulticast mode [ 804.149144][ T4655] hsr0: left allmulticast mode [ 804.153975][ T4655] hsr_slave_0: left allmulticast mode [ 804.159586][ T4655] hsr_slave_1: left allmulticast mode [ 804.200768][ T4665] IPv6: Can't replace route, no match found [ 804.458498][ T4675] netlink: 76 bytes leftover after parsing attributes in process `syz.6.11048'. [ 804.481926][ T4677] 9pnet_fd: Insufficient options for proto=fd [ 804.546155][ T4678] netlink: 28 bytes leftover after parsing attributes in process `syz.6.11048'. [ 805.090566][ T4696] netlink: 8 bytes leftover after parsing attributes in process `syz.6.11056'. [ 805.113953][ T4696] bond1: entered promiscuous mode [ 805.119070][ T4696] bond1: entered allmulticast mode [ 805.124661][ T4696] 8021q: adding VLAN 0 to HW filter on device bond1 [ 805.170612][ T4696] macsec1: entered allmulticast mode [ 805.176081][ T4696] hsr0: entered allmulticast mode [ 805.181125][ T4696] hsr_slave_0: entered allmulticast mode [ 805.187004][ T4696] hsr_slave_1: entered allmulticast mode [ 805.249721][ T4696] hsr0: left allmulticast mode [ 805.254680][ T4696] hsr_slave_0: left allmulticast mode [ 805.260417][ T4696] hsr_slave_1: left allmulticast mode [ 805.292949][ T4708] 9pnet_fd: Insufficient options for proto=fd [ 805.312963][ T4703] IPv6: Can't replace route, no match found [ 806.054200][ T4755] Cannot find add_set index 0 as target [ 806.701247][ T4781] 9pnet_fd: Insufficient options for proto=fd [ 806.719193][ T4815] netlink: 8 bytes leftover after parsing attributes in process `syz.6.11079'. [ 806.953566][ T4839] netlink: 28 bytes leftover after parsing attributes in process `syz.1.11081'. [ 807.566423][ T4867] loop0: detected capacity change from 0 to 512 [ 807.622687][ T4867] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 807.649300][ T4867] ext4 filesystem being mounted at /490/file1 supports timestamps until 2038-01-19 (0x7fffffff) [ 807.695005][T28343] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 807.717770][ T4880] netlink: 4 bytes leftover after parsing attributes in process `syz.0.11092'. [ 808.001977][ T4907] loop0: detected capacity change from 0 to 512 [ 808.027051][ T4907] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 808.040329][ T4907] ext4 filesystem being mounted at /494/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 808.635511][ T29] kauditd_printk_skb: 554 callbacks suppressed [ 808.635529][ T29] audit: type=1326 audit(1734906009.885:192568): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4875 comm="syz.6.11090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 808.681938][ T29] audit: type=1326 audit(1734906009.885:192569): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4875 comm="syz.6.11090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6a6ecd1f29 code=0x7ffc0000 [ 808.705700][ T29] audit: type=1326 audit(1734906009.885:192570): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4875 comm="syz.6.11090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6a6ed35d29 code=0x7ffc0000 [ 808.729395][ T29] audit: type=1326 audit(1734906009.915:192571): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4875 comm="syz.6.11090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 808.753131][ T29] audit: type=1326 audit(1734906009.915:192572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4875 comm="syz.6.11090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6a6ecd1f29 code=0x7ffc0000 [ 808.776757][ T29] audit: type=1326 audit(1734906009.915:192573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4875 comm="syz.6.11090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6a6ed35d29 code=0x7ffc0000 [ 808.800559][ T29] audit: type=1326 audit(1734906009.925:192574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4875 comm="syz.6.11090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 808.824224][ T29] audit: type=1326 audit(1734906009.925:192575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4875 comm="syz.6.11090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6a6ecd1f29 code=0x7ffc0000 [ 808.847873][ T29] audit: type=1326 audit(1734906009.925:192576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4875 comm="syz.6.11090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6a6ed35d29 code=0x7ffc0000 [ 808.881495][ T29] audit: type=1326 audit(1734906009.925:192577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=4875 comm="syz.6.11090" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 808.987848][T28343] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 809.008771][ T5031] netlink: 4 bytes leftover after parsing attributes in process `syz.2.11105'. [ 809.067189][ T5033] netlink: 76 bytes leftover after parsing attributes in process `syz.1.11106'. [ 809.123242][ T5042] netlink: 12 bytes leftover after parsing attributes in process `syz.1.11108'. [ 809.907518][ T5081] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11116'. [ 809.974053][ T5081] bond0: entered promiscuous mode [ 809.979272][ T5081] bond0: entered allmulticast mode [ 809.991077][ T5081] 8021q: adding VLAN 0 to HW filter on device bond0 [ 810.041212][ T5085] macsec1: entered allmulticast mode [ 810.046635][ T5085] hsr0: entered allmulticast mode [ 810.051688][ T5085] hsr_slave_0: entered allmulticast mode [ 810.057371][ T5085] hsr_slave_1: entered allmulticast mode [ 810.076515][ T5085] hsr0: left allmulticast mode [ 810.081357][ T5085] hsr_slave_0: left allmulticast mode [ 810.086944][ T5085] hsr_slave_1: left allmulticast mode [ 810.201755][ T5091] netlink: 4 bytes leftover after parsing attributes in process `syz.1.11120'. [ 810.392417][ T5100] netlink: 28 bytes