last executing test programs: 1m40.569178778s ago: executing program 3 (id=5045): perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5d31, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7, 0xa}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='devices.list\x00', 0x26e1, 0x0) close(r0) socketpair$unix(0x1, 0x1, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, 0x0, 0x1100) socketpair$unix(0x1, 0x5, 0x0, 0x0) close(0xffffffffffffffff) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, 0x0) write$cgroup_devices(r0, &(0x7f0000000000)=ANY=[], 0xfffffeff) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xd, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x61, 0x14, 0x74}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x5, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, @sock_ops}, 0x48) 1m40.496328883s ago: executing program 3 (id=5047): perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0x96, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x7}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000000c0)={0x5, 0x80, 0xec, 0x7, 0x40, 0x7, 0x0, 0x0, 0xd299, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, @perf_bp={0x0, 0x4}, 0x100882, 0x7ff, 0x6, 0x0, 0xb, 0x2, 0x3ff, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$MAP_CREATE(0x0, &(0x7f0000000000)=@base={0x10, 0x4, 0x4, 0x2, 0x0, 0x1}, 0x48) bpf$MAP_GET_NEXT_KEY(0x2, &(0x7f0000000180)={r0, &(0x7f00000006c0), &(0x7f0000000000), 0x2}, 0x20) 1m40.408606757s ago: executing program 3 (id=5050): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r1 = socket(0x400000000010, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r1, 0x0, 0x0) r3 = socket(0x400000000010, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000140)=@newtfilter={0x48, 0x2c, 0xd27, 0x30bd29, 0x25dfdc00, {0x0, 0x0, 0x0, r5, {0x0, 0x4}, {}, {0xf}}, [@filter_kind_options=@f_matchall={{0xd}, {0x14, 0x2, [@TCA_MATCHALL_CLASSID={0x8, 0x1, {0x5, 0xfff6}}, @TCA_MATCHALL_FLAGS={0x8, 0x3, 0x2}]}}]}, 0x48}, 0x1, 0x0, 0x0, 0x10}, 0x0) 1m40.37663888s ago: executing program 3 (id=5054): socket$nl_route(0x10, 0x3, 0x0) r0 = openat$sysfs(0xffffff9c, &(0x7f00000037c0)='/sys/kernel/notes', 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd=r0, 0x0, 0x0, 0x0, 0x0, 0x1}) prctl$PR_SCHED_CORE(0x3e, 0x1, 0x0, 0x2, 0x0) r1 = syz_io_uring_setup(0xb77, &(0x7f0000000340)={0x0, 0xe824, 0x800, 0x0, 0x3d2}, &(0x7f0000000dc0)=0x0, &(0x7f0000000000)=0x0) syz_memcpy_off$IO_URING_METADATA_GENERIC(r2, 0x4, &(0x7f0000000180)=0xfffffffc, 0x0, 0x4) syz_io_uring_submit(r2, r3, &(0x7f0000000200)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x4, 0x0, &(0x7f0000000600)=[{0x0}], 0x1}) io_uring_enter(r1, 0x847ba, 0x0, 0xe, 0x0, 0x0) add_key$user(&(0x7f0000000100), 0x0, 0x0, 0x0, 0xfffffffffffffff9) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000640)={'erspan0\x00', &(0x7f0000000580)={'syztnl1\x00', 0x0, 0x700, 0x7, 0x6, 0xcce, {{0x19, 0x4, 0x0, 0x2d, 0x64, 0x67, 0x0, 0xff, 0x2b, 0x0, @multicast1, @dev={0xac, 0x14, 0x14, 0x12}, {[@rr={0x7, 0x17, 0xd3, [@local, @multicast2, @rand_addr=0x64010101, @private=0xa010102, @multicast2]}, @ssrr={0x89, 0x17, 0xf7, [@private=0xa010100, @dev={0xac, 0x14, 0x14, 0x26}, @remote, @multicast2, @loopback]}, @lsrr={0x83, 0xb, 0x17, [@multicast1, @empty]}, @ra={0x94, 0x4}, @ssrr={0x89, 0x13, 0x6d, [@private=0xa010100, @multicast2, @loopback, @multicast2]}]}}}}}) 1m40.328752332s ago: executing program 3 (id=5056): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x40241, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000200)={'syzkaller1\x00', 0xc201}) r1 = socket$kcm(0x2, 0xa, 0x2) r2 = bpf$PROG_LOAD(0x5, &(0x7f0000000080)={0x1, 0x5, &(0x7f0000001100)=ANY=[@ANYBLOB="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"], &(0x7f0000000140)='GPL\x00'}, 0x94) r3 = socket$kcm(0x11, 0x200000000000002, 0x300) setsockopt$sock_attach_bpf(r3, 0x1, 0x32, &(0x7f0000001f80)=r2, 0x4) ioctl$SIOCSIFHWADDR(r1, 0x8914, &(0x7f0000000180)={'syzkaller1\x00', @link_local}) write$tun(r0, &(0x7f0000000040)={@val={0x6f01, 0x800}, @val={0x1, 0x0, 0x27, 0x0, 0x27}, @mpls={[], @llc={@snap={0x1, 0xab, "a7", "7e8bc7", 0x952, "faa1542b18efd6dbeafc4c107346f45b2403e91ed538cafc10f4b6875727ede0f5c5bd0b"}}}}, 0x3a) 1m40.219342939s ago: executing program 3 (id=5058): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x8) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffe}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) bind$unix(r2, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e24}, 0x6e) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000001000/0x4000)=nil) ptrace(0x10, 0x1) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x4011, &(0x7f0000000180), 0x0, 0x65b, &(0x7f0000000880)="$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") 1m25.094413176s ago: executing program 32 (id=5058): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000001840), 0x2982, 0x0) ioctl$TCXONC(r1, 0x540a, 0x0) ioctl$TIOCSTI(r1, 0x5412, &(0x7f0000000000)=0x8) sched_setscheduler(r0, 0x2, &(0x7f0000000200)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs={0x0, 0x0, 0xfffffffe}, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) bind$unix(r2, &(0x7f0000000040)=@abs={0x1, 0x0, 0x4e24}, 0x6e) prctl$PR_SET_MM(0x23, 0x8, &(0x7f0000001000/0x4000)=nil) ptrace(0x10, 0x1) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000140)='./file0\x00', 0x4011, &(0x7f0000000180), 0x0, 0x65b, &(0x7f0000000880)="$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") 1m18.343999313s ago: executing program 0 (id=5408): bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0x10, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b4000000000000007910480000000000610400000000000095"], 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_msg}, 0x94) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000440), 0x42002) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000140)={0xffffffff, 0x0, 0x1, 'queue1\x00'}) write$sndseq(r0, &(0x7f0000000000)=[{0x84, 0x77, 0x0, 0x0, @tick, {}, {}, @raw32}], 0xffc8) poll(&(0x7f0000000080)=[{r0, 0x20}], 0x1, 0xfbe) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r0, 0x4040534e, &(0x7f00000000c0)={0x2, @tick=0x7ffe, 0x7, {0x3, 0xbb}, 0x3d, 0x2, 0x9}) 1m17.485922853s ago: executing program 0 (id=5421): mkdirat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000380)='./file1\x00', &(0x7f0000006c00)='rpc_pipefs\x00', 0x0, 0x0) fspick(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0) 1m17.401559578s ago: executing program 0 (id=5425): r0 = socket$inet_udp(0x2, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) r1 = getpid() sched_setscheduler(r1, 0x1, &(0x7f0000000180)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r2, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r3, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[@ANYBLOB="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"], &(0x7f0000000100)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_EXP_NEW(r4, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000200)={0x8c, 0x0, 0x2, 0x401, 0x0, 0x0, {0xa}, [@CTA_EXPECT_MASTER={0x3c, 0x1, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @local}, {0x14, 0x4, @local}}}]}, @CTA_EXPECT_MASK={0x3c, 0x3, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x89}}, @CTA_TUPLE_IP={0x2c, 0x1, 0x0, 0x1, @ipv6={{0x14, 0x3, @mcast2}, {0x14, 0x4, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}}}]}]}, 0x8c}, 0x1, 0x0, 0x0, 0x24004890}, 0x4) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x507, 0x4) sendmmsg$inet(r0, &(0x7f0000000600)=[{{&(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10, 0x0}}], 0x1, 0x2000c844) r5 = socket$netlink(0x10, 0x3, 0x0) writev(r5, &(0x7f00000003c0)=[{&(0x7f0000000280)="390000001300034700bb65e1c3e4ffff01000000010000005600000025000000190004000400000007fd17e5ffff0800040000000000000000", 0x39}], 0x1) sendmsg$IPCTNL_MSG_TIMEOUT_NEW(r4, 0x0, 0x2000c001) sendto$inet(r0, &(0x7f00000000c0)="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", 0xffe3, 0x6000000000000000, 0x0, 0x0) 1m16.403049517s ago: executing program 0 (id=5429): mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1c0) mount$bind(&(0x7f0000000000)='.\x00', &(0x7f0000000200)='./file0/../file0\x00', 0x0, 0x101091, 0x0) mount$bind(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x100000, 0x0) mount$bind(&(0x7f0000000cc0)='./file0\x00', &(0x7f00000000c0)='./file0/file0\x00', 0x0, 0x8b101a, 0x0) mount$bind(0x0, &(0x7f0000000240)='./file0/file0\x00', 0x0, 0x80000, 0x0) syz_clone(0x1228000, 0x0, 0xfffffffffffffdad, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000400)='./file0\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x18d883, 0x0) mount$bind(&(0x7f0000000140)='./file0/file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x10a78c0, 0x0) 1m15.823479281s ago: executing program 0 (id=5435): r0 = socket(0x2a, 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000001480)=0x14) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000400)=@newqdisc={0x24, 0x24, 0xf0b, 0x0, 0x0, {0x0, 0x0, 0x0, r1, {}, {0xffff, 0xffff}, {0x0, 0xfff1}}}, 0x24}}, 0x44884) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000003fc0)=@newtfilter={0x127c, 0x2c, 0xd27, 0x70bd2d, 0x25dfdffd, {0x0, 0x0, 0x0, r1, {0x6}, {}, {0x8, 0xffe0}}, [@filter_kind_options=@f_cgroup={{0xb}, {0x124c, 0x2, [@TCA_CGROUP_EMATCHES={0x4}, @TCA_CGROUP_POLICE={0xc, 0x2, [@TCA_POLICE_AVRATE={0x8, 0x4, 0x6a}]}, @TCA_CGROUP_EMATCHES={0xb8, 0x3, 0x0, 0x1, [@TCA_EMATCH_TREE_HDR={0x8, 0x1, {0x40}}, @TCA_EMATCH_TREE_LIST={0xac, 0x2, 0x0, 0x1, [@TCF_EM_META={0x2c, 0x1, 0x0, 0x0, {{0x5a, 0x4, 0x7}, [@TCA_EM_META_HDR={0xc, 0x1, {{0x4, 0xc5, 0x1}, {0x2, 0x6}}}, @TCA_EM_META_RVALUE={0x4}, @TCA_EM_META_LVALUE={0x8, 0x2, [@TCF_META_TYPE_INT=0x5]}, @TCA_EM_META_RVALUE={0x8, 0x3, [@TCF_META_TYPE_INT=0x7]}]}}, @TCF_EM_U32={0x1c, 0x2, 0x0, 0x0, {{0x200, 0x3, 0xb6}, {0x4, 0x8, 0x6, 0x9}}}, @TCF_EM_IPSET={0x10, 0x2, 0x0, 0x0, {{0x800, 0x8, 0x1}, {0xffffffffffffffff, 0x4}}}, @TCF_EM_CMP={0x18, 0x3, 0x0, 0x0, {{0xfffa, 0x1, 0x8}, {0x4, 0x0, 0xf800, 0x3, 0x4, 0x2, 0x2}}}, @TCF_EM_IPT={0x38, 0x2, 0x0, 0x0, {{0x8, 0x9, 0x2}, [@TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}, @TCA_EM_IPT_MATCH_NAME={0xb}, @TCA_EM_IPT_NFPROTO={0x5, 0x4, 0x7}, @TCA_EM_IPT_HOOK={0x8, 0x1, 0x4}, @TCA_EM_IPT_MATCH_REVISION={0x5, 0x3, 0x8}]}}]}]}, @TCA_CGROUP_POLICE={0x920, 0x2, [@TCA_POLICE_TBF={0x3c, 0x1, {0x2, 0x3, 0xa25f, 0x8, 0x0, {0x4, 0x1, 0x4, 0x5, 0x3, 0x8}, {0x1, 0x2, 0xfff, 0x401, 0x5, 0x40000}, 0x7, 0x5, 0x7fff}}, @TCA_POLICE_TBF={0x3c, 0x1, {0x1, 0xffffffffffffffff, 0x1, 0x4, 0x4, {0x1, 0x2, 0x6, 0x4, 0xfb, 0xbf8}, {0x9, 0x2, 0x7, 0x1, 0x101, 0x800}, 0x8f, 0xfffff800, 0x8}}, @TCA_POLICE_RATE64={0xc, 0x8, 0x8079}, @TCA_POLICE_RATE64={0xc, 0x8, 0x78d}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x4}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x2, 0x4a2a, 0xfff, 0x1, 0x55ed, 0x700, 0xd, 0x98, 0x6, 0x9, 0x400, 0x3, 0x3c1, 0x1, 0x4, 0x7, 0x5, 0x13b231df, 0x3, 0x5, 0x2, 0x3, 0x1, 0x8, 0x4, 0x8, 0x400, 0x3, 0x1000, 0x3, 0xa, 0xfffffff7, 0x6, 0xf41, 0xeea4, 0x7, 0x5, 0x2, 0x10, 0x8, 0xfffffff7, 0x42e7, 0x4, 0x1f, 0xfff, 0xb, 0xb1, 0x7, 0x401, 0x2, 0x0, 0x3, 0xacb, 0x4, 0x81, 0xd, 0x80000000, 0x9, 0xe, 0x4, 0x24, 0x9, 0x80000001, 0x9, 0x4, 0x2, 0x3, 0xba, 0xfffffff9, 0x6, 0x7, 0x5104, 0x5, 0xb, 0x2, 0xf, 0x0, 0x0, 0x7, 0x46, 0x40, 0xc, 0x2, 0x7, 0x4, 0x3, 0x7, 0x2add, 0x9, 0xbf7, 0xfffffffd, 0x2, 0x550a, 0x44265c61, 0x9, 0xc9, 0x200, 0x80000000, 0x5, 0x4, 0x5, 0x4, 0x3, 0x80000000, 0x3, 0x401, 0x8000, 0x1, 0x1, 0xbc, 0x5, 0x2, 0x800, 0x281e, 0x0, 0xa, 0xf1, 0x7, 0x2, 0x400, 0x6, 0x2, 0x2, 0x98, 0x6, 0xae1, 0x80000000, 0x7, 0x8, 0x1ff, 0x11df, 0x5, 0x1000, 0x116, 0x8, 0x3eae, 0x3, 0x2, 0x7, 0x3e601135, 0xd5, 0xab8, 0x5, 0x8080000, 0x4, 0x36, 0xe5a2, 0x437, 0x5, 0x7, 0x2, 0x3cf, 0x9, 0x7fffffff, 0x1, 0x5, 0x8, 0x4, 0x48ab, 0x55e1, 0x7, 0xa, 0x3, 0x7, 0x8, 0xb, 0x0, 0xffff460b, 0x6, 0x9, 0x1, 0xfffffff7, 0x7f, 0x0, 0x42b, 0x6, 0x7, 0xd, 0x1, 0x1, 0x0, 0x7ff, 0x306, 0x0, 0xffff, 0x4, 0x31f, 0x8, 0x6, 0x2, 0x5, 0x7a7f, 0x9c, 0x401, 0x2068, 0x1, 0x5, 0x9, 0x7, 0x2d7, 0x8, 0x8, 0x7, 0x3, 0x5, 0x2, 0x7, 0x108e, 0x47, 0x0, 0x2a, 0x0, 0xa60, 0xb8, 0x2a, 0x2, 0x4, 0x6, 0x9, 0x897, 0x9, 0x95, 0xcf5, 0x7, 0x4, 0x2, 0xac34, 0x0, 0x3, 0xfffffffd, 0x0, 0x6, 0xa7bf, 0xffff, 0xfffffff7, 0x8e06, 0x6, 0xa, 0xec52, 0x1, 0x7ff, 0x0, 0x7, 0x7, 0x73c, 0x1, 0x0, 0x4a, 0x3, 0xb, 0xf, 0x1, 0x2, 0xf5, 0x100, 0xffffffff]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x5, 0x20000000, 0x0, 0x1200, 0x6, {0x3, 0x2, 0x0, 0x7, 0x7, 0x8}, {0x80, 0x0, 0x6, 0xa9e, 0x6, 0xffffffa8}, 0xb, 0x1ff}}, @TCA_POLICE_RATE={0x404, 0x2, [0x7, 0x1, 0x7fff, 0x3, 0x10, 0x2b0, 0x80000000, 0x80000000, 0x1, 0x0, 0xa00000, 0x9, 0x2, 0x0, 0x8, 0x8, 0x8001, 0xfffffffb, 0x5, 0xa, 0x401, 0x81, 0x1, 0x1, 0x6, 0xfffffff9, 0x40, 0x5, 0x77d1, 0x200, 0x7f, 0x401, 0x1, 0x800, 0x1ff, 0x31b, 0x8, 0xb, 0x4, 0x6, 0x5, 0x3, 0x1, 0xfffffffa, 0x86e, 0x1, 0xa36c, 0x2, 0x1, 0x8, 0x9, 0x1, 0x5, 0x3, 0x1, 0x9, 0x4, 0x5, 0x3, 0x8, 0x8, 0x0, 0x98, 0x4, 0x9, 0x3, 0x2, 0x5, 0x80, 0xd, 0x1, 0x4, 0x6, 0xc465, 0x7fffffff, 0x0, 0xfffffff5, 0xee1d, 0x88, 0x3, 0x4, 0x0, 0x62, 0x6, 0x8000, 0x9, 0x3, 0x0, 0xf, 0x2, 0xf, 0x0, 0x1, 0x9, 0x2e0, 0xd72, 0x4, 0x200, 0xf, 0x0, 0x10000, 0x8, 0x40, 0x3, 0x3, 0x1, 0x1, 0x9, 0x9f, 0x80, 0xfffffffc, 0x7fffffff, 0x3, 0x7, 0x0, 0xd3b, 0x42cb, 0x3a34, 0x0, 0x8000, 0x2, 0x5, 0x0, 0x7, 0x8, 0x8000, 0x8, 0x5, 0x7, 0x7fffffff, 0x72e4, 0x4, 0xb1, 0x1, 0xd, 0xf, 0xf, 0x7f, 0x885e, 0x3ff, 0x1ff, 0x7, 0x3, 0x9, 0x800000, 0x7, 0x2a2, 0x9, 0x2, 0x8, 0x2, 0x1, 0x6, 0x2, 0x8, 0x9, 0x0, 0x0, 0x4, 0xfffffff8, 0x800, 0x8, 0x3, 0x8, 0x2, 0xa, 0x40, 0x0, 0x3, 0x4, 0xfffffbff, 0x7, 0x3, 0x7, 0x8001, 0x1, 0x1, 0x8001, 0x5, 0x1, 0x7, 0x4000000, 0xe, 0x45be835a, 0x0, 0x4, 0x4, 0x3ff, 0x6, 0x4, 0x7ff, 0xfffffc00, 0x0, 0x72b, 0x3ff, 0x8, 0x9, 0xfff, 0x209f, 0x6, 0x40, 0x37a, 0x4, 0xffffffcd, 0x10001, 0x800000, 0xd4, 0xfff, 0x42, 0x2, 0x80000000, 0x80000000, 0x10001, 0x8, 0x6, 0x1, 0x5, 0x3, 0x0, 0x3af, 0x8, 0x1, 0x81800000, 0xa, 0x4, 0x8000, 0xfffffff0, 0xd8d, 0x1, 0x56c, 0x0, 0x1f, 0x3, 0x8001, 0xac7, 0x8, 0x5, 0xfff, 0x1, 0x5, 0x2, 0x1, 0x1, 0x1, 0x2, 0x7, 0x1, 0x169, 0x9, 0x5, 0x9, 0xc, 0x7, 0x8, 0x9]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x8, 0x3, 0x600, 0xe, 0x5049d79a, {0x8, 0x0, 0x1, 0x1950, 0x9, 0x3}, {0x9, 0x1, 0x8, 0xc, 0x6, 0x7}, 0x7, 0x6, 0xfffffffb}}]}, @TCA_CGROUP_POLICE={0x860, 0x2, [@TCA_POLICE_RATE={0x404, 0x2, [0x79ac, 0xc0, 0x2, 0x3, 0xd, 0x8, 0x1d8, 0xfffffe01, 0x0, 0x1, 0xaa3, 0x7ff, 0x10, 0x7fffffff, 0xb, 0xa, 0x9, 0x2, 0x1e, 0x9, 0x7ff, 0x45, 0x7ff, 0x0, 0x4000008, 0x4, 0x0, 0x8, 0xc, 0x6, 0x0, 0x6, 0x9, 0x9, 0x6, 0xff, 0x3, 0x4, 0xb9c4, 0x401, 0x0, 0x0, 0x7, 0x6, 0x3, 0x2, 0xf0bc, 0x4, 0x80000001, 0x8, 0x24f, 0x4, 0x8, 0xec8, 0x8, 0x8000, 0x100, 0xbf9, 0x8000, 0x4, 0x100, 0x0, 0x5, 0x8, 0x9, 0x3, 0x523, 0x6, 0x2, 0x8, 0xb08, 0xa09571, 0x71a4, 0x665, 0x9, 0x6, 0x4, 0xa, 0x1, 0x4, 0xfffeffff, 0xfffff800, 0x1000, 0x13, 0x7, 0x8, 0xffff, 0xfff, 0x81, 0x7, 0x1, 0x1, 0x1, 0xa, 0x4, 0x8000, 0x6, 0x5, 0x2, 0x6, 0x7, 0x7fffffff, 0x7f, 0x1, 0x5, 0x290, 0x0, 0xffffff53, 0x3, 0x4, 0x5, 0x4, 0x9, 0x3, 0x10, 0xfa77, 0x1, 0x3, 0x8d42, 0x5, 0x200, 0x2, 0xffffffff, 0x68a7, 0x0, 0x3000, 0x5, 0x7, 0x401, 0x9d9d, 0x7, 0x7fff, 0xf, 0xfffffe01, 0x4e5e, 0x8, 0xf1d4, 0x4c07, 0x9, 0x0, 0x458000, 0x4, 0x0, 0x3, 0x0, 0x3, 0x6, 0x6, 0x200000, 0xf, 0x1, 0xff, 0x8001, 0xa76000, 0x7, 0x3, 0x7, 0x8, 0x5, 0x3, 0x0, 0x8, 0x80000, 0x7, 0x7, 0x394, 0x3, 0xffff439f, 0x2b, 0x81, 0x1, 0x0, 0x1, 0x6, 0x6, 0x2, 0x7fff, 0x2, 0x1ff, 0x9, 0x4, 0x8, 0x7, 0x1, 0x5, 0x40, 0x8, 0x8, 0x6, 0x5, 0x83, 0x8000, 0x401, 0x917, 0x10000, 0x0, 0x3, 0x4, 0x6, 0x1, 0x2, 0x7ff, 0x80000000, 0x6, 0xff, 0x10, 0x1, 0x5, 0x8, 0x2, 0x5, 0x4, 0x0, 0x3, 0x4, 0x8, 0x8001, 0x7, 0xfc3, 0x4, 0x9, 0x3859, 0x1, 0x5, 0x0, 0x80000001, 0x5, 0x3, 0x7046dfee, 0x7fffffff, 0xc90, 0x6, 0xe, 0x10000, 0x4, 0x0, 0x4ede, 0x5, 0x9, 0x5, 0x9, 0x1, 0x0, 0x4, 0x8, 0x5, 0x5780f034, 0x1, 0x3, 0xa, 0x800, 0x4, 0xfff, 0x3, 0xfffffffa, 0x905e]}, @TCA_POLICE_TBF={0x3c, 0x1, {0x6, 0x1000000f, 0x8, 0x39, 0xfffffff3, {0x9, 0x2, 0x1000, 0x0, 0x831d, 0x200}, {0x3, 0x1, 0x5, 0x7, 0xf041, 0x80000001}, 0x9, 0xffffffd6, 0x5}}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x4}, @TCA_POLICE_PEAKRATE64={0xc, 0x9, 0x5c}, @TCA_POLICE_PEAKRATE={0x404, 0x3, [0x91ca, 0x40, 0x9, 0xf, 0x2, 0x5, 0x8, 0x8000, 0xb914, 0x9, 0x7, 0x1, 0x1ae, 0x4, 0x3, 0x4, 0xa4b, 0xffffb685, 0x4, 0x6, 0x8001, 0x6, 0x7ff, 0x0, 0x0, 0x5, 0x4, 0x7, 0x6, 0x0, 0x845, 0x2, 0x1, 0x8, 0x800, 0x0, 0x0, 0x1700000, 0xde, 0x4, 0x7f, 0x90e0, 0x8, 0x9, 0xeb, 0x78c, 0x8000, 0x796d, 0x5, 0x6, 0xf0, 0x46de88e, 0x3, 0x40f, 0xe, 0x9, 0x9, 0x2, 0x1000, 0x2, 0x2, 0x6, 0x19c5, 0x7, 0x9205, 0x8001, 0x4, 0x6, 0x8, 0x8, 0x6, 0xb, 0x7fff, 0x65, 0x1, 0x268, 0x2, 0x6, 0x4, 0x9, 0x51b1, 0x1, 0x100, 0x2e8aa349, 0x4, 0x8, 0x1, 0x5, 0x6, 0x2, 0x95, 0x8000, 0x2, 0xa4, 0x1, 0x1, 0x4, 0xd, 0x400000, 0x0, 0xffff, 0x720, 0x8, 0x1, 0xa5, 0x9, 0x5, 0x7, 0x2, 0x3, 0x7ff, 0xa4, 0x6, 0x6, 0x986a, 0x5, 0xe4e, 0x1, 0x10, 0x5, 0x5, 0x2, 0x6, 0x3, 0x8, 0x80000000, 0x1ff, 0x8, 0x1000, 0x48f, 0x5, 0x5aa4b4c, 0x5, 0xe414, 0xaaa, 0xa, 0x4, 0x3, 0x3, 0x3, 0xfffffffe, 0x1, 0xea9b, 0x5, 0x1, 0x7, 0x1e10, 0x7, 0x80000000, 0x3af, 0xbed0, 0x7, 0xdc5, 0x8001, 0x2, 0x7, 0x7, 0x7, 0x0, 0xb, 0x1f7, 0x3c1e83b9, 0x9, 0x7f0, 0x5, 0x3ff, 0x9, 0x4, 0xd, 0x1, 0x7f, 0x6, 0x2, 0x7, 0x8, 0x2b5, 0x4, 0x3, 0x8, 0x80, 0x0, 0xa, 0xd9, 0x35, 0x8, 0x4, 0x1e, 0x1ff, 0x8, 0xf633, 0x532, 0xfffffff6, 0x1, 0x8, 0x3, 0x1, 0x0, 0x8, 0x5, 0xada, 0x80, 0x9, 0x3, 0x5, 0x5, 0x3646, 0x0, 0x3c000000, 0x451fa2c7, 0x7ff, 0x9, 0x4, 0x2, 0x20000000, 0x7, 0x2, 0xe15, 0xd, 0x878, 0x0, 0x5, 0x46a, 0x9, 0x4, 0xa0, 0x99, 0x80, 0x0, 0x6a4c, 0x744e, 0x3, 0x4, 0x101, 0x5, 0xd, 0x80000000, 0x6, 0x7, 0xfffffff9, 0x6, 0x0, 0x1, 0x6, 0x6, 0x0, 0x8fc1, 0x3, 0xe, 0x8, 0x7ff, 0xfffffffc, 0x7d7, 0x8001, 0x3, 0x0, 0x2]}]}]}}]}, 0x127c}}, 0x2000c800) r2 = socket$netlink(0x10, 0x3, 0x0) sendmmsg(r2, &(0x7f00000002c0), 0x40000000000009f, 0x0) 1m14.944693572s ago: executing program 0 (id=5444): capset(&(0x7f0000000340)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff, 0x3}) syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') 1m14.944475042s ago: executing program 33 (id=5444): capset(&(0x7f0000000340)={0x20080522}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x81, 0xffffffff, 0x3}) syz_open_procfs(0x0, &(0x7f0000000080)='net/unix\x00') 31.564681287s ago: executing program 5 (id=6111): bpf$ENABLE_STATS(0x20, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc097, 0x2, @perf_bp={0x0, 0x8}, 0x8216, 0x6, 0x11000, 0x0, 0x9484, 0x1, 0x400}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, 0x0, 0x0) bpf$BPF_PROG_TEST_RUN(0x1c, 0x0, 0x0) move_pages(0x0, 0x20a0, &(0x7f0000000040), &(0x7f0000001180), &(0x7f0000000000), 0x0) r0 = socket(0x400000000010, 0x3, 0x0) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f0000000040)={'syzkaller0\x00', 0x7101}) r2 = socket(0x400000000010, 0x3, 0x0) r3 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=@newqdisc={0x34, 0x24, 0x4ee4e6a52ff56541, 0x70bd26, 0x25dfdbfb, {0x0, 0x0, 0x0, r4, {0x0, 0xfff1}, {0xffff, 0xffff}, {0x7, 0x7}}, [@qdisc_kind_options=@q_blackhole={0xe}]}, 0x34}, 0x1, 0x0, 0x0, 0x8800}, 0x0) r5 = socket$unix(0x1, 0x5, 0x0) ioctl$sock_SIOCGIFINDEX(r5, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000280)=@getchain={0x24, 0x66, 0x903, 0x70bd2d, 0x25dfdbff, {0x0, 0x0, 0x0, r6, {0xffff, 0xe}, {0x3, 0xfff1}, {0xa}}}, 0x24}, 0x1, 0x0, 0x0, 0x8848}, 0x20004804) unshare(0x6a040000) bpf$PROG_LOAD(0x5, &(0x7f0000001100)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], 0x0, 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) unshare(0x20000400) bpf$ENABLE_STATS(0x20, &(0x7f0000000180), 0x4) 30.67621363s ago: executing program 5 (id=6123): r0 = syz_open_dev$usbfs(&(0x7f0000000480), 0x77, 0x141341) syz_clone(0xc30e3400, 0x0, 0x900, &(0x7f0000000000), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0026}]}) r1 = signalfd(0xffffffffffffffff, &(0x7f0000000040)={[0x24bc]}, 0x8) faccessat2(r1, &(0x7f0000000000)='\x00', 0x0, 0x1100) ioctl$USBDEVFS_CONTROL(r0, 0xc0185500, &(0x7f00000000c0)={0x80, 0x6, 0x300, 0x0, 0x0, 0xfffffff9, 0x0}) 30.526275679s ago: executing program 5 (id=6129): r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000200)='./file1\x00', 0x2208810, &(0x7f0000000080), 0xfe, 