last executing test programs: 2m29.881347026s ago: executing program 3 (id=973): r0 = bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0x4, 0x16, &(0x7f0000001000)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00'}, 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000c00)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000696c6c2500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007100000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) socketpair$tipc(0x1e, 0x1, 0x0, &(0x7f0000000600)={0xffffffffffffffff}) recvmsg(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/249, 0xf9}], 0x1}, 0x0) close(r2) r3 = syz_clone3(&(0x7f0000001880)={0x100000200, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="06000000040000000700000008"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f0000000740)={0x11, 0xc, &(0x7f0000000800)=ANY=[@ANYBLOB="18000000105d00000003ffe4000000000018110000", @ANYRES32=r4, @ANYBLOB="0000000000000000b7080000000000dbd5ad50fa5be8de66209e007b8af8ff00e1ffffbea200000000000007020000f8ffffffb703000008000000b70400000000"], 0x0, 0xfff, 0x0, 0x0, 0x41000, 0x13, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x21, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000380)='sys_enter\x00', r0, 0x0, 0x8}, 0x18) tgkill(r3, r3, 0x21) socket$nl_generic(0x10, 0x3, 0x10) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$tipc(&(0x7f0000000080), r5) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) r8 = syz_io_uring_setup(0xbc3, &(0x7f0000001480)={0x0, 0x9e30, 0x80, 0x0, 0x224}, &(0x7f0000000040)=0x0, &(0x7f0000000280)=0x0) syz_io_uring_submit(r9, r10, &(0x7f0000000300)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x2, 0xa3d8, &(0x7f00000005c0)=[{&(0x7f0000000240)="5db5bd", 0x3}], 0x81, 0x8, 0x1, {0x2}}) bpf$MAP_CREATE(0x0, &(0x7f0000001d00)=ANY=[@ANYBLOB="0b00000005000000050000000900000001"], 0x48) openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000400), 0x440) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x0, 0xc, &(0x7f0000000300)=ANY=[@ANYBLOB="18000000000000000000000000000000850000002a000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000b000000095"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x4}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000500)={0x11, 0xc, &(0x7f0000000300)=ANY=[], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x40, '\x00', 0x0, @fallback=0x24, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x94) open(&(0x7f00000002c0)='./bus\x00', 0x0, 0x61) bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) syz_memcpy_off$IO_URING_METADATA_GENERIC(r9, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) io_uring_enter(r8, 0x47f8, 0x0, 0x0, 0x0, 0x0) ioctl$TUNSETSTEERINGEBPF(r7, 0x400454da, &(0x7f0000000000)) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b400000000000000791000000000000063000000000000009500050000000000"], &(0x7f0000003ff6)='GPL\x00', 0x4, 0xc3, &(0x7f0000000640)=""/195, 0x0, 0x0, '\x00', 0x0, @sk_msg, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x8, 0x10, &(0x7f0000000080), 0x10}, 0x94) sendmsg$TIPC_CMD_SHOW_PORTS(r5, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000001680)={&(0x7f0000001640)={0x1c, r6, 0x1}, 0x1c}, 0x1, 0x0, 0x0, 0x10}, 0x0) 2m29.052905092s ago: executing program 3 (id=1001): r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000240)=0x100000001, 0x59) connect$inet6(r0, &(0x7f0000000200)={0xa, 0xffff, 0x0, @loopback}, 0x1c) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="0b00000008000000020000000400000005000000", @ANYRES32, @ANYBLOB="000000000000000000000000fcffffffffffffff0e1c2a9bbf333f4984b6212f40828646a26d5f32891e3a6f9c5b5403bde93ba06c374158e06416265df63c66c8771120037331a634499a16bacc9edbdf0b1db18b25578f7515ee4a5e6825b4b5051c9e209631eabfeb35991ea4d2e7aea4b5e5", @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000380)={{r1}, 0x0, 0x0}, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f0000000280)=ANY=[@ANYBLOB], 0x48) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0x8, &(0x7f0000000740)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32=r2, @ANYBLOB="0000000000000000b703000000e00000850000001b000000b700000000fa000095"], &(0x7f0000000780)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={&(0x7f0000000180)='kmem_cache_free\x00', r3}, 0x18) r4 = socket$can_bcm(0x1d, 0x2, 0x2) connect$can_bcm(r4, &(0x7f0000000000), 0x10) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, &(0x7f00000003c0)={'vxcan0\x00', 0x0}) sendmsg$can_bcm(r4, &(0x7f0000000480)={&(0x7f0000000340)={0x1d, r5}, 0x10, &(0x7f00000000c0)={&(0x7f0000000580)=ANY=[@ANYBLOB="01000000d7fe68ca0000000000000000", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="00000000040000"], 0x20000600}}, 0x0) 2m28.824587561s ago: executing program 3 (id=1002): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000400000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x18, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000540)={{r0}, &(0x7f00000004c0), &(0x7f0000000300)=r1}, 0x20) r2 = socket(0x10, 0x3, 0x9) sendmsg$NFT_BATCH(r2, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f00000013c0)=ANY=[@ANYBLOB="140000005304ec"], 0x28}, 0x1, 0x0, 0x0, 0x64841}, 0x40000) 2m28.790448714s ago: executing program 3 (id=1004): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYRES16], 0x48) socket$nl_route(0x10, 0x3, 0x0) r1 = syz_io_uring_setup(0x3440, &(0x7f0000000c40)={0x0, 0x8000004, 0x10100, 0x100000}, &(0x7f0000000100)=0x0, &(0x7f00000007c0)=0x0) syz_io_uring_submit(r2, r3, &(0x7f00000001c0)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd_index=0x3, 0x0, 0x0, 0x0, 0x6840abb1c9b4ef6d}) io_uring_enter(r1, 0x4d10, 0x2, 0x2, 0x0, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(0xffffffffffffffff, 0x89f3, &(0x7f0000000000)={'tunl0\x00', &(0x7f0000000200)={'syztnl0\x00', 0x0, 0x1, 0x7800, 0x80000001, 0x3, {{0xe, 0x4, 0x1, 0x7, 0x38, 0x67, 0x0, 0x3, 0x29, 0x0, @multicast2, @multicast2, {[@timestamp_addr={0x44, 0xc, 0x74, 0x1, 0xe, [{@loopback, 0x5}]}, @end, @lsrr={0x83, 0x3, 0x14}, @timestamp={0x44, 0x8, 0x9d, 0x0, 0x3, [0x5]}, @ra={0x94, 0x4, 0x1}, @rr={0x7, 0x7, 0x9d, [@multicast1]}]}}}}}) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000480)='./file0\x00', 0x0, &(0x7f0000000280)={[{@noload}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x1}}, {@bh}, {@noload}, {@data_err_ignore}, {@usrjquota}]}, 0xfe, 0x44d, &(0x7f0000000900)="$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") quotactl$Q_QUOTAOFF(0xffffffff80000301, &(0x7f0000000040)=@loop={'/dev/loop', 0x0}, 0x0, 0x0) prlimit64(0x0, 0xe, 0x0, 0x0) r5 = syz_clone3(&(0x7f0000001880)={0x120000000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r6 = socket$inet6_sctp(0xa, 0x5, 0x84) r7 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r7, 0x84, 0x6f, &(0x7f0000000280)={0x0, 0x1c, &(0x7f0000000000)=[@in6={0xa, 0x3, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x9}]}, 0x0) getsockopt$inet_sctp6_SCTP_MAX_BURST(r7, 0x84, 0x83, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000300)=0x8) r9 = socket$nl_generic(0x10, 0x3, 0x10) r10 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000800), 0xffffffffffffffff) r11 = bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYRES64=r10], &(0x7f0000000380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000040)={&(0x7f0000000200)='kfree\x00', r11, 0x0, 0xfffffffffffffffc}, 0x18) sendmsg$NL80211_CMD_SET_TID_CONFIG(r9, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000580)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="8b332abd700000000000150000000c009900c70000003a00000010001d800200008008000d8004000300"], 0x30}}, 0x0) getsockopt$inet_sctp6_SCTP_PEER_AUTH_CHUNKS(r6, 0x84, 0x1a, &(0x7f0000000500)={r8, 0xfdf, "58acd9e9f34ff6037af38521e1461fa15fe31f8c34020880d19b91c8ba70141df0a5e4d217646947d958d97771bda78e318083e8994069355f204b834680fb14d97afaf1cf3c65868eb86490f3baa475820a6e828b96d9a6f3940579ea89305b48b06117fc91afa96e714dd1a2f8c10c3cfe09f901a1b8ab7ef7aaf8c220b8c430c5c9e61493f2467a2325121d0a499db2cfb0d48365f973ae1fcc0ff0cdd41d46fe60438973ccab91a9644b88d668f1f9a404f4adfd3e3d24516d132e07c69ec69d2cfd3f42773e6b1395180b0099512fe92c7e5ca04d1e5190bc1ebe64401f4488aba3a332c169668164a8667f99b0ddebf06dfe1089343f31beeea43db06d9e001333fcf930bc966694fb2d9b2f945e630a68857447f3336a04692d032180ca6646c29f65e3a0b98a88c5c140bf805599dc7157f4f6f0bc29d3fbff8daa166430578b68166950cfb8142bd879ae0ae234d5dfdb479f8236a77f5230ec2cc9b50c3440d1048ba79550884ec8cf9cef8d3d5b40549b970c3923b99f3a829d342428dd5a9b2b525ef065b3816f42e668f87982da31c4d23da6ec16dc6562fe495093764730f0817771342a230c66508f93c7ec271f6fabc54f10c12786ac26483fcce3ea940035b4af23e09128873e2aad1b015d67aeb57f339fa86f47926d9fe60078e68021d46425f6b04662bb889aee89cf92c8aec2f603ee4b5281d7540f59c02b8364c5827c2e2db7399fcbee300471b04263ff22854bd315698386a31f8d5ab946e27ade5fa6453ca38b736cb9ed6622b7aa8506b38a33427fed300541267a22163be587fe897cb18357d0d31112ab1ca26c91c24994d269468ce57f07b7bb1dc92fd24b1a75bbc96199508e8bacd5996942da855d43261843bfdcec8d95710f72a5bee37065139a2b5ce211ceb4a811779a0460b27f3ce9fa016b57c0e2f36b5216974b60f60b7c099609d78154bf1501de0a97750b76ad15ac3cc2993ff5dfe8b8cf191a369de1641f48b8634749c6e48c4cacb4ab591ca2b1e04b6eef770216f15af52fa359b1c67a902f1f6e96d4fb4b7a958283f206a11436d8ce984ecd5906945954a06839d328eac84eb45eb5d881a202a7cd9b40e6416569b4cd306fef85da3e8e99e0ec20691dd8d208b9d815e72f9830f06264fa07cc92b0419909c6e96bee6c35eedca8ff87e1e22d17e72027c419c730476b55c1073e721126df189b9c4d58af28ce96e2bb79dd6bc124a33d76c67f847925f664bbd158f1f39838ce267b3fe7ccecd9847e5c412672e366679bae9f9a390e9ab907f876ff0c33798d0355306a9368c173b07539f4b8d34699b6198207755eadf6c3d38d8e89ffe7066ab12cc594c476e4482c4fd79a3533844fdc523def3c1ce7bd7cdd8c24a36210deaa9d1a5fdb8ce5984944e8725133dac3989b1cb936162878da80b3e4de05eccdf106b6ae15120764c66c968476edc9b159a964618fc0804f32081a984949d9b657b2cbae2c686d7f8f16cfcf8ed79e3a59722e415033b3d7bcbed2819f5936bb93be27a1a9c6b68f66813a112bd274ac62f25a80415d8054973ba3589a4be6aa4048f4e7800a21b03743e4c1684218be22992cc591511d85db06382407061d1cd66cc5c01cb069d074bebf14aa42bed4d905722a4cd90a8ac083bc48881e4cee9a371c4bbd666a8c180b221baea00b504ce902d4daf4a7f3b72cf412810219e5d08e3dd1d6f7fd854e806327f241c28cc7f553ded88452d1d6c1c1e70ddaf267c04165d71a99fff88c31859d9b3d66709129d9035adcf73d582b3753c468ca26248ea799c3cd2000fa2f3fc9e6bd108342fd7d64c3c24fcafe0661766c2fbce2cb904746c6af0939b27951e17dd596866a020ce751de49b9ee7f8dd1e580319369fdcbdf08cac4e2f72a55a77cebd3cc3d17b02d42bdfd8e5efed0076a3166ce00025a94546a4748a24c9a58311beee9520ee334cec16f8a64057353b1ed1c564dbb7918e5fb6ef558e4c01139ef35b64dc6cf29bb247cfc81b657c9da94aeac410ef44ed34b61ec6ded9aa369b0e366b6ca7e87a17f6ea9ff2a3202344a3c59a9fc12d06bbcb020d123ed18b6bf79df64550862c73bb2cede3f73fb60c1673dcbafc140b85c02af13fc33a54d7476a0065b7b7472d3a0f86e8b3db8172941bca0fcbd41c5ce8d6c764de30a9a5e1fe3a82c040546b990f48e88b83eb1ed27c1b0089241daa70a7b1ad5a197a9f07f983408808362ad6c86163e9ef4438db441238462e774377693fdd6f1df05c044c92f86b601f631429f62aa0f33ac68b9c5d2f4c6c63f4a22c4fbf48346f533e3c0786464e955d4b97a51bde4e3a20bd2459b1dbc109d3b41fea134d5022a502776c87bfdc94c98d22ab42b65606a70aac975746779f071b3e37dbbc7839b4f40119e9b8f35ac539ff828104635ef4f5a24aeaab2ff91c22fa5ece3ec9a444c085ff2d5c1a42288428b270947f51fd4dc4f4c29152513300c268c9d531d3e1e9641423ed90d1ac2e6c333cf45bcc39a6310d722a738dadc60b90491a7eb58227a8ea6a3d097366cc145986b5f650cb343ef72e6fddbfc443fde75f1afaa80737aefb604e66ac62c79e13ddcbdaf729b583fda9ae09b1d62a6f8b79bdc3a32aafd456bfc87bcc46b74cebe3429b648cfe66857d61f7acf17313dcea273f6f0bdecfcc24f5889888e1421ca5d6aef75b115ae50bfab2b985e0d6cf4a29e62b938913c48a7050deee7f42f7d2f05ba825be49173945b0693107bca5509d2e24c3e3ce8e126a1aa37ed0012e14dc332b5011e4014f92fe39ff49c4145c2687851de39ad3392df80c1004d94ab60379d8861a3551b6beea79f907d9a70e81a81e4548b29161c52d149902c8ddde4662eb1edcbd74f368dad587baf53b0ce73ae6da70119db56aa49b848865fe33693db35957b238ab9733b54e68c9268868316248693a7457a49c416af121d1de8ed0f6ce8b0469e78449ec6c8dc8cdd71810b24e83c5f9b550e526fbd5a1584f454f36473669e41293e4c8a51d7ea1ba23ec41467b38f945cdc65345f0cc0c586e124e4187e9c0454913231930a2ef76cf514e0f44a4ab7d0430dd905e424ab9297e1f06e7ab5c0ab8e7945657af1056f0f0b7ac62413182a965137d6afde74643d7f4b05030fdca7ece1f459b2fb066494b86698c296a579e284b8596eedff29a60b832324d4caefa27cbc02ffeec8806261eeb0d86cd119353a4072bb31c5d54885f28f1e009d7e954242fd73aa48a468017ef2fe6a72df6c3a00f774d864f70462fec8cbafc48d563b0be7ee7343cfd0d8283ef56df94c5d96c39672b39baf7ca3ea00d6dfd05a9f5df522d69fba71062c2e0229f38578855e61ac8c105b222e45a587f91481428ee82fcf775ea62be0ad16de010d4112c074b84c9670557b074b77575725769137d8a9733d81b2743161975e0735a1ebbe575faa74480ab41b67b0393424e4986b60707ffd9cbf87cdc98ceeb3e6b2486753e5b93439262f2657da612f7cea37a5656968137d80e85b2e3c3701c65f35317470097b7d5971540a6a7c47125550a47be2c5c563909e8c6044155f6d7cd0fd9064b1327d1ece3ae5bdd2424c002c1fc94abb3c103b98b895c32e77ff263e29cc30430f55f80cd71d039c321363a2c20c2e9c39b99acd6f55413775ff41a30e173c597b9ad37a6d5939cb9411d9e7f3fc274131e29cb63161f77529edfc232ce9ee22afb38421a0b81af9d979291325deda11003cdeced19beca6a1d46a2b8b4631b62f5a943906164391028cc6b54e145b45defef7d9922cd10bff9ca0c0564e87bc905b6a9f849d4a48a5a6aee58985203c3652b98cbf3f50ec98d07af3ebda1eca948191147b313df38cf50ff095f2a4bda34fdb64f33abe8df0c3d9c69dd9c47528d904610d3f46bbd4061bf06862087a3772e94e8635ffb4c6ffe3985e7d80c7e971f627807dcebecb20180b4a42f6dea337ed2dd9b5ace2e55a77977e56a0fa99b0757817039ac73e53a713201d26e33f16ba8dc43db6c532d88c45267a659d8a39e341d8f379650b40efe41fca1a3c47431a36dc5b091237652b0f21336ee273f7b8e43b23f01676c76b91666fe662ccf858ec221eab19634c58964d26d64ee96434e231cf63b8566562c067972e1f29722a65112f5539fffbd8234b11abcef97aae747c7c2ca7ebd0f7401e4b715d5c4bcd71ccb29f733b2a1f3344eb32ac4c9275e7d165c74a00191309db1baa95283aad71c1910f3f00ce07cf654e3e3b2ef9cbe3af6b9216b36754109e474c02f6db4e35c3a49e4ef175f1da48c70d7cc3422704b6376e34d8ab984ef9cefd7e63a9f9c3f10c6b82a47d697f5e2ffc2a18c9671384b316db5fd0921cfce7bfb3771a99d1a6543a9c8e9d88d8889026a16098870f972eb9fed8882831c109402b011ad770a11c09d9d28710ec74837c4cba6612551b992d4b5f38914bd86cefabf3ae8f707afe5267169d05945d97b2f5b8c5042f0a26badd2cc6ee1ba27cc310088431a4387206d9b7980871d8a4f0a9b9fcec98be4bfae94ad9e3cc207253ddb19530dfd574f25695e7f323290c6e2111e06c6d2ae6ac79ec653d44121efc33e92b604683be0c681f6b459e4f0dd2d9f0bd74b388052312cbc78355e4c1931d3a25d35d0f817691b25327ab5f2603dd5d617ad2d30ded43f49f5b7b60690443ce7ccfe74406240604539e842917989100f4bd74f42ffff877b36efe7203eca07af32e5a4d4341079e38962ff5c15ce88d7c7ba610ed0f0ea2a98ef13b900b5e1449e60e4597e280febb2187ae41d12a9cf74257ed70dbd4f9ea925a2f6b621f84a793eb0bc77c13a6d6cf0fa17866895b6927a77314c590babdb026b2847af10b7252c96cc1ebecb6b80c159507194d49ebc50a98b1d81219a67c273bf2e038edd433c8f3c85d324e76e805008f55c6d4697a6b03c58b681d00785a930f6e3b1969cc8f8bd5ff0fc545fb8a6be86de6971d0e9216e77762cd812cad367e2cfb4c1a2285e3dd3e230da4ebce67908f8d97e8994fda3c296262aa9345f6d08460282ad247857380296d13d39f66921551d64364a04c0b502520175c7aa0d3adc1ccad667f06046e00c67f83d34db03e1a9945d7ddc6e05af46ef349357742c353c3dbb13e4baf3b01849384d7b9480dcea13c4e9c45b3cbbb2b960a1a55acbf34d396ba346358f28052636af18a2c957ae9ebba189e21a3dbe338f2cbf7612cdea3f53acefcaeb1542d439639b7d925da8a9382eaf725bfc475deeace1fd6331a68215b6726a18aab9a2a93f1abb83e9a9eff2a4e622113bc6ae0c1c171ef3a487564daf46a552ca1052395d6f1450426001e98d7b545b32bd6b4609d072ef9766ac9c246041dc02ffad5f204512627e6f838b2e1d0ddc789fdf0710c41bb6d4022c7c86fc4cc92be4955cebc5265f195409598fc2d31ec6d8eaa58e5be63c5ff7c378ae85f58736f9066b6ac8772ad9d7e4161ef852a163ac749d56895e1cd78406ca3e75f3d720d47969ea85b7b2021b43eae844c38f230a0df0ee440bd8cdb4b702392a36abad00fca1b3331ee3ec029910baf6363516a34c062ddf476cc0f6e1746085ce02841147a68e88d544ab95a1e9b4bbc0cbd53febc34d1c9c2373a2471a1c781daa5bd7f9665990ff000d012ab7849d8027684952d85c35c0dd7c24132eb3516df35ba933af06339d87996b19d0c"}, &(0x7f0000000080)=0xfe7) tgkill(r5, r5, 0x21) r12 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) getsockopt$inet_sctp_SCTP_MAX_BURST(r12, 0x84, 0x14, &(0x7f00000003c0), &(0x7f0000000400)=0x4) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xd, &(0x7f0000000040)=ANY=[@ANYBLOB="180100001700000000000000ff000000850000006d00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000002007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008002010b704000000000000850000000100000095"], &(0x7f00000001c0)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', r4, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) 2m28.312393902s ago: executing program 3 (id=1011): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000e80)=ANY=[@ANYBLOB="0a00000002000000ff0f000007"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000000000000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x40, '\x00', 0x0, @fallback=0x1e, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000000), 0x80082, 0x0) syz_open_procfs(0x0, &(0x7f00000000c0)='fd/3\x00') r1 = syz_io_uring_setup(0x1289, &(0x7f00000003c0)={0x0, 0x0, 0x10100, 0x1, 0xfffffffe}, &(0x7f0000000380)=0x0, &(0x7f0000000200)=0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=@base={0x1b, 0x0, 0x0, 0x8000}, 0x48) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xf, &(0x7f0000000240)=@ringbuf={{0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, {{0x18, 0x1, 0x1, 0x0, r4}}, {}, [], {{}, {}, {0x85, 0x0, 0x0, 0x84}}}, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r6 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000140)={0x2, &(0x7f0000000000)=[{0x9, 0x0, 0x4, 0xfc00000}, {0x5, 0x4, 0x4, 0x5}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000180)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r6, 0x40182103, &(0x7f00000002c0)={r7, 0x3, r5, 0x400, 0x80000}) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000000)={0x1, &(0x7f00000000c0)=[{0x200000000006, 0x0, 0x0, 0x7ffc1ffb}]}) getresgid(0x0, 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(0xffffffffffffffff, 0x29, 0x2a, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) lseek(0xffffffffffffffff, 0x2, 0x4) capget(&(0x7f0000000800)={0x19980330, 0xffffffffffffffff}, &(0x7f00000008c0)={0x5, 0xffff0fc9, 0x1, 0x9, 0x3, 0x3}) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000740)={&(0x7f00000006c0)='sched_switch\x00', r5}, 0x10) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3ff, 0x22a0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffff8, 0x0, @perf_config_ext, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0xffefffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000080)={0xffffffffffffffff, 0x0, &(0x7f0000001540)=""/155}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="0100000042000000060006000800000000000000", @ANYRES32=0x1, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x48) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="0c008c000400"/20, @ANYRES32=r8, @ANYBLOB='\x00'/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB='\x00'/28], 0x50) syz_io_uring_submit(r2, r3, &(0x7f0000000180)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}) io_uring_enter(r1, 0x567, 0x0, 0x0, 0x0, 0x0) r9 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000780)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000400)='kfree\x00', r9, 0x0, 0xfffffffffffffffe}, 0x18) 2m28.048318803s ago: executing program 3 (id=1016): ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg2\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000400)={'tunl0\x00', r0, 0x700, 0x8, 0x101, 0x5, {{0x37, 0x4, 0x0, 0x4, 0xdc, 0x65, 0x0, 0x7, 0x2, 0x0, @loopback, @remote, {[@rr={0x7, 0xb, 0x1d, [@initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}, @cipso={0x86, 0x5c, 0x3, [{0x2, 0x6, "fdfd6283"}, {0x6, 0x5, "7150f4"}, {0x0, 0x10, "17e9cde9bb6e6e61fcc38405407b"}, {0x5, 0x9, "49b22149d4ba63"}, {0x2, 0x7, "3902db93ff"}, {0x6, 0xc, "2095c943dc86d69d4f0d"}, {0x0, 0xf, "0ab1b8b8b969e8ad7316fcd9da"}, {0x7, 0x10, "bdee7b6348e8a67e87899c3a5872"}]}, @timestamp_prespec={0x44, 0x1c, 0xe7, 0x3, 0x4, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x17}, {@empty, 0x6}, {@local, 0x10}]}, @cipso={0x86, 0x11, 0x1, [{0x1, 0x4, "dcb2"}, {0xe, 0x7, "b45951126c"}]}, @rr={0x7, 0x1f, 0x8e, [@rand_addr=0x64010102, @rand_addr=0x64010102, @multicast2, @multicast2, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @rr={0x7, 0x13, 0x3d, [@multicast1, @multicast1, @broadcast, @rand_addr=0x64010101]}]}}}}}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000001880)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000200000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r8}, 0x10) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) r9 = io_uring_setup(0x1694, &(0x7f0000000240)={0x0, 0x0, 0x400}) io_uring_register$IORING_REGISTER_BUFFERS(r9, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r9, 0x10, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002700)=""/4096, 0x1a00}], 0x0, 0x11a}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x7}, 0x18) r10 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r10, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xffff, 0x0, 0x1c42}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'xfrm0\x00'}]}, 0x48}}, 0x0) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0xfff9, 0x2, 0x25, 0x10000}, {0x7, 0x2, 0x5, 0xf4}]}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) 2m28.047897523s ago: executing program 32 (id=1016): ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000001c0)={'wg2\x00', 0x0}) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000300)={'syztnl2\x00', &(0x7f0000000400)={'tunl0\x00', r0, 0x700, 0x8, 0x101, 0x5, {{0x37, 0x4, 0x0, 0x4, 0xdc, 0x65, 0x0, 0x7, 0x2, 0x0, @loopback, @remote, {[@rr={0x7, 0xb, 0x1d, [@initdev={0xac, 0x1e, 0x1, 0x0}, @private=0xa010100]}, @cipso={0x86, 0x5c, 0x3, [{0x2, 0x6, "fdfd6283"}, {0x6, 0x5, "7150f4"}, {0x0, 0x10, "17e9cde9bb6e6e61fcc38405407b"}, {0x5, 0x9, "49b22149d4ba63"}, {0x2, 0x7, "3902db93ff"}, {0x6, 0xc, "2095c943dc86d69d4f0d"}, {0x0, 0xf, "0ab1b8b8b969e8ad7316fcd9da"}, {0x7, 0x10, "bdee7b6348e8a67e87899c3a5872"}]}, @timestamp_prespec={0x44, 0x1c, 0xe7, 0x3, 0x4, [{@initdev={0xac, 0x1e, 0x1, 0x0}, 0x17}, {@empty, 0x6}, {@local, 0x10}]}, @cipso={0x86, 0x11, 0x1, [{0x1, 0x4, "dcb2"}, {0xe, 0x7, "b45951126c"}]}, @rr={0x7, 0x1f, 0x8e, [@rand_addr=0x64010102, @rand_addr=0x64010102, @multicast2, @multicast2, @rand_addr=0x64010102, @initdev={0xac, 0x1e, 0x1, 0x0}, @remote]}, @rr={0x7, 0x13, 0x3d, [@multicast1, @multicast1, @broadcast, @rand_addr=0x64010101]}]}}}}}) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000140)={0x1, &(0x7f0000000040)=[{0x200000000006, 0x0, 0x0, 0x7ffc0001}]}) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xb, &(0x7f0000001880)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000200000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000001070000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f0000000000)={'pim6reg1\x00', 0x2}) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000300)='qdisc_create\x00', r5}, 0x10) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000000140)={'pim6reg1\x00', @broadcast}) r7 = bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00000000000000000000000080"], 0x48) r8 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x18, 0x7, &(0x7f0000000540)=ANY=[@ANYBLOB="18000000002c0000000000000000000018110000", @ANYRES32=r7, @ANYBLOB="0000000000000000b702000001000000850000008600000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x62, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000a80)='kfree\x00', r8}, 0x10) mremap(&(0x7f0000a96000/0x1000)=nil, 0x1000, 0x400000, 0x3, &(0x7f0000000000/0x400000)=nil) r9 = io_uring_setup(0x1694, &(0x7f0000000240)={0x0, 0x0, 0x400}) io_uring_register$IORING_REGISTER_BUFFERS(r9, 0x0, &(0x7f00000002c0)=[{&(0x7f0000001700)=""/4095, 0x440000}], 0x100000000000011a) io_uring_register$IORING_REGISTER_BUFFERS_UPDATE(r9, 0x10, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000002700)=""/4096, 0x1a00}], 0x0, 0x11a}, 0x20) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1, 0x0, 0x7}, 0x18) r10 = socket(0x10, 0x803, 0x0) sendmsg$IPVS_CMD_SET_INFO(r10, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={0x0, 0x14}}, 0x0) getsockname$packet(r10, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) r11 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r11, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)=@newlink={0x48, 0x10, 0x401, 0x0, 0x0, {0x0, 0x0, 0xffff, 0x0, 0x1c42}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @xfrm={{0x9}, {0x4}}}, @IFLA_IFNAME={0x14, 0x3, 'xfrm0\x00'}]}, 0x48}}, 0x0) setsockopt$SO_ATTACH_FILTER(r10, 0x1, 0x1a, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0xfff9, 0x2, 0x25, 0x10000}, {0x7, 0x2, 0x5, 0xf4}]}, 0x10) r12 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018040000", @ANYRES32, @ANYBLOB="0000000000000000b70800000000396f7b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000002400000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x34, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r12}, 0x10) 57.7372471s ago: executing program 0 (id=3468): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x18) syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000840)={[{@nouid32}]}, 0x1, 0x71c, &(0x7f0000000f40)="$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") r0 = socket$inet6(0xa, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) r1 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x0, 0x0}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000500), 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0xd, 0x3, &(0x7f0000000880)=ANY=[@ANYRES64=r1], &(0x7f0000000400)='syzkaller\x00', 0xfffffffb, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r2 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r2, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) add_key(&(0x7f00000001c0)='ceph\x00', 0x0, &(0x7f0000000840)='\x00\x00\x00\x00\x00\x00\x00\x00\x00*\x00\x00', 0xc, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={0x0}, 0x18) syz_emit_ethernet(0x7d, &(0x7f0000000980)=ANY=[@ANYBLOB="0180c2000000fad1e048716e0800456c006f0064000007219078e0000002ffffffff4e214e21049190782cb31d54c0306845457bb47787d6d0f025d20b43bb188d0d1a8054e11824740f8ec93c4b34a154ad5431e819a1540877ac847499b5301bfc76fafa0acadcedec0f03474a8ffd9c8164a9692ee0e2e7942f87470be23a5711e07e420e6f306fa6c2ae707f332e591c0517a94d7f2e330782cafa43634a2c94d8469b7d61889002ba9832a47d48414e45a16ea29fbe75920bcb9aed783ba571af65e6065314bf5b9b8c366f1b86cd2233800b90ee392a844e5740188cfb4a4d689ba2884373333a"], 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) r4 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r4, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) sendmsg$nl_route(r3, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000370400000000ffdbdf2500000000", @ANYRES32=r5, @ANYBLOB="0101000000000000300012800b00010067656e657665000020000280050004000100000014000700dc020000000000000000000000000001"], 