leftover after parsing attributes in process `syz.1.11124'. [ 810.481939][ T5108] loop0: detected capacity change from 0 to 1024 [ 810.504212][ T5108] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 810.556532][ T5108] bpf_get_probe_write_proto: 5 callbacks suppressed [ 810.556553][ T5108] syz.0.11128[5108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 810.563334][ T5108] syz.0.11128[5108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 810.582804][ T5108] syz.0.11128[5108] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 810.643331][ T5108] netlink: 36 bytes leftover after parsing attributes in process `syz.0.11128'. [ 810.728803][T28343] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 810.782715][ T5134] netlink: 4 bytes leftover after parsing attributes in process `syz.0.11132'. [ 810.946087][ T5147] netlink: 28 bytes leftover after parsing attributes in process `syz.6.11138'. [ 811.015888][ T5158] loop0: detected capacity change from 0 to 512 [ 811.038433][ T5158] EXT4-fs (loop0): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 811.054813][ T5158] ext4 filesystem being mounted at /505/bus supports timestamps until 2038-01-19 (0x7fffffff) [ 811.882899][T28343] EXT4-fs (loop0): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 811.917690][ T5290] netlink: 4 bytes leftover after parsing attributes in process `syz.6.11147'. [ 812.030856][ T5301] bond2: entered promiscuous mode [ 812.036032][ T5301] bond2: entered allmulticast mode [ 812.041464][ T5301] 8021q: adding VLAN 0 to HW filter on device bond2 [ 812.088509][ T5301] macsec1: entered allmulticast mode [ 812.093863][ T5301] hsr0: entered allmulticast mode [ 812.099000][ T5301] hsr_slave_0: entered allmulticast mode [ 812.104857][ T5301] hsr_slave_1: entered allmulticast mode [ 812.112632][ T5301] hsr0: left allmulticast mode [ 812.117534][ T5301] hsr_slave_0: left allmulticast mode [ 812.122934][ T5301] hsr_slave_1: left allmulticast mode [ 812.944155][ T5430] sit0: entered allmulticast mode [ 813.211313][ T5467] netdevsim netdevsim4 netdevsim0: set [1, 1] type 2 family 0 port 20000 - 0 [ 813.220428][ T5467] netdevsim netdevsim4 netdevsim1: set [1, 1] type 2 family 0 port 20000 - 0 [ 813.229346][ T5467] netdevsim netdevsim4 netdevsim2: set [1, 1] type 2 family 0 port 20000 - 0 [ 813.238241][ T5467] netdevsim netdevsim4 netdevsim3: set [1, 1] type 2 family 0 port 20000 - 0 [ 813.313650][ T5479] bond2: entered promiscuous mode [ 813.318950][ T5479] bond2: entered allmulticast mode [ 813.324595][ T5479] 8021q: adding VLAN 0 to HW filter on device bond2 [ 813.341628][ T5479] macsec1: entered allmulticast mode [ 813.347030][ T5479] hsr0: entered allmulticast mode [ 813.352074][ T5479] hsr_slave_0: entered allmulticast mode [ 813.357777][ T5479] hsr_slave_1: entered allmulticast mode [ 813.365515][ T5479] hsr0: left allmulticast mode [ 813.370385][ T5479] hsr_slave_0: left allmulticast mode [ 813.375791][ T5479] hsr_slave_1: left allmulticast mode [ 813.648310][ T29] kauditd_printk_skb: 717 callbacks suppressed [ 813.648329][ T29] audit: type=1326 audit(1734906014.895:193295): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5348 comm="syz.2.11162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f09ac2bcce7 code=0x7ffc0000 [ 813.678286][ T29] audit: type=1326 audit(1734906014.895:193296): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5348 comm="syz.2.11162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f09ac261f29 code=0x7ffc0000 [ 813.701932][ T29] audit: type=1326 audit(1734906014.895:193297): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5348 comm="syz.2.11162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 813.725685][ T29] audit: type=1326 audit(1734906014.905:193298): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5348 comm="syz.2.11162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f09ac2bcce7 code=0x7ffc0000 [ 813.749320][ T29] audit: type=1326 audit(1734906014.905:193299): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5348 comm="syz.2.11162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f09ac261f29 code=0x7ffc0000 [ 813.772981][ T29] audit: type=1326 audit(1734906014.905:193300): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5348 comm="syz.2.11162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 813.796714][ T29] audit: type=1326 audit(1734906014.915:193301): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5348 comm="syz.2.11162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f09ac2bcce7 code=0x7ffc0000 [ 813.820576][ T29] audit: type=1326 audit(1734906014.915:193302): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5348 comm="syz.2.11162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f09ac261f29 code=0x7ffc0000 [ 813.844361][ T29] audit: type=1326 audit(1734906014.915:193303): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5348 comm="syz.2.11162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 813.921295][ T29] audit: type=1326 audit(1734906014.925:193304): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5348 comm="syz.2.11162" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f09ac2bcce7 code=0x7ffc0000 [ 815.390979][ T5551] __nla_validate_parse: 5 callbacks suppressed [ 815.391000][ T5551] netlink: 28 bytes leftover after parsing attributes in process `syz.6.11198'. [ 815.546506][ T5573] SELinux: syz.1.11205 (5573) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 815.616779][ T5577] x_tables: duplicate underflow at hook 1 [ 815.637342][ T5577] tipc: Started in network mode [ 815.642300][ T5577] tipc: Node identity ac1414aa, cluster identity 4711 [ 815.651551][ T5577] tipc: New replicast peer: 100.1.1.1 [ 815.657066][ T5577] tipc: Enabled bearer , priority 10 [ 816.169537][ T5626] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11224'. [ 816.654431][ T3375] tipc: Node number set to 2886997162 [ 817.138525][ T5728] SELinux: syz.0.11234 (5728) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 817.966148][ T5782] sit0: entered allmulticast mode [ 818.139074][ T5793] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11262'. [ 818.704471][ T29] kauditd_printk_skb: 409 callbacks suppressed [ 818.704489][ T29] audit: type=1326 audit(1734906019.815:193714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5769 comm="syz.0.11251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 818.734570][ T29] audit: type=1326 audit(1734906019.815:193715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5769 comm="syz.0.11251" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 818.959187][ T29] audit: type=1326 audit(1734906020.135:193716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5832 comm="syz.2.11267" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 818.983012][ T29] audit: type=1326 audit(1734906020.135:193717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5832 comm="syz.2.11267" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 819.006951][ T29] audit: type=1326 audit(1734906020.135:193718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5832 comm="syz.2.11267" exe="/root/syz-executor" sig=0 arch=c000003e syscall=14 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 819.030659][ T29] audit: type=1326 audit(1734906020.135:193719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5832 comm="syz.2.11267" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f09ac2c5d29 code=0x7ffc0000 [ 819.067978][ T5838] 9pnet_fd: p9_fd_create_unix (5838): problem connecting socket: éq‰Y’3aK: -111 [ 819.324347][ T29] audit: type=1326 audit(1734906020.315:193720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5807 comm="syz.4.11264" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 819.348332][ T29] audit: type=1326 audit(1734906020.315:193721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=5807 comm="syz.4.11264" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7fa3eb9a5d29 code=0x7ffc0000 [ 819.372014][ T29] audit: type=1400 audit(1734906020.315:193722): avc: denied { mounton } for pid=5837 comm="syz.2.11268" path=2F3436342FE91F7189591E9233614B dev="tmpfs" ino=2476 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=sock_file permissive=1 [ 819.397092][ T29] audit: type=1400 audit(1734906020.365:193723): avc: denied { relabelfrom } for pid=5837 comm="syz.2.11268" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=tun_socket permissive=1 [ 819.419615][ T5898] netlink: 28 bytes leftover after parsing attributes in process `syz.2.11274'. [ 819.461021][ T5905] netlink: 8 bytes leftover after parsing attributes in process `syz.6.11275'. [ 819.510502][ T5905] bond3: entered promiscuous mode [ 819.515708][ T5905] bond3: entered allmulticast mode [ 819.525039][ T5905] 8021q: adding VLAN 0 to HW filter on device bond3 [ 819.547197][ T5911] macsec1: entered allmulticast mode [ 819.552531][ T5911] hsr0: entered allmulticast mode [ 819.557740][ T5911] hsr_slave_0: entered allmulticast mode [ 819.563398][ T5911] hsr_slave_1: entered allmulticast mode [ 819.607595][ T5911] hsr0: left allmulticast mode [ 819.612431][ T5911] hsr_slave_0: left allmulticast mode [ 819.617875][ T5911] hsr_slave_1: left allmulticast mode [ 820.028255][ T5930] IPv6: Can't replace route, no match found [ 821.391709][ T5951] syz.6.11292[5951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 821.391789][ T5951] syz.6.11292[5951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 821.403444][ T5951] syz.6.11292[5951] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 821.416461][ T5951] netlink: 8 bytes leftover after parsing attributes in process `syz.6.11292'. [ 821.636455][ T5958] netlink: 4 bytes leftover after parsing attributes in process `syz.0.11294'. [ 821.718142][ T5963] FAULT_INJECTION: forcing a failure. [ 821.718142][ T5963] name failslab, interval 1, probability 0, space 0, times 0 [ 821.731147][ T5963] CPU: 0 UID: 0 PID: 5963 Comm: syz.2.11296 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 821.742013][ T5963] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 821.752145][ T5963] Call Trace: [ 821.755487][ T5963] [ 821.758433][ T5963] dump_stack_lvl+0xf2/0x150 [ 821.763081][ T5963] dump_stack+0x15/0x1a [ 821.767277][ T5963] should_fail_ex+0x223/0x230 [ 821.771989][ T5963] should_failslab+0x8f/0xb0 [ 821.776615][ T5963] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 821.782375][ T5963] ? __d_alloc+0x3d/0x340 [ 821.786725][ T5963] __d_alloc+0x3d/0x340 [ 821.790955][ T5963] d_alloc_pseudo+0x1e/0x80 [ 821.795510][ T5963] alloc_file_pseudo+0x70/0x140 [ 821.800449][ T5963] hugetlb_file_setup+0x290/0x3c0 [ 821.805502][ T5963] ksys_mmap_pgoff+0x172/0x330 [ 821.810353][ T5963] x64_sys_call+0x1940/0x2dc0 [ 821.815124][ T5963] do_syscall_64+0xc9/0x1c0 [ 821.819737][ T5963] ? clear_bhb_loop+0x55/0xb0 [ 821.824567][ T5963] ? clear_bhb_loop+0x55/0xb0 [ 821.829296][ T5963] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 821.835227][ T5963] RIP: 0033:0x7f09ac2c5d29 [ 821.839651][ T5963] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 821.859363][ T5963] RSP: 002b:00007f09aa931038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 821.867796][ T5963] RAX: ffffffffffffffda RBX: 00007f09ac4b5fa0 RCX: 00007f09ac2c5d29 [ 821.875872][ T5963] RDX: 0000000000000000 RSI: 0000000000c00008 RDI: 0000000020400000 [ 821.883929][ T5963] RBP: 00007f09aa931090 R08: ffffffffffffffff R09: 0000000000000000 [ 821.891915][ T5963] R10: 0000000000050032 R11: 0000000000000246 R12: 0000000000000001 [ 821.899890][ T5963] R13: 0000000000000000 R14: 00007f09ac4b5fa0 R15: 00007ffc032fce78 [ 821.907891][ T5963] [ 821.975810][ T5970] netlink: 28 bytes leftover after parsing attributes in process `syz.6.11300'. [ 821.979823][ T5967] netlink: 8 bytes leftover after parsing attributes in process `syz.0.11298'. [ 822.041731][ T5967] bond1: entered promiscuous mode [ 822.047151][ T5967] bond1: entered allmulticast mode [ 822.063824][ T5967] 8021q: adding VLAN 0 to HW filter on device bond1 [ 822.106929][ T5972] macsec1: entered allmulticast mode [ 822.112288][ T5972] hsr0: entered allmulticast mode [ 822.117393][ T5972] hsr_slave_0: entered allmulticast mode [ 822.123054][ T5972] hsr_slave_1: entered allmulticast mode [ 822.150975][ T5972] hsr0: left allmulticast mode [ 822.155852][ T5972] hsr_slave_0: left allmulticast mode [ 822.161281][ T5972] hsr_slave_1: left allmulticast mode [ 822.167509][ T5983] netlink: 4 bytes leftover after parsing attributes in process `syz.2.11299'. [ 822.542989][ T6021] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11319'. [ 822.557830][ T6021] bond1: entered promiscuous mode [ 822.562927][ T6021] bond1: entered allmulticast mode [ 822.568708][ T6021] 8021q: adding VLAN 0 to HW filter on device bond1 [ 822.582463][ T6021] macsec1: entered allmulticast mode [ 822.587857][ T6021] hsr0: entered allmulticast mode [ 822.592915][ T6021] hsr_slave_0: entered allmulticast mode [ 822.598619][ T6021] hsr_slave_1: entered allmulticast mode [ 822.606133][ T6021] hsr0: left allmulticast mode [ 822.610954][ T6021] hsr_slave_0: left allmulticast mode [ 822.616509][ T6021] hsr_slave_1: left allmulticast mode [ 823.030865][ T6040] IPv6: Can't replace route, no match found [ 823.347276][T30098] udevd[30098]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 823.715054][ T6128] syzkaller0: entered promiscuous mode [ 823.720674][ T6128] syzkaller0: entered allmulticast mode [ 823.727955][ T29] kauditd_printk_skb: 401 callbacks suppressed [ 823.727970][ T29] audit: type=1326 audit(1734906024.975:194125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.6.11327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 823.757881][ T29] audit: type=1326 audit(1734906024.975:194126): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.6.11327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6a6ecd1f29 code=0x7ffc0000 [ 823.781652][ T29] audit: type=1326 audit(1734906024.975:194127): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.6.11327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f6a6ed35d29 code=0x7ffc0000 [ 823.812810][ T29] audit: type=1326 audit(1734906024.985:194128): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.6.11327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 823.836584][ T29] audit: type=1326 audit(1734906024.985:194129): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.6.11327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6a6ecd1f29 code=0x7ffc0000 [ 823.860258][ T29] audit: type=1326 audit(1734906024.985:194130): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.6.11327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f6a6ed35d29 code=0x7ffc0000 [ 823.883875][ T29] audit: type=1326 audit(1734906024.995:194131): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.6.11327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 823.907611][ T29] audit: type=1326 audit(1734906024.995:194132): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.6.11327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6a6ecd1f29 code=0x7ffc0000 [ 823.931475][ T29] audit: type=1326 audit(1734906024.995:194133): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.6.11327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f6a6ed35d29 code=0x7ffc0000 [ 823.955069][ T29] audit: type=1326 audit(1734906025.005:194134): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6041 comm="syz.6.11327" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 824.380534][ T6211] IPv6: Can't replace route, no match found [ 824.405477][ T6214] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11353'. [ 824.420054][ T6214] bond2: entered promiscuous mode [ 824.425271][ T6214] bond2: entered allmulticast mode [ 824.430643][ T6214] 8021q: adding VLAN 0 to HW filter on device bond2 [ 824.438781][ T6216] netlink: 28 bytes leftover after parsing attributes in process `syz.2.11354'. [ 824.450920][ T6214] macsec1: entered allmulticast mode [ 824.456321][ T6214] hsr0: entered allmulticast mode [ 824.461378][ T6214] hsr_slave_0: entered allmulticast mode [ 824.467225][ T6214] hsr_slave_1: entered allmulticast mode [ 824.476453][ T6214] hsr0: left allmulticast mode [ 824.481290][ T6214] hsr_slave_0: left allmulticast mode [ 824.486745][ T6214] hsr_slave_1: left allmulticast mode [ 824.561991][ T6228] netlink: 4 bytes leftover after parsing attributes in process `syz.1.11357'. [ 826.962015][ T6343] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11367'. [ 827.013266][ T6343] bond5: entered promiscuous mode [ 827.018428][ T6343] bond5: entered allmulticast mode [ 827.031296][ T6343] 8021q: adding VLAN 0 to HW filter on device bond5 [ 827.058442][ T6343] macsec1: entered allmulticast mode [ 827.063827][ T6343] hsr0: entered allmulticast mode [ 827.068997][ T6343] hsr_slave_0: entered allmulticast mode [ 827.074768][ T6343] hsr_slave_1: entered allmulticast mode [ 827.090293][ T6343] hsr0: left allmulticast mode [ 827.095274][ T6343] hsr_slave_0: left