0x572, &(0x7f0000001700)="$eJzs3V9rm9UfAPDvk6bdn26/dTDGTy+ksAsnc+na+meCF/NSdDjQ+xnarIymy2jSsdaB24W78UaGIOJAfAHeezl8A76KgQ6GjqIX3lSe9EmXNUmbtpnpzOcDac95npOcc/I85+R78iQkgIE1nv7JRbwUEV8lEcea9uUj2zm+Xm71ya2Z9JbE2trHvyeRZNsa5ZPs/2iW+X9E/PxFxJlca73V5ZX5YrlcWszyE7WF6xPV5ZWzVxeKc6W50rWp6enzb05PvfP2Wz3r62uX/vr2owfvn//y1Oo3Pz46fi+JC3Ek29fcjz243ZwZj/HsORmOC5sKTvagsv0k6XcD2JWhbJwPRzoHHIuhbNQD/32fR8QaMKAS4x8GVCMOaKzte7QOfmE8fm99AdTa//z6eyNxsL42OryaPLMySte7Yz2oP63jp9/u30tv0bv3IQC2dftORJzL51vnvySb/3bvXBdlNtexw/lvbYdNApo8SOOf19vFP5WsxMH6383xz2ibsbsb24//3KMeVNNRGv+92zb+3bhoNTaU5Y7WY77h5MrVcimd2/4XEadj+ECa3+p6zvnVhx3nqafx30g9Bkzrb8SCWTse5Q88e5/ZYq24lz43e3wn4uW28W+yEf8mbY5/+nxc6rKOk6X7r3Ta1xz/tu//87X2Q8Sr2fG//cya6OkVrWTr65MT9fNhonFWtPrz7slfOtXfuf9Hn0NvW6XH/3Db83+j/2NJ8/Xa6s7r+P7g36VO+7Y//u3P/5Hkk3p6JNt2s1irLU5GjCQftm6fenrfRr5RPu3/6VPtx/9W5/+hiPi0y/7fPXG3Y9F+n/9p/2d3dPx3nnj4wWffdaq/u+P/Rj11OtvSzfzXbQP38twBAAAAAADAfpOLiCOR5Aob6VyuUFj/fMeJOJwrV6q1M1cqS9dmo/5d2bEYzjWudI82fR5iMvs8bCM/tSk/HRHHI+LroUP1fGGmUp7td+cBAAAAAAAAAAAAAAAAAABgnxjt8P3/1K9D/W4d8Nz5yW8YXNuO/1780hOwL3n9h8Fl/MPgMv5hcBn/MLjySb9bAPSL138YXMY/DC7jHwAAAAAAAAAAAAAAAAAAAAAAAAAAAHrq0sWL6W1t9cmtmTQ/e2N5ab5y4+xsqTpfWFiaKcxUFq8X5ho/ELKw5YMlf0S5Urk+ORVLNydqpWptorq8cnmhsnStdvnqQnGudLk0/G90CgAAAAAAAAAAAAAAAAAAAF4w1eWV+WK5XFqUkNhVIr8/miGxnmgM7D0/YH/nJQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAABo9k8AAAD//24dNcY=") r1 = fcntl$dupfd(r0, 0x406, r0) ioctl$SIOCPNDELRESOURCE(r1, 0x89ef, &(0x7f0000000000)=0xfffff218) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000100)=ANY=[@ANYBLOB="500000001e00010029bd7000ffdbdf2500000000000000000000000000000001000004d204003200fe80000000000000000000000000009946"], 0x50}, 0x1, 0x0, 0x0, 0x8004}, 0x0) unlinkat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x200) 30.388545947s ago: executing program 5 (id=6134): mmap$IORING_OFF_SQ_RING(&(0x7f0000400000/0xc00000)=nil, 0xc00000, 0xb, 0x59032, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000001240)='./file2\x00', 0x14552, &(0x7f0000000b40)=ANY=[], 0xfb, 0x11ff, &(0x7f0000002480)="$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") creat(&(0x7f00000004c0)='./bus\x00', 0x20) io_setup(0xfa05, &(0x7f0000000040)) mount(&(0x7f0000000280)=@loop={'/dev/loop', 0x0}, &(0x7f0000000140)='./bus\x00', 0x0, 0x1000, 0x0) r0 = open(&(0x7f0000000540)='./bus\x00', 0x4000, 0x110) syz_mount_image$ext4(&(0x7f0000000200)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x380470a, &(0x7f0000000a00)={[{@quota}, {@bsdgroups}, {@lazytime}, {@errors_remount}, {@jqfmt_vfsv1}, {@oldalloc}, {@stripe={'stripe', 0x3d, 0x5}}]}, 0x2, 0x47d, &(0x7f0000000a80)="$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") pselect6(0x66, 0x0, 0x0, &(0x7f00000010c0)={0x1, 0x0, 0x1, 0x0, 0xfffffffffffffffe, 0x0, 0x1}, &(0x7f0000000300)={0x0, 0x3938700}, 0x0) syz_clone3(&(0x7f0000000300)={0x23800000, 0x0, 0x0, 0x0, {0x27}, 0x0, 0x0, 0x0, 0x0}, 0x58) preadv2(r0, &(0x7f00000000c0)=[{&(0x7f0000001200)=""/4083, 0xffffffdf}], 0x1, 0x0, 0x0, 0x1) 29.725963176s ago: executing program 5 (id=6152): r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000240)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a28000000000a030000000000000000000a00000708000240000000020900010073797a31000000002c000000030a010100000000000000000a0000070900010073797a31000000000900030073797a320000000014000000110001"], 0x7c}, 0x1, 0x0, 0x0, 0x4000}, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000009b40)={0x0, 0x0, &(0x7f0000009b00)={&(0x7f0000000500)=ANY=[@ANYBLOB="140000001000010000000000000000000500000a68000000060a010400000000000000000a0000040900010073797a31000000003c0004803800018008000100636d70002c000280080001400000001608000240000000011800038014000100407327c3609bd593363c9b5c03e4b5900b00020073797a32"], 0x90}, 0x1, 0x0, 0x0, 0x4040}, 0x20000040) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x0, 0x40, &(0x7f0000000680)=@raw={'raw\x00', 0x8, 0x3, 0x320, 0x1a0, 0x43, 0xa0, 0x1a0, 0x98, 0x288, 0x178, 0x178, 0x288, 0x178, 0x49, 0x0, {[{{@ip={@loopback, @local, 0xff, 0x0, 'wg2\x00', 'ip6erspan0\x00'}, 0x12a, 0x178, 0x90, 0x0, {0x0, 0x7a010000}, [@common=@unspec=@conntrack2={{0xc0}, {{@ipv4=@empty, [0xff000000, 0xff000000, 0xff, 0xffffff00], @ipv4=@multicast1, [0xff, 0xffffffff, 0xffffff00, 0xffffff00], @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, [0xffffff00, 0xff000000, 0xff000000], @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [0xff000000, 0x0, 0xff], 0x1, 0x8, 0x3a, 0x4e22, 0x4e23, 0x4e22, 0x4e21, 0x0, 0x80}, 0x40, 0x90}}, @common=@unspec=@helper={{0x48}, {0x0, 'ftp-20000\x00'}}]}, @common=@unspec=@MARK={0x28, 'MARK\x00', 0x2, {0x2, 0x8}}}, {{@uncond, 0x0, 0xa8, 0xe8, 0x0, {}, [@common=@unspec=@connbytes={{0x38}, {[{0xb}]}}]}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "f1c098b60204ed02d82cf440fef5497b80c29d381d41116000"}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x380) r3 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r3, 0x8933, &(0x7f0000000140)={'batadv0\x00', 0x0}) r5 = syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r3) sendmsg$BATADV_CMD_GET_DAT_CACHE(r3, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x1c, r5, 0x303, 0x2, 0x4, {0x6}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r4}]}, 0x1c}}, 0x0) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000400), 0xffffffffffffffff) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000440)={'batadv0\x00', 0x0}) r8 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r8, &(0x7f0000000c00)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000000)=@ipv4_delroute={0x2c, 0x18, 0x901, 0x4, 0x25dfdbfc, {0x2, 0x18, 0x0, 0x0, 0xff, 0x3, 0xff, 0x9}, [@RTA_DST={0x8, 0x1, @dev}, @RTA_PRIORITY={0x8, 0x6, 0x13}]}, 0x2c}}, 0x0) sendmsg$BATADV_CMD_SET_MESH(r1, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x1c, r6, 0x1, 0x70bd27, 0x1, {}, [@BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r7}]}, 0x1c}}, 0xf8) 29.226529945s ago: executing program 5 (id=6165): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x80078b, &(0x7f00000000c0)={[{@usrjquota}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@delalloc}, {@nobh}, {@min_batch_time={'min_batch_time', 0x3d, 0xb656}}, {@init_itable_val={'init_itable', 0x3d, 0x8d55}}]}, 0x0, 0x46f, &(0x7f0000000bc0)="$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") (fail_nth: 7) 29.158573899s ago: executing program 34 (id=6165): syz_mount_image$ext4(&(0x7f00000004c0)='ext4\x00', &(0x7f00000001c0)='./file0\x00', 0x80078b, &(0x7f00000000c0)={[{@usrjquota}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x4}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x5c}}, {@delalloc}, {@nobh}, {@min_batch_time={'min_batch_time', 0x3d, 0xb656}}, {@init_itable_val={'init_itable', 0x3d, 0x8d55}}]}, 0x0, 0x46f, &(0x7f0000000bc0)="$eJzs281rHGUYAPBnJh9t7UdirR+tVaNFCIpJk1btwYui4KGioId6jMm2hG4baaLYUmwqUi+CFPQsHgX/Am8iiHoSvOrFkxSK9tLqKTKzM+1mm02N2WRi9veDzb7vzrs7z5P5eud9dwPoWkPZnyRiR0T8EhEDjeriBkONpxvXzk/+de38ZBILC6//keTtrl87P1k2Ld+3vagMpxHph0mxksVmz547OVGv184U9dG5U2+Pzp4999S7pyZO1E7UTo8fOXL40Nizz4w/3ZE8s7yu73t/Zv/el9+8/Mrksctv/fBVFu+OYnlzHp0ylCX+50KuddnjnV5ZxXY2lZPeCgNhRXoiIttcffnxPxA9cWvjDcRLH1QaHLCmsmvTlvaL5xeATSyJqiMAqlFe6LP73/KxTl2PDeHq840boCzvG8WjsaQ30qJNX8v9bScNRcSx+b8/zx6xRuMQAADNPp787Gg54ru4/5fGffnzb/nfXcUcymBE3B0RuyPinojYExH3RuRt74+IB1YZz+39n/TKKj9yWVn/77libmtx/6/s/cVgT1HbmefflxyfrtcOFv+T4ejbktXHllnHNy/+/Em7Zc39v+yRrb/sCxZxXOltGaCbmpibyDulHXD1YsS+3qXyT27OBCQRsTci9q3so3eVheknvtzfrtGd819GB+aZFr7I0pvP8p+PlvxLSfP85PRt85OjW6NeOzha7hW3+/GnS6+1W/+q8u+Aq7XGc9P2b20ymDTP186ufB2Xfv2o7T3Nf9z/0/7kjXyeub947b2JubkzYxH9ydG8vuj18VvvLetl+2z/Hz6w9PG/u3hPlv+DEZHtxA9FxMMR8UgR+6MR8VhEHFgm/+9faL+szD/Sirb/xYipJc9/N/f/lu2/8kLPye++brf+f7f9D+el4eKV/Px3B0uFk50uWgNczf8OAAAA/i/S/DvwSTpys5ymIyON7/DvibvS+szs3JPHZ945PdX4rvxg9KXlSNdAMR5an67XxpL54hMb46PjxVhxOV56qBg3/rRnW14fmZypT1WcO3S77W2O/8zvPVVHB6yxbUu+Ot6/7oEAFWidR08XVy+8Gk4GsFn5vTZ0rzsc/+l6xQGsP9d/6F5LHf8XWurmAmBzcv2H7uX4hy6Vflt1BECFXP+hK63md/1rWNi6McKoprBRN0peiCgL6YaIR2GNClWfmQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADrjnwAAAP//fhbpGw==") (fail_nth: 7) 3.976243437s ago: executing program 6 (id=6482): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) timer_create(0x0, &(0x7f0000000240)={0x0, 0x21, 0x2, @thr={0x0, 0x0}}, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x2, 0x0) 3.039851962s ago: executing program 4 (id=6496): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f00000000c0)={0x0, 0x9, 0x180}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) syz_emit_ethernet(0x36, &(0x7f0000000280)={@local, @random="1cf800", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x3, 0x7, 0x28, 0x66, 0x0, 0x9, 0x1, 0x0, @remote, @remote}, @timestamp={0xd, 0x0, 0x0, 0x3, 0x9c, 0x10229, 0x7, 0x6}}}}}, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180000002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000004c0)={r3, 0x3, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x44) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000040)={0x0, 0x0}, 0x8) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=r4, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000340)=r5, 0x4) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x1000000009, 0x690bb, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x100000000, 0x7, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x3) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x11000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="98000000", @ANYRES16=r7, @ANYBLOB="050427bd7000fedbdf2501"], 0x98}, 0x1, 0x0, 0x0, 0x4000001}, 0x4040084) 2.791942186s ago: executing program 6 (id=6498): prlimit64(0x0, 0xe, &(0x7f0000000000)={0x8, 0x8b}, 0x0) r0 = getpid() sched_setscheduler(r0, 0x1, &(0x7f0000000100)=0x5) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001480)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f00000004c0)=@file={0x0, './file0\x00'}, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) bpf$MAP_CREATE_TAIL_CALL(0x0, 0x0, 0x48) r3 = syz_open_dev$usbfs(&(0x7f0000000480), 0x76, 0x160341) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000200)) socket$packet(0x11, 0x3, 0x300) ioctl$USBDEVFS_IOCTL(r3, 0xc0105512, &(0x7f0000000000)=@usbdevfs_connect) 2.692647632s ago: executing program 2 (id=6499): syz_emit_ethernet(0x4e, &(0x7f0000000380)={@local, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x2a}, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "4dc58c", 0x18, 0x6, 0x0, @dev={0xfe, 0x80, '\x00', 0x1a}, @local, {[], {{0x4e21, 0x4001, 0x41424344, 0x41424344, 0x0, 0x0, 0x6, 0x2, 0xfffd, 0x0, 0x0, {[@window={0x3, 0x3, 0x2}]}}}}}}}}, 0x0) pipe(&(0x7f0000000500)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = fsopen(&(0x7f0000000080)='autofs\x00', 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f00000005c0)='fd', 0x0, r0) write$tun(r0, &(0x7f0000000000)={@val={0x0, 0x6558}, @val={0x2, 0x0, 0xa, 0x4, 0x7, 0xfffd}, @mpls={[{0x5}, {0x3}, {0x5}, {0x7ff, 0x0, 0x1}, {0x0, 0x0, 0x1}, {0x81, 0x0, 0x1}, {0x0, 0x0, 0x1}], @generic="487a1fdcb8a36ab5b5a7e979cd793979145bc25c56b913798bf2e9b8a03a1789ea5f838743966ec687c0f0d31a1dcee4dfa8f0e519d16121506435ffdee0a1b66ae0e57940fc0db1f06fdc75917be84817afd6e6f1fd6534e7a746add06bccb8dd870846803b2690d2941a3162d06a5c199cf0caf1d90e199c21fcf5bf07d3f71b03f872535dd28fb9e1ed9f60265ed283198b486761406cf17e4b7f21f09fc90e51c9d663c510a5efb3940e1e3d93bb391ccab596b36e9e8b03d34e69bd9be38560d29425e8a45060c8563a3af67f4b833a"}}, 0xfc) 2.620517767s ago: executing program 4 (id=6500): r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x4f, 0x1, 0x0, 0x0, 0x0, 0x7, 0x98142, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7d, 0x1, @perf_config_ext={0x4190, 0xaea}, 0x4105, 0x2e, 0x6, 0x3, 0x2, 0x0, 0x6, 0x0, 0x0, 0x0, 0x40000000000a9e6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x9) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) r2 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000000c0), 0x1, 0x0) setresgid(0xee00, 0xee01, 0x0) setuid(0xee00) pwritev(r2, &(0x7f0000000480)=[{&(0x7f00000001c0)="e7", 0x1}], 0x1000000000000020, 0xfffffffe, 0x80) sendmsg$NFT_BATCH(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000800)=ANY=[@ANYBLOB="140000001000040000000000000000000300000a20000000000a05000000000000000000070000000900010073797a300000000044000000090a010400000000000000000700ffff08000a40000000030900020073797a31000000000900010073797a3000000000080005400000002105000d40930000005c0000000c0a01020000000000000000070000000900020073797a31000000000900010073797a3000000000300003802c0000800400018024000b80100001800c000100636f756e746572"], 0xe8}, 0x1, 0x0, 0x0, 0x10}, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='highspeed', 0x9) connect$inet(r0, &(0x7f0000000180)={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x1b}}, 0x10) sendto$inet(r0, &(0x7f00000000c0), 0xffffffffffffffef, 0x0, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000380)=ANY=[@ANYBLOB="1400000042000501"], 0x14}}, 0x44014) recvmmsg(r3, &(0x7f0000000000)=[{{0x0, 0x140, &(0x7f00000002c0)=[{&(0x7f00000004c0)=""/4091, 0xe5c}, {&(0x7f0000001580)=""/238, 0xf0}], 0x4, 0x0, 0x353}}], 0x40000000000002e, 0x2, 0x0) recvfrom$inet(r0, &(0x7f0000000080)=""/8, 0xfffffffffffffd0b, 0x720, 0x0, 0xfffffffffffffd25) 2.482174135s ago: executing program 2 (id=6501): socket$inet6(0xa, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = bpf$MAP_CREATE(0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="0f000000040000000400000012"], 0x50) bpf$ENABLE_STATS(0x20, 0x0, 0x0) r2 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000000440)={r1, &(0x7f0000000440), &(0x7f0000000040)=@tcp=r2}, 0x20) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x21) syz_emit_ethernet(0xbe, &(0x7f0000000000)=ANY=[@ANYBLOB="aac1bdd95faaaaaaaa23aaaaaaaaaa0c0800450000b00000000000119078000000000000000000004e20009c907801000000000000007b4b142b7461fd777b1c012bd14efb9f49fcdb8f080c26a04883ad5c8c82b8af584cbf2649a50f2dbc43efa8698d0a881c51852e4451b57d037ad3c04594282423424d00000000000000000000000000bcfd56f1375461caaa2f19935e6996c7096ffeeb03000000000000649a3bfbc1f39cb307b3472eb9cdb042d2644fcbb2c5a57df67d544af6"], 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f00000007c0)='./file0\x00', 0x0, &(0x7f00000003c0)={[{@init_itable_val={'init_itable', 0x3d, 0x1}}, {@errors_remount}, {@noauto_da_alloc}, {@barrier}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x7}}, {@inode_readahead_blks={'inode_readahead_blks', 0x3d, 0x2000}}]}, 0x1, 0x783, &(0x7f0000001340)="$eJzs3M9rXOUaAOD3nGaa/si9kwt3ce+mCi20UDpJmk27Mm7ETaFQcFtDMgkhJ5mSmdQkFpq6E4TabFQE0b1Lt0Kpf4A7KSi4F0RrXKibkTOZTNt0Zjptk04bnwdO5vvOfN9533dm8uUcyJkA/rFezX8kEUMRcTEiis39aUQcbLQORaxvjdu8d20q35Ko1y/9kuTTYrNebB0raT4ejcaU+F9E3ClEnH7v0bjV1bX5ySwrLzX7I7WFKyPV1bUzcwuTs+XZ8uLY+PnRc+Pj50bHd63WE2+dP3zr2zc2Nr77qnbz2MCZJCYadUeztl0L9ICt16QQEzv2L+5FsD5Kehgz8BzyAACgu/w8/0Dz3KwQxTjQ7SzNCRwAAAC8lOqD9V792fNIAAAA4AWTRL8zAAAAAPbW9v8BbN/bu1f3wXby8+sRMdwu/kDjHuKIQ1GIiCObyUO3HyRb0+CZrN+IiNsTbT5/vdzR3N3o/ebh3Tkiu+12vv5MtFt/0tb6E23Wn4Ht7054Rp3Xv/vxD3RY/y72GOPrz/5f6Bj/RnXl/WPt4iet+EmH+G/3GP/mxge3Oj1X/yLiZNu/P8lDsbp8P8TIzFzW7lerle6dv07d7Vx/xJFH4idJI2rSvf4rPdb/7uZv8+td4p863v3934o/+NC8/DPxYTOPNCJuNR/z/saOGMcXvv/m0cjJ+nb86Q6vf/v3/81W/Z/3WP+PXw6u9DgUAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAGtKIGIokLbXaaVoqRRyNiP/GkTSrVGunZyrLi9P5cxHDUUhn5rLyaEQUt/pJ3h9rtO/3z+7oj0fEf344vBV0LiuXpirZdL+LBwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAoOVoRAxFkpYiIo2I34tpWir1OysAAABg1w33OwEAAABgz7n+BwAAgP3vaa//k13OAwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAANjXLl64kG/1zXvXpvL+9NXV5fnK1TPT5ep8aWF5qjRVWbpSmq1UZrNyaaqy8LjjpRExdj6WV0Zq5WptpLq6dnmhsrxYuzy3MDlbvlwuPJeqAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeFJDjS1JSxGRNtppWipF/CsihqOQzMxl5dGI+HdE3C0WBvP+WL+TBgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAYNdVV9fmJ7OsvPRyN+r7q5yeG5FEvABpdGh80nxXuo1J1iP6nmraTPRZjhPxJLOuP+Zl6XfjlT6tRwAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA9Fd1dW1+MsvKS9V+ZwIAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAEB/pT8lEZFvJ4snhnY+ezD5o9h4jIh3Pr300cpkrbY0lu//tbW/9nFz/9kHJl5/njUAAADAvvfakwzevk7fvo4HAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAADoVXV1bX4yy8pLe9iIG/2uEgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAeBp/BwAA//9Js7nR") sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000800)=ANY=[@ANYBLOB="5001000013000001000000000000000007000000", @ANYRES32=0x0, @ANYBLOB="00000000000000001c001a801800008000000500080000003e120000080006000000000008000d000100000008000400070000000401188038000180140004003ae1eaf86e7d6aad8cc869fd1b7e6a7a1400050095850a7446cb8816fdf1a30c90b19ad10b0002005d2d5e25285e0000200001801400050029b25f1acc211c8ff8e3c67932344a9a070002005d2800003400018014000500c7b045252d685c97dfe622cfee8f217a14000400d06779c2171dd80ab33ff2eb59a7b2f12d0fcba9160000005c00018014000500cad9a1508bd37f9c5163daef2b5dfb4214000500628cab9c555ffc01a48ebc907a450000080002002b232400140404004408691e6c4ff037af677b66596af3f01400050036e28f17e07547516966de9b2b73d3261800018014000400c11c97e7f5c6810d897fda2c89ebd023654769ef6d3035c0f053b1be3cdd26bc449eadd14aa002a7ba403578f602fe7a7696829aa04a978ab600ee"], 0x150}}, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'bridge0\x00'}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000040)={0x0, 0x0, 0x0}, 0x0) ppoll(0x0, 0x0, 0x0, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000340)=ANY=[], 0x0, 0x2e, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x10, 0x40008001}, 0x94) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000200)=ANY=[@ANYBLOB="22000000040000001000"], 0x48) bpf$BPF_MAP_CONST_STR_FREEZE(0x16, &(0x7f00000000c0)={r4, 0xffffffffffffffff}, 0x4) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000580)={0x11, 0x10, &(0x7f0000000100)=ANY=[@ANYBLOB, @ANYRES32=r5, @ANYBLOB="0000000000000000b70500000800000085000000a500000095"], 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xfffffffe}, 0x94) syz_open_dev$tty1(0xc, 0x4, 0x1) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x40, 0x7, &(0x7f0000006680)) madvise(&(0x7f0000024000/0x4000)=nil, 0x4000, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000000)=@newqdisc={0x24, 0x24, 0xd31, 0x4, 0x4, {0x0, 0x0, 0x0, 0x0, {0x0, 0xe}, {0xffff, 0xfff2}, {0x4, 0xfff1}}}, 0x24}}, 0x20000000) sendmsg$IPCTNL_MSG_CT_NEW(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) r7 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000000)={'bridge0\x00', 0x0}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)=ANY=[@ANYBLOB="280000007000010010ab4be68e8da23507000000", @ANYRES32=r8, @ANYBLOB="1000018004000480080001"], 0x28}}, 0x0) sendmmsg(r6, &(0x7f00000002c0), 0x40000000000009f, 0x0) socket$nl_route(0x10, 0x3, 0x0) 1.814322824s ago: executing program 6 (id=6504): perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x7, 0x8604, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_bp={0x0, 0x2}, 0x0, 0x10000, 0x0, 0x6, 0x10000, 0x20005, 0xb, 0x0, 0x7f2, 0x0, 0x8000000000000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) (async) unshare(0x6a040000) (async) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x8031, 0xffffffffffffffff, 0x94eb2000) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) (async) r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0xc, &(0x7f0000000340)=0x6, 0x4) (async) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000480)=ANY=[@ANYBLOB="240000001a0001000000ff7f0000000080000000", @ANYRESDEC=r0, @ANYBLOB='\x00\x00\x00\x00\b'], 0x24}, 0x1, 0x0, 0x0, 0x2c04c081}, 0x8000) (async, rerun: 64) unshare(0x100) (async, rerun: 64) r1 = syz_open_dev$evdev(&(0x7f0000000000), 0x0, 0x2002) write$evdev(r1, &(0x7f0000000040)=[{{}, 0x0, 0x2}], 0x37) (async, rerun: 32) r2 = socket$inet_tcp(0x2, 0x1, 0x0) (async, rerun: 32) r3 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x21, 0x800000000004, @tid=r3}, &(0x7f0000bbdffc)) (async) timer_settime(0x0, 0x0, &(0x7f0000000340)={{0x77359400}, {0x0, 0x3938700}}, 0x0) clock_nanosleep(0x9, 0x0, &(0x7f0000000080)={0x77359400}, &(0x7f0000000200)) (async) getsockopt$inet_tcp_buf(r2, 0x6, 0x23, &(0x7f0000000040)=""/32, &(0x7f0000000000)=0x20) (async) r4 = syz_io_uring_setup(0x2085, &(0x7f0000000380)={0x0, 0x86f7, 0x10000, 0x3, 0x188}, &(0x7f0000002000)=0x0, &(0x7f0000000440)=0x0) syz_io_uring_submit(r5, r6, &(0x7f00000001c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x0, 0x0, @fd_index=0x3, 0xfffffffffffffffd, 0x0, 0x0, 0x22}) io_uring_enter(r4, 0x48e9, 0xf2ba, 0x2, 0x0, 0x0) unshare(0x20010000) r7 = socket$netlink(0x10, 0x3, 0x0) sendmsg$RDMA_NLDEV_CMD_NEWLINK(r7, &(0x7f0000000400)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000240)={&(0x7f00000004c0)={0x10, 0x1403, 0x200, 0x70bd25, 0x25dfdbfc}, 0x10}, 0x1, 0x0, 0x0, 0x4}, 0x20000000) (async) sendmsg$nl_route_sched(r7, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000001c0)=@newqdisc={0x54, 0x10, 0x1, 0x0, 0x10000000, {0x0, 0x0, 0x0, 0x0, {0x1}, {}, {0xe, 0xd}}, [@TCA_INGRESS_BLOCK={0x8}, @TCA_STAB={0x28, 0x8, 0x0, 0x1, [{{0x1c, 0x1a, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}, {0x8, 0x1b, [0x0, 0x0]}}]}]}, 0x54}, 0x1, 0x0, 0x0, 0x80}, 0x0) 1.7081991s ago: executing program 4 (id=6505): r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x10000, &(0x7f0000000080)={[{@nombcache}, {@delalloc}, {@data_err_ignore}, {@nojournal_checksum}, {@usrjquota}, {@bsdgroups}]}, 0x1, 0x4cd, &(0x7f0000000c80)="$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") quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) syz_clone3(&(0x7f0000000040)={0x1a0000280, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, &(0x7f0000000100)=[0x0], 0x1}, 0x58) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x2a, 0x0) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x140, 0x0) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000002000)={0x9, 0x9}) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/power/sync_on_suspend', 0x53fa82, 0x6f) write$tcp_mem(r3, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000000c0)=0x29) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000140)=0x8) dup3(r0, r1, 0x80000) unlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0) 1.671759103s ago: executing program 1 (id=6506): r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000080)={'syzkaller0\x00', 0x7101}) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000100)={'syzkaller0\x00'}) sendmsg$nl_route_sched(r1, 0x0, 0x20040084) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = socket$unix(0x1, 0x1, 0x0) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) sendmsg$nl_route_sched(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000440)=@newqdisc={0x8c, 0x28, 0x4ee4e6a52ff56541, 0x4001, 0xfffffdfc, {0x0, 0x0, 0x0, r5, {0x4}, {0xffff}, {0x2, 0xfff3}}, [@qdisc_kind_options=@q_taprio={{0xb}, {0x5c, 0x2, [@TCA_TAPRIO_ATTR_PRIOMAP={0x56, 0x1, {0x4, [0x6, 0x3, 0x3, 0x4, 0xd, 0x5, 0xb, 0x8, 0x7, 0x5, 0x6, 0x3, 0x5, 0x8, 0xf, 0x3], 0x1, [0x1, 0x10, 0x3, 0x8, 0x31d4, 0xa, 0x6, 0x3742, 0x7fff, 0x7, 0xff, 0x800, 0xcbe6, 0xd80, 0xf638, 0x1], [0x3, 0x9, 0x8, 0x5, 0x0, 0x3, 0xc, 0x6, 0x5, 0x0, 0xe, 0x8001, 0x8a67, 0x4, 0x7fff, 0xfffe]}}]}}]}, 0x8c}}, 0x0) r6 = openat$tun(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) close(r6) socket$nl_generic(0x10, 0x3, 0x10) ioctl$SIOCSIFHWADDR(r6, 0x8914, &(0x7f0000002280)={'syzkaller0\x00', @multicast}) r7 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(r7, 0x8933, &(0x7f0000000100)={'syzkaller0\x00', 0x0}) r9 = socket$packet(0x11, 0x3, 0x300) sendto$packet(r9, &(0x7f00000005c0)="ba", 0x1, 0x40, &(0x7f00000001c0)={0x11, 0x8100, r8, 0x1, 0xd8, 0x6, @multicast}, 0x14) 1.671199582s ago: executing program 4 (id=6507): perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0xd, 0x1, 0x0, 0x1, 0x0, 0x6, 0xf4039, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x147b7e, 0x0, @perf_bp={0x0, 0x8}, 0x9092, 0x0, 0x43a1bd76, 0x2, 0x9, 0x100006, 0x2, 0x0, 0x0, 0x0, 0x200b}, 0x0, 0x4000000000, 0xffffffffffffffff, 0x8) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x2c, &(0x7f0000000000)='/proc/sys/net/\x00\x00v4\x00\x00s/\x92ync_\x00le\xf44.