0x50}, 0x1, 0x0, 0x0, 0x11}, 0x40004) sendmmsg$inet(r0, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @empty, @loopback}}}], 0x20}}], 0x1, 0x80) 57.537417146s ago: executing program 0 (id=3470): r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000000240)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a90500040000746400009e150451160200000064c6", 0x15}, {&(0x7f0000000000)="17460081ba60ccbb9d000000000000", 0xf}], 0x2}}, {{&(0x7f00000004c0)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000780)="5825be06000000000000007ca2746314d178", 0x12}], 0x1}}], 0x2, 0x4004040) 57.510004348s ago: executing program 0 (id=3471): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0x18, 0x30, 0x871a15abc695fa3d, 0x70bd27, 0x0, {}, [{0x4}]}, 0x18}}, 0x0) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x4e21, @loopback}], 0x10) sendmsg$inet_sctp(r3, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000000)="fd", 0x1}], 0x1, 0x0, 0x0, 0x804c044}, 0x881) r4 = dup(r3) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x106}}, 0x20) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000300)=0x9, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x29fdf) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0xfd87) write$sndseq(r2, &(0x7f0000000180)=[{0xff, 0x0, 0x0, 0x0, @tick=0x4, {}, {}, @result={0x1, 0x2}}, {0x0, 0x0, 0xff, 0x3, @tick=0xf27, {0x1}, {}, @addr={0x2a, 0x5}}], 0x38) readv(r2, &(0x7f0000000000)=[{&(0x7f0000001140)=""/136, 0x88}], 0x1) 57.330371272s ago: executing program 0 (id=3473): syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$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") mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file1\x00', 0x0, 0x5000, 0x0) r0 = open(&(0x7f0000000140)='./file1\x00', 0x100, 0x110) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x8005, 0x0, 0x0, 0x15, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71e14ef3dc177e9b48b00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x200]}) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000500)='./file1\x00', 0x0, &(0x7f00000001c0), 0x1, 0x4bc, &(0x7f0000000a40)="$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") (async) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000100)='./file1\x00', 0x0, 0x5000, 0x0) (async) open(&(0x7f0000000140)='./file1\x00', 0x100, 0x110) (async) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x8005, 0x0, 0x0, 0x15, 0x0, "ef359f413bb93852f7d6a4ae6dddfbd1ce5d29c2ee5e5ca9000ff8ee09e737ff0edf110ff4117639c2eb4b78c660e677df701905b9aafab4afaaf755a3f6a004", "036c47c6780820d1cbf7966d61fdcf335263bd9bffbcc2542ded71038259ca171ce1a311ef54ec32d71e14ef3dc177e9b48b00", "f28359738e229a4c66810000000000d300e6d602000000000000000000000001", [0x200]}) (async) mkdirat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x0) (async) 56.842045521s ago: executing program 0 (id=3481): ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000b40)={'\x00', 0x7ff, 0x5, 0xc, 0xfffffffffffffffd, 0x59c, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x1000002, 0x200000005c831, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_setup(0x63ab, &(0x7f00000006c0)={0x0, 0x1d11, 0x10000}, &(0x7f0000010080), &(0x7f0000000400)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f0000000080)=[{0x0}], 0x1) 55.888712217s ago: executing program 0 (id=3493): r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000000240)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a90500040000746400009e150451160200000064c6", 0x15}, {&(0x7f0000000000)="17460081ba60ccbb9d000000000000", 0xf}], 0x2}}, {{&(0x7f00000004c0)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000780)="5825be06000000000000007ca2746314d178", 0x12}], 0x1}}], 0x2, 0x4004040) 55.878659528s ago: executing program 33 (id=3493): r0 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) sendmmsg$inet(r0, &(0x7f0000000240)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a90500040000746400009e150451160200000064c6", 0x15}, {&(0x7f0000000000)="17460081ba60ccbb9d000000000000", 0xf}], 0x2}}, {{&(0x7f00000004c0)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000780)="5825be06000000000000007ca2746314d178", 0x12}], 0x1}}], 0x2, 0x4004040) 41.409275256s ago: executing program 6 (id=3819): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='kfree\x00', r0, 0x0, 0x4ab}, 0x18) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="640000000206010200000000000000000000000015000300686173683a69702c706f72742c6e6574000000000900020073797a32000000000500040000000000140007800800124000000000050015002200000005000500020000000500010006"], 0x64}}, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000004c0)='kmem_cache_free\x00'}, 0x18) socket$inet_sctp(0x2, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f6000000850000004300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002a40)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc101500000c0a010100000000000000000a0000060900020073797a31000000000900010073797a3100000000e4140380100000800c00018006000100d10300000c0000800800034000000002"], 0x1574}, 0x1, 0x0, 0x0, 0x4000850}, 0x840) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4a20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4000004, &(0x7f0000000c00)={[{@jqfmt_vfsold}, {@grpid}, {@debug}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xdf07}}, {@noauto_da_alloc}, {@commit={'commit', 0x3d, 0x5}}, {@init_itable_val={'init_itable', 0x3d, 0x9}}, {@debug}, {@usrjquota}, {@nolazytime}, {@norecovery}]}, 0xfe, 0x477, &(0x7f0000000780)="$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") r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="050000000000000061110c00000000008510000002000000850000000500000095000000000000009500a5050000000077d8f3b423cdac8d80000000000000002be16ad10a48b243ccc42606d25dfd73a015e0ca7fc2506a0f7535f7866907dc6751dfb265a0e3ccae669e17fd6587d452d6453559c3421eed73d56615fe6c54c3b3ffe1b4ce25d7c983c044c03bf3a48dfe47ec9dd6c091c30b93bfae76d9ebacd3ed3e26e7a23129d6606fd28a69989d552af6bda9df2c3af36effff9af2551ce896165127cb3f011a7d06602e2fd52347125907000000000000003ed38ae89d24e1cebfba2f3fd65bfacba83109751fe6c05405d027edd68149ee99eef6a6992308a4fc0b7c70bc677d6dd4aed4af7500d7900a820b6347184e9a217b5614cd50cbe43a1ed2526814bc0000e9e086ce48e90defb6670c3df262ad0a97aec7291c25447c106a99893e10db21901eb397b2f5fd71d20fa7a050fbbef9e326ea27e513e96068fd1e8a43e89f9c85c822a961546ed5363c17ff1432d08806bc376e3e49ee52b59d13182e1f24ed200ada12f7a1001500a710eb1affb87ba55b2d72078e9f40b4ae7d01000000d11cd22c35d32940000088dde499000000fdffffff000000000000000000000000000000000000000000000c52f4ebd2c893bb97a068bd10734a83584898eccb26f7b789cfc4cd995fa3e11a5c74c85404e208000000729ac83b0dcb4f48f3c3356b9997fc455a17690b6f7f9ccbe4b1701941b18a904c0e585a66c3b84b138efc20a546d3d5227e23b03f2a834391ad24fe7d9b20cf92cb151763d41f5c76e2ff3e93ee296c4082ee73e7e197253a2b66c353312c9d75711ce1623e9c54bdff59d2a69dcb7d84c235b23a4480c2461b405cfd1a38992f295ad3adc94cd07c850d1ce6d0b2fea02c24e9280333152fb794e4ddea02017a6c139b50101caecaf2abc0842b99a96fc4275ad107274e2934a87a4ddcdb112754ca5bdec0ead14b6c0f19a43a2f04c7f0be31491eb8c9ff68236c8600000000000000000000000066e034c81c3cab4e33fc8dc55ce0ada18dcbf31c6e82893add3bee3e10fc873d1d922b0877cbcd95b839d3059d5140a1f742f6e7095d6744756e17ece06a1043375b0f61b5d4e17c81baa31b924d84f2243471221c15fa12313ffbfa7c2730309f66705b71e6205e7cbf3643561eabb9a63fcd604d5cc27e1317ad94cf438d71873e540be16b6ca205081173bd03c4754fc4674812daab482fd390a1c903b5d28a1eb247b53c3fca5206cb000000"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r2}, 0x10) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x80) open_by_handle_at(r3, &(0x7f0000000240)=@reiserfs_2={0x4b, 0x2, {0xb}}, 0x36f0516f) 41.384233049s ago: executing program 6 (id=3821): bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x18) syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000840)={[{@nouid32}]}, 0x1, 0x71c, &(0x7f0000000f40)="$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") r0 = socket$inet6(0xa, 0x2, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) socket$nl_generic(0x10, 0x3, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x30, 0x3, 0x8, 0xfffff034}]}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000500), 0x8) bpf$PROG_LOAD_XDP(0x5, 0x0, 0x0) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r1 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r1, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000000006000000000000000085000000070000"], 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) add_key(&(0x7f00000001c0)='ceph\x00', 0x0, &(0x7f0000000840)='\x00\x00\x00\x00\x00\x00\x00\x00\x00*\x00\x00', 0xc, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={0x0}, 0x18) syz_emit_ethernet(0x7d, &(0x7f0000000980)=ANY=[@ANYBLOB="0180c2000000fad1e048716e0800456c006f0064000007219078e0000002ffffffff4e214e21049190782cb31d54c0306845457bb47787d6d0f025d20b43bb188d0d1a8054e11824740f8ec93c4b34a154ad5431e819a1540877ac847499b5301bfc76fafa0acadcedec0f03474a8ffd9c8164a9692ee0e2e7942f87470be23a5711e07e420e6f306fa6c2ae707f332e591c0517a94d7f2e330782cafa43634a2c94d8469b7d61889002ba9832a47d48414e45a16ea29fbe75920bcb9aed783ba571af65e6065314bf5b9b8c366f1b86cd2233800b90ee392a844e5740188cfb4a4d689ba2884373333a"], 0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$SMC_PNETID_GET(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={0x0, 0x14}}, 0x0) getsockname$packet(r3, &(0x7f0000000940)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000900)=0x14) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="500000001000370400000000ffdbdf2500000000", @ANYRES32=r4, @ANYBLOB="0101000000000000300012800b00010067656e657665000020000280050004000100000014000700dc020000000000000000000000000001"], 0x50}, 0x1, 0x0, 0x0, 0x11}, 0x40004) sendmmsg$inet(r0, &(0x7f00000017c0)=[{{&(0x7f0000000040)={0x2, 0x4e1c, @multicast1}, 0x10, 0x0, 0x0, &(0x7f0000000000)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @empty, @loopback}}}], 0x20}}], 0x1, 0x80) 41.351577821s ago: executing program 6 (id=3822): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000002c0)=ANY=[@ANYBLOB, @ANYRES16=r1, @ANYBLOB="0100d0000000fbdbdf25010000001800018014000200766574683100000000000000000000001c0002800c00"], 0x48}, 0x1, 0x0, 0x0, 0x840}, 0x4008800) 41.333777333s ago: executing program 6 (id=3823): mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x2000006, 0x31, 0xffffffffffffffff, 0xd0fb6000) syz_mount_image$ext4(&(0x7f0000001140)='ext4\x00', &(0x7f00000007c0)='./file1\x00', 0x410c84, &(0x7f0000000340), 0x1, 0x775, &(0x7f0000001180)="$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") open(&(0x7f00000005c0)='./bus\x00', 0x167842, 0x19) r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0x2, 0x4, 0x8, 0x9, 0x0, 0xffffffffffffffff, 0x7}, 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000200)=@framed={{}, [@ringbuf_output={{0x18, 0x1, 0x1, 0x0, r0}, {}, {}, {}, {}, {}, {}, {0x85, 0x0, 0x0, 0x3}}]}, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000080)='kfree\x00'}, 0x10) r1 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xdd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x2, @perf_config_ext={0x0, 0xffffffffffffffff}, 0x4, 0x0, 0x3, 0x6, 0x0, 0x20}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='cpu<\t0||\t') 41.24057855s ago: executing program 6 (id=3824): syz_emit_ethernet(0xfa, &(0x7f0000000440)={@local, @remote, @void, {@llc_tr={0x11, {@snap={0x0, 0x1, '\x00V', "c1b406", 0x9300, "5d3e896c188a67eed0963de854456d9caf0a29e8df1c18cd067adc5253fb63fe053da77ff74f1056f241a02864ac46154f8d453c3c0333980c8dbc202a9586f190b232bd76384f0d2bdc0c04820222a7bdecf260f83faf44f35023993aebaa35c038cffcc6517b9420de96c61b035d2ca22971dda050f22d08ac12ef5b9819aed7699161159b49e0aaae80d13a9e220d4cef7806d5556a629a0303d6923a383d21becb3cd425e3da19b1e6ae9638fa313793104bfeaec9513e57c55e5df0c494ceff5419f434bfaa1f49f301ec56d77fc826387cd9c38f2292bb4ebf242272ad4e7d46"}}}}}, 0x0) r0 = fsopen(&(0x7f0000000000)='cgroup2\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) bpf$MAP_DELETE_ELEM(0x3, 0x0, 0x0) r2 = openat$cgroup_subtree(r1, &(0x7f0000000100), 0x2, 0x0) r3 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000001080)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="18000000000000000000000000c5000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7020000140000fbb703000000e31f008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b70000000000000095"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000003c0)={&(0x7f0000000c00)='sys_enter\x00', r4}, 0x10) time(0x0) write$cgroup_subtree(r2, &(0x7f0000000300)=ANY=[@ANYBLOB='-cpu'], 0x5) write$cgroup_subtree(r2, &(0x7f0000000280)=ANY=[@ANYBLOB="2b6370752046947ae9386dbd4122a7"], 0x5) syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f00000005c0)='./file1\x00', 0x8205, &(0x7f0000001340)={[{@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x15}}, {@stripe}, {@grpid}, {@errors_remount}, {@data_err_ignore}, {@noblock_validity}, {@minixdf}, {@min_batch_time={'min_batch_time', 0x3d, 0x13}}]}, 0x1, 0x60a, &(0x7f0000001c40)="$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") r5 = open(&(0x7f0000000300)='.\x00', 0x0, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r6, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r7 = socket(0x400000000010, 0x3, 0x0) r8 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r7, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newqdisc={0x38, 0x24, 0x4ee4e6a52ff56541, 0x70bd2a, 0xffffffff, {0x0, 0x0, 0x0, r9, {0x0, 0x1}, {0xffff, 0xffff}, {0xfff3, 0xffff}}, [@qdisc_kind_options=@q_multiq={{0xb}, {0x8}}]}, 0x38}}, 0x0) sendmsg$nl_route_sched(r7, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000001f40)=@newtfilter={0x7c, 0x2c, 0xd27, 0x30bd29, 0x25dfdbfd, {0x0, 0x0, 0x0, r9, {0x0, 0x7}, {}, {0x7, 0x4}}, [@filter_kind_options=@f_route={{0xa}, {0x4c, 0x2, [@TCA_ROUTE4_POLICE={0x48, 0x5, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x4}, @TCA_POLICE_TBF={0x3c, 0x1, {0xf13a, 0x8, 0x6, 0xeaba, 0x6, {0x10, 0x2, 0x767, 0xf, 0x6}, {0xe, 0x1, 0x101, 0x3, 0x8, 0xfffffff9}, 0xcf, 0x1, 0x3}}]}]}}]}, 0x7c}, 0x1, 0x0, 0x0, 0xc001}, 0x2008c014) ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f00000001c0)=0x10) 41.162454776s ago: executing program 6 (id=3827): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0xc000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={0x0, 0x1574}, 0x1, 0x0, 0x0, 0x4000850}, 0x840) 25.968352532s ago: executing program 34 (id=3827): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0xc000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={0x0, 0x1574}, 0x1, 0x0, 0x0, 0x4000850}, 0x840) 1.99650485s ago: executing program 4 (id=4800): syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0x20c006, &(0x7f0000000040)={[{@nomblk_io_submit}, {@mblk_io_submit}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x10000000000068}}, {@lazytime}, {@data_err_ignore}, {@nojournal_checksum}], [{@seclabel}]}, 0x1, 0x46e, &(0x7f0000000800)="$eJzs3M9vFFUcAPDv7G6BAspKEOWHWkUD0dhCQeTgBaOJB01M9IDHui0EWaihNRHSaDUGj4bEu/Fo4l/gSS9GPZl41bshIaYXUC9rpjvT7m63pVu23dr9fJKB9+a97XvfmXm7b+Z1G0DfGkr/SSJ2R8TvEbGnnm2uMFT/7+7cTOXvuZlKErXaW38l8/XuzM1U8qr563blmVJE4bMkDrVpd+ra9Utj1erE1Sw/Mn35/ZGpa9efv3h57MLEhYkro2fOnDp54sXToy90Jc40rjsHP5o8fOC1d26+UTl3892fv03y+FviiIgdXWhyaKXCZ2q1LjSxeTzQkE5KTUW14ob3htUq1odpDMyP/z1RjMWTtyde/bSnnQPWVa1Wq+3Pxn8bszVgC0ui1z0AeiP/oE/vf7OtsIHTj567fbZ+A5TGfjfb6iWlyA/EQMv9bTcNRcS52X++SrdofQ6xc+c6tQoA9LPvz0YcPZLN/5oWfgqxvyH3YLaGUo6IhyJib0Scjoh9EfFwxHzdRyLi0Q7bb10kaVmHSftxq8Mf2ZF0/vdStrbVPP9bmAaXixH/5tPlcgwk5y9WJ45nx+RYDGxP8yvND3945bcvlitrnP+lW9p+PhfM+nGrtL35NeNj02P3E3Oj259EHCy1iz9ZWAlIL4sDEXFwjW1cfPabw8uV3Tv+ZtsaM6U1dqhB7euIo/XzPxst8eeSldcnR3ZEdeL4SH5VLPXLrzfeXMi0LIZ1Gn+3pee/0Pb6X4i/nDSu10513saNPz6vLFe21ut/W/J2074Px6anr56I2Ja8Xu904/7Rlnqji/XT+I8daT/+98bikTgUEelF/FhEPB4RT2R9fzIinoqIIyvE/9PLT7/XvCfpIP71lcY/3tH5X0wMZhXaFDUlipd+/K6p0fJicnXn/9R86li2ZzXvfyt0pylxP8cOAAAA/i8KEbE7ksLwQrpQGB6u/w7/vthZqE5OTT93fvKDK+P17wiUY6CQP+mqPw+uPw89kd3W5/nRlvzJ7Lnxl8XB+fxwZbI63uvgoc/tWmb8p/70xQ3Y+tawjtaFpTdgMzCYoX8Z/9C/jH/oX6WlqcFe9QXYWO0+/z/uQT+Ajdcy/i37QR9x/w/9y/iH/mX8Q1+aGox7f0l+syZ2bI5ubOlEvhC0pCgKvetY/oSqoajU6wO1psTgqv9QxYYnevimBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA0EX/BQAA//+uvd/j") syz_clone3(&(0x7f0000000780)={0x1c3002480, 0x0, 0x0, 0x0, {0x2b}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = open(&(0x7f00000005c0)='./bus\x00', 0x64842, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000600)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a98010000060a09040000000000000000020000020900010073797a30000000000900020073797a320000000068000480640001800b0001006e756d67656e000054000280080004400000000508000240000002000800024000000002080004400000000408000240fffff478080004400000000408000340000000000800024000000001080001"], 0x1c0}, 0x1, 0x0, 0x0, 0x8080}, 0x2400c0c4) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000000c0)={'batadv_slave_0\x00'}) socket$inet6_mptcp(0xa, 0x1, 0x106) setsockopt$netlink_NETLINK_TX_RING(0xffffffffffffffff, 0x10e, 0xc, 0x0, 0x0) utimensat(0xffffffffffffff9c, &(0x7f0000000300)='.\x00', 0x0, 0x0) r2 = syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0b00000007000000080000000800000005"], 0x48) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000100000000000000fe0018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000500)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r4}, 0x10) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x20, 0x3, &(0x7f00000002c0)=ANY=[@ANYBLOB="1800000000000000000000000000000095"], &(0x7f0000000000)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @netfilter=0x2d, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x99ee}, 0x94) bpf$BPF_LINK_CREATE_XDP(0x1c, &(0x7f0000000500)={r5, 0x0, 0x2d, 0x0, @val=@netfilter={0xa, 0x4, 0x600, 0x1}}, 0x20) r6 = socket$inet6(0xa, 0x2, 0x0) sendto$inet6(r6, 0x0, 0x0, 0x20000001, &(0x7f0000000300)={0xa, 0x4e20, 0x5, @mcast1}, 0x1c) ptrace(0x10, r2) ptrace(0x10, r2) 1.602436782s ago: executing program 4 (id=4810): syz_mount_image$ext4(&(0x7f0000000140)='ext4\x00', &(0x7f0000000640)='./file1\x00', 0x3014870, &(0x7f0000000500)={[{@usrjquota_path={'usrjquota', 0x3d, './file1'}}, {@nombcache}, {@quota}, {@norecovery}, {@nodiscard}, {@jqfmt_vfsv1}], [{@uid_lt}, {@obj_user={'obj_user', 0x3d, 'c*\\+,,-%'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@euid_eq}]}, 0x0, 0x4e3, &(0x7f0000000b00)="$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") r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="160000000000000004000000ff"], 0x48) bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000a40)={0x3, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0], 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000740)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) fchownat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0xffffffffffffffff, 0x1000) bpf$MAP_CREATE(0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="1e0000000000000004000000ff"], 0x48) syz_usbip_server_init(0x1) r1 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000240)={0x18, 0x4, &(0x7f0000000000)=ANY=[@ANYBLOB="18010000202300800000000025ad9835850000007b00000095"], &(0x7f00000001c0)='GPL\x00', 0x4}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000140)='kmem_cache_free\x00', r1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x6}]}, 0x10) bind$bt_hci(0xffffffffffffffff, &(0x7f0000000140)={0x1f, 0xffff, 0x2}, 0x6) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r2, &(0x7f0000000080)={0x1f, 0xffff, 0x3}, 0x6) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000007c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000005c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2f, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000080)='kfree\x00', r3}, 0x10) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = socket(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r6, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={0x0, 0x14}}, 0x0) getsockname$packet(r6, &(0x7f00000002c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000100)=0x14) sendmsg$nl_route_sched(r5, &(0x7f00000001c0)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000900)=@newqdisc={0x30, 0x24, 0xf1d, 0x0, 0x0, {0x0, 0x0, 0x0, r7, {}, {0xfff1, 0xffff}}, [@qdisc_kind_options=@q_clsact={0xb}]}, 0x30}, 0x1, 0xfffc}, 0x4000800) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000003080)=@delchain={0x50, 0x64, 0xf31, 0xfffffffb, 0x0, {0x0, 0x0, 0x0, r7, {0x0, 0xfff1}, {0xfff3, 0xffff}, {0x0, 0x1b}}, [@filter_kind_options=@f_flower={{0xb}, {0x20, 0x2, [@TCA_FLOWER_INDEV={0x14, 0x2, 'bridge_slave_0\x00'}, @TCA_FLOWER_KEY_IPV4_SRC={0x8, 0xa, @initdev={0xac, 0x1e, 0x0, 0x0}}]}}]}, 0x50}, 0x1, 0x0, 0x0, 0x10}, 0x0) 1.266893208s ago: executing program 1 (id=4815): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x70bd27, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{0x0, 0xfffffffd}, 0x93}, [{0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {0x0, 0x0, 0x0, 0x0, 0x3000000}, {0x1, 0x0, 0x0, 0x4000000, 0x7, 0x80000}, {0x8, 0x5, 0x0, 0xfffffffc, 0x5}, {}, {0x0, 0x0, 0x800000, 0x0, 0x6}, {0x0, 0xc3}, {0x0, 0x5}, {0x5}, {}, {0x0, 0x10}, {0x0, 0x4, 0x0, 0x8000000}, {0x0, 0x0, 0x4000, 0x0, 0x800}, {0x2, 0x0, 0x0, 0x0, 0x6, 0x6}, {}, {}, {0x0, 0x0, 0x0, 0x1, 0x0, 0xfff}, {0x0, 0x0, 0x0, 0x8000000}, {}, {0x0, 0x0, 0x0, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x0, 0x0, 0x0, 0xfffffffc}, {0x20000}, {}, {0x0, 0x7, 0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x60569add}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xffffffff, 0x9}, {0x0, 0x0, 0x0, 0x0, 0xfffff800}, {}, {}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {0x0, 0x9, 0x0, 0xffffffff, 0x0, 0x2}, {}, {0x80}, {0x80}, {0x0, 0x0, 0x0, 0x5, 0x5}, {}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, {0x0, 0x0, 0x0, 0x8510}, {0xffff}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x0, 0xfffefffd, 0xffffffff}, {0x0, 0x0, 0x0, 0x1}, {}, {0x5}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, {0x0, 0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x9}, {0x0, 0xfffffffc, 0x200}, {}, {}, {0x4}, {}, {0x0, 0x0, 0x800}, {}, {0x0, 0x101, 0x0, 0x0, 0x0, 0xffffffff}, {}, {}, {0x0, 0x0, 0x0, 0x4, 0x9}, {}, {0x0, 0x0, 0x0, 0x0, 0x1, 0x7}, {0x0, 0xb}, {}, {}, {0x0, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x56}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {0xb}, {0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {0x0, 0xfffffffd}, {0x6}, {0x7f}, {}, {0x0, 0x8, 0x0, 0x0, 0xfffffffe}, {0x0, 0x2, 0x0, 0x2, 0xfffffffc, 0xfffffffe}, {0x0, 0x0, 0x0, 0x0, 0xe9d, 0x58a}, {0x2}, {0x2, 0x9, 0x20000000}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x292}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0xe600, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, {0x0, 0x5, 0x0, 0x7, 0x1}, {0x0, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x80}, {0x10000000, 0x0, 0x0, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {0xfffffffb, 0x0, 0x0, 0x0, 0x8000}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {0x2d}, {0x0, 0x0, 0x8000}, {0x0, 0x8000}, {0x0, 0x0, 0x10000}, {0x0, 0x80000000, 0x0, 0x7fff800}, {}, {0x0, 0x0, 0x0, 0x0, 0xd}], [{}, {}, {0x0, 0x1}, {0x1}, {}, {0x3}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {0x5, 0x1}, {}, {0x4}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {}, {0x4}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x1}, {}, {0x2}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {0x0, 0x1}, {}, {0x5}, {}, {0x4}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {0x2}, {0x0, 0x1}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {0x1}, {}, {0x5}, {}, {}, {}, {}, {}, {}, {}, {0x2, 0x1}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {0x2}, {}, {}, {0x4}, {0x3}]}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}]}, 0xe68}}, 0x0) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000280), 0x0) sendmsg$inet_sctp(r3, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000000)="fd", 0x1}], 0x1, 0x0, 0x0, 0x804c044}, 0x881) r4 = dup(r3) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x106}}, 0x20) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000300)=0x9, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x29fdf) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0xfd87) write$sndseq(r2, &(0x7f0000000180)=[{0xff, 0x0, 0x0, 0x0, @tick=0x4, {}, {}, @result={0x1, 0x2}}, {0x0, 0x0, 0xff, 0x3, @tick=0xf27, {0x1}, {}, @addr={0x2a, 0x5}}], 0x38) readv(r2, &(0x7f0000000000)=[{&(0x7f0000001140)=""/136, 0x88}], 0x1) 983.815761ms ago: executing program 4 (id=4819): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x20) r2 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r2, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xe}, 0x94) r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r3}, 0x10) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r4, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000000)='dn+\x88\xfe\xf7\x01') 962.352383ms ago: executing program 4 (id=4820): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00'}, 0x10) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x70bd27, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{0x0, 0xfffffffd}, 0x93}, [{0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {0x0, 0x0, 0x0, 0x0, 0x3000000}, {0x1, 0x0, 0x0, 0x4000000, 0x7, 0x80000}, {0x8, 0x5, 0x0, 0xfffffffc, 0x5}, {}, {0x0, 0x0, 0x800000, 0x0, 0x6}, {0x0, 0xc3}, {0x0, 0x5}, {0x5}, {}, {0x0, 0x10}, {0x0, 0x4, 0x0, 0x8000000}, {0x0, 0x0, 0x4000, 0x0, 0x800}, {0x2, 0x0, 0x0, 0x0, 0x6, 0x6}, {}, {}, {0x0, 0x0, 0x0, 0x1, 0x0, 0xfff}, {0x0, 0x0, 0x0, 0x8000000}, {}, {0x0, 0x0, 0x0, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x0, 0x0, 0x0, 0xfffffffc}, {0x20000}, {}, {0x0, 0x7, 0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x60569add}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xffffffff, 0x9}, {0x0, 0x0, 0x0, 0x0, 0xfffff800}, {}, {}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {0x0, 0x9, 0x0, 0xffffffff, 0x0, 0x2}, {}, {0x80}, {0x80}, {0x0, 0x0, 0x0, 0x5, 0x5}, {}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, {0x0, 0x0, 0x0, 0x8510}, {0xffff}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x0, 0xfffefffd, 0xffffffff}, {0x0, 0x0, 0x0, 0x1}, {}, {0x5}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, {0x0, 0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x9}, {0x0, 0xfffffffc, 0x200}, {}, {}, {0x4}, {}, {0x0, 0x0, 0x800}, {}, {0x0, 0x101, 0x0, 0x0, 0x0, 0xffffffff}, {}, {}, {0x0, 0x0, 0x0, 0x4, 0x9}, {}, {0x0, 0x0, 0x0, 0x0, 0x1, 0x7}, {0x0, 