allmulticast mode [ 827.100667][ T6343] hsr_slave_1: left allmulticast mode [ 827.202083][ T6337] netlink: 28 bytes leftover after parsing attributes in process `syz.2.11365'. [ 827.212723][ T6359] tipc: Started in network mode [ 827.217881][ T6359] tipc: Node identity ac1414aa, cluster identity 4711 [ 827.236609][ T6359] tipc: New replicast peer: 100.1.1.1 [ 827.242166][ T6359] tipc: Enabled bearer , priority 10 [ 827.548770][ T6402] syz.4.11383[6402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 827.548842][ T6402] syz.4.11383[6402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 827.581179][ T6402] syz.4.11383[6402] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 827.863726][ T6422] syz.6.11388[6422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 827.914872][ T6422] syz.6.11388[6422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 827.956827][ T6422] syz.6.11388[6422] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 828.036837][ T6427] tipc: Enabling of bearer rejected, already enabled [ 828.289501][ T6445] syz.0.11397[6445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 828.289626][ T6445] syz.0.11397[6445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 828.327910][ T6445] syz.0.11397[6445] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 828.354396][T28275] tipc: Node number set to 2886997162 [ 828.737040][ T29] kauditd_printk_skb: 578 callbacks suppressed [ 828.737055][ T29] audit: type=1326 audit(1734906029.985:194713): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.0.11400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f506be5cce7 code=0x7ffc0000 [ 828.741913][ T6464] netlink: 4 bytes leftover after parsing attributes in process `syz.2.11403'. [ 828.743266][ T29] audit: type=1326 audit(1734906029.985:194714): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.0.11400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f506be01f29 code=0x7ffc0000 [ 828.803690][ T29] audit: type=1326 audit(1734906029.985:194715): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.0.11400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 828.827299][ T29] audit: type=1326 audit(1734906030.025:194716): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.0.11400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f506be5cce7 code=0x7ffc0000 [ 828.850990][ T29] audit: type=1326 audit(1734906030.025:194717): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.0.11400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f506be01f29 code=0x7ffc0000 [ 828.874619][ T29] audit: type=1326 audit(1734906030.025:194718): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.0.11400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 828.898177][ T29] audit: type=1326 audit(1734906030.035:194719): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.0.11400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f506be5cce7 code=0x7ffc0000 [ 828.921914][ T29] audit: type=1326 audit(1734906030.035:194720): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.0.11400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f506be01f29 code=0x7ffc0000 [ 828.945605][ T29] audit: type=1326 audit(1734906030.035:194721): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.0.11400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f506be65d29 code=0x7ffc0000 [ 828.969223][ T29] audit: type=1326 audit(1734906030.045:194722): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6454 comm="syz.0.11400" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f506be5cce7 code=0x7ffc0000 [ 829.936370][ T6491] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11413'. [ 829.976811][ T6491] bond3: entered promiscuous mode [ 829.981934][ T6491] bond3: entered allmulticast mode [ 830.035081][ T6491] 8021q: adding VLAN 0 to HW filter on device bond3 [ 830.097393][ T6497] macsec1: entered allmulticast mode [ 830.102794][ T6497] hsr0: entered allmulticast mode [ 830.107974][ T6497] hsr_slave_0: entered allmulticast mode [ 830.113723][ T6497] hsr_slave_1: entered allmulticast mode [ 830.140021][ T6497] hsr0: left allmulticast mode [ 830.144873][ T6497] hsr_slave_0: left allmulticast mode [ 830.150318][ T6497] hsr_slave_1: left allmulticast mode [ 830.277631][ T6504] netlink: 4 bytes leftover after parsing attributes in process `syz.4.11418'. [ 830.386220][ T6512] @: renamed from vlan0 (while UP) [ 830.405646][ T6517] IPv6: Can't replace route, no match found [ 830.486514][ T6521] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11425'. [ 830.712715][ T6542] syz.2.11435[6542] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 830.805235][ T6546] netlink: 4 bytes leftover after parsing attributes in process `syz.1.11436'. [ 831.181235][ T6584] FAULT_INJECTION: forcing a failure. [ 831.181235][ T6584] name failslab, interval 1, probability 0, space 0, times 0 [ 831.194146][ T6584] CPU: 1 UID: 0 PID: 6584 Comm: syz.4.11448 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 831.204935][ T6584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 831.215052][ T6584] Call Trace: [ 831.218343][ T6584] [ 831.221298][ T6584] dump_stack_lvl+0xf2/0x150 [ 831.225938][ T6584] dump_stack+0x15/0x1a [ 831.230201][ T6584] should_fail_ex+0x223/0x230 [ 831.234915][ T6584] should_failslab+0x8f/0xb0 [ 831.239603][ T6584] kmem_cache_alloc_lru_noprof+0x57/0x320 [ 831.245420][ T6584] ? shmem_alloc_inode+0x34/0x50 [ 831.250476][ T6584] shmem_alloc_inode+0x34/0x50 [ 831.255345][ T6584] ? __pfx_shmem_alloc_inode+0x10/0x10 [ 831.260829][ T6584] alloc_inode+0x3c/0x160 [ 831.265242][ T6584] new_inode+0x1e/0x100 [ 831.269423][ T6584] shmem_get_inode+0x24e/0x730 [ 831.274277][ T6584] __shmem_file_setup+0x127/0x1f0 [ 831.279332][ T6584] shmem_file_setup+0x3b/0x50 [ 831.284126][ T6584] __se_sys_memfd_create+0x31d/0x5c0 [ 831.289447][ T6584] __x64_sys_memfd_create+0x31/0x40 [ 831.294694][ T6584] x64_sys_call+0x2d4c/0x2dc0 [ 831.299428][ T6584] do_syscall_64+0xc9/0x1c0 [ 831.304009][ T6584] ? clear_bhb_loop+0x55/0xb0 [ 831.308704][ T6584] ? clear_bhb_loop+0x55/0xb0 [ 831.313407][ T6584] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 831.319346][ T6584] RIP: 0033:0x7fa3eb9a5d29 [ 831.323800][ T6584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 831.343521][ T6584] RSP: 002b:00007fa3ea010e18 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 831.352023][ T6584] RAX: ffffffffffffffda RBX: 00000000000004bc RCX: 00007fa3eb9a5d29 [ 831.360094][ T6584] RDX: 00007fa3ea010ef0 RSI: 0000000000000000 RDI: 00007fa3eba22409 [ 831.368085][ T6584] RBP: 0000000020000a40 R08: 00007fa3ea010bb7 R09: 00007fa3ea010e40 [ 831.376075][ T6584] R10: 000000000000000a R11: 0000000000000202 R12: 0000000020000500 [ 831.384072][ T6584] R13: 00007fa3ea010ef0 R14: 00007fa3ea010eb0 R15: 00000000200001c0 [ 831.392064][ T6584] [ 831.550901][ T6594] tipc: Started in network mode [ 831.556024][ T6594] tipc: Node identity ac1414aa, cluster identity 4711 [ 831.564563][ T6594] tipc: New replicast peer: 100.1.1.1 [ 831.570026][ T6594] tipc: Enabled bearer , priority 10 [ 831.697897][ T6602] netlink: 4 bytes leftover after parsing attributes in process `syz.4.11456'. [ 831.707001][ T6602] netlink: 4 bytes leftover after parsing attributes in process `syz.4.11456'. [ 831.724036][ T6602] netlink: 4 bytes leftover after parsing attributes in process `syz.4.11456'. [ 831.769135][ T6606] bond6: entered promiscuous mode [ 831.774323][ T6606] bond6: entered allmulticast mode [ 831.779906][ T6606] 8021q: adding VLAN 0 to HW filter on device bond6 [ 831.801304][ T6606] macsec1: entered allmulticast mode [ 831.806735][ T6606] hsr0: entered allmulticast mode [ 831.811795][ T6606] hsr_slave_0: entered allmulticast mode [ 831.817491][ T6606] hsr_slave_1: entered allmulticast mode [ 831.832189][ T6606] hsr0: left allmulticast mode [ 831.837083][ T6606] hsr_slave_0: left allmulticast mode [ 831.842546][ T6606] hsr_slave_1: left allmulticast mode [ 832.023485][ T6624] FAULT_INJECTION: forcing a failure. [ 832.023485][ T6624] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 832.036655][ T6624] CPU: 0 UID: 0 PID: 6624 Comm: syz.0.11465 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 832.047443][ T6624] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 832.057516][ T6624] Call Trace: [ 832.060804][ T6624] [ 832.063805][ T6624] dump_stack_lvl+0xf2/0x150 [ 832.068429][ T6624] dump_stack+0x15/0x1a [ 832.072702][ T6624] should_fail_ex+0x223/0x230 [ 832.077406][ T6624] should_fail+0xb/0x10 [ 832.081632][ T6624] should_fail_usercopy+0x1a/0x20 [ 832.086727][ T6624] _copy_to_user+0x20/0xa0 [ 832.091169][ T6624] simple_read_from_buffer+0xa0/0x110 [ 832.096562][ T6624] proc_fail_nth_read+0xf9/0x140 [ 832.101592][ T6624] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 832.107170][ T6624] vfs_read+0x1a2/0x700 [ 832.111390][ T6624] ? __rcu_read_unlock+0x4e/0x70 [ 832.116373][ T6624] ? __fget_files+0x17c/0x1c0 [ 832.121079][ T6624] ksys_read+0xe8/0x1b0 [ 832.125316][ T6624] __x64_sys_read+0x42/0x50 [ 832.129837][ T6624] x64_sys_call+0x2874/0x2dc0 [ 832.134528][ T6624] do_syscall_64+0xc9/0x1c0 [ 832.139104][ T6624] ? clear_bhb_loop+0x55/0xb0 [ 832.143875][ T6624] ? clear_bhb_loop+0x55/0xb0 [ 832.148564][ T6624] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 832.154543][ T6624] RIP: 0033:0x7f506be6473c [ 832.159000][ T6624] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 832.178616][ T6624] RSP: 002b:00007f506a4d7030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 832.187348][ T6624] RAX: ffffffffffffffda RBX: 00007f506c055fa0 RCX: 00007f506be6473c [ 832.195322][ T6624] RDX: 000000000000000f RSI: 00007f506a4d70a0 RDI: 0000000000000004 [ 832.203301][ T6624] RBP: 00007f506a4d7090 R08: 0000000000000000 R09: 0000000000000000 [ 832.211362][ T6624] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 832.219433][ T6624] R13: 0000000000000000 R14: 00007f506c055fa0 R15: 00007fff8c648588 [ 832.227483][ T6624] [ 832.494173][ T6637] __nla_validate_parse: 1 callbacks suppressed [ 832.494192][ T6637] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11470'. [ 832.531046][ T6637] bond4: entered promiscuous mode [ 832.536298][ T6637] bond4: entered allmulticast mode [ 832.541716][ T6637] 8021q: adding VLAN 0 to HW filter on device bond4 [ 832.577022][ T6641] macsec1: entered allmulticast mode [ 832.582362][ T6641] hsr0: entered allmulticast mode [ 832.587511][ T6641] hsr_slave_0: entered allmulticast mode [ 832.593164][ T6641] hsr_slave_1: entered allmulticast mode [ 832.610605][ T6641] hsr0: left allmulticast mode [ 832.615495][ T6641] hsr_slave_0: left allmulticast mode [ 832.620981][ T6641] hsr_slave_1: left allmulticast mode [ 832.664799][ T8] tipc: Node number set to 2886997162 [ 832.700403][ T6650] IPv6: Can't replace route, no match found [ 833.158048][ T6698] bpf_get_probe_write_proto: 5 callbacks suppressed [ 833.158066][ T6698] syz.2.11483[6698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 833.175050][ T6698] syz.2.11483[6698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 833.199025][ T6698] syz.2.11483[6698] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 833.749479][ T29] kauditd_printk_skb: 1225 callbacks suppressed [ 833.749497][ T29] audit: type=1326 audit(1734906034.995:195948): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6643 