\xab%nN\xd4\xa2\x88\x00\xd1l,'}, 0x30) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000), 0x200002, 0x0) fchdir(r1) ioctl$USBDEVFS_ALLOC_STREAMS(0xffffffffffffffff, 0x8008551c, 0x0) r2 = openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='.\x00', 0x0, 0x0) getdents(r2, 0xfffffffffffffffd, 0x58) sendmsg$NFT_BATCH(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f00000007c0)=ANY=[@ANYBLOB="ac4ef15b8267ea8079659471d7a66112f4932984b49c6d377c31daa7894358ea519894c18b8fdac4668bd0967a031b06b11324b75ab49926abaf3e783d2d4b638874f345a809f1492fa05fdbaf653d4ff78756ac3eb67c29dc565590a5aadfc992fe5db28ae4bab74f42"], 0x118}}, 0x4000040) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFT_BATCH(r3, &(0x7f000000c2c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000340)=ANY=[@ANYBLOB="140000001000010000000000000000000000000a28000000000a0101000000005e1affd5020000000900010073797a300000000008000240000000032c000000030a01030000e6ff00000000020000000900010073797a30000000000900030073797a320000000014000000110001"], 0x7c}}, 0x0) sendmsg$NFT_BATCH(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000280)={{0x14}, [@NFT_MSG_NEWRULE={0x6c, 0x6, 0xa, 0x40b, 0x0, 0x0, {0x2, 0x0, 0x8}, [@NFTA_RULE_EXPRESSIONS={0x40, 0x4, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, @match={{0xa}, @val={0x2c, 0x2, 0x0, 0x1, [@NFTA_MATCH_NAME={0xd, 0x1, 'connmark\x00'}, @NFTA_MATCH_INFO={0x10, 0x3, "a62a1a4094b2c56d78942e97"}, @NFTA_MATCH_REV={0x8, 0x2, 0x1, 0x0, 0x1}]}}}]}, @NFTA_RULE_CHAIN={0x9, 0x2, 'syz2\x00'}, @NFTA_RULE_TABLE={0x9, 0x1, 'syz0\x00'}]}], {0x14, 0x11, 0x1, 0x0, 0x0, {0x9}}}, 0x94}}, 0xe040) close(r3) syz_mount_image$vfat(&(0x7f0000000200), &(0x7f0000000000)='./file0\x00', 0x1810882, &(0x7f0000000040)=ANY=[@ANYBLOB="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"], 0x0, 0x2b9, &(0x7f0000000280)="$eJzs3T9rc1UYAPDnpmkSdUgGJxG8oIPTy9t3dUmVFqqZlAzqoMW2IE0QWij4B9NOri6OfgJBcHP1A7j4DQRXwc0OhSv35t4kbdPYaNP65/db+vTc85zznNPTlA45ef/54eFeGgdnn/0crVYStW504zyJTtSichqXdL8MAODf7DzL4rdsbJm8JCJaqysLAFihpf/+f7fykgCAFXvr7Xfe2Oz1tt5M01ZsD7846ef/2edfx883D+LDGMR+PI52XERkE+N4O8uyUT3NdeKl4eikn2cO3/uxHH/z14gifyPa0SmaLufv9LY20rGZ/FFex9Pl/N08/0m049k58+/0tp7MyY9+I15+cab+R9GOnz6Ij2IQe0UR0/zPN9L0teyr3z99Ny8vz09GJ/1m0W8qW7vnHw0AAAAAAAAAAAAAAAAAAAAAAP9hj8q7c5pR3N+TN5X376xd5N+sR1rpXL6fZ5yfVANduR9olMXX1f06j9M0zcqO0/x6PFeP+sOsGgAAAAAAAAAAAAAAAAAAAP5Zjj/+5HB3MNg/KoLXszKYtCwXVLcBVG/r/6vjdCct9aMXYnHn5nSuWhkuGDnWqj5JxMIy8kX8vd24dfDUTTV/8+2yA7b+vM/6dK7olJtxx+uqTtfhbjJ/D5tRtbSqQ/L9bJ9G3HKuxk2PsqWOX2Puo/bSa288UwSjBX0iWVTYK7+Md65sKX+hTid9GsWuzk1fL4OZ9CtnY6nzfP21Iknu/OUHAAAAAAAAAAAAAAAAAACYMX3T75yHZwtTa1lzZWUBAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAwL2afv7/JKhfa7kajMrkccsPry7o3Iij4wdeIgAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAP8DfwQAAP//4wFdTQ==") r4 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000280)='cpuacct.usage_percpu\x00', 0x275a, 0x0) write$UHID_CREATE2(r4, &(0x7f0000000040)=ANY=[], 0x118) mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x88fd537e5c114b6e, 0x11, r4, 0x0) ioctl$SG_NEXT_CMD_LEN(r4, 0x2283, &(0x7f00000001c0)=0xdc) r5 = socket$can_bcm(0x1d, 0x2, 0x2) socket$inet6(0xa, 0x2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/asound/seq/clients\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000100)={0x0, 0x3, 0x0, 0x1, 0x800}, 0x0, &(0x7f0000000240)={0x1f, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, &(0x7f0000000280)={0x0, 0x3938700}, 0x0) connect$can_bcm(r5, &(0x7f00000000c0), 0x10) sendmsg$can_bcm(r5, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)=ANY=[@ANYBLOB="05000000000000000100006be3", @ANYRES64=0x0, @ANYRES64=0xea60, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="0000000001"], 0x48}}, 0x0) sendmsg$can_bcm(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000580)=ANY=[@ANYBLOB="050000009f60000000000000e7000000c5", @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYRES64=0x0, @ANYBLOB="0000000001000000030000200103"], 0x48}, 0x1, 0x0, 0x0, 0x4}, 0x8800) prctl$PR_SET_SYSCALL_USER_DISPATCH_ON(0x3b, 0x1, 0x3ff, 0x8, &(0x7f0000006680)) syz_clone(0x40008011, 0x0, 0x0, 0x0, 0x0, 0x0) rt_sigtimedwait(&(0x7f0000000000)={[0xffffffffffffffff]}, 0x0, 0x0, 0x8) socket$nl_netfilter(0x10, 0x3, 0xc) copy_file_range(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)=0xc, 0x3, 0x0) 1.596587307s ago: executing program 2 (id=6508): mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x9) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f00000000c0), 0xffffffffffffffff) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), r0) sendmsg$ETHTOOL_MSG_LINKMODES_GET(r0, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r1, 0x321, 0x70bd27, 0x25dfdbfc, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}]}, 0x20}, 0x1, 0x0, 0x0, 0xa1}, 0x4000000) 1.534395351s ago: executing program 2 (id=6510): r0 = socket$key(0xf, 0x3, 0x2) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1, {0x3}}, './file0\x00'}) setsockopt$CAN_RAW_FD_FRAMES(r2, 0x65, 0x5, &(0x7f0000000180)=0x1, 0x4) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r3) sendmsg$NL80211_CMD_SET_REG(r3, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000880)={&(0x7f00000000c0)={0x14, r4, 0x8, 0x70bd27, 0x25dfdbfe}, 0x14}, 0x1, 0x0, 0x0, 0x20040040}, 0x0) sendmsg$nl_xfrm(r1, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000001f40)={&(0x7f00000004c0)=ANY=[@ANYBLOB="fc000000190001002dbd700000000000c73e4018e93188a32262b1cada1db60600000000000000000000000000000000ac1414aa00000000b64cabba773b5642", @ANYRES32=0x0, @ANYRES32, @ANYBLOB="00000000000000000c00000000000000000000000000000000000000000000000000000000000000ffffffffffffffff000000000000000000000000000000000000000000000000000a000000000000feffffffff7f40000200000000000008000000000000000001000600000000004400050064010102000000000000000000000000000000003c00000002000000ac1414aa00000000000000000000000006000000040300"/180], 0xfc}}, 0x0) sendmsg$key(r0, &(0x7f0000000000)={0x40000000, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=ANY=[@ANYBLOB="0207000902"], 0x10}}, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f00000000c0)=@l2tp6={0xa, 0x0, 0x2, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}, 0x80, 0x0}, 0xc810) mkdirat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x0) openat(0xffffffffffffff9c, &(0x7f0000004280)='./file0\x00', 0x0, 0x0) r5 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r5, 0x10f, 0x87, &(0x7f0000000280)={0x41}, 0x10) r6 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r6, 0x10f, 0x87, &(0x7f0000000280)={0x41, 0x4, 0x2}, 0x10) sendmsg$tipc(r6, &(0x7f0000000240)={&(0x7f0000000080), 0x10, 0x0}, 0x0) r7 = socket$tipc(0x1e, 0x2, 0x0) setsockopt$TIPC_GROUP_JOIN(r7, 0x10f, 0x87, &(0x7f0000000100)={0x41, 0x0, 0x2}, 0x1be) sendmsg$tipc(r6, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x44010}, 0x0) r8 = socket$kcm(0xa, 0x3, 0x3a) r9 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000300)='auxv\x00') preadv(r9, &(0x7f0000000000)=[{&(0x7f0000004540)=""/4095, 0xfff}, {0x0}], 0x2, 0xb, 0x5) r10 = socket$kcm(0x29, 0x2, 0x0) r11 = socket$kcm(0x2a, 0x2, 0x0) sendmsg$kcm(r11, &(0x7f0000001f80)={&(0x7f0000001d00)=@qipcrtr={0x2a, 0xffffffffffffffff, 0xfffffffe}, 0x80, 0x0}, 0x0) recvmsg(r11, &(0x7f0000000540)={0x0, 0x0, 0x0}, 0x40002182) ioctl$sock_kcm_SIOCKCMCLONE(r11, 0x5411, 0x0) setsockopt$MRT_ASSERT(r2, 0x0, 0xcf, &(0x7f00000001c0)=0x1, 0x4) sendmmsg$inet(r10, &(0x7f0000000440)=[{{0x0, 0x0, &(0x7f0000000b00)=[{&(0x7f00000006c0)="667634a4224ebb1721a99d660d089d8f96b2a5caad938c3ecbe172140af6d30098fcf7c71f1df7f33d6deb1b1ea3c1e783f5e2d46a304e9bccdcb77287067ca19f26ee5a3624fde4b84148682be8ff5f4ba060e4573b3f3211de589ec6561f69bef49eb25ba6286b268a4b66a3b7", 0x6e}], 0x1, &(0x7f0000000780)=ANY=[@ANYBLOB="05630633bfe458a67683e4e5", @ANYRES16, @ANYRESHEX=r8, @ANYRESOCT, @ANYRES64, @ANYRES16, @ANYRES32=r2, @ANYBLOB="62d52b67868cbbbbbdaf06f43d9a9224b91279a3a0ea1d55b9be336d375aff85f098769ba425b2682750ffb6dac78d108602f06305071228e23b7e13d992f7b7c9cbf38c9fa80418926f480d58c0f659f5fdf39b275c52a3bc5948014bcab90641df8401", @ANYRESDEC=r11, @ANYRES16=r10], 0xd0}}, {{0x0, 0x0, &(0x7f00000005c0)=[{&(0x7f0000000000)="b8", 0x1}], 0x1}}], 0x2, 0x810) 1.512316542s ago: executing program 1 (id=6511): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="98000000", @ANYRES16=r1, @ANYBLOB="050427bd7000fedbdf2501"], 0x98}, 0x1, 0x0, 0x0, 0x4000001}, 0x4040084) 1.448537265s ago: executing program 7 (id=6512): r0 = syz_genetlink_get_family_id$devlink(&(0x7f0000000580), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r1, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000300)={0x4c, r0, 0x1, 0x0, 0x0, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0xd}, {0x5, 0x8e}}]}, 0x4c}}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$key(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000300)=ANY=[], 0x10}}, 0x0) r2 = openat$thread_pidfd(0xffffffffffffff9c, &(0x7f0000000000), 0x8000, 0x0) fremovexattr(r2, &(0x7f0000000080)=@random={'user.', 'mm_page_alloc\x00'}) r3 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x72, 0x0, 0x0, 0x0, 0x0, 0x80000008, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext={0x3, 0x4}, 0x109001, 0x801, 0x800043, 0x5, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) r4 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) r5 = gettid() timer_create(0x0, &(0x7f0000533fa0)={0x0, 0x11, 0x800000000004, @tid=r5}, &(0x7f0000bbdffc)) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x1}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(0x0, 0x1, &(0x7f0000000040)={{0x77359400}}, 0x0) mmap(&(0x7f0000000000/0x200000)=nil, 0x200000, 0x300000b, 0x204031, 0xffffffffffffffff, 0xec776000) syz_mount_image$iso9660(&(0x7f00000002c0), &(0x7f0000000540)='./file0\x00', 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="0016150b3f000000000000f0d4354b5a255ada7999001fc8f9e982365349739b3c7c9b5e8deb88405cc272b3be8ccfb503a2273297f601e86c6be6fb632414e1d0e9b21ce82dbf007799fe5492a936da23ab3b6539199a736055c647615f7cac5c45e94860a05844b846a6f8254252a17f35c8f5355bfdd3f62dd2f30f129a"], 0x1, 0x521, &(0x7f00000013c0)="$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") r6 = openat(0xffffffffffffff9c, &(0x7f0000004280)='.\x00', 0x0, 0x0) getdents64(r6, &(0x7f0000000180)=""/52, 0x34) getdents64(r6, 0xfffffffffffffffe, 0x29) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000100)={{0x1, 0x1, 0x18, r3, {0x8}}, './file0\x00'}) mprotect(&(0x7f0000000000/0x2000)=nil, 0x2000, 0xc) r7 = socket(0x10, 0x2, 0x0) r8 = epoll_create1(0x0) r9 = epoll_create(0x1) openat$selinux_mls(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r9, 0x1, r7, &(0x7f0000000200)={0x4}) epoll_ctl$EPOLL_CTL_MOD(r8, 0x3, r7, &(0x7f0000000140)) epoll_pwait(r8, &(0x7f00000000c0)=[{}], 0x1, 0x0, 0x0, 0x0) 1.436841716s ago: executing program 1 (id=6513): bpf$TOKEN_CREATE(0x24, 0x0, 0x0) r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./bus\x00', 0xe, &(0x7f00000006c0)={[{@journal_ioprio={'journal_ioprio', 0x3d, 0x1}}, {@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0xeb0}}, {@debug_want_extra_isize={'debug_want_extra_isize', 0x3d, 0x68}}, {@lazytime}, {@nombcache}, {@noload}, {@noquota}]}, 0x3, 0x440, &(0x7f0000000280)="$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") r1 = bpf$MAP_CREATE(0x0, &(0x7f00000000c0)=ANY=[@ANYRESHEX=r0], 0x50) r2 = open(0x0, 0x0, 0x1) socket$nl_netfilter(0x10, 0x3, 0xc) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000080)=0x7) r3 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f00000002c0)=0x2) sched_setscheduler(r3, 0x2, &(0x7f0000000200)=0x6) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r4, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r5, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r4, &(0x7f00000000c0), 0x10106, 0x2, 0x0) socket$can_j1939(0x1d, 0x2, 0x7) r6 = socket(0x1e, 0x5, 0x0) munmap(&(0x7f0000003000/0x3000)=nil, 0x3000) getdents64(0xffffffffffffffff, &(0x7f0000002f40)=""/4098, 0x1002) kexec_load(0x0, 0x0, 0x0, 0x5) socket$nl_route(0x10, 0x3, 0x0) timerfd_gettime(r2, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000580), r6) ioctl$AUTOFS_IOC_PROTOSUBVER(0xffffffffffffffff, 0x80049367, 0x0) r7 = socket(0x1d, 0x2, 0x6) munmap(&(0x7f00003fe000/0xc00000)=nil, 0xc00000) munlock(&(0x7f000092d000/0x3000)=nil, 0x3000) ppoll(&(0x7f0000000140)=[{r1, 0x100}, {r7, 0x180}], 0x2, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x143041, 0x0) semget(0x1, 0x4, 0x39c) 1.413820538s ago: executing program 6 (id=6514): perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20, 0x9400, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x7}, 0x100, 0xa88, 0x8406, 0x5, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x0, 0x46}, 0x0, 0xffbfffffffffffff, 0xffffffffffffffff, 0x1) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSKBENT(r0, 0x4b47, &(0x7f00000000c0)={0x0, 0x9, 0x180}) bpf$PROG_LOAD(0x5, &(0x7f0000000280)={0x15, 0x2000000000000216, &(0x7f0000000440)=ANY=[@ANYBLOB="18000000000000000000000000000000850000000f00000018010000646c6c2400000000000000007b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000000600000095"], 0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x1c, '\x00', 0x0, @fallback=0x28, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x94) r1 = bpf$PROG_LOAD(0x5, &(0x7f00000005c0)={0x7, 0xc, &(0x7f0000000440)=ANY=[], &(0x7f0000000240)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0x2, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r2 = perf_event_open(&(0x7f00000012c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x20, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, r1) syz_emit_ethernet(0x36, &(0x7f0000000280)={@local, @random="1cf800", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x3, 0x7, 0x28, 0x66, 0x0, 0x9, 0x1, 0x0, @remote, @remote}, @timestamp={0xd, 0x0, 0x0, 0x3, 0x9c, 0x10229, 0x7, 0x6}}}}}, 0x0) syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/net\x00') r3 = bpf$PROG_LOAD(0x5, &(0x7f00000000c0)={0x16, 0xb, &(0x7f0000000580)=ANY=[@ANYBLOB="18000000000000000000000000000000180000002020702500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000000000000b703000000000000850000007000000095"], &(0x7f0000000200)='GPL\x00', 0x0, 0x0, 0x0, 0x41100, 0x0, '\x00', 0x0, @flow_dissector, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) bpf$BPF_PROG_TEST_RUN(0x1c, &(0x7f00000004c0)={r3, 0x3, 0x11, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x44) bpf$LINK_GET_NEXT_ID(0x1f, &(0x7f0000000040)={0x0, 0x0}, 0x8) r5 = bpf$LINK_GET_FD_BY_ID(0x1e, &(0x7f00000002c0)=r4, 0x4) bpf$LINK_DETACH(0x22, &(0x7f0000000340)=r5, 0x4) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x1, 0x0, 0x0, 0x0, 0x1000000009, 0x690bb, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_bp={0x0}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x100000000, 0x7, 0x2, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x3) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x10012, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x11000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xc0}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0xb) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r6, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="98000000", @ANYRES16=r7, @ANYBLOB="050427bd7000fedbdf2501"], 0x98}, 0x1, 0x0, 0x0, 0x4000001}, 0x4040084) r8 = syz_genetlink_get_family_id$wireguard(&(0x7f0000000200), 0xffffffffffffffff) getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, &(0x7f0000000340)=0x0, &(0x7f0000000380)=0x4) r10 = syz_open_dev$vcsn(&(0x7f0000000680), 0x6, 0x400880) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r10, &(0x7f0000000f40)={&(0x7f00000006c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000f00)={&(0x7f0000000700)={0x20c, 0x3, 0x1, 0x201, 0x0, 0x0, {0x7, 0x0, 0x4}, [@CTA_NAT_DST={0xc4, 0xd, 0x0, 0x1, [@CTA_NAT_V6_MINIP={0x14, 0x4, @local}, @CTA_NAT_PROTO={0x34, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e24}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e22}]}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast2}, @CTA_NAT_V4_MAXIP={0x8, 0x2, @empty}, @CTA_NAT_PROTO={0x4}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @remote}, @CTA_NAT_V4_MINIP={0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, @CTA_NAT_V6_MINIP={0x14, 0x4, @private1}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @mcast1}, @CTA_NAT_V6_MINIP={0x14, 0x4, @loopback}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x6}, @CTA_MARK_MASK={0x8, 0x15, 0x1, 0x0, 0x2}, @CTA_TUPLE_REPLY={0x4c, 0x2, 0x0, 0x1, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x46}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x84}}, @CTA_TUPLE_ZONE={0x6}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5, 0x1, 0x11}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @rand_addr=0x64010101}}}]}, @CTA_TIMEOUT={0x8, 0x7, 0x1, 0x0, 0x440b}, @CTA_NAT_SRC={0xc8, 0x6, 0x0, 0x1, [@CTA_NAT_V4_MAXIP={0x8, 0x2, @local}, @CTA_NAT_V4_MINIP={0x8, 0x1, @remote}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @mcast1}, @CTA_NAT_V6_MINIP={0x14, 0x4, @remote}, @CTA_NAT_V6_MINIP={0x14, 0x4, @private1={0xfc, 0x1, '\x00', 0x1}}, @CTA_NAT_V6_MINIP={0x14, 0x4, @mcast1}, @CTA_NAT_PROTO={0x1c, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0xf0c9}]}, @CTA_NAT_PROTO={0x34, 0x3, 0x0, 0x1, [@CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e22}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e20}, @CTA_PROTONAT_PORT_MIN={0x6, 0x1, 0x4e21}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e21}, @CTA_PROTONAT_PORT_MAX={0x6, 0x2, 0x4e23}]}, @CTA_NAT_V6_MAXIP={0x14, 0x5, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, @CTA_ID={0x8}]}, 0x20c}, 0x1, 0x0, 0x0, 0x20000004}, 0x800) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, &(0x7f00000003c0)={'wg0\x00', 0x0}) io_setup(0x8001, &(0x7f0000000580)) sendmsg$WG_CMD_SET_DEVICE(0xffffffffffffffff, &(0x7f00000004c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000400)={&(0x7f0000000940)={0x5b8, r8, 0x400, 