0xb}, {}, {}, {0x0, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x56}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {0xb}, {0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {0x0, 0xfffffffd}, {0x6}, {0x7f}, {}, {0x0, 0x8, 0x0, 0x0, 0xfffffffe}, {0x0, 0x2, 0x0, 0x2, 0xfffffffc, 0xfffffffe}, {0x0, 0x0, 0x0, 0x0, 0xe9d, 0x58a}, {0x2}, {0x2, 0x9, 0x20000000}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x292}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0xe600, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, {0x0, 0x5, 0x0, 0x7, 0x1}, {0x0, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x80}, {0x10000000, 0x0, 0x0, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {0xfffffffb, 0x0, 0x0, 0x0, 0x8000}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {0x2d}, {0x0, 0x0, 0x8000}, {0x0, 0x8000}, {0x0, 0x0, 0x10000}, {0x0, 0x80000000, 0x0, 0x7fff800}, {}, {0x0, 0x0, 0x0, 0x0, 0xd}], [{}, {}, {0x0, 0x1}, {0x1}, {}, {0x3}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {0x5, 0x1}, {}, {0x4}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {}, {0x4}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x1}, {}, {0x2}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {0x0, 0x1}, {}, {0x5}, {}, {0x4}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {0x2}, {0x0, 0x1}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {0x1}, {}, {0x5}, {}, {}, {}, {}, {}, {}, {}, {0x2, 0x1}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {0x2}, {}, {}, {0x4}, {0x3}]}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}]}, 0xe68}}, 0x0) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x4e21, @loopback}], 0x10) sendmsg$inet_sctp(r3, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000000)="fd", 0x1}], 0x1, 0x0, 0x0, 0x804c044}, 0x881) r4 = dup(r3) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f0000000440)={0x0, 0x18, 0xfa00, {0x4, 0x0, 0x106}}, 0x20) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000300)=0x9, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x29fdf) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0xfd87) write$sndseq(r2, &(0x7f0000000180)=[{0xff, 0x0, 0x0, 0x0, @tick=0x4, {}, {}, @result={0x1, 0x2}}, {0x0, 0x0, 0xff, 0x3, @tick=0xf27, {0x1}, {}, @addr={0x2a, 0x5}}], 0x38) readv(r2, &(0x7f0000000000)=[{0x0}], 0x1) 843.501342ms ago: executing program 5 (id=4825): r0 = open(&(0x7f00000005c0)='./bus\x00', 0x60842, 0x0) pwritev2(r0, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x78c00}], 0x1, 0x1200, 0x30, 0x3) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x71, &(0x7f0000000040)={0x0, 0x4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000100)={0xffff, 0x9, 0x7, 0x3, 0x7, 0xf8, 0x7, 0x1ff, r1}, 0x20) gettid() timer_create(0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) write$binfmt_elf64(r2, &(0x7f0000001600)=ANY=[@ANYBLOB="7f454c4600040000ff7f08000000000002003e00ecffffff98030000000000004000000000000000560000000000000000000000000038000100000002000000030000000500000004000000000000000d20000000400000c8010000000000000c"], 0x78) close(r2) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000480)={0x11, 0xb, &(0x7f0000000640)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007300000095"], &(0x7f0000000140)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xb, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r3 = creat(&(0x7f00000002c0)='./file0\x00', 0x0) write$binfmt_aout(r3, &(0x7f00000000c0)=ANY=[], 0x20) r4 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0, 0x12, r4, 0x0) syz_clone(0x630c1100, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x8, 0x80, 0x0, 0x4, 0x0, 0x7, 0x2, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) r5 = open$dir(&(0x7f0000000080)='./file0\x00', 0x804000, 0x0) mmap$xdp(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x3, 0x12, r5, 0x0) 747.41705ms ago: executing program 7 (id=4827): mknodat$null(0xffffffffffffff9c, 0x0, 0x40, 0x103) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000040)='kfree\x00', r0}, 0x18) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000000c0)=ANY=[@ANYBLOB="4000000012000501"], 0x40}, 0x1, 0x0, 0x0, 0x4000}, 0x20040810) (fail_nth: 4) 499.92865ms ago: executing program 2 (id=4829): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x6, @loopback, 0x3}], 0x1c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) socket$inet_smc(0x2b, 0x1, 0x0) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) 470.129712ms ago: executing program 7 (id=4830): r0 = bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f00000002c0)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x0, 0x10, &(0x7f0000000580)=ANY=[@ANYBLOB="18050000000000000000000000000000b7080000000000007b8af8ff00000000b7080000000000007b8af0ff00000000bfa100000000000007010000f8ffffffbfa400000000000007040000f0ffffffb70200000800000018230000", @ANYRES32=r0, @ANYBLOB="0000000000000000b704000001000000850000007800000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0x10, &(0x7f0000000580)=ANY=[], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000006c0)={&(0x7f0000000700)='kmem_cache_free\x00', r1}, 0x18) fcntl$setown(0xffffffffffffffff, 0x8, 0x0) rmdir(0x0) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket(0x840000000002, 0x3, 0xff) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f0000000040)='gre0\x00', 0x10) sendmmsg$inet(r2, &(0x7f0000000240)=[{{&(0x7f00000001c0)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f0000001980)=[{&(0x7f0000000200)="a90500040000746400009e150451160200000064c6", 0x15}, {&(0x7f0000000000)="17460081ba60ccbb9d000000000000", 0xf}], 0x2}}, {{&(0x7f00000004c0)={0x2, 0x4e24, @loopback}, 0x10, &(0x7f00000000c0)=[{&(0x7f0000000780)="5825be06000000000000007ca2746314d1787b35", 0x14}], 0x1}}], 0x2, 0x4004040) 469.803762ms ago: executing program 2 (id=4831): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=@base={0xe, 0x4, 0x8, 0x1, 0x4}, 0x50) r1 = bpf$MAP_CREATE_TAIL_CALL(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="0300000004000000040000000a"], 0x48) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000880)={0x3, 0x8, &(0x7f0000000000)=ANY=[@ANYBLOB="1806000000000300000000000000c2", @ANYRES32=r1, @ANYBLOB="0000000000000000b703000000000000850000000c000000b70000000000000095"], &(0x7f0000000980)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sched_cls, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000300)={{r0}, &(0x7f0000000280), &(0x7f00000002c0)=r2}, 0x20) r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000340)={0x6, 0xd, &(0x7f0000000200)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000bc00000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bca2000000000000a6020000f8ffffffb703000008000000b704000000000400850000003300000095"], &(0x7f0000000180)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @xdp, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000600)={r3, 0x5, 0xe, 0x0, &(0x7f0000000000)="43227504000000b32415f73227b2", 0x0, 0xd01, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x50) 460.410933ms ago: executing program 7 (id=4832): r0 = socket$inet(0x2, 0x2, 0x1) sendmsg$inet(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x2, 0x4e20, @empty}, 0x10, &(0x7f0000000200)=[{&(0x7f00000004c0)='\b\x00', 0x2}, {&(0x7f0000000cc0)="cd99a0036a5c", 0x6}], 0x2, &(0x7f0000000b40)=[@ip_retopts={{0x10}}], 0x10}, 0x24008004) socket$nl_route(0x10, 0x3, 0x0) (async) syz_clone(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) (async) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32, @ANYBLOB="0000000000000000b7080000100000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x35, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r3 = bpf$MAP_CREATE(0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="0b00000005000000000400000900000001"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000800000000000000000000018110000", @ANYRES32=r3], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) r4 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f00000001c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x21, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) (async) syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f0000000500)='./file0\x00', 0x0, &(0x7f0000000540), 0x1, 0x4a3, &(0x7f0000000580)="$eJzs3c1rXOUaAPBnZpo0SXNvP+7l0vbCbaEXej9oJh9IE3XjSl0UxIIbhRqTaayZZEJmUpvQRaq7LlyIoiAu3PsXuLEriyCudS8upKI1ggrCyDkzk+Zr4qBpBnJ+Pzid95z3dJ73zfC8nHnPOXMCyKyzyT+5iMGI+DwijjZWN+9wtvGydv/mVLLkol6//F0u3S9Zb+3a+n9HImI1Ivoi4tknI17KbY9bXV6ZnSyXS4vN9WJtbqFYXV65cG1ucqY0U5ofGb84MTE+PDY6sWd9vf3GK7cvffR074c/vX7v7puffJw0a7BZt7Efe6nR9Z44vmHboYh4/GEE64JCsz/93W4If0jy+f0tIs6l+X80CumnCWRBvV6v/1o/3K56tQ4cWPn0GDiXH4qIRjmfHxpqHMP/PQby5Uq19v+rlaX56cax8rHoyV+9Vi4NN78rHIueXLI+kpYfrI9uWR+LSI+B3yr0p+tDU5Xy9P4OdcAWR7bk/4+FRv4DGeErP2SX/Ifskv+QXfIfskv+Q3bJf8gu+Q/ZJf8hu+Q/ZJf8h+yS/5BJz1y6lCz11v3v09eXl2Yr1y9Ml6qzQ3NLU0NTlcWFoZlKZSa9Z2fu996vXKksjDwSSzeKtVK1Vqwur1yZqyzN166k9/VfKfXsS6+AThw/c+fLXESsPtqfLoneZp1chYOtXs9Ft+9BBrqj0O0BCOgaU3+QXb7jAzv8RO8mfe0qFva+LcD+yHe7AUDXnD/l/B9klfl/yC7z/5BdjvEB8/+QPeb/IbsG2zz/6y8bnt01HBF/jYgvCj2HW8/6Ag6C/De55vH/+aP/Htxa25v7OT1F0BsRr753+Z0bk7Xa4kiy/fv17bV3m9tHu9F+oFOtPG3lMQCQXWv3b061lv2M++0TjYsQtsc/1Jyb7EvPUQ6s5TZdq5Dbo2sXVm9FxMmd4ueazztvnPkYWCtsi3+i+ZprvEXa3kPpc9P3J/6pDfH/tSH+6T/9V4FsuJOMP8M75V8+zelYz7/N48/gHl070X78y6+Pf4U249+ZDmO8/P5rX7eNfyvi9I7xW/H60lhb4ydtO99h/HsvPPePdnX1Dxrvs1P8lqRUrM0tFKvLKxfS35GbKc2PjF+cmBgfHhudKKZz1MXWTPV2j5387O5u/R9oE3+3/ifb/tth/3/556fPn90l/n/O7fz5n9glfn9E/K/D+D+MfvViu7ok/nSb/ud3iZ9sG+swfvXtpw53uCsAsA+qyyuzk+VyaVFBQUFhvdDtkQl42B4kfbdbAgAAAAAAAAAAAHRqPy4n7nYfAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAOgt8CAAD//1kn1ls=") (async) r5 = openat$dir(0xffffffffffffff9c, &(0x7f0000000580)='.\x00', 0x8880, 0x85) getdents64(r5, 0x0, 0x4f) (async) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000005c0)={&(0x7f0000000580)='kmem_cache_free\x00', r4}, 0x10) (async) bind$netlink(r1, &(0x7f0000000000)={0x10, 0x0, 0x0, 0x80065c9}, 0xc) sendmsg$NFT_BATCH(r1, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a20000000000a01010200000000000000020000000900010073797a300000000040000000030a01010000000000000000020000000900010073797a30000000000900030073797a320000000014000480080001400000000008000240000000002c000000030a03000000000000000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0xb4}, 0x1, 0x0, 0x0, 0x400c0d1}, 0x0) (async) r6 = bpf$MAP_CREATE(0x0, &(0x7f0000000640)=ANY=[@ANYBLOB="0600000004000000fd0f000002"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x0, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000004000000018110000", @ANYRES32=r6, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f9ffffffb703000000080000b70400000000000085000000c300000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x90) (async) r7 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x18, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x43, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000300)={&(0x7f0000000140)='sched_switch\x00', r7}, 0x18) (async) io_uring_setup(0x7ce9, &(0x7f00000003c0)={0x0, 0x19dd, 0x2, 0x1, 0x105}) (async) r8 = socket$inet6_tcp(0xa, 0x1, 0x0) (async) io_setup(0x8, &(0x7f00000001c0)=0x0) io_submit(r9, 0x3a, &(0x7f00000006c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0}]) (async) io_getevents(r9, 0x2, 0x2, &(0x7f0000001340)=[{}, {}], 0x0) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0x4, &(0x7f0000000380)=ANY=[@ANYBLOB="1800000000000000000000000000000085000000ae00000095"], &(0x7f0000001b80)='syzkaller\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7fff}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='kfree\x00', r10}, 0x10) (async) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000080)) (async) syz_io_uring_setup(0x1104, &(0x7f0000000300)={0x0, 0x1, 0x80, 0x8000000, 0x8000021e}, &(0x7f0000000940)=0x0, &(0x7f0000000040)) syz_memcpy_off$IO_URING_METADATA_GENERIC(r11, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) 398.705568ms ago: executing program 7 (id=4833): mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_setup(0x31fa, &(0x7f00000001c0)={0x0, 0x6a93, 0x40, 0x2, 0xd1}) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = socket(0x4, 0x80000, 0xf8c) syz_emit_ethernet(0x7e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0d80c200000086dd60156909001b2f00fc020000000000000000000000000000ff020000000000000000000000000001242088a88dff00000006000000000800000086dd88a888be08"], 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000000314230c2abd7000ff05df250900020073797a310000000008004100727865001400330073797a5f74756e"], 0x38}, 0x1, 0x0, 0x0, 0x48845}, 0x4000) socket(0xa, 0x3, 0x3a) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x44840) syz_genetlink_get_family_id$nl80211(&(0x7f0000003840), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mknod$loop(0x0, 0x2000, 0x1) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRESOCT=r2], 0x5c}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000090601060000000000000000000000000900020073797a310000000005000100070000001c0007800c00018008000140ffffffff0c000280080001407f000001"], 0x44}, 0x1, 0x0, 0x0, 0x10040047}, 0x240008c4) sendmsg$IPSET_CMD_DESTROY(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="740000000306010800000000000000000600000705000100070000000500010007000000050001000700000005000100070000000900020073797a3000000000050001000700000005000100070000000900020073797a30000000000900020073797a30000000000900020073797a31"], 0x74}, 0x1, 0x0, 0x0, 0x80c1}, 0x50) syz_clone(0x48002000, 0x0, 0x0, 0x0, 0x0, 0x0) 398.236348ms ago: executing program 1 (id=4834): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x20) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x477e, 0x6}, 0x818e, 0x1000000, 0xfffffffd, 0x3, 0x0, 0x0, 0x1, 0x0, 0xfffffffd, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffefff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r4, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000000)='dn+\x88\xfe\xf7\x01') 368.63378ms ago: executing program 2 (id=4835): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x26}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) unshare(0x26000400) r1 = syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x79af, 0x3180, 0x7fff, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f00000002c0)=@IORING_OP_MSG_RING={0x28, 0x6, 0x0, r1, 0x0, 0x0, 0x0, 0x2}) io_uring_enter(r1, 0x627, 0x4c1, 0x43, 0x0, 0x0) 339.810943ms ago: executing program 1 (id=4836): r0 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="1b0000000000000000000000000004"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xf, &(0x7f0000000340)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b70200001400001cb7030000000000008500000083000000bf0900000000000055090100000000009500000000000000bf91000000000000b7020000000000008500000085000000b7000000"], &(0x7f0000000080)='syzkaller\x00', 0x0, 0x0, 0x0, 0x40f00, 0x22, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000340)='kfree\x00', r1}, 0x18) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x4) sendmsg$NFT_BATCH(r2, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)={&(0x7f0000000540)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a5c000000160a0500000000000000000002000000300003802c00038004000100776732000000000000000000000000001400010076657468315f746f5f627269646765000900020073797a30000000000900010073797a30"], 0x84}, 0x1, 0x0, 0x0, 0x40000}, 0x20008000) 339.334803ms ago: executing program 1 (id=4837): r0 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x5, &(0x7f0000000280)=ANY=[@ANYRESOCT], &(0x7f0000000100)='syzkaller\x00', 0xffffffff, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000140)={&(0x7f0000000040)='kmem_cache_free\x00', r0, 0x0, 0x4}, 0x18) syz_mount_image$ext4(&(0x7f0000000740)='ext4\x00', &(0x7f0000000780)='./file0\x00', 0x0, &(0x7f0000000840)={[{@nouid32}]}, 0x1, 0x71c, &(0x7f0000000f40)="$eJzs3U1rXNUbAPDn3mb+yb+NJoKKLyAVxYqlkya2lK6sC9FNMVBwm4bkJsTc9MbMTG1CF+nKrYii4Ea/gxtXims/gF9BQbTURV1F7mQmfZtJpppkIPP7wZ15zr03ec6ZCeeBnGFOAAPrZPmQRjwfEdNJxFjrfBIRlWY0FHFp+747t2/OlUcSW1tX/kia95TtuO9nSiciYjMinouInyoRp9NH89bWN5Zn8zxba7Un6iurE7X1jTNLK7OL2WJ27eK5c1PnLpy/eHH/xvrG+x88Wz3/zuj30wszpyZ//S6JSzHaunb/OPbT9mtSKV/CB7x7EMn6KOl3B/hXhiLiWOv5mRiLY80IADjKtoYjtgCAAZOo/wAwYNr/B2iv7R3UOlg3v78dESOd8g+11sxGmuuQx+8kD6xMJBExfpgd5UjavBURV8dPPvr3lzyyZvu4zu5HBzlQP5bzz6VO80+6M/9Eh/lnpP3Zif+o+/x3L/+xLvPfdI853nuxUXTNfyvihaFO+ZOd/EmX/Fd7zP/D3fm/u13b+jbitY71J3kgV/fPh0wsLOXZ2e3HzjlONm5+uNv4j3fJv7nH+Fd7HP/oZy//vLlL/tdf2f3975S/rImf9pj/k8pbX3S7Vuaf7zL+vd7/b3rMf+GljzZ6vBUAAAAAAAAAAAAAAAAAAAAAAAAAAACOhDQiRiNJqztxmlar23t4Px3H07yo1U8vFI1r89HcK3s8Kmn7q5bHtttJ2Z5sfR9/uz31UPvNiHgqIj4f/n+zXZ0r8vl+Dx4AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAWk48tP//X8Pb+/8DAEfcSL87AAAcOvUfAAaP+g8Ag0f9B4DBo/4DwOBR/wFg8Kj/AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAByy6cuXy2Przu2bc2V7/vp6Y7m4fmY+qy1XVxpz1blibbW6WBSLeVadK1b2+n15UaxOTUXjxkQ9q9UnausbMytF41p9ZmlldjGbySqHMioAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeDyjzSNJqxGRNuM0rVYjnoiI8agkC0t5djYinoyIX4Yrw2V7st+dBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAIB9VlvfWJ7N82xNIBAIdoJ+z0wAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABw+O5t+t3vngAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABAP6W/JRFRHqfGXh19+Or/krvDzeeI+PjrK1/emK3X1ybL83/unK9/1To/1Y/+AwB7adfpdh0HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgE5q6xvLs3merR1g0O8xAgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAACwf/4JAAD//68fzsc=") socket$inet6(0xa, 0x2, 0x0) r1 = socket(0x2, 0xa, 0x300) socket$nl_netfilter(0x10, 0x3, 0xc) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r2, 0x0, 0x4000054) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000100)={0x1, &(0x7f0000000200)=[{0x30, 0x3, 0x8, 0xfffff034}]}, 0x10) bpf$TOKEN_CREATE(0x24, &(0x7f0000000500)={0x0, r1}, 0x8) bpf$PROG_LOAD_XDP(0x5, &(0x7f00000005c0)={0xd, 0x3, &(0x7f0000000880)=ANY=[@ANYRES64=r2], &(0x7f0000000400)='syzkaller\x00', 0xfffffffb, 0x0, 0x0, 0x0, 0x20, '\x00', 0x0, 0xf, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x3}, 0x94) syz_genetlink_get_family_id$ethtool(0x0, 0xffffffffffffffff) r3 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) bind$nfc_llcp(r3, 0x0, 0x0) bpf$MAP_CREATE_RINGBUF(0x0, 0x0, 0x0) r4 = bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x11, 0x5, &(0x7f0000000040)=ANY=[@ANYBLOB="18000000000000060000000000000000850000000700000045000000a000020095"], &(0x7f0000000800)='GPL\x00', 0x3, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f00000003c0)='kfree\x00', r4}, 0x10) add_key(&(0x7f00000001c0)='ceph\x00', 0x0, &(0x7f0000000840), 0x0, 0xffffffffffffffff) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000001580)={0x0}, 0x18) r5 = bpf$PROG_LOAD_XDP(0x5, &(0x7f0000000300)={0x6, 0x3, &(0x7f00000000c0)=ANY=[@ANYBLOB="1800000002000000000000000008082295"], &(0x7f00000002c0)='GPL\x00'}, 0x94) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000240)={r5, 0x5, 0xb68, 0xfffffffffffffeb9, &(0x7f0000000000)="ff", 0x0, 0x149c, 0x503, 0x0, 0x0, 0x0, 0x0, 0x2, 0xffff80fe, 0xe}, 0x48) syz_emit_ethernet(0x7d, &(0x7f0000000980)=ANY=[@ANYBLOB="0180c2000000fad1e048716e0800456c006f0064000007219078e0000002ffffffff4e214e21049190782cb31d54c0306845457bb47787d6d0f025d20b43bb188d0d1a8054e11824740f8ec93c4b34a154ad5431e819a1540877ac847499b5301bfc76fafa0acadcedec0f03474a8ffd9c8164a9692ee0e2e7942f87470be23a5711e07e420e6f306fa6c2ae707f332e591c0517a94d7f2e330782cafa43634a2c94d8469b7d61889002ba9832a47d48414e45a16ea29fbe75920bcb9aed783ba571af65e6065314bf5b9b8c366f1b86cd2233800b90ee392a844e5740188cfb4a4d689ba2884373333a"], 0x0) 284.878007ms ago: executing program 5 (id=4838): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x4e21, @loopback}], 0x10) sendmsg$inet_sctp(r2, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000000)="fd", 0x1}], 0x1, 0x0, 0x0, 0x804c044}, 0x881) r3 = dup(r2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x2}}, 0x20) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000300)=0x9, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x29fdf) 223.766152ms ago: executing program 7 (id=4839): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000140)={{0x14, 0x10, 0x1, 0x2000000, 0x0, {0x1}}, [@NFT_MSG_NEWSETELEM={0x14, 0xe, 0xa, 0x201, 0x0, 0x0, {0x1}}], {0x14, 0x10}}, 0x3c}}, 0x20000080) 219.440222ms ago: executing program 5 (id=4840): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r1, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0xe}, 0x94) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000600)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x8, '\x00', 0x0, @fallback=0x13, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) r3 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r3, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000000)='dn+\x88\xfe\xf7\x01') 187.322315ms ago: executing program 7 (id=4841): r0 = socket$nl_route(0x10, 0x3, 0x0) bpf$MAP_CREATE(0x0, 0x0, 0x48) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={0x0}, 0x18) sendmsg$nl_route_sched(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000003c0)=@newtaction={0xe68, 0x30, 0x871a15abc695fa3d, 0x70bd27, 0x0, {}, [{0xe54, 0x1, [@m_pedit={0xe50, 0x1, 0x0, 0x0, {{0xa}, {0xe24, 0x2, 0x0, 0x1, [@TCA_PEDIT_PARMS={0xe20, 0x2, {{{0x0, 0xfffffffd}, 0x93}, [{0x0, 0x0, 0x0, 0x0, 0xfffffffd}, {0x0, 0x0, 0x0, 0x0, 0x3000000}, {0x1, 0x0, 0x0, 0x4000000, 0x7, 0x80000}, {0x8, 0x5, 0x0, 0xfffffffc, 0x5}, {}, {0x0, 0x0, 0x800000, 0x0, 0x6}, {0x0, 0xc3}, {0x0, 0x5}, {0x5}, {}, {0x0, 0x10}, {0x0, 0x4, 0x0, 0x8000000}, {0x0, 0x0, 0x4000, 0x0, 0x800}, {0x2, 0x0, 0x0, 0x0, 0x6, 0x6}, {}, {}, {0x0, 0x0, 0x0, 0x1, 0x0, 0xfff}, {0x0, 0x0, 0x0, 0x8000000}, {}, {0x0, 0x0, 0x0, 0x0, 0x20}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, {}, {0x0, 0x0, 0x0, 0xfffffffc}, {0x20000}, {}, {0x0, 0x7, 0x0, 0x0, 0xffffffff}, {0x0, 0x0, 0x0, 0xfffffffd, 0x0, 0x3}, {0x0, 0x0, 0x0, 0x0, 0x5}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x60569add}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, {0xffffffff, 0x9}, {0x0, 0x0, 0x0, 0x0, 0xfffff800}, {}, {}, {0xffffffff, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {}, {}, {0x0, 0x9, 0x0, 0xffffffff, 0x0, 0x2}, {}, {0x80}, {0x80}, {0x0, 0x0, 0x0, 0x5, 0x5}, {}, {0x0, 0x0, 0x8}, {0x0, 0x0, 0x0, 0x0, 0x9}, {0x0, 0x0, 0x0, 0x0, 0x3}, {}, {}, {0x0, 0x0, 0x0, 0x8510}, {0xffff}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x0, 0xfffefffd, 0xffffffff}, {0x0, 0x0, 0x0, 0x1}, {}, {0x5}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}, {0x0, 0x0, 0x0, 0x0, 0x8}, {}, {0x0, 0x0, 0x0, 0xfffffffe, 0x0, 0x9}, {0x0, 0xfffffffc, 0x200}, {}, {}, {0x4}, {}, {0x0, 0x0, 0x800}, {}, {0x0, 0x101, 0x0, 0x0, 0x0, 0xffffffff}, {}, {}, {0x0, 0x0, 0x0, 0x4, 0x9}, {}, {0x0, 0x0, 0x0, 0x0, 0x1, 0x7}, {0x0, 0xb}, {}, {}, {0x0, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x56}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, {}, {0xb}, {0x0, 0x0, 0x0, 0x0, 0x4}, {}, {}, {0x0, 0xfffffffd}, {0x6}, {0x7f}, {}, {0x0, 0x8, 0x0, 0x0, 0xfffffffe}, {0x0, 0x2, 0x0, 0x2, 0xfffffffc, 0xfffffffe}, {0x0, 0x0, 0x0, 0x0, 0xe9d, 0x58a}, {0x2}, {0x2, 0x9, 0x20000000}, {}, {}, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x292}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, {0x0, 0x0, 0xe600, 0x0, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x101}, {0x0, 0x5, 0x0, 0x7, 0x1}, {0x0, 0x5}, {0x0, 0x0, 0x0, 0x0, 0x80}, {0x10000000, 0x0, 0x0, 0x0, 0x4}, {}, {0x0, 0x0, 0x0, 0x0, 0xfffffffc}, {0x3}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x7fffffff}, {}, {0x0, 0x0, 0x0, 0x8}, {}, {}, {}, {0xfffffffb, 0x0, 0x0, 0x0, 0x8000}, {0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, {0x2d}, {0x0, 0x0, 0x8000}, {0x0, 0x8000}, {0x0, 0x0, 0x10000}, {0x0, 0x80000000, 0x0, 0x7fff800}, {}, {0x0, 0x0, 0x0, 0x0, 0xd}], [{}, {}, {0x0, 0x1}, {0x1}, {}, {0x3}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {0x0, 0x1}, {}, {0x5, 0x1}, {}, {0x4}, {0x3}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {}, {0x4}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {0x4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x1}, {}, {0x1}, {}, {0x2}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {0x0, 0x1}, {}, {0x5}, {}, {0x4}, {}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x5}, {0x2}, {0x0, 0x1}, {}, {0x0, 0x1}, {}, {}, {}, {}, {}, {0x1}, {}, {0x5}, {}, {}, {}, {}, {}, {}, {}, {0x2, 0x1}, {}, {}, {}, {}, {0x0, 0x1}, {}, {}, {}, {0x2}, {}, {}, {0x4}, {0x3}]}}]}, {0x4}, {0xc}, {0xc, 0x8, {0x0, 0x1}}}}]}]}, 0xe68}}, 0x0) r1 = syz_open_dev$sg(&(0x7f00000060c0), 0x0, 0x8002) r2 = fcntl$dupfd(r1, 0x0, r1) r3 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r3, 0x84, 0x64, &(0x7f0000000280), 0x0) sendmsg$inet_sctp(r3, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000000)="fd", 0x1}], 0x1, 0x0, 0x0, 0x804c044}, 0x881) r4 = dup(r3) write$RDMA_USER_CM_CMD_CREATE_ID(r4, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x2}}, 0x20) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r4, 0x84, 0x72, &(0x7f0000000100)={0x0, 0x0, 0x20}, 0xc) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r3, 0x84, 0x13, &(0x7f0000000300)=0x9, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x29fdf) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r4, &(0x7f00000000c0)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x5}}, 0xfd87) write$sndseq(r2, &(0x7f0000000180)=[{0xff, 0x0, 0x0, 0x0, @tick=0x4, {}, {}, @result={0x1, 0x2}}, {0x0, 0x0, 0xff, 0x3, @tick=0xf27, {0x1}, {}, @addr={0x2a, 0x5}}], 0x38) readv(r2, &(0x7f0000000000)=[{&(0x7f0000001140)=""/136, 0x88}], 0x1) 186.657935ms ago: executing program 5 (id=4842): r0 = socket$inet6_sctp(0xa, 0x1, 0x84) r1 = dup(r0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_ADD(r1, 0x84, 0x64, &(0x7f0000000040)=[@in6={0xa, 0x4e24, 0x6, @loopback, 0x3}], 0x1c) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xb, &(0x7f0000000280)=ANY=[@ANYBLOB="180000000000000000000000000000001801000020207025000000002dba513d7b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000008fd8850000000400000095"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x28, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000200)={&(0x7f0000000180)='kfree\x00', r2}, 0x10) symlinkat(&(0x7f0000002040)='./file0/file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa/file0\x00', 0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00') pivot_root(&(0x7f0000000240)='./file0\x00', 0x0) 169.742386ms ago: executing program 2 (id=4843): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0e000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000580)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000001e00007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x11, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000a40)={&(0x7f0000000980)='sys_enter\x00', r1}, 0x10) signalfd4(0xffffffffffffffff, &(0x7f0000000340)={[0x4]}, 0x8, 0x1800) 162.028897ms ago: executing program 5 (id=4844): r0 = bpf$MAP_CREATE(0x0, &(0x7f0000001fc0)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="180000000000000000000000000001b518110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007"], &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x40f00, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000100)={&(0x7f0000000080)='kfree\x00', r1}, 0x18) syz_mount_image$ext4(0x0, &(0x7f00000001c0)='./file0\x00', 0x1809049, 0x0, 0xff, 0x0, 0x0) pipe2$9p(&(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000180), 0x2004000, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@access_uid}], [], 0x6b}}) 112.081161ms ago: executing program 2 (id=4845): prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000640)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x9, 0x4, 0x7ffc0002}]}) bpf$MAP_CREATE(0x0, 0x0, 0x50) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) set_mempolicy(0x3, &(0x7f0000000400)=0x4000000ffb, 0x9) syz_clone(0x4021400, 0x0, 0x9000, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x11, 0xb, 0x0, &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x40e00, 0x0, '\x00', 0x0, @fallback=0x16, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x94) r1 = bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000001c0)={&(0x7f0000000340)='kfree\x00', r0, 0x0, 0x4}, 0x18) perf_event_open(&(0x7f0000000380)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) socket(0x10, 0x803, 0x0) socket$unix(0x1, 0x2, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x24, 0x1, 0x0, 0x0, 0x0, 0x7, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0}, 0x2000, 0x10000, 0x7, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x200043, 0x1ff) write$binfmt_elf64(r3, &(0x7f0000000980)=ANY=[@ANYBLOB="7f454c4600000006010000000000000003003e000000000003000000000000004000000000000000980100000000000002000000000038000200000002000000000000600300000008000000000000000d00000000000000ed08000000000000f0ffffffffffffff0000000000000000080000000000000003000000cff5ffff800300000000000001000000000000000500000000000000ff"], 0x5b0) close(r3) r4 = bpf$PROG_LOAD(0x5, &(0x7f0000000680)={0x18, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback=0x1, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f0000000c80)='kmem_cache_free\x00', r4}, 0x10) perf_event_open(&(0x7f0000000380)={0x4, 0x80, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0xc8, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000029c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet(r6, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x800) recvmsg$unix(r5, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f00000003c0)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) write$cgroup_subtree(r7, &(0x7f0000000300)=ANY=[@ANYRESHEX=r2, @ANYRES64=r1], 0xfdef) r8 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r8, 0x400454ca, &(0x7f00000000c0)={'syzkaller1\x00', 0x6bf1c2d5adba8c32}) r9 = socket$kcm(0x2, 0xa, 0x2) ioctl$SIOCSIFHWADDR(r9, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}}) writev(r8, &(0x7f0000000140)=[{&(0x7f0000000080)="2e9b5b0007e03dd65193dfb6c575963f86dd6067", 0x14}, {&(0x7f00000029c0)="32e496b26cb156fc17de651bb0059979555c10b710b18f6a6eb3e0edacecac6e537e", 0x22}, {&(0x7f0000000280)="400a8116", 0x4}], 0x3) 111.731851ms ago: executing program 4 (id=4846): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="0500000004000000ff0f000005"], 0x50) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x22, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = fsopen(&(0x7f0000000100)='ramfs\x00', 0x1) fsconfig$FSCONFIG_CMD_CREATE(r1, 0x6, 0x0, 0x0, 0x0) r2 = fsmount(r1, 0x0, 0x20) symlinkat(&(0x7f0000000000)='.