comm="syz.6.11472" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 833.791154][ T29] audit: type=1326 audit(1734906034.995:195949): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6643 comm="syz.6.11472" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6a6ecd1f29 code=0x7ffc0000 [ 833.814804][ T29] audit: type=1326 audit(1734906034.995:195950): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6643 comm="syz.6.11472" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6a6ed35d29 code=0x7ffc0000 [ 833.838500][ T29] audit: type=1326 audit(1734906035.015:195951): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6643 comm="syz.6.11472" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 833.862127][ T29] audit: type=1326 audit(1734906035.015:195952): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6643 comm="syz.6.11472" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6a6ecd1f29 code=0x7ffc0000 [ 833.885802][ T29] audit: type=1326 audit(1734906035.015:195953): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6643 comm="syz.6.11472" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6a6ed35d29 code=0x7ffc0000 [ 833.909518][ T29] audit: type=1326 audit(1734906035.015:195954): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6643 comm="syz.6.11472" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 833.933161][ T29] audit: type=1326 audit(1734906035.015:195955): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6643 comm="syz.6.11472" exe="/root/syz-executor" sig=0 arch=c000003e syscall=15 compat=0 ip=0x7f6a6ecd1f29 code=0x7ffc0000 [ 833.956751][ T29] audit: type=1326 audit(1734906035.015:195956): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6643 comm="syz.6.11472" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f6a6ed35d29 code=0x7ffc0000 [ 833.980501][ T29] audit: type=1326 audit(1734906035.015:195957): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=6643 comm="syz.6.11472" exe="/root/syz-executor" sig=0 arch=c000003e syscall=39 compat=0 ip=0x7f6a6ed2cce7 code=0x7ffc0000 [ 834.229167][ T6790] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11494'. [ 834.301585][ T6796] tipc: Enabling of bearer rejected, already enabled [ 834.412567][ T6807] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=6807 comm=syz.4.11502 [ 834.591521][ T6813] netlink: 8 bytes leftover after parsing attributes in process `syz.4.11504'. [ 834.770287][ T6813] bond7: entered promiscuous mode [ 834.775452][ T6813] bond7: entered allmulticast mode [ 834.820990][ T6813] 8021q: adding VLAN 0 to HW filter on device bond7 [ 834.984411][ T6818] macsec1: entered allmulticast mode [ 834.989827][ T6818] hsr0: entered allmulticast mode [ 834.994890][ T6818] hsr_slave_0: entered allmulticast mode [ 835.000532][ T6818] hsr_slave_1: entered allmulticast mode [ 835.101745][ T6818] hsr0: left allmulticast mode [ 835.106745][ T6818] hsr_slave_0: left allmulticast mode [ 835.112269][ T6818] hsr_slave_1: left allmulticast mode [ 835.203104][ T6830] syz.0.11509[6830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 835.203207][ T6830] syz.0.11509[6830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 835.228773][ T6830] syz.0.11509[6830] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 835.754537][ T6854] netlink: 4 bytes leftover after parsing attributes in process `syz.4.11517'. [ 836.349745][ T6875] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 836.416507][ T6879] netlink: 28 bytes leftover after parsing attributes in process `syz.0.11528'. [ 836.924002][ T6907] netlink: 28 bytes leftover after parsing attributes in process `syz.2.11540'. [ 837.935112][ T6947] SELinux: syz.1.11554 (6947) wrote to /sys/fs/selinux/user! This will not be supported in the future; please update your userspace. [ 838.131152][ T6972] syz.0.11567[6972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 838.131316][ T6972] syz.0.11567[6972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 838.142995][ T6972] syz.0.11567[6972] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 838.212520][ T6977] tipc: Started in network mode [ 838.229086][ T6977] tipc: Node identity ac1414aa, cluster identity 4711 [ 838.236497][ T6977] tipc: New replicast peer: 100.1.1.1 [ 838.236535][ T6977] tipc: Enabled bearer , priority 10 [ 838.293249][ T6987] IPv6: Can't replace route, no match found [ 838.421936][ T7002] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7002 comm=syz.6.11580 [ 838.473265][ T7010] tipc: Enabling of bearer rejected, already enabled [ 838.483828][ T7012] netlink: 4 bytes leftover after parsing attributes in process `syz.2.11584'. [ 838.638775][ T7038] IPv6: Can't replace route, no match found [ 838.676055][ T7040] tipc: Enabling of bearer rejected, already enabled [ 838.792166][ T29] kauditd_printk_skb: 454 callbacks suppressed [ 838.792184][ T29] audit: type=1400 audit(1734906040.035:196412): avc: denied { prog_load } for pid=7051 comm="syz.1.11602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 838.794477][ T7052] syz.1.11602[7052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 838.799257][ T29] audit: type=1400 audit(1734906040.035:196413): avc: denied { bpf } for pid=7051 comm="syz.1.11602" capability=39 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 838.818041][ T7052] syz.1.11602[7052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 838.829302][ T29] audit: type=1400 audit(1734906040.035:196414): avc: denied { perfmon } for pid=7051 comm="syz.1.11602" capability=38 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 838.858429][ T7052] syz.1.11602[7052] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 838.865486][ T29] audit: type=1400 audit(1734906040.115:196415): avc: denied { open } for pid=7049 comm="syz.2.11601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 838.913740][ T29] audit: type=1400 audit(1734906040.115:196416): avc: denied { kernel } for pid=7049 comm="syz.2.11601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 838.933737][ T29] audit: type=1400 audit(1734906040.135:196417): avc: denied { create } for pid=7051 comm="syz.1.11602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 838.933789][ T29] audit: type=1400 audit(1734906040.135:196418): avc: denied { write } for pid=7051 comm="syz.1.11602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 838.933820][ T29] audit: type=1400 audit(1734906040.145:196419): avc: denied { read } for pid=7051 comm="syz.1.11602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_generic_socket permissive=1 [ 838.933855][ T29] audit: type=1400 audit(1734906040.145:196420): avc: denied { prog_run } for pid=7051 comm="syz.1.11602" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bpf permissive=1 [ 838.944701][ T29] audit: type=1400 audit(1734906040.185:196421): avc: denied { cpu } for pid=7049 comm="syz.2.11601" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=perf_event permissive=1 [ 839.113132][ T7064] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7064 comm=syz.2.11606 [ 839.132306][ T7066] IPv6: Can't replace route, no match found [ 839.208535][ T7075] tipc: Enabling of bearer rejected, already enabled [ 839.221940][ T7077] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7077 comm=syz.2.11612 [ 839.236586][ T3376] tipc: Node number set to 2886997162 [ 839.392402][ T7093] syz.1.11617[7093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 839.392463][ T7093] syz.1.11617[7093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 839.404057][ T7093] syz.1.11617[7093] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 839.512099][ T7102] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7102 comm=syz.6.11621 [ 839.566374][ T7109] netlink: 8 bytes leftover after parsing attributes in process `syz.1.11624'. [ 839.589524][ T7109] bond5: entered promiscuous mode [ 839.594782][ T7109] bond5: entered allmulticast mode [ 839.607591][ T7109] 8021q: adding VLAN 0 to HW filter on device bond5 [ 839.621985][ T7111] macsec1: entered allmulticast mode [ 839.627359][ T7111] hsr0: entered allmulticast mode [ 839.632474][ T7111] hsr_slave_0: entered allmulticast mode [ 839.638365][ T7111] hsr_slave_1: entered allmulticast mode [ 839.651784][ T7111] hsr0: left allmulticast mode [ 839.656673][ T7111] hsr_slave_0: left allmulticast mode [ 839.662156][ T7111] hsr_slave_1: left allmulticast mode [ 839.672331][ T7113] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7113 comm=syz.6.11625 [ 839.745065][ T7116] netlink: 28 bytes leftover after parsing attributes in process `syz.1.11626'. [ 839.783056][ T7122] IPv6: Can't replace route, no match found [ 839.908773][ T7136] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7136 comm=syz.1.11636 [ 839.961453][ T7144] netlink: 28 bytes leftover after parsing attributes in process `syz.4.11639'. [ 840.009078][ T7147] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7147 comm=syz.6.11641 [ 840.260571][ T7164] syz.2.11648[7164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 840.260653][ T7164] syz.2.11648[7164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 840.272326][ T7164] syz.2.11648[7164] is installing a program with bpf_probe_write_user helper that may corrupt user memory! [ 840.818438][ T7176] netlink: 28 bytes leftover after parsing attributes in process `syz.6.11652'. [ 840.899464][ T7190] tipc: Enabling of bearer rejected, already enabled [ 840.926515][T30098] udevd[30098]: inotify_add_watch(7, /dev/loop0, 10) failed: No such file or directory [ 841.027527][ T7203] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7203 comm=syz.1.11659 [ 841.261632][ T7227] sch_tbf: burst 0 is lower than device lo mtu (65550) ! [ 841.349787][ T7242] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=65535 sclass=netlink_route_socket pid=7242 comm=syz.1.11664 [ 841.415301][ T1128] ================================================================== [ 841.423546][ T1128] BUG: KCSAN: data-race in io_sq_thread / io_sq_thread_stop [ 841.430876][ T1128] [ 841.433211][ T1128] write to 0xffff888102ce0878 of 8 bytes by task 7248 on cpu 1: [ 841.440848][ T1128] io_sq_thread+0xe68/0x10b0 [ 841.445460][ T1128] ret_from_fork+0x4b/0x60 [ 841.449898][ T1128] ret_from_fork_asm+0x1a/0x30 [ 841.454728][ T1128] [ 841.457052][ T1128] read to 0xffff888102ce0878 of 8 bytes by task 1128 on cpu 0: [ 841.464598][ T1128] io_sq_thread_stop+0x1d/0xd0 [ 841.469378][ T1128] io_sq_thread_finish+0x252/0x2d0 [ 841.474503][ T1128] io_ring_ctx_free+0x1a/0x710 [ 841.479288][ T1128] io_ring_exit_work+0x4d5/0x500 [ 841.484236][ T1128] process_scheduled_works+0x483/0x9a0 [ 841.489717][ T1128] worker_thread+0x51d/0x6f0 [ 841.494319][ T1128] kthread+0x1d1/0x210 [ 841.498389][ T1128] ret_from_fork+0x4b/0x60 [ 841.502810][ T1128] ret_from_fork_asm+0x1a/0x30 [ 841.507584][ T1128] [ 841.509920][ T1128] value changed: 0xffff888102f06300 -> 0x0000000000000000 [ 841.517022][ T1128] [ 841.519354][ T1128] Reported by Kernel Concurrency Sanitizer on: [ 841.525500][ T1128] CPU: 0 UID: 0 PID: 1128 Comm: kworker/u8:12 Not tainted 6.13.0-rc3-syzkaller-00301-gbcde95ce32b6 #0 [ 841.536442][ T1128] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024 [ 841.546501][ T1128] Workqueue: iou_exit io_ring_exit_work [ 841.552062][ T1128] ==================================================================