0x70bd2d, 0x25dfdbfe, {}, [@WGDEVICE_A_IFINDEX={0x8, 0x1, r9}, @WGDEVICE_A_FWMARK={0x8, 0x7, 0x101}, @WGDEVICE_A_IFINDEX={0x8, 0x1, r11}, @WGDEVICE_A_PEERS={0x58c, 0x8, 0x0, 0x1, [{0x588, 0x0, 0x0, 0x1, [@WGPEER_A_ALLOWEDIPS={0x574, 0x9, 0x0, 0x1, [{0x10c, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @empty}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0xb}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x3a}}, {0x5, 0x3, 0x2}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @loopback}, {0x5, 0x3, 0x2}}]}, {0x88, 0x0, 0x0, 0x1, [@ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x13}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x20}}, {0x5, 0x3, 0x2}}]}, {0x28, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2}, {0x5, 0x3, 0x2}}]}, {0x40, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}]}, {0xc4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00'}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @rand_addr=0x64010100}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @private=0xa010102}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x2f}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, {0x5, 0x3, 0x1}}]}, {0xf4, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @mcast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @multicast2}, {0x5}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @multicast1}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @initdev={0xac, 0x1e, 0x1, 0x0}}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x44}}, {0x5, 0x3, 0x2}}, @ipv4={{0x6}, {0x8, 0x2, @dev={0xac, 0x14, 0x14, 0x39}}, {0x5, 0x3, 0x1}}, @ipv4={{0x6}, {0x8, 0x2, @broadcast}, {0x5, 0x3, 0x1}}]}, {0x4c, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @private1={0xfc, 0x1, '\x00', 0x1}}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @private1}, {0x5, 0x3, 0x1}}]}, {0x130, 0x0, 0x0, 0x1, [@ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x2}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @multicast1}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0x18}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @private0={0xfc, 0x0, '\x00', 0x1}}, {0x5}}, @ipv6={{0x6}, {0x14, 0x2, @empty}, {0x5, 0x3, 0x3}}, @ipv6={{0x6}, {0x14, 0x2, @dev={0xfe, 0x80, '\x00', 0xb}}, {0x5, 0x3, 0x1}}, @ipv6={{0x6}, {0x14, 0x2, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010100}}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @loopback}, {0x5, 0x3, 0x3}}, @ipv4={{0x6}, {0x8, 0x2, @local}, {0x5, 0x3, 0x2}}]}]}, @WGPEER_A_PROTOCOL_VERSION={0x8}, @WGPEER_A_PERSISTENT_KEEPALIVE_INTERVAL={0x6, 0x5, 0xc3}]}]}]}, 0x5b8}, 0x1, 0x0, 0x0, 0x4010}, 0x8040) getresgid(&(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080)) 1.2004415s ago: executing program 7 (id=6515): socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2a, 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r3 = memfd_secret(0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000000010000000000", @ANYRES32=0x1, @ANYBLOB="0200"/15, @ANYRES32=r1, @ANYRES32, @ANYBLOB="0400000002000000040000000000000000000000065faad5598733d2"], 0x50) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000740), 0x0, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0x0, 0xfff}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x11, 0x4, &(0x7f0000000380)=@raw=[@call={0x85, 0x0, 0x0, 0x7d}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8}], &(0x7f00000002c0)='GPL\x00', 0x102, 0xf9, &(0x7f0000000400)=""/249, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, &(0x7f00000005c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x1, 0x8, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r3, r4, r0, r5, r6, r7, 0x1], 0x0, 0x10, 0x3}, 0x94) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x19, @private0, 0x8b}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r8, 0x3}, &(0x7f0000000140)=0xc) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x794bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000400) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x2, 0x4, 0x8, 0x9}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x0, r9, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x50) 1.049068249s ago: executing program 7 (id=6516): r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000000)={[0xfffffffffffffff7]}, 0x8, 0x0) read$watch_queue(r0, &(0x7f0000000180)=""/153, 0xffffffffffffff51) r1 = syz_open_dev$MSR(&(0x7f00000000c0), 0x0, 0x0) ioctl$X86_IOC_RDMSR_REGS(r1, 0xc02063a0, &(0x7f0000000180)=[0x1, 0x4, 0x20000005, 0xffffff01, 0x9, 0x401, 0xe, 0x2]) 923.989186ms ago: executing program 7 (id=6517): r0 = syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000000)='./file1\x00', 0x10000, &(0x7f0000000080)={[{@nombcache}, {@delalloc}, {@data_err_ignore}, {@nojournal_checksum}, {@usrjquota}, {@bsdgroups}]}, 0x1, 0x4cd, &(0x7f0000000c80)="$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") quotactl$Q_QUOTAON(0xffffffff80000201, &(0x7f0000000180)=@loop={'/dev/loop', 0x0}, 0xffffffffffffffff, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x9) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='hugetlb.1GB.usage_in_bytes\x00', 0x275a, 0x0) syz_clone3(&(0x7f0000000040)={0x1a0000280, 0x0, 0x0, 0x0, {0x30}, 0x0, 0x0, 0x0, &(0x7f0000000100)=[0x0], 0x1}, 0x58) keyctl$instantiate(0xc, 0x0, &(0x7f0000000100)=ANY=[], 0x2a, 0x0) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x140, 0x0) ioctl$PTP_EXTTS_REQUEST2(r2, 0x40103d0b, &(0x7f0000002000)={0x9, 0x9}) socket$inet6_udp(0xa, 0x2, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xa, 0x28011, r1, 0x0) r3 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/power/sync_on_suspend', 0x53fa82, 0x6f) write$tcp_mem(r3, 0x0, 0x0) madvise(&(0x7f0000000000/0x600000)=nil, 0x600003, 0x15) r4 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCSTI(r4, 0x5412, &(0x7f00000000c0)=0x29) ioctl$TIOCSTI(r4, 0x5412, &(0x7f0000000140)=0x8) dup3(r0, r1, 0x80000) unlinkat(0xffffffffffffff9c, &(0x7f0000000180)='./file0/file0\x00', 0x0) 817.548722ms ago: executing program 7 (id=6518): socket$nl_route(0x10, 0x3, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) bind$netlink(r0, &(0x7f0000000180)={0x10, 0x0, 0x800000, 0x1410}, 0xc) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0xf) socket$nl_route(0x10, 0x3, 0x0) bind$netlink(0xffffffffffffffff, &(0x7f0000000280)={0x10, 0x0, 0x0, 0x80}, 0xc) r1 = socket$netlink(0x10, 0x3, 0x0) bind$netlink(r1, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc) r2 = socket$netlink(0x10, 0x3, 0x8) bind$netlink(r2, &(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000}, 0xc) r3 = socket$netlink(0x10, 0x3, 0x4) bind$netlink(r3, 0x0, 0x0) r4 = socket$netlink(0x10, 0x3, 0x4) writev(r4, &(0x7f0000000100)=[{&(0x7f0000000000)="580000001400192340834b80043f679a10ff3d425f9cc3f4ff7f4e32f61bcdf1e422a6ff00000100804824cabecc4b381eaadc28f23457e792945f64009400050028925aaa000000c600000000000000feff2c707f8f00ff", 0x58}], 0x1) 781.855794ms ago: executing program 4 (id=6519): r0 = socket$inet_udp(0x2, 0x2, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000280)=0x8) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff}) connect$unix(r1, 0x0, 0x0) bpf$PROG_LOAD(0x5, &(0x7f00000054c0)={0xe, 0x16, &(0x7f0000001900)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @sk_skb}, 0x94) socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$inet_udp_int(r0, 0x11, 0x67, &(0x7f0000000000)=0x507, 0x4) sendmmsg$inet(r0, &(0x7f0000000600)=[{{&(0x7f0000000080)={0x2, 0x4e20, @local}, 0x10, 0x0}}], 0x1, 0x2000c844) r2 = socket$netlink(0x10, 0x3, 0x0) writev(r2, &(0x7f00000003c0)=[{0x0}], 0x1) sendto$inet(r0, &(0x7f00000000c0)="8689d46205a34100bf2bbe11a5ce7839edaf02afe39ead95913e9c4f8cf31440606769ebdf12cfacae8e8c03f5db079da7d9ecda75e2a7d49d5cbcb370c4d789390a328ba42c9c60cf2154d1b659aa709e8980a522cfb72f23ad87fb7019706ccae98cfe7c4fd23e8297b8cabc46ede1ac3da78f1b488c6357e7edfcd417df6660af20a54ecdcb02f689ae15ee655d4b7b1ea733e88ee9f53669388dff487c1c49953f3bc142112bd4b582b29b35d43962ed245c2cd5d5df40a3e0ed6beaf3b641e84b0f0dfa121a9efe05269f9f4a0e9bcbf43c7a90a711f453668c730c3badedca687b71a9c27bab9e724cc4a4918713031596ea6fd01124f973f257ccd9665aee7df4a9d64f079d176abc00000000d7af3e2dd4396f72373fb0a787a6129ca41181f5087fb843212550b58e3707d5a0399de36c2503836cbe2133de4f574e9e05c96788b0de1bd13e390445433d96737b964fa8af2ac4b2f0f9390ca93d8d3d810044d024359e067c4553230ab748947d33f8fc115ce9a49e6571c45a05d786cbd49342c236537dbbeec666b07baab917252113a5b9a77283189b518f356debe42d80cf2d0687b9c64d0253a6a09286fded6e4f8557b8fb4f25ca4fb138af8945c74bbc98748eaaa030be5317646f195e6e085ac6ddb29542e3581961259987241f7e7061526a7afec8962e74215fea43703a4e543ee9d1a3c3f5f2a41977ece8fdadcf89ce331ce59bebae5f53513d0e10485d7ddbda60513bf339602510b3a23ea29a0d5d03a61e34d12942ea4a847c884b27b5344a456d02a55f8929cc567e7c792c01fab7a7b32780a14c361000609b817dd91507b04d875279527946fdb8fb92a512485e234d092c28f1d0a0498731ccc0eb10515d510e8945839307b46512ceca6f495fdd2c6ae5eb2ef3b2a40ebdc7edf0048e3fb5e3d97a9ea5113a6b70d20ad5c43f0df95d88c0f121a1884da21a21f0ba47420f8391a97921cc51871dbb272e43710fe71d5e342c3afd10608a8b02f00e8fbd8d570b6faace86c494ecea8913233391e7b7cec3d571bb3032181ed58e1b513e511f79ee562c8cde9b3b74c2e95dcde7fadb5a666bdc0c1684794620ce8cf0c0aee8e90b3ef6e7160d3f055cb4d1ced32e4edc15e7d102952d3237e6c02c591a95a182bf190c0124abc7f1225332ff1c5e1b94e4e9bf02c1a18bd7bfce20707f7298da322560bc1a4cf298d46f5bf8ff41da21e25aa17f65f9ee43ca890b5ef6a3ccf3efedf3ca60a9acef1352ad0c43e6cf375108cf0974ce89a99adba7e6a3f8949dc573440fafe0e3abdd0066057a2d868e8386080f18a421568d8e7a89536a4173861bd55245c8fcf7dcba18edce36d2e85b9630fbc218db9ebd16abb11ac06fdbf2bc3e6394d4c6e7ae71813d30772d487743a2856348fee09989ce03331e7848770fc91e62191c20fe5f4a73c5dae467dd612bdb63b1e50921d38271305d7412103d5a6214d6d534d1d530b9169f882b6926bbd338f0282a8bd9a44603934e5249e83f1d0947b39f82a7843d2b6f796d8abf7ff3e66cfd4519324d71cebbf6580dffc10d555e479e9acaa12c3c59e3732c181aa4223d0fcdac514e9d7c7963c2634964520286b028f60a4ae612b8e6049315139e884cbffd6836253094ad023329183496cf663366ad4d7f7f5f1bd2db9b0d33f106c041fba4494c7da404d45d8955e5459ca4a62862721ec1fa534fd95e262c5814426816e60000000000000000001aa4fb6f40ec24f42f6949cc28d2a0d4eb61cb1664627582d962523586539445b81e9759321652280ecb", 0xffe3, 0x6000000000000000, 0x0, 0x0) 684.56532ms ago: executing program 7 (id=6520): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x7, 0x100}, 0x0) sched_setscheduler(0x0, 0x1, &(0x7f0000000240)=0x7) r0 = getpid() socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000180)) sched_setscheduler(r0, 0x2, &(0x7f0000000340)=0x7) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0xb635773f06ebbeee, 0x8031, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs={0x0, 0x0, 0x1}, 0x6e) sendmmsg$unix(r2, &(0x7f0000000000), 0x651, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000000)=0x6) r3 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000004c0), 0x48000) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r3, 0xc08c5332, &(0x7f0000000e00)={0x9, 0x9, 0x0, 'queue0\x00', 0x401}) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r3, 0xc08c5335, &(0x7f00000001c0)={0x0, 0x80, 0x1, 'queue0\x00'}) 601.997375ms ago: executing program 6 (id=6521): r0 = socket$inet6(0xa, 0x3, 0x84) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000080)={{{@in6=@local, @in=@local, 0x0, 0x0, 0x4e20, 0x0, 0x2}, {0x0, 0x0, 0x0, 0x2, 0x8001, 0x40000000000, 0x2}, {0x0, 0x69f}, 0x0, 0x1, 0x1}, {{@in=@loopback, 0x4d6, 0x3c}, 0x2, @in=@empty, 0x0, 0x3}}, 0xe8) r1 = socket$netlink(0x10, 0x3, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, 0x0) openat$ptmx(0xffffffffffffff9c, 0x0, 0x80, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RATE_NEW(r1, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000700)={0x0}, 0x1, 0x0, 0x0, 0x41}, 0x0) 600.823625ms ago: executing program 4 (id=6522): r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x8}}, './file0\x00'}) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f00000002c0)={0x2000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) select(0x40, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x300, 0x20}, 0x0, 0x0, &(0x7f0000000100)={0x77359400}) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000004cc0)=[{{0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f00000003c0)="f6", 0x1}], 0x1}}], 0x1, 0x10) mount_setattr(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000380), 0x48) ioctl$TCSETS(r2, 0x40045431, &(0x7f0000000100)={0x0, 0x42f, 0xfffffff9, 0x7fff, 0x16, "0062ba7d82000000000000000000f7ffffff00"}) r3 = syz_open_pts(r2, 0x0) ioctl$TIOCSSOFTCAR(r3, 0x541a, &(0x7f0000000080)=0x2) r4 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0xb, 0x510, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x1, @perf_config_ext={0xd07, 0x40}, 0x100b28, 0x6, 0x0, 0x1, 0x8, 0x20005, 0xb, 0x0, 0x0, 0x0, 0x20000006}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000002c0), 0x40, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r5, 0xc018937e, &(0x7f0000000200)={{0x1, 0x1, 0x29}, './file0\x00'}) ioctl$SNDRV_TIMER_IOCTL_SELECT(r4, 0x5422, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000400)=ANY=[@ANYBLOB="48e9a30376fc8b2844000000000000d5f40e276e42b592eaa47d78a72ccb6b4c07011ba769e055f18120", @ANYRES32=0x0, @ANYBLOB="0002000000800000140012800900010076657468000000000400028008000300000000000a00010002e8eb3dff9f0000"], 0x48}}, 0x8000) r6 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) bpf$MAP_GET_NEXT_KEY(0x4, &(0x7f0000000200)={r6, &(0x7f0000000080)="835fc71bf8c6e19777ce482fe01e16c3516d8508d6d642bdfeaaaa01815528e93459d98f90ad9233d1ebca91e01c3fdcbc17c4297891657ac900aa11da87b9767a032f8352b0b1e832ad2941dcb36d6e0f1dd8", &(0x7f0000000100)=""/226}, 0x20) 385.774638ms ago: executing program 1 (id=6523): r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$team(&(0x7f00000004c0), 0xffffffffffffffff) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000004bc0)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000700)=ANY=[@ANYBLOB="98000000", @ANYRES16=r1, @ANYBLOB="050427bd7000fedbdf2501"], 0x98}, 0x1, 0x0, 0x0, 0x4000001}, 0x4040084) 336.13973ms ago: executing program 2 (id=6524): r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000180), r1) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="01002cbd7000ffdbdf2521000000050020000000000009001f0070687930000000000a0001"], 0x34}, 0x1, 0x0, 0x0, 0x44801}, 0x0) r3 = socket$l2tp6(0xa, 0x2, 0x73) r4 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r4, &(0x7f0000000040)={0xa, 0x0, 0xfffffffe, @empty}, 0x20) bind$l2tp6(r3, &(0x7f0000000000)={0xa, 0x0, 0x1, @empty, 0x0, 0x6}, 0x20) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$l2tp(&(0x7f0000000140), r5) sendmsg$L2TP_CMD_TUNNEL_CREATE(r5, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000003c0)=ANY=[@ANYBLOB='\\\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="0100000000000000000001000500050007000000000008000900030000001400200000000000000000000000e1ffe000000108000a0000000000060002000100000014001f"], 0x5c}, 0x1, 0x6c}, 0x0) r7 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r9 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000b00)={0x6, 0xc, &(0x7f00000008c0)=ANY=[@ANYBLOB="180200000400000000000000000000008500000041000000180100002020732500000000002020207b1af8ff00000000bfa100000000000007010000f8ffffffb702000008000000b703000000000000850000006e00000095"], &(0x7f0000000240)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, @fallback=0xe, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) r10 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r9) r11 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r11, 0x8933, &(0x7f0000000340)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_ADD_DEV(r9, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000380)=ANY=[@ANYBLOB='P\x00\x00\x00', @ANYRES16=r10, @ANYBLOB="4d7e00000000000000002a00000008002f000000000005003600000000000c0005000000000200000000050037000000000008000200", @ANYRES32=r12, @ANYBLOB="06000600fe000000060004"], 0x50}, 0x4, 0x700000000000000, 0x0, 0x4}, 0x4040084) r13 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), r8) sendmsg$IEEE802154_LLSEC_DEL_DEV(r7, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f00000004c0)=ANY=[@ANYBLOB='(\x00', @ANYRES16=r13, @ANYBLOB="07f026bd7000fedbdf252b0000000c0005000000000208000200534bab959b87843e892eb0ba76041f4ae2f356fff462da6859fd3b9f1dd83e3f39ccf84e32f088000ac2a9d2628b2759be12c2eeb7f24f4e82eb35d087857d47d9aec80981", @ANYRES32=r12, @ANYBLOB], 0x28}, 0x1, 0x0, 0x0, 0xc0000}, 0x8000) sendmsg$IEEE802154_LIST_IFACE(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000180)={0x54, r2, 0x400, 0x70bd2b, 0x25dfdbff, {}, [@IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan1\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r12}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan4\x00'}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x65, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0xb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc093, 0x2, @perf_bp={0x0, 0x8}, 0x4, 0x0, 0x11000, 0x0, 0x2, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0xb5}, 0x0, 0xdfffffffffffffff, 0xffffffffffffffff, 0x1) migrate_pages(0x0, 0xfc, &(0x7f0000000200)=0x7ffffffffffffffd, &(0x7f0000000240)=0x1) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f0000000100)='./file1\x00', 0x2800050, &(0x7f0000003240)=ANY=[], 0x6, 0x342, &(0x7f0000000680)="$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") socket(0x2, 0x80805, 0x0) r14 = perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x29, 0x1, 0x0, 0x0, 0x0, 0x9, 0x640b9, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x2, @perf_config_ext={0x800000, 0x3fff8000}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x9, 0x6, 0x2, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r15 = bpf$PROG_LOAD(0x5, &(0x7f00000018c0)={0x5, 0x5, &(0x7f0000000480)=ANY=[@ANYBLOB="180800000000000000000000000000001800000000000000000000000000000095"], &(0x7f0000000440)='syzkaller\x00', 0x4, 0x0, 0x0, 0x0, 0x48, '\x00', 0x0, @fallback=0x1d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x94) ioctl$PERF_EVENT_IOC_SET_BPF(r14, 0x40042408, r15) prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f0000000180)={0x1, &(0x7f0000000080)=[{0x200000000006, 0x0, 0x0, 0x7ffc0002}]}) 120.478553ms ago: executing program 6 (id=6525): pselect6(0x40, &(0x7f0000000000)={0x0, 0x5, 0x6f1, 0x3ff, 0x551f, 0xf, 0x9, 0xfffffffffffff5ed}, &(0x7f0000000040)={0x7, 0x8, 0x0, 0x2, 0x5, 0x9, 0x4, 0x200}, &(0x7f0000000080)={0x2, 0x6, 0x7, 0x11a1, 0x39, 0x8001, 0x4, 0xab6}, &(0x7f00000000c0), &(0x7f0000000140)={&(0x7f0000000100), 0x8}) r0 = epoll_create(0x588) r1 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000001c0)={0x90002000}) r2 = eventfd(0x8) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000200)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_TREE_SEARCH(r1, 0xd0009411, &(0x7f0000000400)={{0x0, 0x5, 0xb0, 0x80000000, 0x400, 0x1, 0x1, 0x7, 0x80, 0x9, 0x9, 0x2, 0x1000, 0x2, 0x36c675bb}}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r2, 0xd000943e, &(0x7f0000001400)={r3, r4, "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", "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"}) ioctl$BTRFS_IOC_SPACE_INFO(r1, 0xc0109414, &(0x7f0000002400)={0x6ad, 0x80000001, ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x14, &(0x7f000000c480), &(0x7f000000c4c0)=0x4) ioctl$BLKREPORTZONE(r1, 0xc0101282, &(0x7f000000c500)={0x8, 0x1, 0x0, [{0x8ae, 0x4, 0xe, 0x4d, 0x6, 0x9, 0x10, '\x00', 0x10000}]}) ioctl$BTRFS_IOC_START_SYNC(r1, 0x80089418, &(0x7f000000c580)=0x0) ioctl$BTRFS_IOC_SNAP_CREATE_V2(r0, 0x50009417, &(0x7f000000c5c0)={{r0}, r5, 0x18, @unused=[0x100000000, 0x4, 0xc80], @subvolid=0xfffffffffffffff9}) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r2, 0x8010661b, &(0x7f000000d5c0)) setsockopt$MRT6_FLUSH(r1, 0x29, 0xd4, &(0x7f000000d600)=0x9, 0x4) epoll_pwait(r0, &(0x7f000000d640)=[{}], 0x1, 0xcf6, &(0x7f000000d680)={[0x10000]}, 0x8) sendmsg$inet6(r1, &(0x7f000000df80)={&(0x7f000000d6c0)={0xa, 0x4e24, 0x6, @dev={0xfe, 0x80, '\x00', 0xb}, 0x7}, 0x1c, &(0x7f000000de00)=[{&(0x7f000000d700)="b91e94fb05a3709f7c1db85b5309f44894994f15ef50cf2c81d2faa71fa418689427812da204752fa45a71ec05919f9b70d7fbbfdcbc469867fedf791c614c87661f1ed749251f6467dddcb15bccde935dea9fd8a687c41175bbe8f3af5073a453a7fbc42f69dc95dc4069e40ae105daa8782b04e1659a057ced9bfb8987795b3b42d9628ef6d207f3adf16c4b5052810963297f56bb7dddca22be1314a213a0afc292da5b61afd2f2bc46c04e765918d3750cc10151543c156fa332961cf369d202ac", 0xc3}, {&(0x7f000000d800)="1de9241545ce96f41a5a0115244414c852279a316be160f25e120c02742f819dd817555d276ba113c19d", 