\x00', r2, &(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x3, 0x10020, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x477e, 0x6}, 0x818e, 0x1000000, 0xfffffffd, 0x3, 0x0, 0x0, 0x1, 0x0, 0xfffffffd, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffefff, 0xffffffffffffffff, 0x0) r3 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x1b, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r3, @ANYBLOB="0000000000000000b70800000000e7057b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000001600000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x9, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe8c}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00'}, 0x10) r4 = add_key$keyring(&(0x7f00000000c0), &(0x7f00000002c0)={'syz', 0x3}, 0x0, 0x0, 0xffffffffffffffff) keyctl$restrict_keyring(0xa, r4, &(0x7f0000000300)='asymmetric\x00', &(0x7f0000000000)='dn+\x88\xfe\xf7\x01') 78.724474ms ago: executing program 4 (id=4847): ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000140)={'syztnl0\x00', &(0x7f00000000c0)={'ip6gre0\x00', 0x0, 0x4, 0xfb, 0x0, 0x834, 0x1, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @remote, 0x1, 0x7800, 0x8, 0x5}}) r1 = syz_clone(0x22180, 0x0, 0xa42f, 0x0, 0x0, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000040)='syscall\x00') open(&(0x7f00009e1000)='./file0\x00', 0x60840, 0x0) bpf$MAP_CREATE(0x0, &(0x7f0000000740)=ANY=[@ANYBLOB="1b00c00000000000e8ccc0", @ANYRES32, @ANYBLOB="0046377a44e6466b4ff7526ef6132d95eb70081d113407d0f14309fc575c77d4511866d72159970088d44429573d15552c33d62d3250281449bfcec5e4300180000097cffe24e0b1664f034f7f9edeed521df5fc18da93a1033b910cf0fcf81354a5f42b3586365d6ea473b7c4a102ee35cb32f7b89b4b361b2170c291ee99aad242d0cc14d1f3103937a8a4778be099bdf151790422fda6d93dcde7c8a4818c7697b742", @ANYRES8=r0, @ANYRES32, @ANYBLOB='\x00'/14], 0x48) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = bpf$PROG_LOAD(0x5, &(0x7f00000004c0)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x9, '\x00', 0x0, @fallback=0x16, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='9p_protocol_dump\x00', r5}, 0x10) mount$9p_fd(0x0, &(0x7f0000000300)='./file0\x00', &(0x7f0000000280), 0x0, &(0x7f0000000600)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX=r3, @ANYBLOB=',wfdno=', @ANYRESHEX=r4]) pread64(r2, &(0x7f0000000140)=""/15, 0xf, 0x4) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000500)={0xffffffffffffffff, 0x20, &(0x7f0000000240)={&(0x7f0000000340)=""/65, 0x41, 0x0, &(0x7f0000000440)=""/181, 0xb5}}, 0x10) r6 = syz_open_dev$tty1(0xc, 0x4, 0x1) r7 = dup(r6) ioctl$TIOCL_SETSEL(0xffffffffffffffff, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x1fa, 0x1011, 0xd72}}) ioctl$TIOCL_SETSEL(r7, 0x541c, &(0x7f0000001900)={0x2, {0x2, 0x0, 0x0, 0x14f}}) r8 = bpf$MAP_CREATE(0x0, &(0x7f0000000540)=ANY=[@ANYBLOB="0700000001000000010100000800000080c50000", @ANYRES32, @ANYBLOB="0400"/20, @ANYRES32=0x0, @ANYRES32, @ANYBLOB="03cbe310f6eb76d9000002030000020000000000", @ANYRES32], 0x50) syz_open_dev$vcsn(&(0x7f00000005c0), 0xed, 0x80000) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000600)=ANY=[@ANYBLOB="19000000040000000800000008"], 0x48) bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000640)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r9, @ANYBLOB="0000000000000000b7080000000000107b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b70400000000925e850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x3, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000400)=ANY=[@ANYRES32=r8], &(0x7f0000000700)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xd, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20004000}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000bc0)={&(0x7f0000000040)='leases_conflict\x00', r10}, 0x10) r11 = bpf$PROG_LOAD(0x5, &(0x7f00000003c0)={0x11, 0xb, &(0x7f0000000a40)=ANY=[@ANYBLOB="180080000800000000000200030000001801000020646c2502000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b70300000000000085000000060000009500000000000000"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x3a, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000080)='sched_switch\x00', r11}, 0x10) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="1800000000000000000000004b64ffec8500000050000000850000000f00000095"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, 0x0, 0x0) lseek(0xffffffffffffffff, 0x84b0, 0x1) syz_io_uring_setup(0x88f, &(0x7f0000000140)={0x0, 0xaee2, 0x80, 0x2, 0x1f9}, &(0x7f0000000000)=0x0, &(0x7f0000000300)) bpf$BPF_PROG_TEST_RUN(0xa, 0x0, 0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r12, 0x4, &(0x7f0000000080)=0xfffffffc, 0x0, 0x4) 78.284674ms ago: executing program 1 (id=4848): bpf$MAP_CREATE_CONST_STR(0x0, &(0x7f0000000a80)=ANY=[@ANYBLOB="02000000040000000800000001"], 0x48) r0 = bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000280)={&(0x7f0000000240)='kfree\x00', r0, 0x0, 0x4ab}, 0x18) sendmsg$IPSET_CMD_CREATE(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) r1 = bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x11, 0xb, &(0x7f0000000180)=ANY=[@ANYBLOB="18000000000000000000000000000000180100002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000040000850000007200000095"], &(0x7f0000000040)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000180)={&(0x7f00000004c0)='kmem_cache_free\x00', r1}, 0x18) socket$inet_sctp(0x2, 0x5, 0x84) socket$inet6_sctp(0xa, 0x5, 0x84) bind$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e20, @empty}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x16, 0xc, &(0x7f0000000440)=ANY=[@ANYBLOB="1800000000000000000000000000000018120000", @ANYRES32, @ANYBLOB="0000000000000000b7080000000000007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b7040000f600000085000000430000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$PROG_LOAD(0x5, &(0x7f0000000540)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000640)='GPL\x00', 0x0, 0x0, 0x0, 0x41000, 0x0, '\x00', 0x0, @fallback=0x1b, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r2, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0xc000}, 0x0) sendmsg$NFT_BATCH(r2, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000002a40)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a3c000000090a010400000000000000000a0000040900010073797a310000000008000540000000020900020073797a310000000008000a40fffffffc101500000c0a010100000000000000000a0000060900020073797a31000000000900010073797a3100000000e4140380100000800c00018006000100d10300000c0000800800034000000002"], 0x1574}, 0x1, 0x0, 0x0, 0x4000850}, 0x840) sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x20008005, &(0x7f0000000100)={0x2, 0x4a20, @dev={0xac, 0x14, 0x14, 0x2e}}, 0x10) syz_mount_image$ext4(&(0x7f0000000100)='ext3\x00', &(0x7f0000000340)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x4000004, &(0x7f0000000c00)={[{@jqfmt_vfsold}, {@grpid}, {@debug}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xdf07}}, {@noauto_da_alloc}, {@commit={'commit', 0x3d, 0x5}}, {@init_itable_val={'init_itable', 0x3d, 0x9}}, {@debug}, {@usrjquota}, {@nolazytime}, {@norecovery}]}, 0xfe, 0x477, &(0x7f0000000780)="$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") r3 = bpf$PROG_LOAD(0x5, &(0x7f0000000440)={0x11, 0x6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x0, 0x5, 0xc3, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x6}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000080)='sched_switch\x00', r3}, 0x10) creat(&(0x7f0000000580)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', 0x1) symlink(&(0x7f0000000540)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00', &(0x7f0000000640)='./file0aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa\x00') r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='.\x00', 0x0, 0x80) open_by_handle_at(r4, &(0x7f0000000240)=@reiserfs_2={0x4b, 0x2, {0xb}}, 0x36f0516f) socket$nl_route(0x10, 0x3, 0x0) 53.458466ms ago: executing program 5 (id=4849): mount$bpf(0x0, 0x0, 0x0, 0x0, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018010000", @ANYRES32, @ANYBLOB], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f00000000c0)={&(0x7f0000000100)='kfree\x00', r0}, 0x10) accept4$vsock_stream(0xffffffffffffffff, 0x0, 0x0, 0x80800) perf_event_open(&(0x7f0000000800)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_uring_setup(0x31fa, &(0x7f00000001c0)={0x0, 0x6a93, 0x40, 0x2, 0xd1}) r1 = socket$nl_rdma(0x10, 0x3, 0x14) r2 = socket(0x4, 0x80000, 0xf8c) syz_emit_ethernet(0x7e, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaa0d80c200000086dd60156909001b2f00fc020000000000000000000000000000ff020000000000000000000000000001242088a88dff00000006000000000800000086dd88a888be08"], 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r1, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB="380000000314230c2abd7000ff05df250900020073797a310000000008004100727865001400330073797a5f74756e"], 0x38}, 0x1, 0x0, 0x0, 0x48845}, 0x4000) socket(0xa, 0x3, 0x3a) sendmsg$NFQNL_MSG_CONFIG(0xffffffffffffffff, 0x0, 0x44840) syz_genetlink_get_family_id$nl80211(&(0x7f0000003840), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) mknod$loop(0x0, 0x2000, 0x1) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) bind$inet(0xffffffffffffffff, 0x0, 0x0) sendmsg$IPSET_CMD_CREATE(r2, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRESOCT=r2], 0x5c}}, 0x0) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPSET_CMD_ADD(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000280)=ANY=[@ANYBLOB="44000000090601060000000000000000000000000900020073797a310000000005000100070000001c0007800c00018008000140ffffffff0c000280080001407f000001"], 0x44}, 0x1, 0x0, 0x0, 0x10040047}, 0x240008c4) sendmsg$IPSET_CMD_DESTROY(r3, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB="740000000306010800000000000000000600000705000100070000000500010007000000050001000700000005000100070000000900020073797a3000000000050001000700000005000100070000000900020073797a30000000000900020073797a30000000000900020073797a31"], 0x74}, 0x1, 0x0, 0x0, 0x80c1}, 0x50) syz_clone(0x48002000, 0x0, 0x0, 0x0, 0x0, 0x0) 32.632847ms ago: executing program 1 (id=4850): r0 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="19000000040000000800000006"], 0x48) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x11, 0xc, &(0x7f0000000180)=ANY=[@ANYBLOB="1800000000000000000000000000000018110000", @ANYRES32=r0, @ANYBLOB="0000000000000000b7080000000019007b8af8ff00000000bfa200000000000007020000f8ffffffb703000008000000b704000000000000850000000100000095"], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000000)={&(0x7f0000000040)='kmem_cache_free\x00', r1}, 0x10) r2 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_ADD(r2, 0x84, 0x64, &(0x7f0000000280)=[@in={0x2, 0x4e21, @loopback}], 0x10) sendmsg$inet_sctp(r2, &(0x7f0000000700)={&(0x7f0000000340)=@in={0x2, 0x4e21, @loopback}, 0x10, &(0x7f0000000080)=[{&(0x7f0000000000)="fd", 0x1}], 0x1, 0x0, 0x0, 0x804c044}, 0x881) r3 = dup(r2) write$RDMA_USER_CM_CMD_CREATE_ID(r3, &(0x7f00000001c0)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x106, 0x2}}, 0x20) setsockopt$inet_sctp_SCTP_DEFAULT_PRINFO(r3, 0x84, 0x72, 0x0, 0x0) setsockopt$inet_sctp_SCTP_PARTIAL_DELIVERY_POINT(r2, 0x84, 0x13, &(0x7f0000000300)=0x9, 0x4) write$RDMA_USER_CM_CMD_RESOLVE_ROUTE(r3, &(0x7f0000000180)={0x4, 0x8, 0xfa00, {0xffffffffffffffff, 0x4}}, 0x29fdf) 0s ago: executing program 2 (id=4851): r0 = perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x4, 0x0, 0x0, 0x0, 0x0, 0x100, 0x10020, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x108284, 0x0, 0xfffffffb}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f00000009c0)=ANY=[@ANYBLOB="04000000040000000400000005"], 0x48) bpf$PROG_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f00000023c0)={0x0, 0x4, &(0x7f0000000480)=ANY=[@ANYBLOB="18020000000000000000"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0x26}, 0x94) bpf$MAP_UPDATE_ELEM_TAIL_CALL(0x2, &(0x7f0000000200)={{r1}, &(0x7f0000000180), &(0x7f00000001c0)=r0}, 0x20) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x11, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000f40)={&(0x7f0000000f00)='kfree\x00', r2}, 0x10) unshare(0x26000400) r3 = syz_io_uring_setup(0x49a, &(0x7f0000000400)={0x0, 0x79af, 0x3180, 0x7fff, 0x40024e}, &(0x7f0000000340)=0x0, &(0x7f0000000040)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r4, 0x4, &(0x7f0000000000)=0xffb, 0x0, 0x4) syz_io_uring_submit(r4, r5, &(0x7f00000002c0)=@IORING_OP_MSG_RING={0x28, 0x6, 0x0, r3, 0x0, 0x0, 0x0, 0x2}) io_uring_enter(r3, 0x627, 0x4c1, 0x43, 0x0, 0x0) kernel console output (not intermixed with test programs): 4] __x64_sys_ioctl+0x43/0x50 [ 182.566194][T13984] x64_sys_call+0x1816/0x2ff0 [ 182.566217][T13984] do_syscall_64+0xd2/0x200 [ 182.566314][T13984] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 182.566338][T13984] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 182.566409][T13984] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 182.566486][T13984] RIP: 0033:0x7f876e64ebe9 [ 182.566503][T13984] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 182.566523][T13984] RSP: 002b:00007f876d0b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 182.566543][T13984] RAX: ffffffffffffffda RBX: 00007f876e875fa0 RCX: 00007f876e64ebe9 [ 182.566563][T13984] RDX: 0000200000000600 RSI: 00000000000089f2 RDI: 0000000000000006 [ 182.566654][T13984] RBP: 00007f876d0b7090 R08: 0000000000000000 R09: 0000000000000000 [ 182.566669][T13984] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 182.566696][T13984] R13: 00007f876e876038 R14: 00007f876e875fa0 R15: 00007ffc8697b868 [ 182.566714][T13984] [ 182.790992][T13979] syz_tun: left allmulticast mode [ 182.929808][T14005] FAULT_INJECTION: forcing a failure. [ 182.929808][T14005] name failslab, interval 1, probability 0, space 0, times 0 [ 182.942581][T14005] CPU: 1 UID: 0 PID: 14005 Comm: syz.5.3914 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 182.942615][T14005] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 182.942626][T14005] Call Trace: [ 182.942656][T14005] [ 182.942666][T14005] __dump_stack+0x1d/0x30 [ 182.942735][T14005] dump_stack_lvl+0xe8/0x140 [ 182.942822][T14005] dump_stack+0x15/0x1b [ 182.942842][T14005] should_fail_ex+0x265/0x280 [ 182.942866][T14005] ? audit_log_d_path+0x8d/0x150 [ 182.942939][T14005] should_failslab+0x8c/0xb0 [ 182.942961][T14005] __kmalloc_cache_noprof+0x4c/0x320 [ 182.943075][T14005] audit_log_d_path+0x8d/0x150 [ 182.943108][T14005] audit_log_d_path_exe+0x42/0x70 [ 182.943194][T14005] audit_log_task+0x1e9/0x250 [ 182.943225][T14005] audit_seccomp+0x61/0x100 [ 182.943252][T14005] ? __seccomp_filter+0x68c/0x10d0 [ 182.943285][T14005] __seccomp_filter+0x69d/0x10d0 [ 182.943310][T14005] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 182.943338][T14005] ? vfs_write+0x7e8/0x960 [ 182.943363][T14005] ? __rcu_read_unlock+0x4f/0x70 [ 182.943388][T14005] ? __fget_files+0x184/0x1c0 [ 182.943419][T14005] __secure_computing+0x82/0x150 [ 182.943442][T14005] syscall_trace_enter+0xcf/0x1e0 [ 182.943478][T14005] do_syscall_64+0xac/0x200 [ 182.943561][T14005] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 182.943588][T14005] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 182.943616][T14005] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 182.943641][T14005] RIP: 0033:0x7f2d90bbebe9 [ 182.943658][T14005] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 182.943705][T14005] RSP: 002b:00007f2d8f61f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 182.943727][T14005] RAX: ffffffffffffffda RBX: 00007f2d90de5fa0 RCX: 00007f2d90bbebe9 [ 182.943741][T14005] RDX: 0000000000000000 RSI: 0000200000000bc0 RDI: 0000000000000008 [ 182.943753][T14005] RBP: 00007f2d8f61f090 R08: 0000000000000000 R09: 0000000000000000 [ 182.943764][T14005] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 182.943775][T14005] R13: 00007f2d90de6038 R14: 00007f2d90de5fa0 R15: 00007ffe02e93b18 [ 182.943798][T14005] [ 183.278362][T14020] FAULT_INJECTION: forcing a failure. [ 183.278362][T14020] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 183.291627][T14020] CPU: 1 UID: 0 PID: 14020 Comm: syz.5.3921 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 183.291687][T14020] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 183.291699][T14020] Call Trace: [ 183.291706][T14020] [ 183.291714][T14020] __dump_stack+0x1d/0x30 [ 183.291736][T14020] dump_stack_lvl+0xe8/0x140 [ 183.291757][T14020] dump_stack+0x15/0x1b [ 183.291841][T14020] should_fail_ex+0x265/0x280 [ 183.291867][T14020] should_fail+0xb/0x20 [ 183.291884][T14020] should_fail_usercopy+0x1a/0x20 [ 183.291928][T14020] _copy_from_user+0x1c/0xb0 [ 183.291960][T14020] ___sys_sendmsg+0xc1/0x1d0 [ 183.292073][T14020] __x64_sys_sendmsg+0xd4/0x160 [ 183.292100][T14020] x64_sys_call+0x191e/0x2ff0 [ 183.292124][T14020] do_syscall_64+0xd2/0x200 [ 183.292149][T14020] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 183.292239][T14020] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 183.292267][T14020] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 183.292289][T14020] RIP: 0033:0x7f2d90bbebe9 [ 183.292305][T14020] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 183.292398][T14020] RSP: 002b:00007f2d8f61f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 183.292421][T14020] RAX: ffffffffffffffda RBX: 00007f2d90de5fa0 RCX: 00007f2d90bbebe9 [ 183.292436][T14020] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 183.292451][T14020] RBP: 00007f2d8f61f090 R08: 0000000000000000 R09: 0000000000000000 [ 183.292463][T14020] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 183.292478][T14020] R13: 00007f2d90de6038 R14: 00007f2d90de5fa0 R15: 00007ffe02e93b18 [ 183.292501][T14020] [ 183.333674][ T29] kauditd_printk_skb: 282 callbacks suppressed [ 183.333690][ T29] audit: type=1326 audit(1755489295.665:10986): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14019 comm="syz.1.3922" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 183.523509][T14026] netlink: 28 bytes leftover after parsing attributes in process `syz.5.3924'. [ 183.535402][T14017] block device autoloading is deprecated and will be removed. [ 183.543015][ T29] audit: type=1326 audit(1755489295.725:10987): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14019 comm="syz.1.3922" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 183.566892][ T29] audit: type=1326 audit(1755489295.725:10988): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14019 comm="syz.1.3922" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 183.590541][ T29] audit: type=1326 audit(1755489295.725:10989): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14019 comm="syz.1.3922" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 183.614163][ T29] audit: type=1326 audit(1755489295.735:10990): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14019 comm="syz.1.3922" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 183.638179][ T29] audit: type=1326 audit(1755489295.735:10991): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14019 comm="syz.1.3922" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 183.662028][ T29] audit: type=1326 audit(1755489295.735:10992): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14019 comm="syz.1.3922" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 183.685679][ T29] audit: type=1326 audit(1755489295.735:10993): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14019 comm="syz.1.3922" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 183.709376][ T29] audit: type=1326 audit(1755489295.735:10994): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14019 comm="syz.1.3922" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 183.733148][ T29] audit: type=1326 audit(1755489295.735:10995): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14019 comm="syz.1.3922" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 183.784569][T14030] loop4: detected capacity change from 0 to 2048 [ 183.803050][T14021] netlink: 'syz.1.3922': attribute type 27 has an invalid length. [ 183.815069][T14030] EXT4-fs (loop4): failed to initialize system zone (-117) [ 183.838348][T14030] EXT4-fs (loop4): mount failed [ 184.060592][T14050] loop4: detected capacity change from 0 to 512 [ 184.067602][T14050] ext4: Unknown parameter 'smackfsfloor' [ 184.187075][T14021] syz_tun: left promiscuous mode [ 184.192267][T14021] syz_tun: left allmulticast mode [ 184.200633][T14021] bridge0: port 2(bridge_slave_1) entered disabled state [ 184.207886][T14021] bridge0: port 1(bridge_slave_0) entered disabled state [ 184.240811][T14021] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 184.250950][T14021] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 184.281896][T14021] geneve2: left promiscuous mode [ 184.290907][T14053] syz_tun: entered promiscuous mode [ 184.296359][T14053] syz_tun: entered allmulticast mode [ 184.329311][T13003] netdevsim netdevsim1 netdevsim0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 184.344049][T13003] netdevsim netdevsim1 netdevsim1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 184.371372][T13003] netdevsim netdevsim1 netdevsim2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 184.390682][T13003] netdevsim netdevsim1 netdevsim3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 184.423596][T14067] loop4: detected capacity change from 0 to 8192 [ 184.448264][T14069] rdma_rxe: rxe_newlink: failed to add syz_tun [ 184.462354][T14067] loop4: p1 p2 p3 p4 [ 184.466411][T14067] loop4: p1 size 3523149824 extends beyond EOD, truncated [ 184.482225][T14067] loop4: p2 start 4293394688 is beyond EOD, truncated [ 184.489084][T14067] loop4: p3 start 150994944 is beyond EOD, truncated [ 184.495842][T14067] loop4: p4 size 50331648 extends beyond EOD, truncated [ 184.614743][T14075] loop4: detected capacity change from 0 to 2048 [ 184.629346][T14072] netlink: 8 bytes leftover after parsing attributes in process `syz.5.3941'. [ 184.651317][T14075] EXT4-fs (loop4): failed to initialize system zone (-117) [ 184.679912][T14075] EXT4-fs (loop4): mount failed [ 184.858035][T14057] SELinux: Context system_u:object_r:gpg_exec_t:s0 is not valid (left unmapped). [ 185.088991][T14094] 9pnet_fd: Insufficient options for proto=fd [ 185.124611][T14098] FAULT_INJECTION: forcing a failure. [ 185.124611][T14098] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 185.137820][T14098] CPU: 1 UID: 0 PID: 14098 Comm: syz.4.3950 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 185.137852][T14098] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 185.137884][T14098] Call Trace: [ 185.137890][T14098] [ 185.137910][T14098] __dump_stack+0x1d/0x30 [ 185.137934][T14098] dump_stack_lvl+0xe8/0x140 [ 185.138022][T14098] dump_stack+0x15/0x1b [ 185.138041][T14098] should_fail_ex+0x265/0x280 [ 185.138065][T14098] should_fail+0xb/0x20 [ 185.138088][T14098] should_fail_usercopy+0x1a/0x20 [ 185.138158][T14098] _copy_from_user+0x1c/0xb0 [ 185.138190][T14098] ___sys_sendmsg+0xc1/0x1d0 [ 185.138235][T14098] __x64_sys_sendmsg+0xd4/0x160 [ 185.138262][T14098] x64_sys_call+0x191e/0x2ff0 [ 185.138291][T14098] do_syscall_64+0xd2/0x200 [ 185.138331][T14098] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 185.138359][T14098] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 185.138388][T14098] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 185.138412][T14098] RIP: 0033:0x7f62425debe9 [ 185.138451][T14098] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 185.138468][T14098] RSP: 002b:00007f6241047038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 185.138487][T14098] RAX: ffffffffffffffda RBX: 00007f6242805fa0 RCX: 00007f62425debe9 [ 185.138500][T14098] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 185.138514][T14098] RBP: 00007f6241047090 R08: 0000000000000000 R09: 0000000000000000 [ 185.138528][T14098] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 185.138543][T14098] R13: 00007f6242806038 R14: 00007f6242805fa0 R15: 00007fff361e4058 [ 185.138593][T14098] [ 185.476374][T14105] netlink: 4 bytes leftover after parsing attributes in process `syz.4.3952'. [ 185.614547][T14110] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=48 sclass=netlink_audit_socket pid=14110 comm=syz.1.3954 [ 185.902513][T14125] 9pnet_fd: Insufficient options for proto=fd [ 186.083685][T14141] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(4) [ 186.090314][T14141] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 186.098268][T14141] vhci_hcd vhci_hcd.0: Device attached [ 186.110154][T14141] netlink: 4 bytes leftover after parsing attributes in process `syz.2.3967'. [ 186.131519][T14146] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 186.138275][T14146] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 186.145829][T14146] vhci_hcd vhci_hcd.0: Device attached [ 186.151689][T14142] vhci_hcd: connection closed [ 186.152018][T12987] vhci_hcd: stop threads [ 186.160950][T12987] vhci_hcd: release socket [ 186.165476][T12987] vhci_hcd: disconnect device [ 186.175603][T14146] netlink: 24 bytes leftover after parsing attributes in process `syz.1.3969'. [ 186.197784][T14148] vhci_hcd: connection closed [ 186.197976][T12987] vhci_hcd: stop threads [ 186.207127][T12987] vhci_hcd: release socket [ 186.211609][T12987] vhci_hcd: disconnect device [ 186.430347][T14159] loop4: detected capacity change from 0 to 2048 [ 186.471529][T14159] EXT4-fs (loop4): failed to initialize system zone (-117) [ 186.478993][T14159] EXT4-fs (loop4): mount failed [ 186.731386][T14168] FAULT_INJECTION: forcing a failure. [ 186.731386][T14168] name failslab, interval 1, probability 0, space 0, times 0 [ 186.732829][T14166] netlink: 5 bytes leftover after parsing attributes in process `syz.1.3975'. [ 186.744070][T14168] CPU: 0 UID: 0 PID: 14168 Comm: syz.2.3976 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 186.744135][T14168] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 186.744146][T14168] Call Trace: [ 186.744153][T14168] [ 186.744161][T14168] __dump_stack+0x1d/0x30 [ 186.744184][T14168] dump_stack_lvl+0xe8/0x140 [ 186.744261][T14168] dump_stack+0x15/0x1b [ 186.744293][T14168] should_fail_ex+0x265/0x280 [ 186.744320][T14168] should_failslab+0x8c/0xb0 [ 186.744345][T14168] kmem_cache_alloc_node_noprof+0x57/0x320 [ 186.744372][T14168] ? __alloc_skb+0x101/0x320 [ 186.744402][T14168] __alloc_skb+0x101/0x320 [ 186.744525][T14168] netlink_alloc_large_skb+0xba/0xf0 [ 186.744556][T14168] netlink_sendmsg+0x3cf/0x6b0 [ 186.744579][T14168] ? __pfx_netlink_sendmsg+0x10/0x10 [ 186.744656][T14168] __sock_sendmsg+0x142/0x180 [ 186.744683][T14168] sock_write_iter+0x165/0x1b0 [ 186.744711][T14168] do_iter_readv_writev+0x49c/0x540 [ 186.744868][T14168] vfs_writev+0x2df/0x8b0 [ 186.744904][T14168] do_writev+0xe7/0x210 [ 186.744931][T14168] __x64_sys_writev+0x45/0x50 [ 186.744955][T14168] x64_sys_call+0x1e9a/0x2ff0 [ 186.745000][T14168] do_syscall_64+0xd2/0x200 [ 186.745026][T14168] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 186.745050][T14168] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 186.745218][T14168] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 186.745240][T14168] RIP: 0033:0x7f37d3fbebe9 [ 186.745255][T14168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 186.745273][T14168] RSP: 002b:00007f37d2a1f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000014 [ 186.745294][T14168] RAX: ffffffffffffffda RBX: 00007f37d41e5fa0 RCX: 00007f37d3fbebe9 [ 186.745307][T14168] RDX: 0000000000000001 RSI: 00002000000003c0 RDI: 0000000000000007 [ 186.745320][T14168] RBP: 00007f37d2a1f090 R08: 0000000000000000 R09: 0000000000000000 [ 186.745332][T14168] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 186.745383][T14168] R13: 00007f37d41e6038 R14: 00007f37d41e5fa0 R15: 00007ffddb4757d8 [ 186.745403][T14168] [ 186.967476][T14166] 0ªî{X¹¦: renamed from gretap0 [ 186.974957][T14166] 0ªî{X¹¦: entered allmulticast mode [ 186.981368][T14166] A link change request failed with some changes committed already. Interface 30ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 187.009398][T14170] netlink: 20 bytes leftover after parsing attributes in process `+}[@'. [ 187.056599][T14175] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3979'. [ 187.065555][T14175] netlink: 8 bytes leftover after parsing attributes in process `syz.4.3979'. [ 187.075501][T14178] FAULT_INJECTION: forcing a failure. [ 187.075501][T14178] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 187.088590][T14178] CPU: 0 UID: 0 PID: 14178 Comm: syz.2.3981 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 187.088621][T14178] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 187.088633][T14178] Call Trace: [ 187.088642][T14178] [ 187.088717][T14178] __dump_stack+0x1d/0x30 [ 187.088743][T14178] dump_stack_lvl+0xe8/0x140 [ 187.088763][T14178] dump_stack+0x15/0x1b [ 187.088779][T14178] should_fail_ex+0x265/0x280 [ 187.088804][T14178] should_fail+0xb/0x20 [ 187.088824][T14178] should_fail_usercopy+0x1a/0x20 [ 187.088858][T14178] _copy_from_user+0x1c/0xb0 [ 187.088882][T14178] ___sys_sendmsg+0xc1/0x1d0 [ 187.088953][T14178] __x64_sys_sendmsg+0xd4/0x160 [ 187.088979][T14178] x64_sys_call+0x191e/0x2ff0 [ 187.089041][T14178] do_syscall_64+0xd2/0x200 [ 187.089065][T14178] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 187.089088][T14178] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 187.089111][T14178] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 187.089263][T14178] RIP: 0033:0x7f37d3fbebe9 [ 187.089281][T14178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 187.089338][T14178] RSP: 002b:00007f37d2a1f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 187.089362][T14178] RAX: ffffffffffffffda RBX: 00007f37d41e5fa0 RCX: 00007f37d3fbebe9 [ 187.089376][T14178] RDX: 0000000000000040 RSI: 00002000000007c0 RDI: 0000000000000005 [ 187.089390][T14178] RBP: 00007f37d2a1f090 R08: 0000000000000000 R09: 0000000000000000 [ 187.089402][T14178] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 187.089448][T14178] R13: 00007f37d41e6038 R14: 00007f37d41e5fa0 R15: 00007ffddb4757d8 [ 187.089468][T14178] [ 187.161439][T14180] netlink: 248 bytes leftover after parsing attributes in process `syz.4.3979'. [ 187.293104][T14182] random: crng reseeded on system resumption [ 187.352437][T14187] FAULT_INJECTION: forcing a failure. [ 187.352437][T14187] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 187.365592][T14187] CPU: 1 UID: 0 PID: 14187 Comm: syz.2.3984 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 187.365622][T14187] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 187.365668][T14187] Call Trace: [ 187.365677][T14187] [ 187.365686][T14187] __dump_stack+0x1d/0x30 [ 187.365795][T14187] dump_stack_lvl+0xe8/0x140 [ 187.365817][T14187] dump_stack+0x15/0x1b [ 187.365832][T14187] should_fail_ex+0x265/0x280 [ 187.365856][T14187] should_fail+0xb/0x20 [ 187.365875][T14187] should_fail_usercopy+0x1a/0x20 [ 187.365976][T14187] strncpy_from_user+0x25/0x230 [ 187.366006][T14187] ? kmem_cache_alloc_noprof+0x186/0x310 [ 187.366093][T14187] ? getname_flags+0x80/0x3b0 [ 187.366200][T14187] getname_flags+0xae/0x3b0 [ 187.366232][T14187] user_path_at+0x28/0x130 [ 187.366266][T14187] __se_sys_quotactl+0xb6/0x670 [ 187.366317][T14187] __x64_sys_quotactl+0x55/0x70 [ 187.366376][T14187] x64_sys_call+0x15d6/0x2ff0 [ 187.366435][T14187] do_syscall_64+0xd2/0x200 [ 187.366463][T14187] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 187.366524][T14187] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 187.366550][T14187] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 187.366573][T14187] RIP: 0033:0x7f37d3fbebe9 [ 187.366590][T14187] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 187.366609][T14187] RSP: 002b:00007f37d2a1f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 187.366664][T14187] RAX: ffffffffffffffda RBX: 00007f37d41e5fa0 RCX: 00007f37d3fbebe9 [ 187.366678][T14187] RDX: 0000000000000000 RSI: 0000200000000380 RDI: ffffffff80000202 [ 187.366691][T14187] RBP: 00007f37d2a1f090 R08: 0000000000000000 R09: 0000000000000000 [ 187.366704][T14187] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 187.366780][T14187] R13: 00007f37d41e6038 R14: 00007f37d41e5fa0 R15: 00007ffddb4757d8 [ 187.366802][T14187] [ 187.663053][T14191] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 187.669645][T14191] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 187.677300][T14191] vhci_hcd vhci_hcd.0: Device attached [ 187.700337][T14191] netlink: 24 bytes leftover after parsing attributes in process `syz.5.3986'. [ 187.751241][T14194] vhci_hcd: connection closed [ 187.751504][T12987] vhci_hcd: stop threads [ 187.760561][T12987] vhci_hcd: release socket [ 187.765108][T12987] vhci_hcd: disconnect device [ 188.454072][ T29] kauditd_printk_skb: 225 callbacks suppressed [ 188.454090][ T29] audit: type=1326 audit(1755489300.785:11221): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14213 comm="syz.5.3995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 188.502549][T14216] 9pnet_fd: Insufficient options for proto=fd [ 188.519611][ T29] audit: type=1326 audit(1755489300.815:11222): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14213 comm="syz.5.3995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 188.543302][ T29] audit: type=1326 audit(1755489300.815:11223): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14213 comm="syz.5.3995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 188.567350][ T29] audit: type=1326 audit(1755489300.815:11224): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14213 comm="syz.5.3995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 188.591536][ T29] audit: type=1326 audit(1755489300.815:11225): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14213 comm="syz.5.3995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 188.615473][ T29] audit: type=1326 audit(1755489300.815:11226): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14213 comm="syz.5.3995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 188.639198][ T29] audit: type=1326 audit(1755489300.815:11227): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14213 comm="syz.5.3995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 188.662797][ T29] audit: type=1326 audit(1755489300.815:11228): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14213 comm="syz.5.3995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 188.686588][ T29] audit: type=1326 audit(1755489300.815:11229): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14213 comm="syz.5.3995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 188.710294][ T29] audit: type=1326 audit(1755489300.815:11230): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14213 comm="syz.5.3995" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 188.781469][T14225] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 188.788028][T14225] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 188.795614][T14225] vhci_hcd vhci_hcd.0: Device attached [ 188.864280][T14227] vhci_hcd: connection closed [ 188.864509][T12960] vhci_hcd: stop threads [ 188.873740][T12960] vhci_hcd: release socket [ 188.878160][T12960] vhci_hcd: disconnect device [ 188.961000][T14236] 1ªî{X¹¦: renamed from 30ªî{X¹¦ (while UP) [ 188.990258][T14236] A link change request failed with some changes committed already. Interface 31ªî{X¹¦ may have been left with an inconsistent configuration, please check. [ 189.168224][T14240] netlink: 'syz.4.4004': attribute type 6 has an invalid length. [ 189.263882][T14244] 9pnet_fd: Insufficient options for proto=fd [ 189.613274][T14266] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 189.619839][T14266] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 189.627440][T14266] vhci_hcd vhci_hcd.0: Device attached [ 189.652584][T14272] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(4) [ 189.659209][T14272] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 189.666856][T14272] vhci_hcd vhci_hcd.0: Device attached [ 189.679463][T14277] vhci_hcd: connection closed [ 189.679653][T12960] vhci_hcd: stop threads [ 189.688679][T12960] vhci_hcd: release socket [ 189.693148][T12960] vhci_hcd: disconnect device [ 189.721721][T14266] __nla_validate_parse: 6 callbacks suppressed [ 189.721751][T14266] netlink: 24 bytes leftover after parsing attributes in process `syz.5.4018'. [ 189.833538][T14273] vhci_hcd: connection closed [ 189.884072][ T3706] usb 11-1: new low-speed USB device number 3 using vhci_hcd [ 189.896531][T12960] vhci_hcd: stop threads [ 189.900862][T12960] vhci_hcd: release socket [ 189.905489][T12960] vhci_hcd: disconnect device [ 190.637938][T14300] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4030'. [ 191.167083][T14314] netlink: 'syz.2.4035': attribute type 3 has an invalid length. [ 191.222430][T14320] FAULT_INJECTION: forcing a failure. [ 191.222430][T14320] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 191.235642][T14320] CPU: 0 UID: 0 PID: 14320 Comm: syz.2.4037 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 191.235737][T14320] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 191.235751][T14320] Call Trace: [ 191.235758][T14320] [ 191.235769][T14320] __dump_stack+0x1d/0x30 [ 191.235792][T14320] dump_stack_lvl+0xe8/0x140 [ 191.235813][T14320] dump_stack+0x15/0x1b [ 191.235833][T14320] should_fail_ex+0x265/0x280 [ 191.235905][T14320] should_fail+0xb/0x20 [ 191.235946][T14320] should_fail_usercopy+0x1a/0x20 [ 191.235971][T14320] _copy_to_user+0x20/0xa0 [ 191.236003][T14320] simple_read_from_buffer+0xb5/0x130 [ 191.236034][T14320] proc_fail_nth_read+0x10e/0x150 [ 191.236062][T14320] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 191.236092][T14320] vfs_read+0x1a8/0x770 [ 191.236115][T14320] ? __rcu_read_unlock+0x4f/0x70 [ 191.236264][T14320] ? __fget_files+0x184/0x1c0 [ 191.236294][T14320] ksys_read+0xda/0x1a0 [ 191.236317][T14320] __x64_sys_read+0x40/0x50 [ 191.236342][T14320] x64_sys_call+0x27bc/0x2ff0 [ 191.236367][T14320] do_syscall_64+0xd2/0x200 [ 191.236460][T14320] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 191.236488][T14320] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 191.236515][T14320] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 191.236584][T14320] RIP: 0033:0x7f37d3fbd5fc [ 191.236605][T14320] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 99 93 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 ef 93 02 00 48 [ 191.236653][T14320] RSP: 002b:00007f37d2a1f030 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 191.236677][T14320] RAX: ffffffffffffffda RBX: 00007f37d41e5fa0 RCX: 00007f37d3fbd5fc [ 191.236693][T14320] RDX: 000000000000000f RSI: 00007f37d2a1f0a0 RDI: 0000000000000006 [ 191.236708][T14320] RBP: 00007f37d2a1f090 R08: 0000000000000000 R09: 0000000000000000 [ 191.236723][T14320] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.236737][T14320] R13: 00007f37d41e6038 R14: 00007f37d41e5fa0 R15: 00007ffddb4757d8 [ 191.236755][T14320] [ 191.552253][T14329] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4041'. [ 191.556019][T14330] 9pnet_fd: Insufficient options for proto=fd [ 191.634242][T14338] netlink: 8 bytes leftover after parsing attributes in process `syz.2.4046'. [ 191.714161][T14342] IPv4: Oversized IP packet from 127.202.26.0 [ 191.752901][T14342] syzkaller1: entered promiscuous mode [ 191.758494][T14342] syzkaller1: entered allmulticast mode [ 191.818899][T14348] FAULT_INJECTION: forcing a failure. [ 191.818899][T14348] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 191.832112][T14348] CPU: 0 UID: 0 PID: 14348 Comm: syz.2.4050 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 191.832141][T14348] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 191.832231][T14348] Call Trace: [ 191.832239][T14348] [ 191.832249][T14348] __dump_stack+0x1d/0x30 [ 191.832270][T14348] dump_stack_lvl+0xe8/0x140 [ 191.832289][T14348] dump_stack+0x15/0x1b [ 191.832304][T14348] should_fail_ex+0x265/0x280 [ 191.832326][T14348] should_fail+0xb/0x20 [ 191.832383][T14348] should_fail_usercopy+0x1a/0x20 [ 191.832408][T14348] strncpy_from_user+0x25/0x230 [ 191.832439][T14348] ? kmem_cache_alloc_noprof+0x186/0x310 [ 191.832470][T14348] ? getname_flags+0x80/0x3b0 [ 191.832573][T14348] getname_flags+0xae/0x3b0 [ 191.832636][T14348] do_sys_openat2+0x60/0x110 [ 191.832667][T14348] __x64_sys_creat+0x65/0x90 [ 191.832757][T14348] x64_sys_call+0x2d94/0x2ff0 [ 191.832819][T14348] do_syscall_64+0xd2/0x200 [ 191.832844][T14348] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 191.832928][T14348] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 191.833017][T14348] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 191.833040][T14348] RIP: 0033:0x7f37d3fbebe9 [ 191.833054][T14348] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 191.833070][T14348] RSP: 002b:00007f37d2a1f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 191.833092][T14348] RAX: ffffffffffffffda RBX: 00007f37d41e5fa0 RCX: 00007f37d3fbebe9 [ 191.833112][T14348] RDX: 0000000000000000 RSI: 0000000000000036 RDI: 00002000000003c0 [ 191.833126][T14348] RBP: 00007f37d2a1f090 R08: 0000000000000000 R09: 0000000000000000 [ 191.833140][T14348] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 191.833212][T14348] R13: 00007f37d41e6038 R14: 00007f37d41e5fa0 R15: 00007ffddb4757d8 [ 191.833233][T14348] [ 192.115178][T14358] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4055'. [ 192.159735][T14363] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=48 sclass=netlink_audit_socket pid=14363 comm=syz.5.4054 [ 192.250054][T14367] qrtr: Invalid version 0 [ 192.267910][T14365] geneve2: entered promiscuous mode [ 192.423996][T14376] netlink: 260 bytes leftover after parsing attributes in process `syz.1.4061'. [ 192.433184][T14376] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4061'. [ 192.549841][T14383] rdma_rxe: rxe_newlink: failed to add syz_tun [ 192.715877][T14400] netlink: 'syz.5.4073': attribute type 21 has an invalid length. [ 192.865465][T14411] FAULT_INJECTION: forcing a failure. [ 192.865465][T14411] name failslab, interval 1, probability 0, space 0, times 0 [ 192.865497][T14411] CPU: 0 UID: 0 PID: 14411 Comm: syz.5.4077 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 192.865568][T14411] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 192.865582][T14411] Call Trace: [ 192.865589][T14411] [ 192.865596][T14411] __dump_stack+0x1d/0x30 [ 192.865689][T14411] dump_stack_lvl+0xe8/0x140 [ 192.865709][T14411] dump_stack+0x15/0x1b [ 192.865726][T14411] should_fail_ex+0x265/0x280 [ 192.865761][T14411] should_failslab+0x8c/0xb0 [ 192.865785][T14411] __kmalloc_noprof+0xa5/0x3e0 [ 192.865811][T14411] ? process_vm_rw+0x27c/0x960 [ 192.865835][T14411] ? iovec_from_user+0x179/0x210 [ 192.865863][T14411] process_vm_rw+0x27c/0x960 [ 192.865918][T14411] ? _parse_integer+0x27/0x40 [ 192.865937][T14411] ? kstrtoull+0x111/0x140 [ 192.865975][T14411] __x64_sys_process_vm_readv+0x78/0x90 [ 192.866002][T14411] x64_sys_call+0x1874/0x2ff0 [ 192.866086][T14411] do_syscall_64+0xd2/0x200 [ 192.866111][T14411] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 192.866136][T14411] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 192.866172][T14411] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 192.866194][T14411] RIP: 0033:0x7f2d90bbebe9 [ 192.866210][T14411] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 192.866227][T14411] RSP: 002b:00007f2d8f61f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000136 [ 192.866247][T14411] RAX: ffffffffffffffda RBX: 00007f2d90de5fa0 RCX: 00007f2d90bbebe9 [ 192.866325][T14411] RDX: 0000000000000002 RSI: 0000200000008400 RDI: 00000000000000da [ 192.866338][T14411] RBP: 00007f2d8f61f090 R08: 0000000000000286 R09: 0000000000000000 [ 192.866351][T14411] R10: 0000200000008640 R11: 0000000000000246 R12: 0000000000000001 [ 192.866363][T14411] R13: 00007f2d90de6038 R14: 00007f2d90de5fa0 R15: 00007ffe02e93b18 [ 192.866383][T14411] [ 193.022480][T14413] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=48 sclass=netlink_audit_socket pid=14413 comm=syz.5.4078 [ 193.234085][T14422] rdma_rxe: rxe_newlink: failed to add syz_tun [ 193.463489][T14426] vhci_hcd: default hub control req: 0310 v0009 i0003 l0 [ 193.495973][ T29] kauditd_printk_skb: 213 callbacks suppressed [ 193.495990][ T29] audit: type=1326 audit(1755489305.825:11442): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.5.4083" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 193.502493][ T29] audit: type=1326 audit(1755489305.835:11443): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.5.4083" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 193.502681][ T29] audit: type=1326 audit(1755489305.835:11444): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.5.4083" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 193.502862][ T29] audit: type=1326 audit(1755489305.835:11445): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.5.4083" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 193.502982][ T29] audit: type=1326 audit(1755489305.835:11446): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.5.4083" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 193.503145][ T29] audit: type=1326 audit(1755489305.835:11447): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.5.4083" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 193.503360][ T29] audit: type=1326 audit(1755489305.835:11448): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.5.4083" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 193.503525][ T29] audit: type=1326 audit(1755489305.835:11449): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.5.4083" exe="/root/syz-executor" sig=0 arch=c000003e syscall=50 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 193.503674][ T29] audit: type=1326 audit(1755489305.835:11450): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.5.4083" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 193.503991][ T29] audit: type=1326 audit(1755489305.835:11451): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14430 comm="syz.5.4083" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f2d90bbebe9 code=0x7ffc0000 [ 193.525280][T14434] 9pnet_fd: Insufficient options for proto=fd [ 193.802052][T14445] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4089'. [ 193.841154][T14447] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(5) [ 193.847710][T14447] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 193.855300][T14447] vhci_hcd vhci_hcd.0: Device attached [ 193.872725][T14447] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4092'. [ 193.891501][T14448] vhci_hcd: connection closed [ 193.892528][T13003] vhci_hcd: stop threads [ 193.901544][T13003] vhci_hcd: release socket [ 193.906159][T13003] vhci_hcd: disconnect device [ 193.918598][T14452] qrtr: Invalid version 0 [ 194.366408][T14458] FAULT_INJECTION: forcing a failure. [ 194.366408][T14458] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 194.379723][T14458] CPU: 1 UID: 0 PID: 14458 Comm: syz.5.4096 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 194.379759][T14458] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 194.379773][T14458] Call Trace: [ 194.379782][T14458] [ 194.379791][T14458] __dump_stack+0x1d/0x30 [ 194.379816][T14458] dump_stack_lvl+0xe8/0x140 [ 194.379839][T14458] dump_stack+0x15/0x1b [ 194.379913][T14458] should_fail_ex+0x265/0x280 [ 194.379938][T14458] should_fail+0xb/0x20 [ 194.379958][T14458] should_fail_usercopy+0x1a/0x20 [ 194.379984][T14458] strncpy_from_user+0x25/0x230 [ 194.380019][T14458] ? kmem_cache_alloc_noprof+0x186/0x310 [ 194.380049][T14458] ? getname_flags+0x80/0x3b0 [ 194.380080][T14458] getname_flags+0xae/0x3b0 [ 194.380113][T14458] do_sys_openat2+0x60/0x110 [ 194.380150][T14458] __x64_sys_creat+0x65/0x90 [ 194.380202][T14458] x64_sys_call+0x2d94/0x2ff0 [ 194.380257][T14458] do_syscall_64+0xd2/0x200 [ 194.380287][T14458] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 194.380370][T14458] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 194.380419][T14458] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 194.380441][T14458] RIP: 0033:0x7f2d90bbebe9 [ 194.380457][T14458] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 194.380475][T14458] RSP: 002b:00007f2d8f61f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000055 [ 194.380494][T14458] RAX: ffffffffffffffda RBX: 00007f2d90de5fa0 RCX: 00007f2d90bbebe9 [ 194.380545][T14458] RDX: 0000000000000000 RSI: 0000000000000036 RDI: 00002000000003c0 [ 194.380559][T14458] RBP: 00007f2d8f61f090 R08: 0000000000000000 R09: 0000000000000000 [ 194.380572][T14458] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 194.380584][T14458] R13: 00007f2d90de6038 R14: 00007f2d90de5fa0 R15: 00007ffe02e93b18 [ 194.380601][T14458] [ 194.650428][T14473] 9pnet_fd: Insufficient options for proto=fd [ 194.711099][T14477] FAULT_INJECTION: forcing a failure. [ 194.711099][T14477] name failslab, interval 1, probability 0, space 0, times 0 [ 194.723896][T14477] CPU: 1 UID: 0 PID: 14477 Comm: syz.4.4103 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 194.723982][T14477] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 194.723994][T14477] Call Trace: [ 194.724000][T14477] [ 194.724007][T14477] __dump_stack+0x1d/0x30 [ 194.724029][T14477] dump_stack_lvl+0xe8/0x140 [ 194.724047][T14477] dump_stack+0x15/0x1b [ 194.724130][T14477] should_fail_ex+0x265/0x280 [ 194.724264][T14477] ? assoc_array_insert+0x2e0/0x1990 [ 194.724290][T14477] should_failslab+0x8c/0xb0 [ 194.724348][T14477] __kmalloc_cache_noprof+0x4c/0x320 [ 194.724382][T14477] assoc_array_insert+0x2e0/0x1990 [ 194.724417][T14477] ? avc_has_perm+0xf7/0x180 [ 194.724444][T14477] __key_link_begin+0x8a/0x140 [ 194.724487][T14477] __key_create_or_update+0x30f/0x750 [ 194.724518][T14477] ? key_validate+0xad/0xd0 [ 194.724584][T14477] key_create_or_update+0x42/0x60 [ 194.724631][T14477] __se_sys_add_key+0x296/0x350 [ 194.724652][T14477] __x64_sys_add_key+0x67/0x80 [ 194.724671][T14477] x64_sys_call+0x28c4/0x2ff0 [ 194.724690][T14477] do_syscall_64+0xd2/0x200 [ 194.724778][T14477] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 194.724799][T14477] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 194.724822][T14477] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 194.724905][T14477] RIP: 0033:0x7f62425debe9 [ 194.724920][T14477] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 194.724936][T14477] RSP: 002b:00007f6241047038 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 194.724955][T14477] RAX: ffffffffffffffda RBX: 00007f6242805fa0 RCX: 00007f62425debe9 [ 194.724966][T14477] RDX: 0000000000000000 RSI: 00002000000004c0 RDI: 00002000000002c0 [ 194.724978][T14477] RBP: 00007f6241047090 R08: 000000003c254c38 R09: 0000000000000000 [ 194.724989][T14477] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 194.725000][T14477] R13: 00007f6242806038 R14: 00007f6242805fa0 R15: 00007fff361e4058 [ 194.725065][T14477] [ 194.972080][ T3706] usb 11-1: enqueue for inactive port 0 [ 194.977711][ T3706] usb 11-1: enqueue for inactive port 0 [ 194.995276][T12987] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 195.032782][T12987] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 195.071187][ T3706] vhci_hcd: vhci_device speed not set [ 195.138566][T12987] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 195.168756][T14504] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4112'. [ 195.203909][T12987] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 195.318397][T14461] chnl_net:caif_netlink_parms(): no params data found [ 195.364210][T12987] bridge_slave_1: left allmulticast mode [ 195.369994][T12987] bridge_slave_1: left promiscuous mode [ 195.375829][T12987] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.390312][T12987] bridge_slave_0: left allmulticast mode [ 195.396205][T12987] bridge_slave_0: left promiscuous mode [ 195.401947][T12987] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.505593][T14511] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4113'. [ 195.514630][T14511] netlink: 8 bytes leftover after parsing attributes in process `syz.4.4113'. [ 195.530227][T14511] netlink: 176 bytes leftover after parsing attributes in process `syz.4.4113'. [ 195.541503][T12987] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 195.549672][T14511] netlink: 16 bytes leftover after parsing attributes in process `syz.4.4113'. [ 195.572571][T12987] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 195.599645][T12987] bond0 (unregistering): Released all slaves [ 195.671174][T14461] bridge0: port 1(bridge_slave_0) entered blocking state [ 195.678312][T14461] bridge0: port 1(bridge_slave_0) entered disabled state [ 195.690439][T14461] bridge_slave_0: entered allmulticast mode [ 195.697421][T14461] bridge_slave_0: entered promiscuous mode [ 195.713546][T14461] bridge0: port 2(bridge_slave_1) entered blocking state [ 195.720689][T14461] bridge0: port 2(bridge_slave_1) entered disabled state [ 195.733540][T14461] bridge_slave_1: entered allmulticast mode [ 195.746956][T14461] bridge_slave_1: entered promiscuous mode [ 195.755702][T12987] hsr_slave_0: left promiscuous mode [ 195.763310][T12987] hsr_slave_1: left promiscuous mode [ 195.769034][T12987] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 195.776533][T12987] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 195.794696][T12987] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 195.802167][T12987] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 195.822836][T12987] veth1_macvtap: left promiscuous mode [ 195.828347][T12987] veth0_macvtap: left promiscuous mode [ 195.834088][T12987] veth1_vlan: left promiscuous mode [ 195.839363][T12987] veth0_vlan: left promiscuous mode [ 195.912029][T12987] team0 (unregistering): Port device team_slave_1 removed [ 195.932126][T12987] team0 (unregistering): Port device team_slave_0 removed [ 196.031256][T14461] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 196.032862][T14544] netlink: 40 bytes leftover after parsing attributes in process `syz.4.4122'. [ 196.052150][T14540] netlink: 'syz.1.4123': attribute type 3 has an invalid length. [ 196.062324][T14461] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 196.121558][T14540] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4123'. [ 196.132246][T14461] team0: Port device team_slave_0 added [ 196.140192][T14461] team0: Port device team_slave_1 added [ 196.180891][T14461] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 196.188181][T14461] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.214154][T14461] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 196.254390][T14461] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 196.261530][T14461] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 196.287901][T14461] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 196.325733][T14461] hsr_slave_0: entered promiscuous mode [ 196.335688][T14461] hsr_slave_1: entered promiscuous mode [ 196.350170][T14461] debugfs: 'hsr0' already exists in 'hsr' [ 196.355983][T14461] Cannot create hsr debugfs directory [ 196.454187][T14578] netlink: 40 bytes leftover after parsing attributes in process `syz.2.4135'. [ 196.468109][T14461] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 196.483839][T14461] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 196.500943][T14461] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 196.518718][T14461] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 196.523358][T14583] FAULT_INJECTION: forcing a failure. [ 196.523358][T14583] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 196.538537][T14583] CPU: 0 UID: 0 PID: 14583 Comm: syz.1.4138 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 196.538579][T14583] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 196.538591][T14583] Call Trace: [ 196.538599][T14583] [ 196.538609][T14583] __dump_stack+0x1d/0x30 [ 196.538632][T14583] dump_stack_lvl+0xe8/0x140 [ 196.538653][T14583] dump_stack+0x15/0x1b [ 196.538671][T14583] should_fail_ex+0x265/0x280 [ 196.538773][T14583] should_fail+0xb/0x20 [ 196.538794][T14583] should_fail_usercopy+0x1a/0x20 [ 196.538818][T14583] _copy_from_user+0x1c/0xb0 [ 196.538868][T14583] kstrtouint_from_user+0x69/0xf0 [ 196.538958][T14583] ? 0xffffffff81000000 [ 196.539005][T14583] ? selinux_file_permission+0x1e4/0x320 [ 196.539026][T14583] proc_fail_nth_write+0x50/0x160 [ 196.539050][T14583] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 196.539078][T14583] vfs_write+0x269/0x960 [ 196.539113][T14583] ? vfs_read+0x4e6/0x770 [ 196.539133][T14583] ? __rcu_read_unlock+0x4f/0x70 [ 196.539156][T14583] ? __fget_files+0x184/0x1c0 [ 196.539182][T14583] ksys_write+0xda/0x1a0 [ 196.539205][T14583] __x64_sys_write+0x40/0x50 [ 196.539271][T14583] x64_sys_call+0x27fe/0x2ff0 [ 196.539290][T14583] do_syscall_64+0xd2/0x200 [ 196.539313][T14583] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 196.539387][T14583] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 196.539416][T14583] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 196.539448][T14583] RIP: 0033:0x7f876e64d69f [ 196.539465][T14583] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 92 02 00 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 <48> 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 4c 93 02 00 48 [ 196.539485][T14583] RSP: 002b:00007f876d0b7030 EFLAGS: 00000293 ORIG_RAX: 0000000000000001 [ 196.539581][T14583] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f876e64d69f [ 196.539595][T14583] RDX: 0000000000000001 RSI: 00007f876d0b70a0 RDI: 0000000000000004 [ 196.539608][T14583] RBP: 00007f876d0b7090 R08: 0000000000000000 R09: 0000000000000000 [ 196.539621][T14583] R10: 0000000000000006 R11: 0000000000000293 R12: 0000000000000001 [ 196.539632][T14583] R13: 00007f876e876038 R14: 00007f876e875fa0 R15: 00007ffc8697b868 [ 196.539651][T14583] [ 196.817083][T14599] syz1: rxe_newlink: already configured on syz_tun [ 196.823044][T14461] 8021q: adding VLAN 0 to HW filter on device bond0 [ 196.838637][T14461] 8021q: adding VLAN 0 to HW filter on device team0 [ 196.851815][T12987] bridge0: port 1(bridge_slave_0) entered blocking state [ 196.859186][T12987] bridge0: port 1(bridge_slave_0) entered forwarding state [ 196.875377][T12960] bridge0: port 2(bridge_slave_1) entered blocking state [ 196.882524][T12960] bridge0: port 2(bridge_slave_1) entered forwarding state [ 196.939023][T14611] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4145'. [ 196.942951][T14461] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 196.958312][T14461] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 197.025862][T14619] netlink: 20 bytes leftover after parsing attributes in process `syz.4.4146'. [ 197.035443][T14461] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 197.077548][T14625] FAULT_INJECTION: forcing a failure. [ 197.077548][T14625] name failslab, interval 1, probability 0, space 0, times 0 [ 197.090589][T14625] CPU: 0 UID: 0 PID: 14625 Comm: syz.4.4149 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 197.090690][T14625] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 197.090704][T14625] Call Trace: [ 197.090711][T14625] [ 197.090720][T14625] __dump_stack+0x1d/0x30 [ 197.090746][T14625] dump_stack_lvl+0xe8/0x140 [ 197.090769][T14625] dump_stack+0x15/0x1b [ 197.090868][T14625] should_fail_ex+0x265/0x280 [ 197.090892][T14625] ? audit_log_d_path+0x8d/0x150 [ 197.090924][T14625] should_failslab+0x8c/0xb0 [ 197.090953][T14625] __kmalloc_cache_noprof+0x4c/0x320 [ 197.091130][T14625] audit_log_d_path+0x8d/0x150 [ 197.091164][T14625] audit_log_d_path_exe+0x42/0x70 [ 197.091197][T14625] audit_log_task+0x1e9/0x250 [ 197.091230][T14625] audit_seccomp+0x61/0x100 [ 197.091283][T14625] ? __seccomp_filter+0x68c/0x10d0 [ 197.091309][T14625] __seccomp_filter+0x69d/0x10d0 [ 197.091334][T14625] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 197.091404][T14625] ? vfs_write+0x7e8/0x960 [ 197.091430][T14625] ? __rcu_read_unlock+0x4f/0x70 [ 197.091454][T14625] ? __fget_files+0x184/0x1c0 [ 197.091483][T14625] __secure_computing+0x82/0x150 [ 197.091528][T14625] syscall_trace_enter+0xcf/0x1e0 [ 197.091551][T14625] do_syscall_64+0xac/0x200 [ 197.091578][T14625] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 197.091673][T14625] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 197.091701][T14625] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 197.091742][T14625] RIP: 0033:0x7f62425debe9 [ 197.091762][T14625] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 197.091783][T14625] RSP: 002b:00007f6241047038 EFLAGS: 00000246 ORIG_RAX: 0000000000000107 [ 197.091807][T14625] RAX: ffffffffffffffda RBX: 00007f6242805fa0 RCX: 00007f62425debe9 [ 197.091821][T14625] RDX: 0000000000000000 RSI: 0000000000000000 RDI: ffffffffffffff9c [ 197.091836][T14625] RBP: 00007f6241047090 R08: 0000000000000000 R09: 0000000000000000 [ 197.091850][T14625] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 197.091894][T14625] R13: 00007f6242806038 R14: 00007f6242805fa0 R15: 00007fff361e4058 [ 197.091915][T14625] [ 197.482524][T14461] veth0_vlan: entered promiscuous mode [ 197.501413][T14461] veth1_vlan: entered promiscuous mode [ 197.519870][T14461] veth0_macvtap: entered promiscuous mode [ 197.527900][T14461] veth1_macvtap: entered promiscuous mode [ 197.537201][T14653] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(5) [ 197.540995][T14461] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 197.543755][T14653] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 197.543925][T14653] vhci_hcd vhci_hcd.0: Device attached [ 197.562472][T14461] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 197.593537][T14654] vhci_hcd: connection closed [ 197.595441][T12960] vhci_hcd: stop threads [ 197.604548][T12960] vhci_hcd: release socket [ 197.609001][T12960] vhci_hcd: disconnect device [ 197.619672][T12960] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.641206][T12960] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.658034][T12960] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 197.667442][T12960] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 198.025119][T14705] SELinux: Context ctinfo is not valid (left unmapped). [ 198.101452][T14718] FAULT_INJECTION: forcing a failure. [ 198.101452][T14718] name failslab, interval 1, probability 0, space 0, times 0 [ 198.114151][T14718] CPU: 1 UID: 0 PID: 14718 Comm: syz.5.4180 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 198.114186][T14718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 198.114197][T14718] Call Trace: [ 198.114205][T14718] [ 198.114215][T14718] __dump_stack+0x1d/0x30 [ 198.114263][T14718] dump_stack_lvl+0xe8/0x140 [ 198.114285][T14718] dump_stack+0x15/0x1b [ 198.114300][T14718] should_fail_ex+0x265/0x280 [ 198.114321][T14718] ? sel_netnode_sid_slow+0x1eb/0x540 [ 198.114383][T14718] should_failslab+0x8c/0xb0 [ 198.114412][T14718] __kmalloc_cache_noprof+0x4c/0x320 [ 198.114444][T14718] sel_netnode_sid_slow+0x1eb/0x540 [ 198.114478][T14718] sel_netnode_sid+0x1e3/0x250 [ 198.114629][T14718] selinux_socket_bind+0x505/0x6b0 [ 198.114668][T14718] selinux_sctp_bind_connect+0x1bc/0x250 [ 198.114704][T14718] security_sctp_bind_connect+0x50/0x90 [ 198.114734][T14718] sctp_setsockopt_bindx+0x116/0x2c0 [ 198.114779][T14718] sctp_setsockopt+0x79f/0xe30 [ 198.114818][T14718] sock_common_setsockopt+0x69/0x80 [ 198.114850][T14718] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 198.114883][T14718] __sys_setsockopt+0x181/0x200 [ 198.114979][T14718] __x64_sys_setsockopt+0x64/0x80 [ 198.114997][T14718] x64_sys_call+0x20ec/0x2ff0 [ 198.115046][T14718] do_syscall_64+0xd2/0x200 [ 198.115099][T14718] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 198.115126][T14718] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 198.115150][T14718] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 198.115171][T14718] RIP: 0033:0x7f2d90bbebe9 [ 198.115239][T14718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.115309][T14718] RSP: 002b:00007f2d8f61f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 198.115328][T14718] RAX: ffffffffffffffda RBX: 00007f2d90de5fa0 RCX: 00007f2d90bbebe9 [ 198.115342][T14718] RDX: 0000000000000064 RSI: 0000000000000084 RDI: 0000000000000003 [ 198.115363][T14718] RBP: 00007f2d8f61f090 R08: 0000000000000038 R09: 0000000000000000 [ 198.115375][T14718] R10: 00002000000000c0 R11: 0000000000000246 R12: 0000000000000001 [ 198.115386][T14718] R13: 00007f2d90de6038 R14: 00007f2d90de5fa0 R15: 00007ffe02e93b18 [ 198.115420][T14718] [ 198.501632][ T29] kauditd_printk_skb: 436 callbacks suppressed [ 198.501650][ T29] audit: type=1400 audit(1755489310.835:11886): avc: denied { append } for pid=14744 comm="syz.1.4192" name="001" dev="devtmpfs" ino=165 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:usb_device_t tclass=chr_file permissive=1 [ 198.559589][T14743] syz_tun: entered promiscuous mode [ 198.564901][T14743] syz_tun: entered allmulticast mode [ 198.633076][T14753] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(5) [ 198.639640][T14753] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 198.647305][T14753] vhci_hcd vhci_hcd.0: Device attached [ 198.674038][T14756] vhci_hcd: connection closed [ 198.675930][T13010] vhci_hcd: stop threads [ 198.684998][T13010] vhci_hcd: release socket [ 198.689437][T13010] vhci_hcd: disconnect device [ 198.735797][T14770] FAULT_INJECTION: forcing a failure. [ 198.735797][T14770] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 198.749170][T14770] CPU: 1 UID: 0 PID: 14770 Comm: syz.4.4202 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 198.749205][T14770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 198.749270][T14770] Call Trace: [ 198.749279][T14770] [ 198.749299][T14770] __dump_stack+0x1d/0x30 [ 198.749325][T14770] dump_stack_lvl+0xe8/0x140 [ 198.749348][T14770] dump_stack+0x15/0x1b [ 198.749367][T14770] should_fail_ex+0x265/0x280 [ 198.749386][T14770] should_fail+0xb/0x20 [ 198.749462][T14770] should_fail_usercopy+0x1a/0x20 [ 198.749483][T14770] _copy_from_iter+0xcf/0xe40 [ 198.749505][T14770] ? __build_skb_around+0x1a0/0x200 [ 198.749587][T14770] ? __alloc_skb+0x223/0x320 [ 198.749625][T14770] netlink_sendmsg+0x471/0x6b0 [ 198.749686][T14770] ? __pfx_netlink_sendmsg+0x10/0x10 [ 198.749708][T14770] __sock_sendmsg+0x142/0x180 [ 198.749809][T14770] ____sys_sendmsg+0x31e/0x4e0 [ 198.749838][T14770] ___sys_sendmsg+0x17b/0x1d0 [ 198.749907][T14770] __x64_sys_sendmsg+0xd4/0x160 [ 198.749952][T14770] x64_sys_call+0x191e/0x2ff0 [ 198.749973][T14770] do_syscall_64+0xd2/0x200 [ 198.750003][T14770] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 198.750071][T14770] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 198.750094][T14770] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 198.750116][T14770] RIP: 0033:0x7f62425debe9 [ 198.750134][T14770] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 198.750172][T14770] RSP: 002b:00007f6241047038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 198.750194][T14770] RAX: ffffffffffffffda RBX: 00007f6242805fa0 RCX: 00007f62425debe9 [ 198.750206][T14770] RDX: 0000000000008000 RSI: 0000200000000280 RDI: 0000000000000004 [ 198.750259][T14770] RBP: 00007f6241047090 R08: 0000000000000000 R09: 0000000000000000 [ 198.750273][T14770] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 198.750295][T14770] R13: 00007f6242806038 R14: 00007f6242805fa0 R15: 00007fff361e4058 [ 198.750318][T14770] [ 198.999224][T14774] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(4) [ 199.005785][T14774] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 199.013405][T14774] vhci_hcd vhci_hcd.0: Device attached [ 199.019302][ T29] audit: type=1326 audit(1755489311.345:11887): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14780 comm="syz.4.4206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 199.043342][ T29] audit: type=1326 audit(1755489311.345:11888): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14780 comm="syz.4.4206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 199.067163][ T29] audit: type=1326 audit(1755489311.345:11889): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14780 comm="syz.4.4206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 199.090911][ T29] audit: type=1326 audit(1755489311.345:11890): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14780 comm="syz.4.4206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 199.114522][ T29] audit: type=1326 audit(1755489311.345:11891): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14780 comm="syz.4.4206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 199.138256][ T29] audit: type=1326 audit(1755489311.345:11892): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14780 comm="syz.4.4206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 199.161941][ T29] audit: type=1326 audit(1755489311.345:11893): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14780 comm="syz.4.4206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 199.185761][ T29] audit: type=1326 audit(1755489311.345:11894): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14780 comm="syz.4.4206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 199.209449][ T29] audit: type=1326 audit(1755489311.345:11895): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=14780 comm="syz.4.4206" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 199.251960][T14776] vhci_hcd: connection closed [ 199.252074][T12987] vhci_hcd: stop threads [ 199.261457][T12987] vhci_hcd: release socket [ 199.265911][T12987] vhci_hcd: disconnect device [ 199.302574][ T3706] vhci_hcd: vhci_device speed not set [ 199.320729][T14795] FAULT_INJECTION: forcing a failure. [ 199.320729][T14795] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 199.333911][T14795] CPU: 1 UID: 0 PID: 14795 Comm: syz.1.4212 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 199.333977][T14795] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 199.333988][T14795] Call Trace: [ 199.333995][T14795] [ 199.334065][T14795] __dump_stack+0x1d/0x30 [ 199.334095][T14795] dump_stack_lvl+0xe8/0x140 [ 199.334112][T14795] dump_stack+0x15/0x1b [ 199.334188][T14795] should_fail_ex+0x265/0x280 [ 199.334207][T14795] should_fail+0xb/0x20 [ 199.334222][T14795] should_fail_usercopy+0x1a/0x20 [ 199.334241][T14795] _copy_from_user+0x1c/0xb0 [ 199.334284][T14795] ____sys_sendmsg+0x1c5/0x4e0 [ 199.334307][T14795] __sys_sendmsg_sock+0x28/0x40 [ 199.334325][T14795] io_sendmsg+0x144/0x5b0 [ 199.334348][T14795] __io_issue_sqe+0xfe/0x2e0 [ 199.334364][T14795] ? io_assign_file+0x149/0x200 [ 199.334391][T14795] io_issue_sqe+0x53/0x970 [ 199.334507][T14795] ? io_sendmsg_prep+0x38b/0x3d0 [ 199.334529][T14795] io_submit_sqes+0x664/0x1050 [ 199.334581][T14795] __se_sys_io_uring_enter+0x1c1/0x1b70 [ 199.334665][T14795] ? 0xffffffff81000000 [ 199.334677][T14795] ? __rcu_read_unlock+0x4f/0x70 [ 199.334696][T14795] ? get_pid_task+0x96/0xd0 [ 199.334714][T14795] ? proc_fail_nth_write+0x13b/0x160 [ 199.334746][T14795] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 199.334768][T14795] ? vfs_write+0x7e8/0x960 [ 199.334848][T14795] ? __rcu_read_unlock+0x4f/0x70 [ 199.334866][T14795] ? __fget_files+0x184/0x1c0 [ 199.334889][T14795] ? fput+0x8f/0xc0 [ 199.334982][T14795] __x64_sys_io_uring_enter+0x78/0x90 [ 199.335001][T14795] x64_sys_call+0x2de1/0x2ff0 [ 199.335062][T14795] do_syscall_64+0xd2/0x200 [ 199.335090][T14795] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 199.335111][T14795] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 199.335132][T14795] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 199.335182][T14795] RIP: 0033:0x7f876e64ebe9 [ 199.335196][T14795] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 199.335212][T14795] RSP: 002b:00007f876d0b7038 EFLAGS: 00000246 ORIG_RAX: 00000000000001aa [ 199.335236][T14795] RAX: ffffffffffffffda RBX: 00007f876e875fa0 RCX: 00007f876e64ebe9 [ 199.335248][T14795] RDX: 000000000080ffff RSI: 00000000000047f6 RDI: 000000000000000a [ 199.335259][T14795] RBP: 00007f876d0b7090 R08: 0000000000000000 R09: 0000000000000000 [ 199.335270][T14795] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.335281][T14795] R13: 00007f876e876038 R14: 00007f876e875fa0 R15: 00007ffc8697b868 [ 199.335298][T14795] [ 199.756651][T14804] 9pnet_fd: Insufficient options for proto=fd [ 199.807741][T14812] FAULT_INJECTION: forcing a failure. [ 199.807741][T14812] name failslab, interval 1, probability 0, space 0, times 0 [ 199.820540][T14812] CPU: 0 UID: 0 PID: 14812 Comm: syz.5.4219 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 199.820634][T14812] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 199.820645][T14812] Call Trace: [ 199.820652][T14812] [ 199.820660][T14812] __dump_stack+0x1d/0x30 [ 199.820712][T14812] dump_stack_lvl+0xe8/0x140 [ 199.820734][T14812] dump_stack+0x15/0x1b [ 199.820753][T14812] should_fail_ex+0x265/0x280 [ 199.820776][T14812] should_failslab+0x8c/0xb0 [ 199.820800][T14812] __kmalloc_node_track_caller_noprof+0xa4/0x410 [ 199.820909][T14812] ? sidtab_sid2str_get+0xa0/0x130 [ 199.820935][T14812] kmemdup_noprof+0x2b/0x70 [ 199.820975][T14812] sidtab_sid2str_get+0xa0/0x130 [ 199.821005][T14812] security_sid_to_context_core+0x1eb/0x2e0 [ 199.821103][T14812] security_sid_to_context+0x27/0x40 [ 199.821143][T14812] selinux_lsmprop_to_secctx+0x67/0xf0 [ 199.821163][T14812] security_lsmprop_to_secctx+0x43/0x80 [ 199.821190][T14812] audit_log_task_context+0x77/0x190 [ 199.821341][T14812] audit_log_task+0xf4/0x250 [ 199.821391][T14812] audit_seccomp+0x61/0x100 [ 199.821418][T14812] ? __seccomp_filter+0x68c/0x10d0 [ 199.821443][T14812] __seccomp_filter+0x69d/0x10d0 [ 199.821558][T14812] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 199.821598][T14812] ? vfs_write+0x7e8/0x960 [ 199.821623][T14812] ? __rcu_read_unlock+0x4f/0x70 [ 199.821716][T14812] ? __fget_files+0x184/0x1c0 [ 199.821745][T14812] __secure_computing+0x82/0x150 [ 199.821769][T14812] syscall_trace_enter+0xcf/0x1e0 [ 199.821798][T14812] do_syscall_64+0xac/0x200 [ 199.821879][T14812] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 199.821905][T14812] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 199.821929][T14812] RIP: 0033:0x7f2d90bbebe9 [ 199.821947][T14812] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 199.822020][T14812] RSP: 002b:00007f2d8f61f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000007 [ 199.822058][T14812] RAX: ffffffffffffffda RBX: 00007f2d90de5fa0 RCX: 00007f2d90bbebe9 [ 199.822073][T14812] RDX: ffffffffffbffff8 RSI: 0000000000000001 RDI: 0000200000b2c000 [ 199.822084][T14812] RBP: 00007f2d8f61f090 R08: 0000000000000000 R09: 0000000000000000 [ 199.822096][T14812] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 199.822108][T14812] R13: 00007f2d90de6038 R14: 00007f2d90de5fa0 R15: 00007ffe02e93b18 [ 199.822129][T14812] [ 200.149770][T14826] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(5) [ 200.156331][T14826] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 200.163936][T14826] vhci_hcd vhci_hcd.0: Device attached [ 200.200077][T14826] __nla_validate_parse: 17 callbacks suppressed [ 200.200096][T14826] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4221'. [ 200.202856][T14835] netlink: 260 bytes leftover after parsing attributes in process `syz.5.4225'. [ 200.224606][T14835] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4225'. [ 200.247644][T14826] team0: Port device team_slave_1 removed [ 200.297477][T14840] syz1: rxe_newlink: already configured on syz_tun [ 200.411157][ T36] usb 15-1: new low-speed USB device number 2 using vhci_hcd [ 200.429038][T14852] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4233'. [ 200.623522][T14873] 9pnet_fd: Insufficient options for proto=fd [ 200.653397][T14877] macvtap0: refused to change device tx_queue_len [ 200.714162][T14888] netlink: 28 bytes leftover after parsing attributes in process `syz.1.4249'. [ 200.779714][T14901] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4256'. [ 200.958455][T14831] vhci_hcd: connection reset by peer [ 200.964587][T13003] vhci_hcd: stop threads [ 200.968863][T13003] vhci_hcd: release socket [ 200.973341][T13003] vhci_hcd: disconnect device [ 201.083285][T14919] geneve2: entered promiscuous mode [ 201.135904][T14925] netlink: 28 bytes leftover after parsing attributes in process `syz.5.4267'. [ 201.157129][T14927] FAULT_INJECTION: forcing a failure. [ 201.157129][T14927] name fail_futex, interval 1, probability 0, space 0, times 1 [ 201.170173][T14927] CPU: 0 UID: 0 PID: 14927 Comm: syz.5.4268 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 201.170230][T14927] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 201.170238][T14927] Call Trace: [ 201.170246][T14927] [ 201.170253][T14927] __dump_stack+0x1d/0x30 [ 201.170302][T14927] dump_stack_lvl+0xe8/0x140 [ 201.170315][T14927] dump_stack+0x15/0x1b [ 201.170326][T14927] should_fail_ex+0x265/0x280 [ 201.170340][T14927] should_fail+0xb/0x20 [ 201.170352][T14927] get_futex_key+0x8e3/0xbd0 [ 201.170389][T14927] ? ring_buffer_unlock_commit+0x324/0x370 [ 201.170407][T14927] futex_wait_setup+0x4a/0x3e0 [ 201.170438][T14927] ? trace_event_buffer_commit+0x196/0x5d0 [ 201.170455][T14927] __futex_wait+0x9d/0x260 [ 201.170509][T14927] ? __pfx_futex_wake_mark+0x10/0x10 [ 201.170529][T14927] futex_wait+0x9d/0x1d0 [ 201.170573][T14927] ? __pfx_hrtimer_wakeup+0x10/0x10 [ 201.170589][T14927] do_futex+0x2bf/0x380 [ 201.170636][T14927] ? get_timespec64+0xc9/0x100 [ 201.170649][T14927] __se_sys_futex+0x2ed/0x360 [ 201.170672][T14927] __x64_sys_futex+0x78/0x90 [ 201.170768][T14927] x64_sys_call+0x2e39/0x2ff0 [ 201.170790][T14927] do_syscall_64+0xd2/0x200 [ 201.170807][T14927] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 201.170823][T14927] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 201.170838][T14927] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 201.170885][T14927] RIP: 0033:0x7f2d90bbebe9 [ 201.170896][T14927] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 201.170908][T14927] RSP: 002b:00007f2d8f61f038 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 201.170946][T14927] RAX: ffffffffffffffda RBX: 00007f2d90de5fa0 RCX: 00007f2d90bbebe9 [ 201.170954][T14927] RDX: 0000000000000002 RSI: 0000000000000000 RDI: 00002000000006c0 [ 201.170963][T14927] RBP: 00007f2d8f61f090 R08: 0000000000000000 R09: 0000000080000002 [ 201.170974][T14927] R10: 0000200000000140 R11: 0000000000000246 R12: 0000000000000001 [ 201.170982][T14927] R13: 00007f2d90de6038 R14: 00007f2d90de5fa0 R15: 00007ffe02e93b18 [ 201.170995][T14927] [ 201.398362][T14929] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4269'. [ 201.480853][T14936] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4272'. [ 201.489798][T14936] netlink: 8 bytes leftover after parsing attributes in process `syz.5.4272'. [ 201.823890][T14976] macvtap0: refused to change device tx_queue_len [ 201.851802][T14978] FAULT_INJECTION: forcing a failure. [ 201.851802][T14978] name failslab, interval 1, probability 0, space 0, times 0 [ 201.864533][T14978] CPU: 1 UID: 0 PID: 14978 Comm: syz.5.4286 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 201.864555][T14978] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 201.864563][T14978] Call Trace: [ 201.864567][T14978] [ 201.864573][T14978] __dump_stack+0x1d/0x30 [ 201.864611][T14978] dump_stack_lvl+0xe8/0x140 [ 201.864624][T14978] dump_stack+0x15/0x1b [ 201.864635][T14978] should_fail_ex+0x265/0x280 [ 201.864649][T14978] ? audit_log_d_path+0x8d/0x150 [ 201.864744][T14978] should_failslab+0x8c/0xb0 [ 201.864760][T14978] __kmalloc_cache_noprof+0x4c/0x320 [ 201.864821][T14978] audit_log_d_path+0x8d/0x150 [ 201.864840][T14978] audit_log_d_path_exe+0x42/0x70 [ 201.864859][T14978] audit_log_task+0x1e9/0x250 [ 201.864881][T14978] audit_seccomp+0x61/0x100 [ 201.864914][T14978] ? __seccomp_filter+0x68c/0x10d0 [ 201.864965][T14978] __seccomp_filter+0x69d/0x10d0 [ 201.864988][T14978] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 201.865016][T14978] ? vfs_write+0x7e8/0x960 [ 201.865109][T14978] __secure_computing+0x82/0x150 [ 201.865131][T14978] syscall_trace_enter+0xcf/0x1e0 [ 201.865220][T14978] do_syscall_64+0xac/0x200 [ 201.865260][T14978] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 201.865330][T14978] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 201.865429][T14978] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 201.865507][T14978] RIP: 0033:0x7f2d90bbebe9 [ 201.865522][T14978] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 201.865539][T14978] RSP: 002b:00007f2d8f61f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002f [ 201.865558][T14978] RAX: ffffffffffffffda RBX: 00007f2d90de5fa0 RCX: 00007f2d90bbebe9 [ 201.865571][T14978] RDX: 0000000000000000 RSI: 0000200000000bc0 RDI: 0000000000000008 [ 201.865584][T14978] RBP: 00007f2d8f61f090 R08: 0000000000000000 R09: 0000000000000000 [ 201.865605][T14978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 201.865618][T14978] R13: 00007f2d90de6038 R14: 00007f2d90de5fa0 R15: 00007ffe02e93b18 [ 201.865640][T14978] [ 202.419927][T15001] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(4) [ 202.426604][T15001] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 202.434233][T15001] vhci_hcd vhci_hcd.0: Device attached [ 202.443984][T15002] vhci_hcd: connection closed [ 202.451306][T13010] vhci_hcd: stop threads [ 202.460366][T13010] vhci_hcd: release socket [ 202.464843][T13010] vhci_hcd: disconnect device [ 202.972730][T15035] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(5) [ 202.979274][T15035] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 202.987107][T15035] vhci_hcd vhci_hcd.0: Device attached [ 203.056858][T15036] vhci_hcd: connection closed [ 203.057108][T13010] vhci_hcd: stop threads [ 203.066186][T13010] vhci_hcd: release socket [ 203.070614][T13010] vhci_hcd: disconnect device [ 203.352941][T15062] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 203.359640][T15062] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 203.367299][T15062] vhci_hcd vhci_hcd.0: Device attached [ 203.375736][T15063] vhci_hcd: connection closed [ 203.375799][T12987] vhci_hcd: stop threads [ 203.384842][T12987] vhci_hcd: release socket [ 203.389270][T12987] vhci_hcd: disconnect device [ 203.581083][ T29] kauditd_printk_skb: 339 callbacks suppressed [ 203.581103][ T29] audit: type=1326 audit(1755489315.905:12232): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15076 comm="syz.2.4321" exe="/root/syz-executor" sig=9 arch=c000003e syscall=231 compat=0 ip=0x7f37d3fbebe9 code=0x0 [ 203.794203][ T29] audit: type=1326 audit(1755489316.115:12233): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15100 comm="syz.4.4330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 203.817907][ T29] audit: type=1326 audit(1755489316.125:12234): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15100 comm="syz.4.4330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 203.841555][ T29] audit: type=1326 audit(1755489316.125:12235): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15100 comm="syz.4.4330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 203.865178][ T29] audit: type=1326 audit(1755489316.125:12236): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15100 comm="syz.4.4330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 203.889254][ T29] audit: type=1326 audit(1755489316.125:12237): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15100 comm="syz.4.4330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 203.912843][ T29] audit: type=1326 audit(1755489316.125:12238): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15100 comm="syz.4.4330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=41 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 203.936492][ T29] audit: type=1326 audit(1755489316.125:12239): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15100 comm="syz.4.4330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 203.960385][ T29] audit: type=1326 audit(1755489316.125:12240): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15100 comm="syz.4.4330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 203.984121][ T29] audit: type=1326 audit(1755489316.125:12241): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15100 comm="syz.4.4330" exe="/root/syz-executor" sig=0 arch=c000003e syscall=49 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 204.392215][T15133] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(4) [ 204.398883][T15133] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 204.406393][T15133] vhci_hcd vhci_hcd.0: Device attached [ 204.414488][T15134] vhci_hcd: connection closed [ 204.414656][T13010] vhci_hcd: stop threads [ 204.423779][T13010] vhci_hcd: release socket [ 204.428256][T13010] vhci_hcd: disconnect device [ 205.031044][T15192] SELinux: Context system_u:object_r:syslogd_var_run_t:s0 is not valid (left unmapped). [ 205.161952][T15208] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(4) [ 205.168662][T15208] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 205.176237][T15208] vhci_hcd vhci_hcd.0: Device attached [ 205.193915][T15210] vhci_hcd: connection closed [ 205.194134][T13003] vhci_hcd: stop threads [ 205.203248][T13003] vhci_hcd: release socket [ 205.207687][T13003] vhci_hcd: disconnect device [ 205.364734][T15231] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 205.371407][T15231] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 205.379008][T15231] vhci_hcd vhci_hcd.0: Device attached [ 205.408666][T15235] __nla_validate_parse: 17 callbacks suppressed [ 205.408748][T15235] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4383'. [ 205.449772][T15237] 9pnet_fd: Insufficient options for proto=fd [ 205.454289][ T36] usb 15-1: enqueue for inactive port 0 [ 205.479388][T15231] netlink: 24 bytes leftover after parsing attributes in process `syz.2.4382'. [ 205.499468][ T36] usb 15-1: enqueue for inactive port 0 [ 205.529341][T15232] vhci_hcd: connection closed [ 205.529562][T12987] vhci_hcd: stop threads [ 205.538748][T12987] vhci_hcd: release socket [ 205.543241][T12987] vhci_hcd: disconnect device [ 205.561218][ T3711] vhci_hcd: vhci_device speed not set [ 205.571105][ T36] vhci_hcd: vhci_device speed not set [ 205.729117][T15258] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4394'. [ 205.809880][T15264] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(5) [ 205.816493][T15264] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 205.824215][T15264] vhci_hcd vhci_hcd.0: Device attached [ 205.878365][T15264] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4396'. [ 205.934116][T15265] vhci_hcd: connection closed [ 205.934644][T13010] vhci_hcd: stop threads [ 205.943767][T13010] vhci_hcd: release socket [ 205.948225][T13010] vhci_hcd: disconnect device [ 205.963051][T15277] netlink: 260 bytes leftover after parsing attributes in process `syz.1.4401'. [ 205.972258][T15277] netlink: 260 bytes leftover after parsing attributes in process `syz.1.4401'. [ 206.001110][ T3710] vhci_hcd: vhci_device speed not set [ 206.031827][T15281] FAULT_INJECTION: forcing a failure. [ 206.031827][T15281] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 206.044996][T15281] CPU: 1 UID: 0 PID: 15281 Comm: syz.4.4403 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 206.045081][T15281] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 206.045095][T15281] Call Trace: [ 206.045104][T15281] [ 206.045114][T15281] __dump_stack+0x1d/0x30 [ 206.045190][T15281] dump_stack_lvl+0xe8/0x140 [ 206.045214][T15281] dump_stack+0x15/0x1b [ 206.045301][T15281] should_fail_ex+0x265/0x280 [ 206.045352][T15281] should_fail+0xb/0x20 [ 206.045372][T15281] should_fail_usercopy+0x1a/0x20 [ 206.045395][T15281] _copy_from_user+0x1c/0xb0 [ 206.045419][T15281] ucma_write+0xd9/0x250 [ 206.045524][T15281] ? __pfx_ucma_write+0x10/0x10 [ 206.045548][T15281] vfs_write+0x269/0x960 [ 206.045571][T15281] ? __rcu_read_unlock+0x4f/0x70 [ 206.045616][T15281] ? __fget_files+0x184/0x1c0 [ 206.045642][T15281] ksys_write+0xda/0x1a0 [ 206.045663][T15281] __x64_sys_write+0x40/0x50 [ 206.045729][T15281] x64_sys_call+0x27fe/0x2ff0 [ 206.045754][T15281] do_syscall_64+0xd2/0x200 [ 206.045780][T15281] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 206.045806][T15281] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 206.045881][T15281] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 206.045906][T15281] RIP: 0033:0x7f62425debe9 [ 206.045922][T15281] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 206.045994][T15281] RSP: 002b:00007f6241047038 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 206.046014][T15281] RAX: ffffffffffffffda RBX: 00007f6242805fa0 RCX: 00007f62425debe9 [ 206.046030][T15281] RDX: 0000000000000048 RSI: 0000200000000180 RDI: 0000000000000005 [ 206.046058][T15281] RBP: 00007f6241047090 R08: 0000000000000000 R09: 0000000000000000 [ 206.046073][T15281] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 206.046154][T15281] R13: 00007f6242806038 R14: 00007f6242805fa0 R15: 00007fff361e4058 [ 206.046204][T15281] [ 206.335397][T15284] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(5) [ 206.341973][T15284] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 206.349573][T15284] vhci_hcd vhci_hcd.0: Device attached [ 206.367925][T15289] vhci_hcd: connection closed [ 206.368069][T12987] vhci_hcd: stop threads [ 206.377102][T12987] vhci_hcd: release socket [ 206.381566][T12987] vhci_hcd: disconnect device [ 206.418898][T15296] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4408'. [ 206.427844][T15296] netlink: 8 bytes leftover after parsing attributes in process `syz.7.4408'. [ 206.437922][T15296] netlink: 176 bytes leftover after parsing attributes in process `syz.7.4408'. [ 206.451116][T15296] netlink: 16 bytes leftover after parsing attributes in process `syz.7.4408'. [ 206.588799][T15318] macvtap0: refused to change device tx_queue_len [ 206.644626][T15322] netlink: 'syz.7.4421': attribute type 1 has an invalid length. [ 206.659026][T15322] 8021q: adding VLAN 0 to HW filter on device bond1 [ 206.671306][T15322] bond1 (unregistering): Released all slaves [ 207.070169][T15357] 9pnet_fd: Insufficient options for proto=fd [ 207.078303][T15357] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=48 sclass=netlink_audit_socket pid=15357 comm=syz.1.4436 [ 207.725951][T15379] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(5) [ 207.732592][T15379] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 207.740278][T15379] vhci_hcd vhci_hcd.0: Device attached [ 207.746179][T15377] 9pnet_fd: Insufficient options for proto=fd [ 207.775868][T15380] vhci_hcd: connection closed [ 207.776094][T13003] vhci_hcd: stop threads [ 207.785312][T13003] vhci_hcd: release socket [ 207.789852][T13003] vhci_hcd: disconnect device [ 207.805199][T15389] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(5) [ 207.811804][T15389] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 207.819562][T15389] vhci_hcd vhci_hcd.0: Device attached [ 207.842870][T15390] vhci_hcd: connection closed [ 207.844060][T13003] vhci_hcd: stop threads [ 207.853091][T13003] vhci_hcd: release socket [ 207.857667][T13003] vhci_hcd: disconnect device [ 207.866321][T15396] 9pnet_fd: Insufficient options for proto=fd [ 207.872535][T15393] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 207.879091][T15393] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 207.886741][T15393] vhci_hcd vhci_hcd.0: Device attached [ 207.894457][T15396] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=48 sclass=netlink_audit_socket pid=15396 comm=syz.2.4451 [ 207.937847][T15395] vhci_hcd: connection closed [ 207.938119][T12960] vhci_hcd: stop threads [ 207.947207][T12960] vhci_hcd: release socket [ 207.951762][T12960] vhci_hcd: disconnect device [ 208.034601][T15405] 9pnet_fd: Insufficient options for proto=fd [ 208.135531][T15413] 9pnet_fd: Insufficient options for proto=fd [ 208.217408][T15422] rdma_rxe: rxe_newlink: failed to add syz_tun [ 208.370277][T15440] 9pnet_fd: Insufficient options for proto=fd [ 208.490741][T15462] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(5) [ 208.497367][T15462] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 208.504976][T15462] vhci_hcd vhci_hcd.0: Device attached [ 208.531175][T15464] vhci_hcd: connection closed [ 208.532360][T13010] vhci_hcd: stop threads [ 208.541427][T13010] vhci_hcd: release socket [ 208.544765][T15470] 9pnet_fd: Insufficient options for proto=fd [ 208.545854][T13010] vhci_hcd: disconnect device [ 208.616992][T15478] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 208.623553][T15478] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 208.631191][T15478] vhci_hcd vhci_hcd.0: Device attached [ 208.647519][T15481] vhci_hcd: connection closed [ 208.647669][T12960] vhci_hcd: stop threads [ 208.656907][T12960] vhci_hcd: release socket [ 208.661412][T12960] vhci_hcd: disconnect device [ 208.685598][ T29] kauditd_printk_skb: 363 callbacks suppressed [ 208.685618][ T29] audit: type=1326 audit(1755489321.015:12605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15487 comm="syz.4.4490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 208.716520][ T29] audit: type=1326 audit(1755489321.015:12606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15487 comm="syz.4.4490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 208.740392][ T29] audit: type=1326 audit(1755489321.015:12607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15487 comm="syz.4.4490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 208.764079][ T29] audit: type=1326 audit(1755489321.015:12608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15487 comm="syz.4.4490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 208.787914][ T29] audit: type=1326 audit(1755489321.015:12609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15487 comm="syz.4.4490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 208.811637][ T29] audit: type=1326 audit(1755489321.015:12610): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15487 comm="syz.4.4490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 208.835563][ T29] audit: type=1326 audit(1755489321.015:12611): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15487 comm="syz.4.4490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 208.859259][ T29] audit: type=1326 audit(1755489321.015:12612): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15487 comm="syz.4.4490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 208.882932][ T29] audit: type=1326 audit(1755489321.015:12613): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15487 comm="syz.4.4490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 208.906630][ T29] audit: type=1326 audit(1755489321.015:12614): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15487 comm="syz.4.4490" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f62425debe9 code=0x7ffc0000 [ 208.946517][T15498] 9pnet_fd: Insufficient options for proto=fd [ 209.306259][T15547] macvtap0: refused to change device tx_queue_len [ 209.363847][T15555] vhci_hcd vhci_hcd.0: pdev(7) rhport(0) sockfd(3) [ 209.370405][T15555] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 209.378069][T15555] vhci_hcd vhci_hcd.0: Device attached [ 209.413270][T15558] vhci_hcd: connection closed [ 209.413544][T12987] vhci_hcd: stop threads [ 209.422599][T12987] vhci_hcd: release socket [ 209.427028][T12987] vhci_hcd: disconnect device [ 209.488224][T15571] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(5) [ 209.494763][T15571] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 209.502350][T15571] vhci_hcd vhci_hcd.0: Device attached [ 209.521372][T15572] vhci_hcd: connection closed [ 209.521548][T13024] vhci_hcd: stop threads [ 209.530680][T13024] vhci_hcd: release socket [ 209.535175][T13024] vhci_hcd: disconnect device [ 209.718839][T15585] macvtap0: refused to change device tx_queue_len [ 209.925196][T15597] FAULT_INJECTION: forcing a failure. [ 209.925196][T15597] name failslab, interval 1, probability 0, space 0, times 0 [ 209.937893][T15597] CPU: 1 UID: 0 PID: 15597 Comm: syz.1.4534 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 209.937923][T15597] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 209.937996][T15597] Call Trace: [ 209.938004][T15597] [ 209.938013][T15597] __dump_stack+0x1d/0x30 [ 209.938035][T15597] dump_stack_lvl+0xe8/0x140 [ 209.938053][T15597] dump_stack+0x15/0x1b [ 209.938069][T15597] should_fail_ex+0x265/0x280 [ 209.938094][T15597] should_failslab+0x8c/0xb0 [ 209.938154][T15597] kmem_cache_alloc_node_noprof+0x57/0x320 [ 209.938180][T15597] ? __alloc_skb+0x101/0x320 [ 209.938216][T15597] __alloc_skb+0x101/0x320 [ 209.938283][T15597] ? selinux_file_permission+0x1e4/0x320 [ 209.938370][T15597] ppp_write+0x87/0x310 [ 209.938402][T15597] vfs_writev+0x403/0x8b0 [ 209.938426][T15597] ? __pfx_ppp_write+0x10/0x10 [ 209.938520][T15597] __x64_sys_pwritev+0xfd/0x1c0 [ 209.938543][T15597] x64_sys_call+0x14f8/0x2ff0 [ 209.938564][T15597] do_syscall_64+0xd2/0x200 [ 209.938651][T15597] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 209.938701][T15597] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 209.938722][T15597] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 209.938742][T15597] RIP: 0033:0x7f876e64ebe9 [ 209.938759][T15597] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 209.938778][T15597] RSP: 002b:00007f876d0b7038 EFLAGS: 00000246 ORIG_RAX: 0000000000000128 [ 209.938830][T15597] RAX: ffffffffffffffda RBX: 00007f876e875fa0 RCX: 00007f876e64ebe9 [ 209.938843][T15597] RDX: 0000000000000002 RSI: 0000200000000240 RDI: 0000000000000006 [ 209.938856][T15597] RBP: 00007f876d0b7090 R08: 000000000000000b R09: 0000000000000000 [ 209.938924][T15597] R10: 0000000000000007 R11: 0000000000000246 R12: 0000000000000001 [ 209.938937][T15597] R13: 00007f876e876038 R14: 00007f876e875fa0 R15: 00007ffc8697b868 [ 209.939019][T15597] [ 210.300919][T15625] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(5) [ 210.307475][T15625] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 210.315085][T15625] vhci_hcd vhci_hcd.0: Device attached [ 210.324368][T15626] vhci_hcd: connection closed [ 210.324519][T12987] vhci_hcd: stop threads [ 210.333645][T12987] vhci_hcd: release socket [ 210.338108][T12987] vhci_hcd: disconnect device [ 210.444493][T15644] __nla_validate_parse: 26 callbacks suppressed [ 210.444507][T15644] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4553'. [ 210.503889][T15648] FAULT_INJECTION: forcing a failure. [ 210.503889][T15648] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 210.517098][T15648] CPU: 1 UID: 0 PID: 15648 Comm: syz.2.4555 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 210.517251][T15648] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 210.517264][T15648] Call Trace: [ 210.517282][T15648] [ 210.517289][T15648] __dump_stack+0x1d/0x30 [ 210.517335][T15648] dump_stack_lvl+0xe8/0x140 [ 210.517356][T15648] dump_stack+0x15/0x1b [ 210.517372][T15648] should_fail_ex+0x265/0x280 [ 210.517464][T15648] should_fail+0xb/0x20 [ 210.517552][T15648] should_fail_usercopy+0x1a/0x20 [ 210.517574][T15648] _copy_from_user+0x1c/0xb0 [ 210.517637][T15648] ___sys_sendmsg+0xc1/0x1d0 [ 210.517674][T15648] __x64_sys_sendmsg+0xd4/0x160 [ 210.517702][T15648] x64_sys_call+0x191e/0x2ff0 [ 210.517819][T15648] do_syscall_64+0xd2/0x200 [ 210.517842][T15648] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 210.517959][T15648] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 210.517975][T15648] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 210.518071][T15648] RIP: 0033:0x7f37d3fbebe9 [ 210.518088][T15648] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 210.518107][T15648] RSP: 002b:00007f37d2a1f038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 210.518121][T15648] RAX: ffffffffffffffda RBX: 00007f37d41e5fa0 RCX: 00007f37d3fbebe9 [ 210.518167][T15648] RDX: 0000000004000080 RSI: 00002000000002c0 RDI: 0000000000000005 [ 210.518175][T15648] RBP: 00007f37d2a1f090 R08: 0000000000000000 R09: 0000000000000000 [ 210.518183][T15648] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 210.518191][T15648] R13: 00007f37d41e6038 R14: 00007f37d41e5fa0 R15: 00007ffddb4757d8 [ 210.518206][T15648] [ 210.706089][T15650] netlink: 24 bytes leftover after parsing attributes in process `syz.2.4556'. [ 210.876468][T15662] macvtap0: refused to change device tx_queue_len [ 210.898875][T15666] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4564'. [ 210.967846][T15676] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(5) [ 210.974414][T15676] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 210.982445][T15676] vhci_hcd vhci_hcd.0: Device attached [ 210.991455][T15677] vhci_hcd: connection closed [ 210.991526][T13010] vhci_hcd: stop threads [ 211.000552][T13010] vhci_hcd: release socket [ 211.005080][T13010] vhci_hcd: disconnect device [ 211.086431][T15683] FAULT_INJECTION: forcing a failure. [ 211.086431][T15683] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 211.099583][T15683] CPU: 0 UID: 0 PID: 15683 Comm: syz.4.4571 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 211.099637][T15683] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 211.099644][T15683] Call Trace: [ 211.099650][T15683] [ 211.099656][T15683] __dump_stack+0x1d/0x30 [ 211.099672][T15683] dump_stack_lvl+0xe8/0x140 [ 211.099685][T15683] dump_stack+0x15/0x1b [ 211.099702][T15683] should_fail_ex+0x265/0x280 [ 211.099725][T15683] should_fail+0xb/0x20 [ 211.099778][T15683] should_fail_usercopy+0x1a/0x20 [ 211.099792][T15683] _copy_from_user+0x1c/0xb0 [ 211.099837][T15683] __sys_bpf+0x178/0x7b0 [ 211.099866][T15683] __x64_sys_bpf+0x41/0x50 [ 211.099881][T15683] x64_sys_call+0x2aea/0x2ff0 [ 211.099928][T15683] do_syscall_64+0xd2/0x200 [ 211.099944][T15683] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 211.099961][T15683] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 211.100016][T15683] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 211.100030][T15683] RIP: 0033:0x7f62425debe9 [ 211.100041][T15683] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.100101][T15683] RSP: 002b:00007f6241047038 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 211.100116][T15683] RAX: ffffffffffffffda RBX: 00007f6242805fa0 RCX: 00007f62425debe9 [ 211.100124][T15683] RDX: 0000000000000010 RSI: 0000200000000340 RDI: 000000000000000f [ 211.100168][T15683] RBP: 00007f6241047090 R08: 0000000000000000 R09: 0000000000000000 [ 211.100176][T15683] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.100184][T15683] R13: 00007f6242806038 R14: 00007f6242805fa0 R15: 00007fff361e4058 [ 211.100197][T15683] [ 211.310075][T15691] macvtap0: refused to change device tx_queue_len [ 211.414724][T15710] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(3) [ 211.421347][T15710] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 211.428964][T15710] vhci_hcd vhci_hcd.0: Device attached [ 211.437921][T15710] netlink: 24 bytes leftover after parsing attributes in process `syz.5.4583'. [ 211.454113][T15711] vhci_hcd: connection closed [ 211.454235][T13010] vhci_hcd: stop threads [ 211.463337][T13010] vhci_hcd: release socket [ 211.467802][T13010] vhci_hcd: disconnect device [ 