0x2a}, {&(0x7f000000d840)="2c831d02ed613b9ec33190edbec522cb47048bb6c5b8dfda4a807bf65c953337d6f46237851fa065e24eb46f201511f0ac1bc63cb6288d902c281e8dbb5ecfaedc01a4f84e611bbff971216531a9aceb90d3499bd4f6cc50e02a482fa71dc0a6cc9c9e737d47b691e5464fd53f905e3a6d692aec3a63d32cc84493adfdee7ff3303a5c6898856bd7a2f064f45391a2c996f0f63b5a7c8862e5f504b97807d8e58b01e45567a26fdad996b8f5b39c7ccd8cdd5a5b3c45f4c22a266350aeb56f7c0b2e0ab032d2aea54f8846ef281a22ed304c299577996d9eed96f7af6862aca1c3ee39f8216b2269515444b8cdae37e6655d0d0cb8725be21a8a", 0xfa}, {&(0x7f000000d940)="ec2a32ad34a8070bfb2b5bd9ddeee9360bac704fe16671862202e057fe883324bf79a59dca24aedcec076e3a3d1d7e3752945509cdf017c39da37bc7da2e283eaf3303f5d4bcdcb90febdc271f3d7ed384d911acf186871a64d57135d1562bb61b1a76d41d44f7518ad12ebb97b40be8c5b1bbac6f0d3ef09b0012e4ee3a9869d8e0732abe38576d0c5d7a4b6d5dfc41246fad9635b08c0cf3f657dd348fff642b8c61a652368fa3585c027e47428c209726af2fb02049bc447e2035a6754c539d3b557413a26bd0f82de7717a9907a456b033ab740a9f8c723c93b0318e2097a046", 0xe2}, {&(0x7f000000da40)="e72e1165346828750f52eaab3c0f30b9c140ebce5d8eb4a1a7c6c230d8b73c21dbead7db316ef6bc9e9bbba47e058e0ee37afac742ecaa4f3607bdac176e71a035a386f6c5347673f2f206266bb89ec8e80dd2f232d6042e58787f4d77d96ad11f17b1f50985dbba3941354023638493acd4311737577e3ae0db91cf7e0694c9f473e8550299a3c5bf14f1d9e7627b60d409af3164", 0x95}, {&(0x7f000000db00)="8d10a11bfd88b00ea6925d9001e260995e5aad7ac98c8ff0fbef7ffb9d89a269fb185a11d34cae3a2dfeed27b2f0c9fe99c0a911161d35", 0x37}, {&(0x7f000000db40)="866fa93c2cc776eaa9e03d", 0xb}, {&(0x7f000000db80)="249e9172d66366857bb4ddb1d8a9be9f00ddcea324f62c042797f62449e16e07dca325f84ade831425e2b2396adc17c5d041ab9ac81a5e2c2e885ac390c710150f29e35ba937256d975b623efe6495967c172fcb9d5b955a0c4c502a208a3398be154ca96d9175f13f5f22e09a48ba9a36ad3cf494b2ca6e225b55b2c82fa7d8c10979f45b832a48e72527b733dd3777ded88a0dd72310d6c51b2d5f72d0972c9bb8cf5d7210356c2417e63e3fcde7fb3b7a95ea3659982bf9e3d36b7e852c9f0eb0f6b79f9f59ccb5c5633571", 0xcd}, {&(0x7f000000dc80)="256a2f010bc8bd8ec19c0ae17ebe604cccb4ff6bd7c4a9e0e8ce9c34237f3d35c14862c399e7c1202a4fdcc387ea3b79e74095579e65d3e0d35fb05b9cea62590b153a9184ba52a11de48dbd250268f7f66dea2c1e7064890169bc65d1e0161e94e9961c4f271212148a0d3f9b102e4e55739a079c4762a0b84e208172bf78315fcc6e627cdfdd9abaeaf99e94727737014d105db30ed52f62b1a3015eccff3e", 0xa0}, {&(0x7f000000dd40)="893c1ec20312d6ff680768dda2c94812715cbc28dac00d0692c2f8e96919acd8d6831024d20fa956ff6e6fff1262b5b3bb7ccedfaf7181c0ac6401de7aa6957f12491d606c73e2c3feacb16d1d9ec1705b1eaccd8a1e000a3f241c4e14ade1a2288da3ceb1453412db0fdcd875b8d75f3986e782f6d0f6dd2d4502520d20fecc36c356ff8abb7a9d", 0x88}], 0xa, &(0x7f000000dec0)=[@dstopts={{0x80, 0x29, 0x37, {0x89, 0xc, '\x00', [@jumbo={0xc2, 0x4, 0xf}, @calipso={0x7, 0x50, {0x2, 0x12, 0x2, 0xb, [0x1, 0x0, 0x9, 0x1, 0xad, 0x3, 0x8, 0xa2c, 0xac35]}}, @jumbo={0xc2, 0x4, 0x45883437}, @jumbo={0xc2, 0x4, 0x6}, @pad1]}}}, @hoplimit={{0x14, 0x29, 0x34, 0x100}}], 0x98}, 0x4) syz_open_dev$tty1(0xc, 0x4, 0x3) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(r1, 0x84, 0x76, &(0x7f000000dfc0)={0x0, 0x1}, &(0x7f000000e000)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r1, 0x84, 0x11, &(0x7f000000e040)={r6, 0x4}, 0x8) socket$nl_netfilter(0x10, 0x3, 0xc) r7 = syz_init_net_socket$llc(0x1a, 0x2, 0x0) ioctl$FS_IOC_GETFSMAP(r7, 0xc0c0583b, &(0x7f000000e080)={0x0, 0x0, 0x5, 0x0, '\x00', [{0x800, 0x65, 0xffffffffffffffff, 0x8, 0x9, 0x7}, {0x604, 0x2, 0x4, 0x1, 0x0, 0x5}], ['\x00', '\x00', '\x00', '\x00', '\x00']}) r8 = socket$inet_mptcp(0x2, 0x1, 0x106) connect$inet(r8, &(0x7f000000e280)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x15}}, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f000000e2c0), r1) fstat(r0, &(0x7f000000e300)) recvmsg$inet_nvme(r1, &(0x7f000000e800)={0x0, 0x0, &(0x7f000000e780)=[{&(0x7f000000e380)=""/174, 0xae}, {&(0x7f000000e440)=""/14, 0xe}, {&(0x7f000000e480)=""/233, 0xe9}, {&(0x7f000000e580)}, {&(0x7f000000e5c0)=""/24, 0x18}, {&(0x7f000000e600)=""/56, 0x38}, {&(0x7f000000e640)=""/204, 0xcc}, {&(0x7f000000e740)=""/24, 0x18}], 0x8}, 0x100) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0, 0x40010, r0, 0xeb9c7000) ioctl$sock_inet6_SIOCADDRT(r1, 0x890b, &(0x7f000000e900)={@empty, @mcast2, @empty, 0x6, 0x0, 0x6, 0x400, 0x9, 0x20020}) 96.607764ms ago: executing program 1 (id=6526): socket$nl_route(0x10, 0x3, 0x0) r0 = socket(0x2a, 0x2, 0x0) getsockname$packet(r0, &(0x7f0000000200)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f00000001c0)=0x14) r2 = bpf$BPF_BTF_GET_FD_BY_ID(0x13, 0x0, 0x0) r3 = memfd_secret(0x0) r4 = bpf$MAP_CREATE_RINGBUF(0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="1b00000000000000000000000000010000000000", @ANYRES32=0x1, @ANYBLOB="0200"/15, @ANYRES32=r1, @ANYRES32, @ANYBLOB="0400000002000000040000000000000000000000065faad5598733d2"], 0x50) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) r6 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000740), 0x0, 0x0) r7 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000780)={0x0, 0xfff}, 0xc) bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000880)={0x11, 0x4, &(0x7f0000000380)=@raw=[@call={0x85, 0x0, 0x0, 0x7d}, @exit, @initr0={0x18, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x0, 0x8}], &(0x7f00000002c0)='GPL\x00', 0x102, 0xf9, &(0x7f0000000400)=""/249, 0x41000, 0x51, '\x00', r1, 0x0, r2, 0x8, &(0x7f00000005c0)={0x0, 0x3}, 0x8, 0x10, &(0x7f0000000600)={0x5, 0x1, 0x8, 0x7}, 0x10, 0x0, 0x0, 0x0, &(0x7f00000007c0)=[r3, r4, r0, r5, r6, r7, 0x1], 0x0, 0x10, 0x3}, 0x94) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000000080)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x4e20, 0x19, @private0, 0x8b}]}, &(0x7f00000000c0)=0x10) getsockopt$inet_sctp6_SCTP_DEFAULT_PRINFO(r0, 0x84, 0x72, &(0x7f0000000100)={r8, 0x3}, &(0x7f0000000140)=0xc) perf_event_open(&(0x7f0000000500)={0x2, 0x80, 0x27, 0x6, 0x0, 0x0, 0x0, 0x9, 0x794bb, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x107b7e, 0x1, @perf_bp={0x0, 0xc}, 0x0, 0x32, 0x43a1bd76, 0x7, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unshare(0x20000400) r9 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)=@base={0x2, 0x4, 0x8, 0x9}, 0x50) bpf$MAP_CREATE(0x0, &(0x7f0000000040)=@base={0xd, 0x6, 0x4, 0x1, 0x0, r9, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x3}, 0x50) 444.56µs ago: executing program 2 (id=6527): prlimit64(0x0, 0xe, &(0x7f0000000140)={0x8, 0x8b}, 0x0) sched_setscheduler(0x0, 0x2, &(0x7f0000000080)=0x8) fcntl$lock(0xffffffffffffffff, 0x7, 0x0) timer_create(0x0, 0x0, &(0x7f0000000300)=0x0) fcntl$lock(0xffffffffffffffff, 0x6, &(0x7f0000000040)={0x0, 0x0, 0x60d3, 0x5}) mprotect(&(0x7f0000000000/0xf000)=nil, 0xf000, 0x1) timer_settime(r0, 0x1, &(0x7f0000000040)={{}, {0x0, 0x989680}}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f0000004200)=[{{0x0, 0x0, 0x0}, 0x2}], 0x1, 0x2, 0x0) 0s ago: executing program 1 (id=6528): perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x3, 0x0, 0x5, 0x0, 0x0, 0x20, 0x42140, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_config_ext={0x3fffffffc, 0x400}, 0x70, 0x0, 0x0, 0x3, 0xfff, 0x8001, 0x7fff}, 0x0, 0xfff0000000000000, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x100, 0x12504, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x7610, 0xe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f00000001c0)=ANY=[@ANYBLOB="d0000000", @ANYRES16=r2, @ANYBLOB="01002bbd7000fcdbdf2510"], 0xd0}, 0x1, 0x0, 0x0, 0x4001}, 0x4000000) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r1) socket$nl_generic(0x10, 0x3, 0x10) r3 = socket$inet6_sctp(0xa, 0x5, 0x84) setsockopt$inet6_IPV6_ADDRFORM(r3, 0x29, 0x1, &(0x7f00000003c0), 0x4) r4 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$SIOCPNENABLEPIPE(r4, 0x89ed, 0x0) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCFLSH(r5, 0x5608, 0xffffffffffffffff) mprotect(&(0x7f0000000000/0xa000)=nil, 0xa000, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000)=0xbd33, 0xfffd) alarm(0x7) r6 = gettid() perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x9, 0xf, 0x6, 0x0, 0x0, 0x0, 0x200, 0x9, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xffffffff, 0x1, @perf_config_ext={0x7, 0xb55}, 0x100800, 0xa27, 0x2, 0x0, 0x40, 0x4, 0x2, 0x0, 0x2, 0x0, 0x6a}, r6, 0x5, r0, 0x0) socket(0x21, 0x1, 0xf67) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) kernel console output (not intermixed with test programs): h2: set [0, 0] type 1 family 0 port 8472 - 0 [ 270.669950][ T12] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 270.709848][ T12] netdevsim netdevsim2 eth3: set [0, 0] type 1 family 0 port 8472 - 0 [ 270.718229][ T12] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 271.492454][ T52] netdevsim netdevsim2 eth3 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 271.502381][ T52] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 271.513553][ T3383] hid-generic 0000:0000:0000.000D: unknown main item tag 0x0 [ 271.541997][ T3383] hid-generic 0000:0000:0000.000D: hidraw0: HID v0.00 Device [syz1] on syz0 [ 271.587015][ T29] kauditd_printk_skb: 77 callbacks suppressed [ 271.587035][ T29] audit: type=1326 audit(1769609131.313:6275): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19311 comm="syz.5.5997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f282c87aeb9 code=0x7ffc0000 [ 271.659472][ T29] audit: type=1326 audit(1769609131.343:6276): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19311 comm="syz.5.5997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=427 compat=0 ip=0x7f282c87aeb9 code=0x7ffc0000 [ 271.683081][ T29] audit: type=1326 audit(1769609131.343:6277): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19311 comm="syz.5.5997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f282c87aeb9 code=0x7ffc0000 [ 271.706637][ T29] audit: type=1326 audit(1769609131.343:6278): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19311 comm="syz.5.5997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f282c87aeb9 code=0x7ffc0000 [ 271.730261][ T29] audit: type=1326 audit(1769609131.343:6279): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19311 comm="syz.5.5997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f282c87aeb9 code=0x7ffc0000 [ 271.753852][ T29] audit: type=1326 audit(1769609131.343:6280): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19311 comm="syz.5.5997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=46 compat=0 ip=0x7f282c87aeb9 code=0x7ffc0000 [ 271.778019][ T29] audit: type=1326 audit(1769609131.343:6281): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19311 comm="syz.5.5997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f282c87aeb9 code=0x7ffc0000 [ 271.802002][ T29] audit: type=1326 audit(1769609131.343:6282): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19311 comm="syz.5.5997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=307 compat=0 ip=0x7f282c87aeb9 code=0x7ffc0000 [ 271.825571][ T29] audit: type=1326 audit(1769609131.343:6283): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19311 comm="syz.5.5997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f282c87aeb9 code=0x7ffc0000 [ 271.849267][ T29] audit: type=1326 audit(1769609131.343:6284): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19311 comm="syz.5.5997" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f282c87aeb9 code=0x7ffc0000 [ 271.966477][T19320] netlink: 'syz.4.5999': attribute type 1 has an invalid length. [ 272.003121][ T52] netdevsim netdevsim2 eth2 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 272.013123][ T52] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 272.071125][T19320] 8021q: adding VLAN 0 to HW filter on device bond1 [ 272.228378][T19321] 8021q: adding VLAN 0 to HW filter on device bond1 [ 272.241438][T19321] bond1: (slave gre2): The slave device specified does not support setting the MAC address [ 272.272474][T19321] bond1: (slave gre2): Error -95 calling set_mac_address [ 272.381921][ T52] netdevsim netdevsim2 eth1 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 272.391921][ T52] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 272.651175][ T52] netdevsim netdevsim2 eth0 (unregistering): unset [0, 0] type 1 family 0 port 8472 - 0 [ 272.661216][ T52] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 272.774234][T19340] syzkaller0: entered promiscuous mode [ 272.779845][T19340] syzkaller0: entered allmulticast mode [ 273.094316][ T3383] hid-generic 0000:0000:0000.000E: unknown main item tag 0x0 [ 273.105509][ T3383] hid-generic 0000:0000:0000.000E: hidraw0: HID v0.00 Device [syz1] on syz0 [ 273.475621][ T3383] Process accounting resumed [ 273.588993][T19373] Cannot find set identified by id 0 to match [ 274.066463][T19301] chnl_net:caif_netlink_parms(): no params data found [ 274.897805][T19301] bridge0: port 1(bridge_slave_0) entered blocking state [ 274.904958][T19301] bridge0: port 1(bridge_slave_0) entered disabled state [ 274.919950][T19301] bridge_slave_0: entered allmulticast mode [ 274.935494][T19301] bridge_slave_0: entered promiscuous mode [ 274.947687][ T10] hid-generic 0000:0000:0000.000F: unknown main item tag 0x0 [ 274.957347][ T10] hid-generic 0000:0000:0000.000F: hidraw0: HID v0.00 Device [syz1] on syz0 [ 274.979832][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:25:a0:90:b7:95, vlan:0) [ 274.992605][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:25:a0:90:b7:95, vlan:0) [ 275.005176][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:25:a0:90:b7:95, vlan:0) [ 275.017636][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:25:a0:90:b7:95, vlan:0) [ 275.030316][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:25:a0:90:b7:95, vlan:0) [ 275.042741][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:25:a0:90:b7:95, vlan:0) [ 275.055223][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:25:a0:90:b7:95, vlan:0) [ 275.067707][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:25:a0:90:b7:95, vlan:0) [ 275.080177][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:25:a0:90:b7:95, vlan:0) [ 275.093078][ C1] bridge0: received packet on veth0_to_bridge with own address as source address (addr:f6:25:a0:90:b7:95, vlan:0) [ 275.096375][T19388] netdevsim netdevsim1 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.140196][T19301] bridge0: port 2(bridge_slave_1) entered blocking state [ 275.147414][T19301] bridge0: port 2(bridge_slave_1) entered disabled state [ 275.181826][T19301] bridge_slave_1: entered allmulticast mode [ 275.195854][T19301] bridge_slave_1: entered promiscuous mode [ 275.242507][T19388] netdevsim netdevsim1 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.273751][T19301] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 275.321626][T19388] netdevsim netdevsim1 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.357115][T19301] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 275.432637][T19388] netdevsim netdevsim1 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 275.476961][T19301] team0: Port device team_slave_0 added [ 275.498685][ T3326] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.517540][T19301] team0: Port device team_slave_1 added [ 275.527567][ T3326] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.561991][ T3326] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.591562][T19301] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 275.598666][T19301] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 275.625000][T19301] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 275.686417][ T3326] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 275.705662][T19301] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 275.712739][T19301] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 275.738770][T19301] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 275.840666][ T23] Process accounting resumed [ 276.095187][T19423] Cannot find set identified by id 0 to match [ 276.146093][T19431] netlink: 'syz.1.6029': attribute type 4 has an invalid length. [ 276.173219][T19301] hsr_slave_0: entered promiscuous mode [ 276.208097][T19301] hsr_slave_1: entered promiscuous mode [ 276.221780][T19301] debugfs: 'hsr0' already exists in 'hsr' [ 276.227609][T19301] Cannot create hsr debugfs directory [ 277.218485][ T52] veth0_to_bridge: left allmulticast mode [ 277.224305][ T52] veth0_to_bridge: left promiscuous mode [ 277.230181][ T52] bridge0: port 3(veth0_to_bridge) entered disabled state [ 277.256819][ T52] bridge_slave_1: left allmulticast mode [ 277.262543][ T52] bridge_slave_1: left promiscuous mode [ 277.268361][ T52] bridge0: port 2(bridge_slave_1) entered disabled state [ 277.286202][ T52] bridge_slave_0: left allmulticast mode [ 277.291216][ T29] kauditd_printk_skb: 76 callbacks suppressed [ 277.291260][ T29] audit: type=1400 audit(1769609137.013:6361): avc: denied { create } for pid=19444 comm="syz.1.6034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 277.292004][ T52] bridge_slave_0: left promiscuous mode [ 277.316564][ T29] audit: type=1400 audit(1769609137.033:6362): avc: denied { write } for pid=19444 comm="syz.1.6034" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 277.318252][ T52] bridge0: port 1(bridge_slave_0) entered disabled state [ 277.399201][ T29] audit: type=1400 audit(1769609137.113:6363): avc: denied { append } for pid=19450 comm="syz.6.6031" name="ppp" dev="devtmpfs" ino=140 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 [ 277.477545][T19469] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6031'. [ 277.559380][ T52] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 277.576715][ T52] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 277.587768][T19484] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=19484 comm=syz.6.6031 [ 277.602240][ T52] bond0 (unregistering): Released all slaves [ 277.610634][T19485] netlink: 8 bytes leftover after parsing attributes in process `syz.5.6038'. [ 277.669641][ T52] tipc: Left network mode [ 277.677245][ T52] hsr_slave_0: left promiscuous mode [ 277.688360][ T52] hsr_slave_1: left promiscuous mode [ 277.694616][ T52] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 277.702097][ T52] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 277.737715][ T52] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 277.745260][ T52] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 277.758342][ T52] veth1_macvtap: left promiscuous mode [ 277.764242][ T52] veth0_macvtap: left promiscuous mode [ 277.766337][ T29] audit: type=1326 audit(1769609137.483:6364): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19503 comm="syz.4.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ae0dfaeb9 code=0x7ffc0000 [ 277.770444][ T52] veth1_vlan: left promiscuous mode [ 277.793342][ T29] audit: type=1326 audit(1769609137.483:6365): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19503 comm="syz.4.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ae0dfaeb9 code=0x7ffc0000 [ 277.822872][ T52] veth0_vlan: left promiscuous mode [ 277.829116][ T29] audit: type=1326 audit(1769609137.533:6366): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19503 comm="syz.4.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=427 compat=0 ip=0x7f7ae0dfaeb9 code=0x7ffc0000 [ 277.852710][ T29] audit: type=1326 audit(1769609137.533:6367): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19503 comm="syz.4.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ae0dfaeb9 code=0x7ffc0000 [ 277.876273][ T29] audit: type=1326 audit(1769609137.533:6368): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19503 comm="syz.4.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ae0dfaeb9 code=0x7ffc0000 [ 277.899809][ T29] audit: type=1326 audit(1769609137.533:6369): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19503 comm="syz.4.