211.501749][T15714] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=15714 comm=syz.7.4584 [ 211.531940][T15718] FAULT_INJECTION: forcing a failure. [ 211.531940][T15718] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 211.545112][T15718] CPU: 0 UID: 0 PID: 15718 Comm: syz.7.4585 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 211.545259][T15718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 211.545293][T15718] Call Trace: [ 211.545298][T15718] [ 211.545304][T15718] __dump_stack+0x1d/0x30 [ 211.545320][T15718] dump_stack_lvl+0xe8/0x140 [ 211.545333][T15718] dump_stack+0x15/0x1b [ 211.545369][T15718] should_fail_ex+0x265/0x280 [ 211.545384][T15718] should_fail+0xb/0x20 [ 211.545395][T15718] should_fail_usercopy+0x1a/0x20 [ 211.545409][T15718] _copy_from_user+0x1c/0xb0 [ 211.545426][T15718] ___sys_sendmsg+0xc1/0x1d0 [ 211.545466][T15718] __x64_sys_sendmsg+0xd4/0x160 [ 211.545483][T15718] x64_sys_call+0x191e/0x2ff0 [ 211.545497][T15718] do_syscall_64+0xd2/0x200 [ 211.545610][T15718] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 211.545627][T15718] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 211.545643][T15718] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 211.545674][T15718] RIP: 0033:0x7f9582ffebe9 [ 211.545686][T15718] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 211.545698][T15718] RSP: 002b:00007f9581a67038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 211.545713][T15718] RAX: ffffffffffffffda RBX: 00007f9583225fa0 RCX: 00007f9582ffebe9 [ 211.545721][T15718] RDX: 0000000000040010 RSI: 0000200000006040 RDI: 0000000000000007 [ 211.545802][T15718] RBP: 00007f9581a67090 R08: 0000000000000000 R09: 0000000000000000 [ 211.545811][T15718] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 211.545819][T15718] R13: 00007f9583226038 R14: 00007f9583225fa0 R15: 00007ffda624ac18 [ 211.545834][T15718] [ 211.870416][T15743] macvtap0: refused to change device tx_queue_len [ 211.874192][T15741] netlink: 36 bytes leftover after parsing attributes in process `syz.7.4595'. [ 211.906524][T15747] netlink: 4 bytes leftover after parsing attributes in process `syz.7.4598'. [ 211.953869][T15753] macvtap0: refused to change device tx_queue_len [ 212.116958][T15774] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 212.171150][T15782] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4613'. [ 212.213821][T15784] rdma_rxe: rxe_newlink: failed to add syz_tun [ 212.391695][T15795] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4617'. [ 212.502001][T15805] vhci_hcd vhci_hcd.0: pdev(5) rhport(0) sockfd(3) [ 212.508574][T15805] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 212.516155][T15805] vhci_hcd vhci_hcd.0: Device attached [ 212.532690][T15811] netlink: 4 bytes leftover after parsing attributes in process `syz.4.4624'. [ 212.543849][T15813] netdevsim netdevsim7 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 212.560565][T15807] vhci_hcd: connection closed [ 212.562195][T13003] vhci_hcd: stop threads [ 212.571301][T13003] vhci_hcd: release socket [ 212.575754][T13003] vhci_hcd: disconnect device [ 212.625203][T15813] netdevsim netdevsim7 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 212.665904][T15813] netdevsim netdevsim7 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 212.744379][T15813] netdevsim netdevsim7 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 212.828930][T13010] netdevsim netdevsim7 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 212.847310][T13010] netdevsim netdevsim7 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 212.857769][T13010] netdevsim netdevsim7 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 212.868684][T13010] netdevsim netdevsim7 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 212.999444][T15846] syzkaller1: entered promiscuous mode [ 213.005078][T15846] syzkaller1: entered allmulticast mode [ 213.217156][T15866] FAULT_INJECTION: forcing a failure. [ 213.217156][T15866] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 213.230560][T15866] CPU: 0 UID: 0 PID: 15866 Comm: syz.5.4648 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 213.230611][T15866] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 213.230619][T15866] Call Trace: [ 213.230623][T15866] [ 213.230629][T15866] __dump_stack+0x1d/0x30 [ 213.230645][T15866] dump_stack_lvl+0xe8/0x140 [ 213.230658][T15866] dump_stack+0x15/0x1b [ 213.230688][T15866] should_fail_ex+0x265/0x280 [ 213.230703][T15866] should_fail_alloc_page+0xf2/0x100 [ 213.230720][T15866] __alloc_frozen_pages_noprof+0xff/0x360 [ 213.230832][T15866] alloc_pages_mpol+0xb3/0x250 [ 213.230852][T15866] vma_alloc_folio_noprof+0x1aa/0x300 [ 213.230872][T15866] handle_mm_fault+0xbfe/0x2c20 [ 213.230910][T15866] ? check_vma_flags+0x315/0x340 [ 213.230931][T15866] __get_user_pages+0x102e/0x1fa0 [ 213.230967][T15866] __mm_populate+0x243/0x3a0 [ 213.230987][T15866] vm_mmap_pgoff+0x232/0x2e0 [ 213.231112][T15866] ksys_mmap_pgoff+0x268/0x310 [ 213.231147][T15866] x64_sys_call+0x14a3/0x2ff0 [ 213.231171][T15866] do_syscall_64+0xd2/0x200 [ 213.231220][T15866] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 213.231246][T15866] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 213.231349][T15866] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 213.231369][T15866] RIP: 0033:0x7f2d90bbebe9 [ 213.231383][T15866] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 213.231400][T15866] RSP: 002b:00007f2d8f61f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000009 [ 213.231418][T15866] RAX: ffffffffffffffda RBX: 00007f2d90de5fa0 RCX: 00007f2d90bbebe9 [ 213.231429][T15866] RDX: 0000000000000002 RSI: 0000000000b36000 RDI: 0000200000000000 [ 213.231517][T15866] RBP: 00007f2d8f61f090 R08: 0000000000000003 R09: 0000000000000000 [ 213.231528][T15866] R10: 0000000000028012 R11: 0000000000000246 R12: 0000000000000001 [ 213.231603][T15866] R13: 00007f2d90de6038 R14: 00007f2d90de5fa0 R15: 00007ffe02e93b18 [ 213.231620][T15866] [ 213.466063][T15874] FAULT_INJECTION: forcing a failure. [ 213.466063][T15874] name failslab, interval 1, probability 0, space 0, times 0 [ 213.478934][T15874] CPU: 1 UID: 0 PID: 15874 Comm: syz.5.4652 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 213.478969][T15874] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 213.478981][T15874] Call Trace: [ 213.478990][T15874] [ 213.478999][T15874] __dump_stack+0x1d/0x30 [ 213.479023][T15874] dump_stack_lvl+0xe8/0x140 [ 213.479060][T15874] dump_stack+0x15/0x1b [ 213.479073][T15874] should_fail_ex+0x265/0x280 [ 213.479126][T15874] ? alloc_lookup_fw_priv+0x147/0x350 [ 213.479144][T15874] should_failslab+0x8c/0xb0 [ 213.479160][T15874] __kmalloc_cache_noprof+0x4c/0x320 [ 213.479192][T15874] alloc_lookup_fw_priv+0x147/0x350 [ 213.479211][T15874] _request_firmware+0x28b/0xbb0 [ 213.479299][T15874] ? avc_has_perm_noaudit+0x1b1/0x200 [ 213.479333][T15874] ? cred_has_capability+0x210/0x280 [ 213.479351][T15874] ? __rcu_read_unlock+0x4f/0x70 [ 213.479372][T15874] request_firmware+0x36/0x50 [ 213.479468][T15874] devlink_compat_flash_update+0xb2/0x1b0 [ 213.479633][T15874] dev_ethtool+0x14a1/0x1660 [ 213.479649][T15874] ? full_name_hash+0x92/0xe0 [ 213.479669][T15874] dev_ioctl+0x2e0/0x960 [ 213.479701][T15874] sock_do_ioctl+0x197/0x220 [ 213.479726][T15874] sock_ioctl+0x41b/0x610 [ 213.479756][T15874] ? __pfx_sock_ioctl+0x10/0x10 [ 213.479771][T15874] __se_sys_ioctl+0xcb/0x140 [ 213.479791][T15874] __x64_sys_ioctl+0x43/0x50 [ 213.479817][T15874] x64_sys_call+0x1816/0x2ff0 [ 213.479882][T15874] do_syscall_64+0xd2/0x200 [ 213.479956][T15874] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 213.480019][T15874] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 213.480036][T15874] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 213.480093][T15874] RIP: 0033:0x7f2d90bbebe9 [ 213.480109][T15874] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 213.480122][T15874] RSP: 002b:00007f2d8f61f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 213.480136][T15874] RAX: ffffffffffffffda RBX: 00007f2d90de5fa0 RCX: 00007f2d90bbebe9 [ 213.480145][T15874] RDX: 0000200000000340 RSI: 0000000000008946 RDI: 0000000000000003 [ 213.480153][T15874] RBP: 00007f2d8f61f090 R08: 0000000000000000 R09: 0000000000000000 [ 213.480161][T15874] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 213.480181][T15874] R13: 00007f2d90de6038 R14: 00007f2d90de5fa0 R15: 00007ffe02e93b18 [ 213.480194][T15874] [ 213.769158][T15881] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 213.775880][T15881] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 213.783619][T15881] vhci_hcd vhci_hcd.0: Device attached [ 213.806679][T15883] vhci_hcd: connection closed [ 213.807059][T13047] vhci_hcd: stop threads [ 213.816191][T13047] vhci_hcd: release socket [ 213.820614][T13047] vhci_hcd: disconnect device [ 213.944975][ T29] kauditd_printk_skb: 501 callbacks suppressed [ 213.944993][ T29] audit: type=1326 audit(1755489326.275:13116): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15904 comm="syz.1.4664" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 213.948345][T15902] rdma_rxe: rxe_newlink: failed to add syz_tun [ 213.975111][ T29] audit: type=1326 audit(1755489326.285:13117): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15904 comm="syz.1.4664" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 214.004994][ T29] audit: type=1326 audit(1755489326.295:13118): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15904 comm="syz.1.4664" exe="/root/syz-executor" sig=0 arch=c000003e syscall=321 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 214.028664][ T29] audit: type=1326 audit(1755489326.295:13119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15904 comm="syz.1.4664" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 214.052391][ T29] audit: type=1326 audit(1755489326.295:13120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15904 comm="syz.1.4664" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 214.076042][ T29] audit: type=1326 audit(1755489326.295:13121): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15904 comm="syz.1.4664" exe="/root/syz-executor" sig=0 arch=c000003e syscall=298 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 214.099878][ T29] audit: type=1326 audit(1755489326.295:13122): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15904 comm="syz.1.4664" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 214.123736][ T29] audit: type=1326 audit(1755489326.295:13123): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15904 comm="syz.1.4664" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 214.147441][ T29] audit: type=1326 audit(1755489326.295:13124): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15904 comm="syz.1.4664" exe="/root/syz-executor" sig=0 arch=c000003e syscall=238 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 214.171391][ T29] audit: type=1326 audit(1755489326.295:13125): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=15904 comm="syz.1.4664" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f876e64ebe9 code=0x7ffc0000 [ 214.267813][T15923] tmpfs: Bad value for 'mpol' [ 214.449253][T15937] rdma_rxe: rxe_newlink: failed to add syz_tun [ 214.567284][T15949] macvtap0: refused to change device tx_queue_len [ 214.580928][T15955] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(3) [ 214.587482][T15955] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 214.595059][T15955] vhci_hcd vhci_hcd.0: Device attached [ 214.619400][T15956] vhci_hcd: connection closed [ 214.619569][T13024] vhci_hcd: stop threads [ 214.628834][T13024] vhci_hcd: release socket [ 214.633409][T13024] vhci_hcd: disconnect device [ 214.946609][T15982] rdma_rxe: rxe_newlink: failed to add syz_tun [ 215.202872][T16001] vhci_hcd vhci_hcd.0: pdev(2) rhport(0) sockfd(5) [ 215.209451][T16001] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 215.217034][T16001] vhci_hcd vhci_hcd.0: Device attached [ 215.260354][T16002] vhci_hcd: connection closed [ 215.260550][T12960] vhci_hcd: stop threads [ 215.269578][T12960] vhci_hcd: release socket [ 215.274099][T12960] vhci_hcd: disconnect device [ 215.570144][T16023] __nla_validate_parse: 13 callbacks suppressed [ 215.570162][T16023] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 215.591958][ C1] vcan0: j1939_session_tx_dat: 0xffff88811b1a4400: queue data error: -100 [ 215.610105][T16025] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 215.616659][T16025] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 215.624242][T16025] vhci_hcd vhci_hcd.0: Device attached [ 215.631975][T16025] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4710'. [ 215.646885][T16026] vhci_hcd: connection closed [ 215.646952][T13024] vhci_hcd: stop threads [ 215.656174][T13024] vhci_hcd: release socket [ 215.660650][T13024] vhci_hcd: disconnect device [ 215.709262][T16031] netlink: 8 bytes leftover after parsing attributes in process `syz.1.4712'. [ 215.738096][T16031] vhci_hcd vhci_hcd.0: pdev(1) rhport(0) sockfd(12) [ 215.744720][T16031] vhci_hcd vhci_hcd.0: devid(0) speed(2) speed_str(full-speed) [ 215.752574][T16031] vhci_hcd vhci_hcd.0: Device attached [ 215.760219][T16034] vhci_hcd: connection closed [ 215.760389][T12960] vhci_hcd: stop threads [ 215.769548][T12960] vhci_hcd: release socket [ 215.774139][T12960] vhci_hcd: disconnect device [ 216.187439][T16053] 9pnet_fd: Insufficient options for proto=fd [ 216.284080][T16069] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(3) [ 216.290674][T16069] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 216.298337][T16069] vhci_hcd vhci_hcd.0: Device attached [ 216.306345][T16069] netlink: 24 bytes leftover after parsing attributes in process `syz.4.4728'. [ 216.321423][T16070] vhci_hcd: connection closed [ 216.321565][T12960] vhci_hcd: stop threads [ 216.330581][T12960] vhci_hcd: release socket [ 216.335173][T12960] vhci_hcd: disconnect device [ 216.391239][T16075] syz_tun: entered promiscuous mode [ 216.396594][T16075] syz_tun: entered allmulticast mode [ 216.433757][T16079] 9pnet_fd: Insufficient options for proto=fd [ 216.499564][T16089] netlink: 4 bytes leftover after parsing attributes in process `syz.1.4737'. [ 216.528143][T16093] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4739'. [ 216.576155][T16101] netlink: 4 bytes leftover after parsing attributes in process `syz.5.4743'. [ 216.600596][T16103] 9pnet_fd: Insufficient options for proto=fd [ 216.674218][T16113] netlink: 4 bytes leftover after parsing attributes in process `+}[@'. [ 216.690705][T16107] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16107 comm=syz.2.4746 [ 216.712382][T16118] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=48 sclass=netlink_audit_socket pid=16118 comm=syz.1.4750 [ 216.782202][T16122] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=48 sclass=netlink_audit_socket pid=16122 comm=syz.5.4752 [ 216.819653][T16129] netlink: 4 bytes leftover after parsing attributes in process `syz.2.4755'. [ 216.900872][T16133] 9pnet_fd: Insufficient options for proto=fd [ 217.195219][T16157] netlink: 260 bytes leftover after parsing attributes in process `syz.4.4767'. [ 217.262433][T16167] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=48 sclass=netlink_audit_socket pid=16167 comm=syz.2.4772 [ 217.323511][T16174] FAULT_INJECTION: forcing a failure. [ 217.323511][T16174] name failslab, interval 1, probability 0, space 0, times 0 [ 217.336212][T16174] CPU: 0 UID: 0 PID: 16174 Comm: syz.4.4775 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 217.336300][T16174] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 217.336315][T16174] Call Trace: [ 217.336323][T16174] [ 217.336331][T16174] __dump_stack+0x1d/0x30 [ 217.336357][T16174] dump_stack_lvl+0xe8/0x140 [ 217.336438][T16174] dump_stack+0x15/0x1b [ 217.336458][T16174] should_fail_ex+0x265/0x280 [ 217.336482][T16174] should_failslab+0x8c/0xb0 [ 217.336510][T16174] kmem_cache_alloc_node_noprof+0x57/0x320 [ 217.336557][T16174] ? __alloc_skb+0x101/0x320 [ 217.336642][T16174] __alloc_skb+0x101/0x320 [ 217.336674][T16174] netlink_alloc_large_skb+0xba/0xf0 [ 217.336710][T16174] netlink_sendmsg+0x3cf/0x6b0 [ 217.336782][T16174] ? __pfx_netlink_sendmsg+0x10/0x10 [ 217.336803][T16174] __sock_sendmsg+0x142/0x180 [ 217.336841][T16174] ____sys_sendmsg+0x31e/0x4e0 [ 217.336870][T16174] ___sys_sendmsg+0x17b/0x1d0 [ 217.336951][T16174] __x64_sys_sendmsg+0xd4/0x160 [ 217.336975][T16174] x64_sys_call+0x191e/0x2ff0 [ 217.336994][T16174] do_syscall_64+0xd2/0x200 [ 217.337016][T16174] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 217.337072][T16174] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 217.337095][T16174] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 217.337117][T16174] RIP: 0033:0x7f62425debe9 [ 217.337232][T16174] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.337248][T16174] RSP: 002b:00007f6241047038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 217.337268][T16174] RAX: ffffffffffffffda RBX: 00007f6242805fa0 RCX: 00007f62425debe9 [ 217.337280][T16174] RDX: 0000000020004440 RSI: 0000200000000400 RDI: 0000000000000003 [ 217.337295][T16174] RBP: 00007f6241047090 R08: 0000000000000000 R09: 0000000000000000 [ 217.337310][T16174] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 217.337324][T16174] R13: 00007f6242806038 R14: 00007f6242805fa0 R15: 00007fff361e4058 [ 217.337348][T16174] [ 217.795899][T16192] macvtap0: refused to change device tx_queue_len [ 217.805662][T16194] FAULT_INJECTION: forcing a failure. [ 217.805662][T16194] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 217.818975][T16194] CPU: 0 UID: 0 PID: 16194 Comm: syz.5.4785 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 217.819025][T16194] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 217.819041][T16194] Call Trace: [ 217.819048][T16194] [ 217.819068][T16194] __dump_stack+0x1d/0x30 [ 217.819097][T16194] dump_stack_lvl+0xe8/0x140 [ 217.819184][T16194] dump_stack+0x15/0x1b [ 217.819199][T16194] should_fail_ex+0x265/0x280 [ 217.819220][T16194] should_fail_alloc_page+0xf2/0x100 [ 217.819251][T16194] alloc_pages_bulk_noprof+0xef/0x540 [ 217.819370][T16194] copy_splice_read+0xf3/0x660 [ 217.819453][T16194] ? __pfx_v9fs_file_splice_read+0x10/0x10 [ 217.819474][T16194] splice_direct_to_actor+0x290/0x680 [ 217.819493][T16194] ? __pfx_direct_splice_actor+0x10/0x10 [ 217.819518][T16194] do_splice_direct+0xda/0x150 [ 217.819582][T16194] ? __pfx_direct_file_splice_eof+0x10/0x10 [ 217.819611][T16194] do_sendfile+0x380/0x650 [ 217.819643][T16194] __x64_sys_sendfile64+0x105/0x150 [ 217.819668][T16194] x64_sys_call+0x2bb0/0x2ff0 [ 217.819762][T16194] do_syscall_64+0xd2/0x200 [ 217.819791][T16194] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 217.819827][T16194] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 217.819851][T16194] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 217.819876][T16194] RIP: 0033:0x7f2d90bbebe9 [ 217.819894][T16194] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 217.819922][T16194] RSP: 002b:00007f2d8f61f038 EFLAGS: 00000246 ORIG_RAX: 0000000000000028 [ 217.819943][T16194] RAX: ffffffffffffffda RBX: 00007f2d90de5fa0 RCX: 00007f2d90bbebe9 [ 217.819955][T16194] RDX: 0000000000000000 RSI: 0000000000000007 RDI: 0000000000000007 [ 217.819967][T16194] RBP: 00007f2d8f61f090 R08: 0000000000000000 R09: 0000000000000000 [ 217.819979][T16194] R10: 0000000800000009 R11: 0000000000000246 R12: 0000000000000001 [ 217.819994][T16194] R13: 00007f2d90de6038 R14: 00007f2d90de5fa0 R15: 00007ffe02e93b18 [ 217.820051][T16194] [ 218.099769][T16210] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=48 sclass=netlink_audit_socket pid=16210 comm=syz.2.4792 [ 218.120177][T16204] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=16204 comm=syz.1.4787 [ 218.739031][T16260] vhci_hcd vhci_hcd.0: pdev(4) rhport(0) sockfd(5) [ 218.745619][T16260] vhci_hcd vhci_hcd.0: devid(0) speed(1) speed_str(low-speed) [ 218.753281][T16260] vhci_hcd vhci_hcd.0: Device attached [ 218.774502][T16261] vhci_hcd: connection closed [ 218.774683][T13024] vhci_hcd: stop threads [ 218.783912][T13024] vhci_hcd: release socket [ 218.788442][T13024] vhci_hcd: disconnect device [ 218.955125][T16274] 9pnet: Could not find request transport: fd0x0000000000000004 [ 218.964412][T16274] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=48 sclass=netlink_audit_socket pid=16274 comm=syz.2.4813 [ 219.105198][ T29] kauditd_printk_skb: 348 callbacks suppressed [ 219.105216][ T29] audit: type=1326 audit(1755489331.435:13474): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16283 comm="syz.7.4817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9582ffebe9 code=0x7ffc0000 [ 219.141337][T16284] audit: audit_lost=14 audit_rate_limit=0 audit_backlog_limit=64 [ 219.149222][T16284] audit: out of memory in audit_log_start [ 219.155805][ T29] audit: type=1326 audit(1755489331.475:13475): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16283 comm="syz.7.4817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f9582ffd550 code=0x7ffc0000 [ 219.179611][ T29] audit: type=1326 audit(1755489331.475:13476): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16283 comm="syz.7.4817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f9582ffd69f code=0x7ffc0000 [ 219.203149][ T29] audit: type=1326 audit(1755489331.485:13477): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16283 comm="syz.7.4817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=0 compat=0 ip=0x7f9582ffd5fc code=0x7ffc0000 [ 219.226646][ T29] audit: type=1326 audit(1755489331.485:13478): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16283 comm="syz.7.4817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f9582ffd69f code=0x7ffc0000 [ 219.250159][ T29] audit: type=1326 audit(1755489331.485:13479): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16283 comm="syz.7.4817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f9582ffd84a code=0x7ffc0000 [ 219.273836][ T29] audit: type=1326 audit(1755489331.485:13480): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16283 comm="syz.7.4817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9582ffebe9 code=0x7ffc0000 [ 219.297491][ T29] audit: type=1326 audit(1755489331.485:13481): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=16283 comm="syz.7.4817" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f9582ffebe9 code=0x7ffc0000 [ 219.593791][T16312] FAULT_INJECTION: forcing a failure. [ 219.593791][T16312] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 219.606985][T16312] CPU: 1 UID: 0 PID: 16312 Comm: syz.7.4827 Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 219.607128][T16312] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 219.607142][T16312] Call Trace: [ 219.607150][T16312] [ 219.607159][T16312] __dump_stack+0x1d/0x30 [ 219.607181][T16312] dump_stack_lvl+0xe8/0x140 [ 219.607203][T16312] dump_stack+0x15/0x1b [ 219.607260][T16312] should_fail_ex+0x265/0x280 [ 219.607279][T16312] should_fail+0xb/0x20 [ 219.607300][T16312] should_fail_usercopy+0x1a/0x20 [ 219.607324][T16312] _copy_from_iter+0xcf/0xe40 [ 219.607397][T16312] ? __build_skb_around+0x1a0/0x200 [ 219.607449][T16312] ? __alloc_skb+0x223/0x320 [ 219.607526][T16312] netlink_sendmsg+0x471/0x6b0 [ 219.607600][T16312] ? __pfx_netlink_sendmsg+0x10/0x10 [ 219.607625][T16312] __sock_sendmsg+0x142/0x180 [ 219.607651][T16312] ____sys_sendmsg+0x31e/0x4e0 [ 219.607742][T16312] ___sys_sendmsg+0x17b/0x1d0 [ 219.607806][T16312] __x64_sys_sendmsg+0xd4/0x160 [ 219.607834][T16312] x64_sys_call+0x191e/0x2ff0 [ 219.607858][T16312] do_syscall_64+0xd2/0x200 [ 219.607886][T16312] ? arch_exit_to_user_mode_prepare+0x27/0x60 [ 219.607976][T16312] ? irqentry_exit_to_user_mode+0x7e/0xa0 [ 219.607999][T16312] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 219.608078][T16312] RIP: 0033:0x7f9582ffebe9 [ 219.608096][T16312] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 a8 ff ff ff f7 d8 64 89 01 48 [ 219.608116][T16312] RSP: 002b:00007f9581a67038 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 219.608135][T16312] RAX: ffffffffffffffda RBX: 00007f9583225fa0 RCX: 00007f9582ffebe9 [ 219.608258][T16312] RDX: 0000000020040810 RSI: 0000200000000080 RDI: 0000000000000005 [ 219.608271][T16312] RBP: 00007f9581a67090 R08: 0000000000000000 R09: 0000000000000000 [ 219.608282][T16312] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 219.608294][T16312] R13: 00007f9583226038 R14: 00007f9583225fa0 R15: 00007ffda624ac18 [ 219.608316][T16312] [ 219.916309][T16331] rdma_rxe: rxe_newlink: failed to add syz_tun [ 220.307945][T16369] rdma_rxe: rxe_newlink: failed to add syz_tun [ 220.375796][T10934] ================================================================== [ 220.383950][T10934] BUG: KCSAN: data-race in shmem_add_to_page_cache / shmem_getattr [ 220.391965][T10934] [ 220.394305][T10934] read-write to 0xffff888105735c70 of 8 bytes by task 16367 on cpu 0: [ 220.402477][T10934] shmem_add_to_page_cache+0x414/0x530 [ 220.407979][T10934] shmem_get_folio_gfp+0x4e8/0xd60 [ 220.413126][T10934] shmem_write_begin+0xa8/0x190 [ 220.418085][T10934] generic_perform_write+0x184/0x490 [ 220.423400][T10934] shmem_file_write_iter+0xc5/0xf0 [ 220.428553][T10934] __kernel_write_iter+0x2d6/0x540 [ 220.433793][T10934] dump_user_range+0x61e/0x8f0 [ 220.438585][T10934] elf_core_dump+0x1e00/0x1f90 [ 220.443468][T10934] coredump_write+0xb0d/0xe30 [ 220.448260][T10934] vfs_coredump+0x142f/0x20c0 [ 220.452954][T10934] get_signal+0xd85/0xf70 [ 220.457485][T10934] arch_do_signal_or_restart+0x96/0x480 [ 220.463080][T10934] irqentry_exit_to_user_mode+0x5e/0xa0 [ 220.468902][T10934] irqentry_exit+0x12/0x50 [ 220.473443][T10934] asm_exc_page_fault+0x26/0x30 [ 220.478930][T10934] [ 220.481277][T10934] read to 0xffff888105735c70 of 8 bytes by task 10934 on cpu 1: [ 220.489270][T10934] shmem_getattr+0x68/0x200 [ 220.493839][T10934] vfs_getattr_nosec+0x143/0x1e0 [ 220.498803][T10934] vfs_statx+0x113/0x390 [ 220.503088][T10934] vfs_fstatat+0x115/0x170 [ 220.507628][T10934] __se_sys_newfstatat+0x55/0x260 [ 220.512679][T10934] __x64_sys_newfstatat+0x55/0x70 [ 220.517732][T10934] x64_sys_call+0x135a/0x2ff0 [ 220.522512][T10934] do_syscall_64+0xd2/0x200 [ 220.527042][T10934] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 220.532964][T10934] [ 220.535374][T10934] value changed: 0x000000000000051f -> 0x0000000000000521 [ 220.542656][T10934] [ 220.544985][T10934] Reported by Kernel Concurrency Sanitizer on: [ 220.551138][T10934] CPU: 1 UID: 0 PID: 10934 Comm: syz-executor Not tainted 6.17.0-rc1-syzkaller-00224-g8d561baae505 #0 PREEMPT(voluntary) [ 220.563815][T10934] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 07/12/2025 [ 220.573960][T10934] ==================================================================