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=42 compat=0 ip=0x7f7ae0dfaeb9 code=0x7ffc0000 [ 277.923297][ T29] audit: type=1326 audit(1769609137.533:6370): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19503 comm="syz.4.6041" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f7ae0dfaeb9 code=0x7ffc0000 [ 278.078443][ T52] team0 (unregistering): Port device team_slave_1 removed [ 278.090004][ T52] team0 (unregistering): Port device team_slave_0 removed [ 278.231758][T19584] sg_write: data in/out 262124/120 bytes for SCSI command 0x0-- guessing data in; [ 278.231758][T19584] program syz.1.6045 not setting count and/or reply_len properly [ 278.441610][T19607] FAULT_INJECTION: forcing a failure. [ 278.441610][T19607] name failslab, interval 1, probability 0, space 0, times 0 [ 278.454339][T19607] CPU: 1 UID: 0 PID: 19607 Comm: syz.4.6051 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 278.454459][T19607] Tainted: [W]=WARN [ 278.454487][T19607] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 278.454504][T19607] Call Trace: [ 278.454513][T19607] [ 278.454523][T19607] __dump_stack+0x1d/0x30 [ 278.454557][T19607] dump_stack_lvl+0x95/0xd0 [ 278.454586][T19607] dump_stack+0x15/0x1b [ 278.454687][T19607] should_fail_ex+0x263/0x280 [ 278.454730][T19607] should_failslab+0x8c/0xb0 [ 278.454761][T19607] __kvmalloc_node_noprof+0x148/0x680 [ 278.454800][T19607] ? alloc_netdev_mqs+0xa5/0xa40 [ 278.454931][T19607] ? vsnprintf+0x7ee/0x860 [ 278.454955][T19607] ? __pfx_veth_setup+0x10/0x10 [ 278.455060][T19607] alloc_netdev_mqs+0xa5/0xa40 [ 278.455105][T19607] rtnl_create_link+0x239/0x720 [ 278.455150][T19607] rtnl_newlink_create+0x174/0x650 [ 278.455247][T19607] ? security_capable+0x7b/0x90 [ 278.455287][T19607] ? netlink_ns_capable+0x86/0xa0 [ 278.455336][T19607] rtnl_newlink+0xf5b/0x1370 [ 278.455399][T19607] ? __pfx_rtnl_newlink+0x10/0x10 [ 278.455423][T19607] rtnetlink_rcv_msg+0x64b/0x720 [ 278.455544][T19607] netlink_rcv_skb+0x123/0x220 [ 278.455587][T19607] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 278.455626][T19607] rtnetlink_rcv+0x1c/0x30 [ 278.455653][T19607] netlink_unicast+0x5c0/0x690 [ 278.455732][T19607] netlink_sendmsg+0x5c8/0x6f0 [ 278.455760][T19607] ? __pfx_netlink_sendmsg+0x10/0x10 [ 278.455785][T19607] ____sys_sendmsg+0x5af/0x600 [ 278.455841][T19607] ___sys_sendmsg+0x195/0x1e0 [ 278.455964][T19607] __x64_sys_sendmsg+0xd4/0x160 [ 278.456025][T19607] x64_sys_call+0x17ba/0x3000 [ 278.456093][T19607] do_syscall_64+0xc0/0x2a0 [ 278.456131][T19607] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 278.456184][T19607] RIP: 0033:0x7f7ae0dfaeb9 [ 278.456206][T19607] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 278.456228][T19607] RSP: 002b:00007f7adf857028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 278.456255][T19607] RAX: ffffffffffffffda RBX: 00007f7ae1075fa0 RCX: 00007f7ae0dfaeb9 [ 278.456304][T19607] RDX: 0000000000000000 RSI: 0000200000000080 RDI: 0000000000000003 [ 278.456322][T19607] RBP: 00007f7adf857090 R08: 0000000000000000 R09: 0000000000000000 [ 278.456373][T19607] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 278.456386][T19607] R13: 00007f7ae1076038 R14: 00007f7ae1075fa0 R15: 00007ffde3af70a8 [ 278.456420][T19607] [ 278.974248][T19301] netdevsim netdevsim2 netdevsim0: renamed from eth0 [ 279.001310][ T3401] Process accounting resumed [ 279.016566][T19301] netdevsim netdevsim2 netdevsim1: renamed from eth1 [ 279.063989][T19301] netdevsim netdevsim2 netdevsim2: renamed from eth2 [ 279.094948][T19301] netdevsim netdevsim2 netdevsim3: renamed from eth3 [ 279.252758][T19301] 8021q: adding VLAN 0 to HW filter on device bond0 [ 279.262171][T19652] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 279.263594][T19652] set match dimension is over the limit! [ 279.286125][T19681] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6067'. [ 279.299040][T19301] 8021q: adding VLAN 0 to HW filter on device team0 [ 279.401104][T19301] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 279.411536][T19301] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 279.436153][ T52] bridge0: port 1(bridge_slave_0) entered blocking state [ 279.443386][ T52] bridge0: port 1(bridge_slave_0) entered forwarding state [ 279.467796][ T52] bridge0: port 2(bridge_slave_1) entered blocking state [ 279.475037][ T52] bridge0: port 2(bridge_slave_1) entered forwarding state [ 279.557758][T19695] netlink: 136 bytes leftover after parsing attributes in process `syz.6.6069'. [ 279.579498][T19301] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 279.651497][T19708] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6069'. [ 279.660492][T19708] netlink: 12 bytes leftover after parsing attributes in process `syz.6.6069'. [ 279.673220][T19703] FAULT_INJECTION: forcing a failure. [ 279.673220][T19703] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 279.686412][T19703] CPU: 0 UID: 0 PID: 19703 Comm: syz.5.6073 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 279.686456][T19703] Tainted: [W]=WARN [ 279.686465][T19703] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 279.686557][T19703] Call Trace: [ 279.686564][T19703] [ 279.686574][T19703] __dump_stack+0x1d/0x30 [ 279.686604][T19703] dump_stack_lvl+0x95/0xd0 [ 279.686630][T19703] dump_stack+0x15/0x1b [ 279.686790][T19703] should_fail_ex+0x263/0x280 [ 279.686832][T19703] should_fail+0xb/0x20 [ 279.686866][T19703] should_fail_usercopy+0x1a/0x20 [ 279.686909][T19703] _copy_from_user+0x1c/0xb0 [ 279.686976][T19703] ___sys_sendmsg+0xc1/0x1e0 [ 279.687017][T19703] __x64_sys_sendmsg+0xd4/0x160 [ 279.687095][T19703] x64_sys_call+0x17ba/0x3000 [ 279.687134][T19703] do_syscall_64+0xc0/0x2a0 [ 279.687168][T19703] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 279.687190][T19703] RIP: 0033:0x7f282c87aeb9 [ 279.687207][T19703] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 279.687293][T19703] RSP: 002b:00007f282b2d7028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 279.687392][T19703] RAX: ffffffffffffffda RBX: 00007f282caf5fa0 RCX: 00007f282c87aeb9 [ 279.687413][T19703] RDX: 0000000000000000 RSI: 0000200000000000 RDI: 0000000000000006 [ 279.687431][T19703] RBP: 00007f282b2d7090 R08: 0000000000000000 R09: 0000000000000000 [ 279.687450][T19703] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 279.687467][T19703] R13: 00007f282caf6038 R14: 00007f282caf5fa0 R15: 00007ffdac4b4a38 [ 279.687508][T19703] [ 279.860007][T19301] veth0_vlan: entered promiscuous mode [ 279.884566][T19301] veth1_vlan: entered promiscuous mode [ 279.899238][T19301] veth0_macvtap: entered promiscuous mode [ 279.908175][T19301] veth1_macvtap: entered promiscuous mode [ 279.923346][T19301] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 279.937491][T19301] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 279.959199][T19576] netdevsim netdevsim2 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 279.968366][T19576] netdevsim netdevsim2 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 279.977838][ T3421] Process accounting resumed [ 279.982575][T19576] netdevsim netdevsim2 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 280.005287][T19576] netdevsim netdevsim2 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 280.162314][T19731] syzkaller0: entered promiscuous mode [ 280.167910][T19731] syzkaller0: entered allmulticast mode [ 280.184512][T19725] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 280.954293][T19765] syzkaller0: entered promiscuous mode [ 280.967352][T19765] syzkaller0: entered allmulticast mode [ 281.039781][T19775] FAULT_INJECTION: forcing a failure. [ 281.039781][T19775] name failslab, interval 1, probability 0, space 0, times 0 [ 281.052559][T19775] CPU: 0 UID: 0 PID: 19775 Comm: syz.5.6090 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 281.052594][T19775] Tainted: [W]=WARN [ 281.052656][T19775] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 281.052670][T19775] Call Trace: [ 281.052679][T19775] [ 281.052689][T19775] __dump_stack+0x1d/0x30 [ 281.052717][T19775] dump_stack_lvl+0x95/0xd0 [ 281.052752][T19775] dump_stack+0x15/0x1b [ 281.052780][T19775] should_fail_ex+0x263/0x280 [ 281.052852][T19775] should_failslab+0x8c/0xb0 [ 281.052876][T19775] kmem_cache_alloc_noprof+0x68/0x490 [ 281.052909][T19775] ? security_inode_alloc+0x37/0x100 [ 281.053018][T19775] security_inode_alloc+0x37/0x100 [ 281.053051][T19775] inode_init_always_gfp+0x4b7/0x500 [ 281.053083][T19775] alloc_inode+0x58/0x170 [ 281.053171][T19775] new_inode+0x1d/0xe0 [ 281.053203][T19775] ramfs_get_inode+0x24/0x1b0 [ 281.053232][T19775] ramfs_tmpfile+0x36/0x100 [ 281.053266][T19775] vfs_tmpfile+0x259/0x520 [ 281.053307][T19775] do_tmpfile+0xa8/0x190 [ 281.053345][T19775] path_openat+0x204f/0x23c0 [ 281.053463][T19775] ? _parse_integer_limit+0x170/0x190 [ 281.053504][T19775] ? _parse_integer+0x27/0x40 [ 281.053601][T19775] ? kstrtoull+0x111/0x140 [ 281.053656][T19775] ? kstrtouint+0x76/0xc0 [ 281.053692][T19775] do_filp_open+0x15d/0x280 [ 281.053816][T19775] do_sys_openat2+0xa6/0x150 [ 281.053907][T19775] __x64_sys_open+0xe6/0x110 [ 281.053941][T19775] x64_sys_call+0x166f/0x3000 [ 281.053973][T19775] do_syscall_64+0xc0/0x2a0 [ 281.054080][T19775] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 281.054125][T19775] RIP: 0033:0x7f282c87aeb9 [ 281.054141][T19775] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 281.054159][T19775] RSP: 002b:00007f282b2d7028 EFLAGS: 00000246 ORIG_RAX: 0000000000000002 [ 281.054180][T19775] RAX: ffffffffffffffda RBX: 00007f282caf5fa0 RCX: 00007f282c87aeb9 [ 281.054199][T19775] RDX: 000000000000050f RSI: 0000000000591002 RDI: 0000200000000100 [ 281.054216][T19775] RBP: 00007f282b2d7090 R08: 0000000000000000 R09: 0000000000000000 [ 281.054302][T19775] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 281.054315][T19775] R13: 00007f282caf6038 R14: 00007f282caf5fa0 R15: 00007ffdac4b4a38 [ 281.054356][T19775] [ 281.428129][T19793] xt_TPROXY: Can be used only with -p tcp or -p udp [ 281.616543][ T3421] Process accounting resumed [ 281.815187][T19813] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 281.921707][T19822] net_ratelimit: 4835 callbacks suppressed [ 281.921726][T19822] openvswitch: netlink: Missing key (keys=40, expected=100) [ 282.119791][T19834] FAULT_INJECTION: forcing a failure. [ 282.119791][T19834] name failslab, interval 1, probability 0, space 0, times 0 [ 282.132744][T19834] CPU: 1 UID: 0 PID: 19834 Comm: syz.4.6114 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 282.132778][T19834] Tainted: [W]=WARN [ 282.132785][T19834] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 282.132872][T19834] Call Trace: [ 282.132879][T19834] [ 282.132889][T19834] __dump_stack+0x1d/0x30 [ 282.132950][T19834] dump_stack_lvl+0x95/0xd0 [ 282.132994][T19834] dump_stack+0x15/0x1b [ 282.133075][T19834] should_fail_ex+0x263/0x280 [ 282.133116][T19834] should_failslab+0x8c/0xb0 [ 282.133143][T19834] __kvmalloc_node_noprof+0x148/0x680 [ 282.133178][T19834] ? nf_hook_entries_grow+0x1cb/0x460 [ 282.133252][T19834] nf_hook_entries_grow+0x1cb/0x460 [ 282.133299][T19834] __nf_register_net_hook+0x18e/0x480 [ 282.133321][T19834] nf_register_net_hook+0x88/0x130 [ 282.133395][T19834] nf_register_net_hooks+0x44/0x150 [ 282.133416][T19834] nf_ct_netns_do_get+0x2b1/0x3a0 [ 282.133460][T19834] ? perf_trace_kmalloc+0xe4/0x110 [ 282.133489][T19834] nf_ct_netns_get+0xf1/0x2c0 [ 282.133692][T19834] xt_ct_tg_check+0x7d/0x680 [ 282.133725][T19834] ? quota_mt_check+0x5a/0xd0 [ 282.133760][T19834] xt_ct_tg_check_v2+0x4a/0x60 [ 282.133798][T19834] xt_check_target+0x28d/0x4c0 [ 282.133917][T19834] ? xt_find_match+0x1d1/0x210 [ 282.133955][T19834] ? mutex_unlock+0x4e/0x90 [ 282.133979][T19834] ? xt_find_target+0x1cd/0x200 [ 282.134011][T19834] translate_table+0xd1b/0x10d0 [ 282.134112][T19834] do_ipt_set_ctl+0x6d0/0x8e0 [ 282.134145][T19834] ? _raw_spin_unlock_bh+0x18/0x20 [ 282.134180][T19834] ? tcp_release_cb+0xf1/0x370 [ 282.134297][T19834] nf_setsockopt+0x199/0x1b0 [ 282.134324][T19834] ip_setsockopt+0x102/0x110 [ 282.134352][T19834] tcp_setsockopt+0x98/0xb0 [ 282.134386][T19834] sock_common_setsockopt+0x69/0x80 [ 282.134500][T19834] ? __pfx_sock_common_setsockopt+0x10/0x10 [ 282.134586][T19834] __sys_setsockopt+0x184/0x200 [ 282.134632][T19834] __x64_sys_setsockopt+0x64/0x80 [ 282.134672][T19834] x64_sys_call+0x21d5/0x3000 [ 282.134705][T19834] do_syscall_64+0xc0/0x2a0 [ 282.134785][T19834] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 282.134809][T19834] RIP: 0033:0x7f7ae0dfaeb9 [ 282.134875][T19834] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 282.134899][T19834] RSP: 002b:00007f7adf857028 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 282.134929][T19834] RAX: ffffffffffffffda RBX: 00007f7ae1075fa0 RCX: 00007f7ae0dfaeb9 [ 282.134948][T19834] RDX: 0000000000000040 RSI: 0004000000000000 RDI: 0000000000000005 [ 282.135020][T19834] RBP: 00007f7adf857090 R08: 00000000000002f0 R09: 0000000000000000 [ 282.135039][T19834] R10: 00002000000003c0 R11: 0000000000000246 R12: 0000000000000002 [ 282.135053][T19834] R13: 00007f7ae1076038 R14: 00007f7ae1075fa0 R15: 00007ffde3af70a8 [ 282.135136][T19834] [ 282.449987][ T29] kauditd_printk_skb: 133 callbacks suppressed [ 282.450006][ T29] audit: type=1326 audit(1769609142.173:6504): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19837 comm="syz.6.6115" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 282.486385][T19842] netlink: 24 bytes leftover after parsing attributes in process `syz.2.6117'. [ 282.507939][ T29] audit: type=1326 audit(1769609142.213:6505): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19837 comm="syz.6.6115" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 282.531640][ T29] audit: type=1326 audit(1769609142.213:6506): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19837 comm="syz.6.6115" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 282.548603][T19842] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 282.555232][ T29] audit: type=1326 audit(1769609142.213:6507): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19837 comm="syz.6.6115" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 282.587227][ T29] audit: type=1326 audit(1769609142.213:6508): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19837 comm="syz.6.6115" exe="/root/syz-executor" sig=0 arch=c000003e syscall=16 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 282.610745][ T29] audit: type=1326 audit(1769609142.213:6509): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19837 comm="syz.6.6115" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 282.610748][T19842] misc raw-gadget: fail, usb_gadget_register_driver returned -16 [ 282.634524][ T29] audit: type=1326 audit(1769609142.213:6510): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19837 comm="syz.6.6115" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 282.665718][ T29] audit: type=1326 audit(1769609142.213:6511): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19837 comm="syz.6.6115" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 282.682993][T19840] syzkaller0: entered promiscuous mode [ 282.689771][ T29] audit: type=1326 audit(1769609142.213:6512): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19837 comm="syz.6.6115" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 282.695119][T19840] syzkaller0: entered allmulticast mode [ 282.718674][ T29] audit: type=1326 audit(1769609142.213:6513): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=19837 comm="syz.6.6115" exe="/root/syz-executor" sig=0 arch=c000003e syscall=54 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 282.760866][T19845] netlink: 'syz.6.6118': attribute type 4 has an invalid length. [ 283.100746][T19876] netlink: 16 bytes leftover after parsing attributes in process `syz.5.6129'. [ 283.161369][T19882] random: crng reseeded on system resumption [ 283.276540][T19897] FAULT_INJECTION: forcing a failure. [ 283.276540][T19897] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 283.289938][T19897] CPU: 0 UID: 0 PID: 19897 Comm: syz.6.6137 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 283.289977][T19897] Tainted: [W]=WARN [ 283.289985][T19897] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 283.290000][T19897] Call Trace: [ 283.290008][T19897] [ 283.290018][T19897] __dump_stack+0x1d/0x30 [ 283.290131][T19897] dump_stack_lvl+0x95/0xd0 [ 283.290211][T19897] dump_stack+0x15/0x1b [ 283.290339][T19897] should_fail_ex+0x263/0x280 [ 283.290521][T19897] should_fail+0xb/0x20 [ 283.290619][T19897] should_fail_usercopy+0x1a/0x20 [ 283.290737][T19897] _copy_from_user+0x1c/0xb0 [ 283.290884][T19897] bpf_test_init+0xb9/0x130 [ 283.291035][T19897] bpf_prog_test_run_flow_dissector+0x12c/0x360 [ 283.291154][T19897] ? kstrtouint+0x76/0xc0 [ 283.291261][T19897] ? __pfx_bpf_prog_test_run_flow_dissector+0x10/0x10 [ 283.291406][T19897] bpf_prog_test_run+0x204/0x340 [ 283.291619][T19897] __sys_bpf+0x4c0/0x7b0 [ 283.291726][T19897] __x64_sys_bpf+0x41/0x50 [ 283.291820][T19897] x64_sys_call+0x28e1/0x3000 [ 283.291969][T19897] do_syscall_64+0xc0/0x2a0 [ 283.292074][T19897] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 283.292149][T19897] RIP: 0033:0x7f63eb8faeb9 [ 283.292202][T19897] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 283.292298][T19897] RSP: 002b:00007f63ea357028 EFLAGS: 00000246 ORIG_RAX: 0000000000000141 [ 283.292377][T19897] RAX: ffffffffffffffda RBX: 00007f63ebb75fa0 RCX: 00007f63eb8faeb9 [ 283.292422][T19897] RDX: 0000000000000050 RSI: 0000200000000300 RDI: 000000000000000a [ 283.292465][T19897] RBP: 00007f63ea357090 R08: 0000000000000000 R09: 0000000000000000 [ 283.292568][T19897] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 283.292618][T19897] R13: 00007f63ebb76038 R14: 00007f63ebb75fa0 R15: 00007ffe1722c348 [ 283.292690][T19897] [ 283.308120][T19886] syzkaller0: entered promiscuous mode [ 283.308144][T19886] syzkaller0: entered allmulticast mode [ 283.558907][T19918] netlink: 4 bytes leftover after parsing attributes in process `syz.2.6143'. [ 283.689673][T19925] erspan1: entered allmulticast mode [ 283.919219][T19928] SELinux: failed to load policy [ 284.093662][T19932] netlink: 40 bytes leftover after parsing attributes in process `syz.1.6149'. [ 284.125632][T19948] ip6tnl1: left promiscuous mode [ 284.223931][T19958] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.299574][T19965] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1545 sclass=netlink_route_socket pid=19965 comm=syz.1.6163 [ 284.324313][T19961] bridge_slave_0: left promiscuous mode [ 284.378848][T19961] ip6tnl1: left promiscuous mode [ 284.395481][T19958] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.443863][T19968] syzkaller0: entered promiscuous mode [ 284.449475][T19968] syzkaller0: entered allmulticast mode [ 284.459431][T19958] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.503431][T19557] netdevsim netdevsim5 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.537449][T19958] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.579233][T19557] netdevsim netdevsim5 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.649632][T19576] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 284.672593][T19557] netdevsim netdevsim5 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.690046][T19576] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 284.714277][T19576] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 284.747051][T19576] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 284.758536][T19557] netdevsim netdevsim5 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 284.823037][T19975] chnl_net:caif_netlink_parms(): no params data found [ 284.866265][T19557] bridge_slave_1: left allmulticast mode [ 284.871997][T19557] bridge_slave_1: left promiscuous mode [ 284.877765][T19557] bridge0: port 2(bridge_slave_1) entered disabled state [ 284.886345][T19557] bridge_slave_0: left allmulticast mode [ 284.892091][T19557] bridge_slave_0: left promiscuous mode [ 284.897911][T19557] bridge0: port 1(bridge_slave_0) entered disabled state [ 284.966846][T19999] FAULT_INJECTION: forcing a failure. [ 284.966846][T19999] name failslab, interval 1, probability 0, space 0, times 0 [ 284.980011][T19999] CPU: 1 UID: 0 PID: 19999 Comm: syz.6.6173 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 284.980047][T19999] Tainted: [W]=WARN [ 284.980054][T19999] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 284.980148][T19999] Call Trace: [ 284.980155][T19999] [ 284.980166][T19999] __dump_stack+0x1d/0x30 [ 284.980196][T19999] dump_stack_lvl+0x95/0xd0 [ 284.980218][T19999] dump_stack+0x15/0x1b [ 284.980245][T19999] should_fail_ex+0x263/0x280 [ 284.980313][T19999] should_failslab+0x8c/0xb0 [ 284.980344][T19999] kmem_cache_alloc_noprof+0x68/0x490 [ 284.980489][T19999] ? getname_flags+0x7f/0x3b0 [ 284.980515][T19999] getname_flags+0x7f/0x3b0 [ 284.980541][T19999] user_path_at+0x28/0x130 [ 284.980581][T19999] __se_sys_mount+0x25b/0x2e0 [ 284.980675][T19999] ? fput+0x8f/0xc0 [ 284.980707][T19999] __x64_sys_mount+0x67/0x80 [ 284.980728][T19999] x64_sys_call+0x2cca/0x3000 [ 284.980754][T19999] do_syscall_64+0xc0/0x2a0 [ 284.980807][T19999] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 284.980829][T19999] RIP: 0033:0x7f63eb8faeb9 [ 284.980846][T19999] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 284.980992][T19999] RSP: 002b:00007f63ea357028 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 [ 284.981016][T19999] RAX: ffffffffffffffda RBX: 00007f63ebb75fa0 RCX: 00007f63eb8faeb9 [ 284.981063][T19999] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000000 [ 284.981078][T19999] RBP: 00007f63ea357090 R08: 0000000000000000 R09: 0000000000000000 [ 284.981091][T19999] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 284.981181][T19999] R13: 00007f63ebb76038 R14: 00007f63ebb75fa0 R15: 00007ffe1722c348 [ 284.981209][T19999] [ 285.207353][T19557] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 285.221696][T19557] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 285.232322][T19557] bond0 (unregistering): Released all slaves [ 285.241353][T19557] bond1 (unregistering): Released all slaves [ 285.309110][T19557] hsr_slave_0: left promiscuous mode [ 285.315861][T19557] hsr_slave_1: left promiscuous mode [ 285.328206][T19557] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 285.335819][T19557] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 285.354670][T19557] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 285.362333][T19557] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 285.379850][T19557] veth1_macvtap: left promiscuous mode [ 285.389296][T19557] veth0_macvtap: left promiscuous mode [ 285.394864][T19557] veth1_vlan: left promiscuous mode [ 285.400223][T19557] veth0_vlan: left promiscuous mode [ 285.415602][T20021] netlink: 8 bytes leftover after parsing attributes in process `syz.2.6177'. [ 285.468267][T20031] xt_CT: You must specify a L4 protocol and not use inversions on it [ 285.517947][T19557] team0 (unregistering): Port device team_slave_1 removed [ 285.539648][T19557] team0 (unregistering): Port device team_slave_0 removed [ 285.628430][T20005] syzkaller0: entered promiscuous mode [ 285.634002][T20005] syzkaller0: entered allmulticast mode [ 285.665803][T19975] bridge0: port 1(bridge_slave_0) entered blocking state [ 285.672930][T19975] bridge0: port 1(bridge_slave_0) entered disabled state [ 285.701046][T19975] bridge_slave_0: entered allmulticast mode [ 285.711623][T19975] bridge_slave_0: entered promiscuous mode [ 285.719615][T19975] bridge0: port 2(bridge_slave_1) entered blocking state [ 285.726964][T19975] bridge0: port 2(bridge_slave_1) entered disabled state [ 285.750225][T19975] bridge_slave_1: entered allmulticast mode [ 285.758275][T19975] bridge_slave_1: entered promiscuous mode [ 285.796066][T19975] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 285.806833][T19975] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 285.926582][T19975] team0: Port device team_slave_0 added [ 285.933307][T19975] team0: Port device team_slave_1 added [ 286.120490][T20067] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6187'. [ 286.140418][T20067] netlink: 12 bytes leftover after parsing attributes in process `syz.4.6187'. [ 286.195539][T19975] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 286.202561][T19975] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 286.228668][T19975] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 286.380896][T19975] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 286.387953][T19975] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 286.414256][T19975] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 286.444453][T19975] hsr_slave_0: entered promiscuous mode [ 286.450802][T19975] hsr_slave_1: entered promiscuous mode [ 286.457146][T19975] debugfs: 'hsr0' already exists in 'hsr' [ 286.462910][T19975] Cannot create hsr debugfs directory [ 286.796067][T19975] netdevsim netdevsim7 netdevsim0: renamed from eth0 [ 286.849635][T19975] netdevsim netdevsim7 netdevsim1: renamed from eth1 [ 286.860173][T19975] netdevsim netdevsim7 netdevsim2: renamed from eth2 [ 286.880688][T19975] netdevsim netdevsim7 netdevsim3: renamed from eth3 [ 286.996558][T19975] 8021q: adding VLAN 0 to HW filter on device bond0 [ 287.021032][T19975] 8021q: adding VLAN 0 to HW filter on device team0 [ 287.080089][ T31] bridge0: port 1(bridge_slave_0) entered blocking state [ 287.087272][ T31] bridge0: port 1(bridge_slave_0) entered forwarding state [ 287.219647][ T31] bridge0: port 2(bridge_slave_1) entered blocking state [ 287.226902][ T31] bridge0: port 2(bridge_slave_1) entered forwarding state [ 287.261271][T20095] syzkaller0: entered promiscuous mode [ 287.266858][T20095] syzkaller0: entered allmulticast mode [ 287.328685][T20119] netlink: 63503 bytes leftover after parsing attributes in process `syz.4.6192'. [ 287.358484][T19975] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 287.382430][ T9] IPVS: starting estimator thread 0... [ 287.475039][T20128] IPVS: using max 1776 ests per chain, 88800 per kthread [ 287.505203][ T9] Process accounting resumed [ 287.617325][T19975] veth0_vlan: entered promiscuous mode [ 287.631784][T19975] veth1_vlan: entered promiscuous mode [ 287.659758][T19975] veth0_macvtap: entered promiscuous mode [ 287.671038][T20151] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 287.675427][T19975] veth1_macvtap: entered promiscuous mode [ 287.697839][T19975] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 287.709744][T19975] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 287.721835][ T31] netdevsim netdevsim7 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 287.731270][ T31] netdevsim netdevsim7 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 287.741058][ T31] netdevsim netdevsim7 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 287.754424][ T31] netdevsim netdevsim7 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 287.860487][T20165] ipt_ECN: cannot use operation on non-tcp rule [ 287.885035][ T29] kauditd_printk_skb: 24 callbacks suppressed [ 287.885055][ T29] audit: type=1400 audit(1769609147.607:6538): avc: denied { create } for pid=20166 comm="syz.2.6196" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=atmpvc_socket permissive=1 [ 287.902636][T20169] sch_tbf: burst 19872 is lower than device lo mtu (65550) ! [ 287.965169][ T29] audit: type=1400 audit(1769609147.687:6539): avc: denied { bind } for pid=20172 comm="syz.2.6198" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 287.991875][T20176] loop7: detected capacity change from 0 to 128 [ 288.139461][T20189] netdevsim netdevsim2 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.301717][T20189] netdevsim netdevsim2 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.391340][T20189] netdevsim netdevsim2 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.470837][T20189] netdevsim netdevsim2 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 288.557341][T19557] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.607991][T19557] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.647265][T19557] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.671329][T19557] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 288.737586][T20192] netlink: 176 bytes leftover after parsing attributes in process `syz.2.6205'. [ 288.749126][ T29] audit: type=1400 audit(1769609148.477:6540): avc: denied { firmware_load } for pid=20191 comm="syz.2.6205" path="/lib/firmware/regulatory.db" dev="sda1" ino=448 scontext=system_u:system_r:kernel_t tcontext=system_u:object_r:lib_t tclass=system permissive=1 [ 288.863865][T20196] ip6tnl1: entered promiscuous mode [ 288.899108][T20197] syzkaller0: entered promiscuous mode [ 288.904651][T20197] syzkaller0: entered allmulticast mode [ 289.050464][T20203] netlink: 132 bytes leftover after parsing attributes in process `syz.4.6209'. [ 289.075665][T20207] gtp0: entered promiscuous mode [ 289.412357][T20218] netlink: 132 bytes leftover after parsing attributes in process `syz.7.6215'. [ 289.510589][T20233] netlink: 20 bytes leftover after parsing attributes in process `syz.2.6220'. [ 289.610211][ T29] audit: type=1400 audit(1769609149.337:6541): avc: denied { create } for pid=20236 comm="syz.7.6222" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 289.678461][ T29] audit: type=1400 audit(1769609149.377:6542): avc: denied { ioctl } for pid=20236 comm="syz.7.6222" path="socket:[71111]" dev="sockfs" ino=71111 ioctlcmd=0x89e3 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=x25_socket permissive=1 [ 290.003256][ T29] audit: type=1400 audit(1769609149.727:6543): avc: denied { write } for pid=20256 comm="syz.2.6230" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=ieee802154_socket permissive=1 [ 290.098575][T20258] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6229'. [ 290.120277][ T29] audit: type=1400 audit(1769609149.847:6544): avc: denied { create } for pid=20259 comm="syz.2.6231" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 290.141364][ T29] audit: type=1400 audit(1769609149.847:6545): avc: denied { write } for pid=20259 comm="syz.2.6231" path="socket:[70152]" dev="sockfs" ino=70152 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=netlink_fib_lookup_socket permissive=1 [ 290.193701][T20263] netlink: 'syz.2.6232': attribute type 4 has an invalid length. [ 290.224782][T20266] loop7: detected capacity change from 0 to 2048 [ 290.265912][T20266] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 290.280196][T20271] FAULT_INJECTION: forcing a failure. [ 290.280196][T20271] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 290.293369][T20271] CPU: 1 UID: 0 PID: 20271 Comm: syz.2.6234 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 290.293407][T20271] Tainted: [W]=WARN [ 290.293414][T20271] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 290.293429][T20271] Call Trace: [ 290.293437][T20271] [ 290.293447][T20271] __dump_stack+0x1d/0x30 [ 290.293542][T20271] dump_stack_lvl+0x95/0xd0 [ 290.293570][T20271] dump_stack+0x15/0x1b [ 290.293598][T20271] should_fail_ex+0x263/0x280 [ 290.293671][T20271] should_fail+0xb/0x20 [ 290.293716][T20271] should_fail_usercopy+0x1a/0x20 [ 290.293759][T20271] _copy_from_user+0x1c/0xb0 [ 290.293835][T20271] ___sys_sendmsg+0xc1/0x1e0 [ 290.293872][T20271] __x64_sys_sendmsg+0xd4/0x160 [ 290.293896][T20271] x64_sys_call+0x17ba/0x3000 [ 290.293972][T20271] do_syscall_64+0xc0/0x2a0 [ 290.294074][T20271] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 290.294104][T20271] RIP: 0033:0x7f737db3aeb9 [ 290.294125][T20271] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 290.294223][T20271] RSP: 002b:00007f737c597028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 290.294289][T20271] RAX: ffffffffffffffda RBX: 00007f737ddb5fa0 RCX: 00007f737db3aeb9 [ 290.294309][T20271] RDX: 0000000000000000 RSI: 0000200000000200 RDI: 0000000000000004 [ 290.294327][T20271] RBP: 00007f737c597090 R08: 0000000000000000 R09: 0000000000000000 [ 290.294345][T20271] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.294357][T20271] R13: 00007f737ddb6038 R14: 00007f737ddb5fa0 R15: 00007ffd4424ff88 [ 290.294382][T20271] [ 290.302329][ T29] audit: type=1400 audit(1769609150.027:6546): avc: denied { unlink } for pid=20265 comm="syz.7.6233" name="file1" dev="loop7" ino=15 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 [ 290.503701][T19975] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 290.552634][T20273] netlink: 52 bytes leftover after parsing attributes in process `syz.2.6235'. [ 290.561834][T20273] netlink: 16 bytes leftover after parsing attributes in process `syz.2.6235'. [ 290.692950][ T3421] Process accounting resumed [ 290.788127][T20283] FAULT_INJECTION: forcing a failure. [ 290.788127][T20283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 290.801350][T20283] CPU: 1 UID: 0 PID: 20283 Comm: syz.2.6238 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 290.801428][T20283] Tainted: [W]=WARN [ 290.801438][T20283] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 290.801456][T20283] Call Trace: [ 290.801465][T20283] [ 290.801476][T20283] __dump_stack+0x1d/0x30 [ 290.801512][T20283] dump_stack_lvl+0x95/0xd0 [ 290.801539][T20283] dump_stack+0x15/0x1b [ 290.801607][T20283] should_fail_ex+0x263/0x280 [ 290.801726][T20283] should_fail+0xb/0x20 [ 290.801765][T20283] should_fail_usercopy+0x1a/0x20 [ 290.801813][T20283] _copy_to_user+0x20/0xa0 [ 290.801891][T20283] simple_read_from_buffer+0xb5/0x130 [ 290.801930][T20283] proc_fail_nth_read+0x10e/0x150 [ 290.801962][T20283] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 290.802053][T20283] vfs_read+0x1ab/0x7f0 [ 290.802110][T20283] ? __rcu_read_unlock+0x4e/0x70 [ 290.802156][T20283] ? __fget_files+0x184/0x1c0 [ 290.802188][T20283] ? mutex_lock+0x57/0x90 [ 290.802233][T20283] ksys_read+0xdc/0x1a0 [ 290.802262][T20283] __x64_sys_read+0x40/0x50 [ 290.802284][T20283] x64_sys_call+0x2889/0x3000 [ 290.802351][T20283] do_syscall_64+0xc0/0x2a0 [ 290.802392][T20283] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 290.802424][T20283] RIP: 0033:0x7f737dafb78e [ 290.802453][T20283] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 290.802473][T20283] RSP: 002b:00007f737c596fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 290.802575][T20283] RAX: ffffffffffffffda RBX: 00007f737c5976c0 RCX: 00007f737dafb78e [ 290.802596][T20283] RDX: 000000000000000f RSI: 00007f737c5970a0 RDI: 0000000000000005 [ 290.802612][T20283] RBP: 00007f737c597090 R08: 0000000000000000 R09: 0000000000000000 [ 290.802628][T20283] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 290.802641][T20283] R13: 00007f737ddb6038 R14: 00007f737ddb5fa0 R15: 00007ffd4424ff88 [ 290.802713][T20283] [ 291.043395][T20279] loop7: detected capacity change from 0 to 8192 [ 291.049898][ T29] audit: type=1400 audit(1769609150.747:6547): avc: denied { create } for pid=20274 comm="syz.7.6236" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 291.115256][T16485] loop7: p1 p2 p3 p4 [ 291.119403][T16485] loop7: p1 size 262144 extends beyond EOD, truncated [ 291.127304][T16485] loop7: p2 start 2531787008 is beyond EOD, truncated [ 291.134216][T16485] loop7: p3 size 100663552 extends beyond EOD, truncated [ 291.154507][T16485] loop7: p4 size 50331648 extends beyond EOD, truncated [ 291.164561][T20279] loop7: p1 p2 p3 p4 [ 291.198554][T20290] syzkaller0: entered promiscuous mode [ 291.204096][T20290] syzkaller0: entered allmulticast mode [ 291.218935][T20281] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 291.229580][T20279] loop7: p1 size 262144 extends beyond EOD, truncated [ 291.245527][T20279] loop7: p2 start 2531787008 is beyond EOD, truncated [ 291.252394][T20279] loop7: p3 size 100663552 extends beyond EOD, truncated [ 291.275688][T20279] loop7: p4 size 50331648 extends beyond EOD, truncated [ 291.406934][T20300] netlink: 'syz.7.6244': attribute type 4 has an invalid length. [ 291.454276][T16485] udevd[16485]: inotify_add_watch(7, /dev/loop7p1, 10) failed: No such file or directory [ 291.464409][T15168] udevd[15168]: inotify_add_watch(7, /dev/loop7p3, 10) failed: No such file or directory [ 291.478749][T17584] udevd[17584]: inotify_add_watch(7, /dev/loop7p4, 10) failed: No such file or directory [ 291.508154][ T3421] IPVS: starting estimator thread 0... [ 291.514633][T20302] IPVS: rr: UDP 224.0.0.2:0 - no destination available [ 291.542986][T16485] udevd[16485]: inotify_add_watch(7, /dev/loop7p3, 10) failed: No such file or directory [ 291.553291][T15168] udevd[15168]: inotify_add_watch(7, /dev/loop7p4, 10) failed: No such file or directory [ 291.615603][T20306] IPVS: using max 2208 ests per chain, 110400 per kthread [ 291.630697][T20311] xt_hashlimit: size too large, truncated to 1048576 [ 291.755946][T20316] netlink: 132 bytes leftover after parsing attributes in process `syz.7.6246'. [ 291.892546][T20319] netdevsim netdevsim6 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 291.947128][T20319] netdevsim netdevsim6 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 292.017049][T20319] netdevsim netdevsim6 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 292.038199][T20326] FAULT_INJECTION: forcing a failure. [ 292.038199][T20326] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 292.051350][T20326] CPU: 1 UID: 0 PID: 20326 Comm: syz.7.6252 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 292.051397][T20326] Tainted: [W]=WARN [ 292.051455][T20326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 292.051472][T20326] Call Trace: [ 292.051482][T20326] [ 292.051492][T20326] __dump_stack+0x1d/0x30 [ 292.051606][T20326] dump_stack_lvl+0x95/0xd0 [ 292.051676][T20326] dump_stack+0x15/0x1b [ 292.051703][T20326] should_fail_ex+0x263/0x280 [ 292.051745][T20326] should_fail+0xb/0x20 [ 292.051849][T20326] should_fail_usercopy+0x1a/0x20 [ 292.051894][T20326] _copy_to_user+0x20/0xa0 [ 292.051916][T20326] simple_read_from_buffer+0xb5/0x130 [ 292.051997][T20326] proc_fail_nth_read+0x10e/0x150 [ 292.052036][T20326] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 292.052109][T20326] vfs_read+0x1ab/0x7f0 [ 292.052173][T20326] ? mutex_lock+0x57/0x90 [ 292.052207][T20326] ksys_read+0xdc/0x1a0 [ 292.052282][T20326] __x64_sys_read+0x40/0x50 [ 292.052310][T20326] x64_sys_call+0x2889/0x3000 [ 292.052346][T20326] do_syscall_64+0xc0/0x2a0 [ 292.052393][T20326] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 292.052435][T20326] RIP: 0033:0x7ff9649fb78e [ 292.052518][T20326] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 292.052543][T20326] RSP: 002b:00007ff963496fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 292.052570][T20326] RAX: ffffffffffffffda RBX: 00007ff9634976c0 RCX: 00007ff9649fb78e [ 292.052590][T20326] RDX: 000000000000000f RSI: 00007ff9634970a0 RDI: 0000000000000006 [ 292.052607][T20326] RBP: 00007ff963497090 R08: 0000000000000000 R09: 0000000000000000 [ 292.052625][T20326] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 292.052652][T20326] R13: 00007ff964cb6038 R14: 00007ff964cb5fa0 R15: 00007ffce3c0a488 [ 292.052679][T20326] [ 292.247769][T20319] netdevsim netdevsim6 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 292.324303][ T52] netdevsim netdevsim6 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.336363][ T52] netdevsim netdevsim6 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.360848][ T3323] netdevsim netdevsim6 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.370195][ T3383] Process accounting resumed [ 292.374893][ T3323] netdevsim netdevsim6 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 292.390320][T20336] netlink: 40 bytes leftover after parsing attributes in process `syz.1.6256'. [ 292.438991][T20343] loop7: detected capacity change from 0 to 2048 [ 292.446106][T20343] EXT4-fs: Ignoring removed mblk_io_submit option [ 292.515449][T20343] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 292.565797][T20358] FAULT_INJECTION: forcing a failure. [ 292.565797][T20358] name failslab, interval 1, probability 0, space 0, times 0 [ 292.578850][T20358] CPU: 0 UID: 0 PID: 20358 Comm: syz.6.6262 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 292.578911][T20358] Tainted: [W]=WARN [ 292.578918][T20358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 292.578931][T20358] Call Trace: [ 292.578938][T20358] [ 292.578948][T20358] __dump_stack+0x1d/0x30 [ 292.578982][T20358] dump_stack_lvl+0x95/0xd0 [ 292.579011][T20358] dump_stack+0x15/0x1b [ 292.579039][T20358] should_fail_ex+0x263/0x280 [ 292.579100][T20358] should_failslab+0x8c/0xb0 [ 292.579130][T20358] kmem_cache_alloc_noprof+0x68/0x490 [ 292.579172][T20358] ? skb_clone+0x151/0x1f0 [ 292.579192][T20358] skb_clone+0x151/0x1f0 [ 292.579287][T20358] __netlink_deliver_tap+0x2c9/0x500 [ 292.579325][T20358] ? netlink_attachskb+0x2e2/0x660 [ 292.579366][T20358] netlink_sendskb+0x126/0x150 [ 292.579406][T20358] netlink_unicast+0x2a2/0x690 [ 292.579499][T20358] netlink_ack+0x4c8/0x500 [ 292.579569][T20358] netlink_rcv_skb+0x192/0x220 [ 292.579634][T20358] ? __pfx_nfnetlink_rcv_msg+0x10/0x10 [ 292.579676][T20358] nfnetlink_rcv+0x167/0x1720 [ 292.579715][T20358] ? __kfree_skb+0x109/0x150 [ 292.579793][T20358] ? nlmon_xmit+0x4f/0x60 [ 292.579834][T20358] ? consume_skb+0x49/0x140 [ 292.579882][T20358] ? nlmon_xmit+0x4f/0x60 [ 292.580020][T20358] ? dev_hard_start_xmit+0x3a8/0x3e0 [ 292.580058][T20358] ? __dev_queue_xmit+0x139a/0x1f20 [ 292.580143][T20358] ? __dev_queue_xmit+0x148/0x1f20 [ 292.580179][T20358] ? ref_tracker_free+0x37d/0x3e0 [ 292.580220][T20358] ? __netlink_deliver_tap+0x4dc/0x500 [ 292.580332][T20358] netlink_unicast+0x5c0/0x690 [ 292.580370][T20358] netlink_sendmsg+0x5c8/0x6f0 [ 292.580466][T20358] ? __pfx_netlink_sendmsg+0x10/0x10 [ 292.580486][T20358] ____sys_sendmsg+0x5af/0x600 [ 292.580510][T20358] ___sys_sendmsg+0x195/0x1e0 [ 292.580553][T20358] __x64_sys_sendmsg+0xd4/0x160 [ 292.580585][T20358] x64_sys_call+0x17ba/0x3000 [ 292.580626][T20358] do_syscall_64+0xc0/0x2a0 [ 292.580660][T20358] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 292.580683][T20358] RIP: 0033:0x7f63eb8faeb9 [ 292.580700][T20358] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 292.580773][T20358] RSP: 002b:00007f63ea357028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 292.580794][T20358] RAX: ffffffffffffffda RBX: 00007f63ebb75fa0 RCX: 00007f63eb8faeb9 [ 292.580809][T20358] RDX: 0000000004000084 RSI: 0000200000000000 RDI: 0000000000000003 [ 292.580827][T20358] RBP: 00007f63ea357090 R08: 0000000000000000 R09: 0000000000000000 [ 292.580852][T20358] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 292.580869][T20358] R13: 00007f63ebb76038 R14: 00007f63ebb75fa0 R15: 00007ffe1722c348 [ 292.580891][T20358] [ 292.903738][T20371] netlink: 24 bytes leftover after parsing attributes in process `syz.6.6263'. [ 292.913470][T20371] FAULT_INJECTION: forcing a failure. [ 292.913470][T20371] name failslab, interval 1, probability 0, space 0, times 0 [ 292.926287][T20371] CPU: 0 UID: 0 PID: 20371 Comm: syz.6.6263 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 292.926325][T20371] Tainted: [W]=WARN [ 292.926334][T20371] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 292.926350][T20371] Call Trace: [ 292.926356][T20371] [ 292.926363][T20371] __dump_stack+0x1d/0x30 [ 292.926389][T20371] dump_stack_lvl+0x95/0xd0 [ 292.926498][T20371] dump_stack+0x15/0x1b [ 292.926525][T20371] should_fail_ex+0x263/0x280 [ 292.926565][T20371] should_failslab+0x8c/0xb0 [ 292.926618][T20371] __kmalloc_cache_noprof+0x64/0x4a0 [ 292.926654][T20371] ? mac802154_llsec_seclevel_add+0x1b0/0x270 [ 292.926743][T20371] mac802154_llsec_seclevel_add+0x1b0/0x270 [ 292.926783][T20371] ieee802154_add_seclevel+0x42/0x60 [ 292.926826][T20371] nl802154_add_llsec_seclevel+0xf6/0x130 [ 292.926856][T20371] genl_family_rcv_msg_doit+0x187/0x1f0 [ 292.926927][T20371] genl_rcv_msg+0x432/0x470 [ 292.926994][T20371] ? __pfx_nl802154_pre_doit+0x10/0x10 [ 292.927065][T20371] ? __pfx_nl802154_add_llsec_seclevel+0x10/0x10 [ 292.927094][T20371] ? __pfx_nl802154_post_doit+0x10/0x10 [ 292.927148][T20371] netlink_rcv_skb+0x123/0x220 [ 292.927185][T20371] ? __pfx_genl_rcv_msg+0x10/0x10 [ 292.927235][T20371] genl_rcv+0x28/0x40 [ 292.927273][T20371] netlink_unicast+0x5c0/0x690 [ 292.927310][T20371] netlink_sendmsg+0x5c8/0x6f0 [ 292.927359][T20371] ? __pfx_netlink_sendmsg+0x10/0x10 [ 292.927378][T20371] ____sys_sendmsg+0x5af/0x600 [ 292.927401][T20371] ___sys_sendmsg+0x195/0x1e0 [ 292.927441][T20371] __x64_sys_sendmsg+0xd4/0x160 [ 292.927534][T20371] x64_sys_call+0x17ba/0x3000 [ 292.927567][T20371] do_syscall_64+0xc0/0x2a0 [ 292.927601][T20371] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 292.927623][T20371] RIP: 0033:0x7f63eb8faeb9 [ 292.927639][T20371] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 292.927670][T20371] RSP: 002b:00007f63ea357028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 292.927695][T20371] RAX: ffffffffffffffda RBX: 00007f63ebb75fa0 RCX: 00007f63eb8faeb9 [ 292.927709][T20371] RDX: 0000000020004000 RSI: 0000200000000140 RDI: 0000000000000004 [ 292.927722][T20371] RBP: 00007f63ea357090 R08: 0000000000000000 R09: 0000000000000000 [ 292.927738][T20371] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 292.927755][T20371] R13: 00007f63ebb76038 R14: 00007f63ebb75fa0 R15: 00007ffe1722c348 [ 292.927859][T20371] [ 293.395902][T20343] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -512 0 [ 293.430188][T19975] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 293.458684][T20389] syzkaller0: entered promiscuous mode [ 293.464308][T20389] syzkaller0: entered allmulticast mode [ 293.472233][T20389] netlink: 'syz.1.6270': attribute type 39 has an invalid length. [ 293.665848][ T29] kauditd_printk_skb: 1 callbacks suppressed [ 293.665864][ T29] audit: type=1400 audit(1769609153.397:6549): avc: denied { mac_admin } for pid=20395 comm="syz.1.6274" capability=33 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=capability2 permissive=1 [ 293.693435][T20396] SELinux: Context : is not valid (left unmapped). [ 293.703618][ T29] audit: type=1400 audit(1769609153.427:6550): avc: denied { relabelto } for pid=20395 comm="syz.1.6274" name="rdma.current" dev="tmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon=":" [ 293.728051][ T29] audit: type=1400 audit(1769609153.427:6551): avc: denied { associate } for pid=20395 comm="syz.1.6274" name="rdma.current" dev="tmpfs" ino=651 scontext=system_u:object_r:unlabeled_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 srawcon=":" [ 293.801308][ T29] audit: type=1400 audit(1769609153.527:6552): avc: denied { unlink } for pid=18393 comm="syz-executor" name="rdma.current" dev="tmpfs" ino=651 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=file permissive=1 trawcon=":" [ 293.853492][T20406] serio: Serial port ttyS3 [ 293.890504][ T29] audit: type=1400 audit(1769609153.617:6553): avc: denied { unlink } for pid=19975 comm="syz-executor" name="bus" dev="tmpfs" ino=104 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_tmpfs_t tclass=chr_file permissive=1 [ 293.962478][ T29] audit: type=1400 audit(1769609153.687:6554): avc: denied { write } for pid=20405 comm="syz.2.6277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 294.001082][ T29] audit: type=1400 audit(1769609153.687:6555): avc: denied { read } for pid=20405 comm="syz.2.6277" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=qipcrtr_socket permissive=1 [ 294.195582][ T3420] Process accounting resumed [ 294.231149][T20424] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6283'. [ 294.327662][T20433] hub 8-0:1.0: USB hub found [ 294.345809][T20430] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 294.361278][T20433] hub 8-0:1.0: 8 ports detected [ 294.399476][T20439] netlink: 88 bytes leftover after parsing attributes in process `syz.7.6285'. [ 294.744229][ T29] audit: type=1400 audit(1769609154.467:6556): avc: denied { connect } for pid=20446 comm="syz.2.6288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 294.830446][T20451] netlink: 132 bytes leftover after parsing attributes in process `syz.7.6287'. [ 294.855384][T20450] netlink: 12 bytes leftover after parsing attributes in process `syz.2.6289'. [ 294.910033][ T29] audit: type=1400 audit(1769609154.497:6557): avc: denied { write } for pid=20446 comm="syz.2.6288" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 295.152996][T20456] syzkaller0: entered promiscuous mode [ 295.158573][T20456] syzkaller0: entered allmulticast mode [ 296.161507][ T3420] Process accounting resumed [ 296.249800][T20482] FAULT_INJECTION: forcing a failure. [ 296.249800][T20482] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 296.263050][T20482] CPU: 0 UID: 0 PID: 20482 Comm: syz.4.6300 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 296.263092][T20482] Tainted: [W]=WARN [ 296.263178][T20482] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 296.263191][T20482] Call Trace: [ 296.263201][T20482] [ 296.263211][T20482] __dump_stack+0x1d/0x30 [ 296.263331][T20482] dump_stack_lvl+0x95/0xd0 [ 296.263360][T20482] dump_stack+0x15/0x1b [ 296.263388][T20482] should_fail_ex+0x263/0x280 [ 296.263496][T20482] should_fail+0xb/0x20 [ 296.263534][T20482] should_fail_usercopy+0x1a/0x20 [ 296.263649][T20482] _copy_to_user+0x20/0xa0 [ 296.263671][T20482] simple_read_from_buffer+0xb5/0x130 [ 296.263720][T20482] proc_fail_nth_read+0x10e/0x150 [ 296.263752][T20482] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 296.263850][T20482] vfs_read+0x1ab/0x7f0 [ 296.263872][T20482] ? __rcu_read_unlock+0x4e/0x70 [ 296.263915][T20482] ? __fget_files+0x184/0x1c0 [ 296.263947][T20482] ? mutex_lock+0x57/0x90 [ 296.264012][T20482] ksys_read+0xdc/0x1a0 [ 296.264040][T20482] __x64_sys_read+0x40/0x50 [ 296.264060][T20482] x64_sys_call+0x2889/0x3000 [ 296.264086][T20482] do_syscall_64+0xc0/0x2a0 [ 296.264129][T20482] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 296.264152][T20482] RIP: 0033:0x7f7ae0dbb78e [ 296.264168][T20482] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 296.264204][T20482] RSP: 002b:00007f7adf856fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 296.264224][T20482] RAX: ffffffffffffffda RBX: 00007f7adf8576c0 RCX: 00007f7ae0dbb78e [ 296.264243][T20482] RDX: 000000000000000f RSI: 00007f7adf8570a0 RDI: 0000000000000004 [ 296.264261][T20482] RBP: 00007f7adf857090 R08: 0000000000000000 R09: 0000000000000000 [ 296.264279][T20482] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 296.264304][T20482] R13: 00007f7ae1076038 R14: 00007f7ae1075fa0 R15: 00007ffde3af70a8 [ 296.264328][T20482] [ 296.578081][T20486] netlink: 'syz.6.6301': attribute type 16 has an invalid length. [ 296.586026][T20486] netlink: 'syz.6.6301': attribute type 17 has an invalid length. [ 296.607513][T20492] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=20492 comm=syz.7.6303 [ 296.640266][T20486] bridge0: port 2(bridge_slave_1) entered disabled state [ 296.647528][T20486] bridge0: port 1(bridge_slave_0) entered disabled state [ 296.746280][T20486] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 296.765105][T20486] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 296.802611][T19576] netdevsim netdevsim6 eth0: unset [1, 0] type 2 family 0 port 6081 - 0 [ 296.823005][T19576] netdevsim netdevsim6 eth1: unset [1, 0] type 2 family 0 port 6081 - 0 [ 296.836917][T19576] netdevsim netdevsim6 eth2: unset [1, 0] type 2 family 0 port 6081 - 0 [ 296.871943][T19576] netdevsim netdevsim6 eth3: unset [1, 0] type 2 family 0 port 6081 - 0 [ 296.935300][ T3478] Process accounting resumed [ 296.965067][T20490] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -512 0 [ 297.001423][T20503] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 297.087286][T20503] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 297.105529][T20504] loop7: detected capacity change from 0 to 2048 [ 297.125119][T20504] EXT4-fs: Ignoring removed mblk_io_submit option [ 297.161727][T20503] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 297.178437][T20504] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: none. [ 297.247412][T20503] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 297.333208][T19557] netdevsim netdevsim4 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.371863][T19557] netdevsim netdevsim4 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.387919][T20497] xt_connbytes: Forcing CT accounting to be enabled [ 297.394716][T20497] set match dimension is over the limit! [ 297.404660][T19557] netdevsim netdevsim4 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.420101][T19557] netdevsim netdevsim4 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 297.433620][T20504] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 297.464488][T19975] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 297.488568][T20514] netlink: 132 bytes leftover after parsing attributes in process `syz.6.6310'. [ 297.498431][T20526] netlink: 20 bytes leftover after parsing attributes in process `syz.1.6312'. [ 297.518359][T20526] 8021q: adding VLAN 0 to HW filter on device bond1 [ 297.648236][T20532] FAULT_INJECTION: forcing a failure. [ 297.648236][T20532] name failslab, interval 1, probability 0, space 0, times 0 [ 297.661019][T20532] CPU: 0 UID: 0 PID: 20532 Comm: syz.7.6313 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 297.661094][T20532] Tainted: [W]=WARN [ 297.661101][T20532] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 297.661117][T20532] Call Trace: [ 297.661124][T20532] [ 297.661132][T20532] __dump_stack+0x1d/0x30 [ 297.661160][T20532] dump_stack_lvl+0x95/0xd0 [ 297.661182][T20532] dump_stack+0x15/0x1b [ 297.661203][T20532] should_fail_ex+0x263/0x280 [ 297.661365][T20532] should_failslab+0x8c/0xb0 [ 297.661397][T20532] kmem_cache_alloc_noprof+0x68/0x490 [ 297.661427][T20532] ? skb_clone+0x151/0x1f0 [ 297.661450][T20532] skb_clone+0x151/0x1f0 [ 297.661477][T20532] nfnetlink_rcv+0x316/0x1720 [ 297.661515][T20532] ? __kfree_skb+0x109/0x150 [ 297.661610][T20532] ? consume_skb+0x49/0x140 [ 297.661717][T20532] ? nlmon_xmit+0x4f/0x60 [ 297.661805][T20532] ? dev_hard_start_xmit+0x3a8/0x3e0 [ 297.661913][T20532] ? __dev_queue_xmit+0x139a/0x1f20 [ 297.662004][T20532] ? __dev_queue_xmit+0x148/0x1f20 [ 297.662190][T20532] ? ref_tracker_free+0x37d/0x3e0 [ 297.662305][T20532] netlink_unicast+0x5c0/0x690 [ 297.662346][T20532] netlink_sendmsg+0x5c8/0x6f0 [ 297.662374][T20532] ? __pfx_netlink_sendmsg+0x10/0x10 [ 297.662393][T20532] ____sys_sendmsg+0x5af/0x600 [ 297.662457][T20532] ___sys_sendmsg+0x195/0x1e0 [ 297.662491][T20532] __x64_sys_sendmsg+0xd4/0x160 [ 297.662514][T20532] x64_sys_call+0x17ba/0x3000 [ 297.662545][T20532] do_syscall_64+0xc0/0x2a0 [ 297.662645][T20532] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 297.662739][T20532] RIP: 0033:0x7ff964a3aeb9 [ 297.662755][T20532] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 297.662774][T20532] RSP: 002b:00007ff963497028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 297.662801][T20532] RAX: ffffffffffffffda RBX: 00007ff964cb5fa0 RCX: 00007ff964a3aeb9 [ 297.662820][T20532] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 297.662912][T20532] RBP: 00007ff963497090 R08: 0000000000000000 R09: 0000000000000000 [ 297.662925][T20532] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 297.662938][T20532] R13: 00007ff964cb6038 R14: 00007ff964cb5fa0 R15: 00007ffce3c0a488 [ 297.662959][T20532] [ 297.964426][T20526] bridge0: port 3(syz_tun) entered blocking state [ 297.971136][T20526] bridge0: port 3(syz_tun) entered disabled state [ 297.977638][ T29] audit: type=1400 audit(1769609157.687:6558): avc: denied { mount } for pid=20525 comm="syz.1.6312" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 [ 297.985540][T20526] syz_tun: entered allmulticast mode [ 298.027081][T20537] netlink: 8 bytes leftover after parsing attributes in process `syz.4.6317'. [ 298.036080][T20537] netlink: 4 bytes leftover after parsing attributes in process `syz.4.6317'. [ 298.045381][T20537] netlink: 'syz.4.6317': attribute type 11 has an invalid length. [ 298.049474][T20538] loop7: detected capacity change from 0 to 512 [ 298.053219][T20537] netlink: 'syz.4.6317': attribute type 13 has an invalid length. [ 298.061560][T20526] syz_tun: entered promiscuous mode [ 298.083201][T20538] EXT4-fs: Journaled quota options ignored when QUOTA feature is enabled [ 298.092022][T20526] bridge0: port 3(syz_tun) entered blocking state [ 298.098619][T20526] bridge0: port 3(syz_tun) entered forwarding state [ 298.119180][T20538] EXT4-fs error (device loop7): ext4_orphan_get:1391: inode #15: comm syz.7.6316: iget: bad i_size value: 38620345925642 [ 298.132263][T20538] EXT4-fs error (device loop7): ext4_orphan_get:1396: comm syz.7.6316: couldn't read orphan inode 15 (err -117) [ 298.145580][T20538] EXT4-fs (loop7): mounted filesystem 00000000-0000-0000-0000-000000000000 r/w without journal. Quota mode: writeback. [ 298.160646][T20538] EXT4-fs error (device loop7): ext4_lookup:1785: inode #15: comm syz.7.6316: iget: bad i_size value: 38620345925642 [ 298.190268][T19975] EXT4-fs (loop7): unmounting filesystem 00000000-0000-0000-0000-000000000000. [ 298.306581][T20530] infiniband syz1: set active [ 298.311409][T20530] infiniband syz1: added syz_tun [ 298.323783][T20557] netlink: 20 bytes leftover after parsing attributes in process `syz.7.6321'. [ 298.385633][T20530] RDS/IB: syz1: added [ 298.389746][T20530] smc: adding ib device syz1 with port count 1 [ 298.410445][T20530] smc: ib device syz1 port 1 has no pnetid [ 298.465438][T20572] FAULT_INJECTION: forcing a failure. [ 298.465438][T20572] name failslab, interval 1, probability 0, space 0, times 0 [ 298.478422][T20572] CPU: 0 UID: 0 PID: 20572 Comm: syz.7.6325 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 298.478463][T20572] Tainted: [W]=WARN [ 298.478471][T20572] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 298.478484][T20572] Call Trace: [ 298.478492][T20572] [ 298.478499][T20572] __dump_stack+0x1d/0x30 [ 298.478554][T20572] dump_stack_lvl+0x95/0xd0 [ 298.478583][T20572] dump_stack+0x15/0x1b [ 298.478609][T20572] should_fail_ex+0x263/0x280 [ 298.478641][T20572] should_failslab+0x8c/0xb0 [ 298.478733][T20572] kmem_cache_alloc_noprof+0x68/0x490 [ 298.478766][T20572] ? skb_clone+0x151/0x1f0 [ 298.478793][T20572] skb_clone+0x151/0x1f0 [ 298.478818][T20572] nfnetlink_rcv+0x316/0x1720 [ 298.478874][T20572] ? __kfree_skb+0x109/0x150 [ 298.478942][T20572] ? consume_skb+0x49/0x140 [ 298.479041][T20572] ? nlmon_xmit+0x4f/0x60 [ 298.479085][T20572] ? dev_hard_start_xmit+0x3a8/0x3e0 [ 298.479140][T20572] ? __dev_queue_xmit+0x139a/0x1f20 [ 298.479184][T20572] ? __dev_queue_xmit+0x148/0x1f20 [ 298.479298][T20572] ? ref_tracker_free+0x37d/0x3e0 [ 298.479346][T20572] netlink_unicast+0x5c0/0x690 [ 298.479452][T20572] netlink_sendmsg+0x5c8/0x6f0 [ 298.479481][T20572] ? __pfx_netlink_sendmsg+0x10/0x10 [ 298.479506][T20572] ____sys_sendmsg+0x5af/0x600 [ 298.479536][T20572] ___sys_sendmsg+0x195/0x1e0 [ 298.479691][T20572] __x64_sys_sendmsg+0xd4/0x160 [ 298.479803][T20572] x64_sys_call+0x17ba/0x3000 [ 298.479837][T20572] do_syscall_64+0xc0/0x2a0 [ 298.479878][T20572] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 298.479905][T20572] RIP: 0033:0x7ff964a3aeb9 [ 298.479935][T20572] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 298.479955][T20572] RSP: 002b:00007ff963497028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 298.479980][T20572] RAX: ffffffffffffffda RBX: 00007ff964cb5fa0 RCX: 00007ff964a3aeb9 [ 298.479995][T20572] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 298.480008][T20572] RBP: 00007ff963497090 R08: 0000000000000000 R09: 0000000000000000 [ 298.480102][T20572] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 298.480126][T20572] R13: 00007ff964cb6038 R14: 00007ff964cb5fa0 R15: 00007ffce3c0a488 [ 298.480152][T20572] [ 298.480431][T20566] hub 8-0:1.0: USB hub found [ 298.715817][ T3420] Process accounting resumed [ 298.722691][T20566] hub 8-0:1.0: 8 ports detected [ 298.836639][T20576] set match dimension is over the limit! [ 298.842591][T20574] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 299.154885][T20579] netlink: 132 bytes leftover after parsing attributes in process `syz.7.6326'. [ 299.186902][T20602] netlink: 'syz.6.6328': attribute type 1 has an invalid length. [ 299.515369][T20639] netdevsim netdevsim1 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 299.532323][T20643] netlink: 'syz.7.6337': attribute type 4 has an invalid length. [ 299.567729][T20639] netdevsim netdevsim1 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 299.617684][T20639] netdevsim netdevsim1 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 299.635153][ T3383] Process accounting resumed [ 299.666698][T20639] netdevsim netdevsim1 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 299.721986][ T3323] netdevsim netdevsim1 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.734232][ T3323] netdevsim netdevsim1 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.756137][ T3323] netdevsim netdevsim1 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.778744][ T3323] netdevsim netdevsim1 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 299.809178][T20660] FAULT_INJECTION: forcing a failure. [ 299.809178][T20660] name failslab, interval 1, probability 0, space 0, times 0 [ 299.822048][T20660] CPU: 1 UID: 0 PID: 20660 Comm: syz.1.6339 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 299.822164][T20660] Tainted: [W]=WARN [ 299.822182][T20660] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 299.822199][T20660] Call Trace: [ 299.822207][T20660] [ 299.822217][T20660] __dump_stack+0x1d/0x30 [ 299.822257][T20660] dump_stack_lvl+0x95/0xd0 [ 299.822320][T20660] dump_stack+0x15/0x1b [ 299.822346][T20660] should_fail_ex+0x263/0x280 [ 299.822428][T20660] should_failslab+0x8c/0xb0 [ 299.822459][T20660] kmem_cache_alloc_noprof+0x68/0x490 [ 299.822507][T20660] ? skb_clone+0x151/0x1f0 [ 299.822604][T20660] skb_clone+0x151/0x1f0 [ 299.822623][T20660] nfnetlink_rcv+0x316/0x1720 [ 299.822662][T20660] ? __kfree_skb+0x109/0x150 [ 299.822712][T20660] ? consume_skb+0x49/0x140 [ 299.822743][T20660] ? nlmon_xmit+0x4f/0x60 [ 299.822782][T20660] ? dev_hard_start_xmit+0x3a8/0x3e0 [ 299.822874][T20660] ? __dev_queue_xmit+0x139a/0x1f20 [ 299.822919][T20660] ? __dev_queue_xmit+0x148/0x1f20 [ 299.822994][T20660] ? ref_tracker_free+0x37d/0x3e0 [ 299.823055][T20660] netlink_unicast+0x5c0/0x690 [ 299.823162][T20660] netlink_sendmsg+0x5c8/0x6f0 [ 299.823256][T20660] ? __pfx_netlink_sendmsg+0x10/0x10 [ 299.823329][T20660] ____sys_sendmsg+0x5af/0x600 [ 299.823358][T20660] ___sys_sendmsg+0x195/0x1e0 [ 299.823401][T20660] __x64_sys_sendmsg+0xd4/0x160 [ 299.823494][T20660] x64_sys_call+0x17ba/0x3000 [ 299.823528][T20660] do_syscall_64+0xc0/0x2a0 [ 299.823684][T20660] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 299.823786][T20660] RIP: 0033:0x7f917a1faeb9 [ 299.823806][T20660] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 299.823825][T20660] RSP: 002b:00007f9178c57028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 299.823871][T20660] RAX: ffffffffffffffda RBX: 00007f917a475fa0 RCX: 00007f917a1faeb9 [ 299.823989][T20660] RDX: 0000000000000010 RSI: 00002000000000c0 RDI: 0000000000000003 [ 299.824014][T20660] RBP: 00007f9178c57090 R08: 0000000000000000 R09: 0000000000000000 [ 299.824032][T20660] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 299.824049][T20660] R13: 00007f917a476038 R14: 00007f917a475fa0 R15: 00007ffc06ba31a8 [ 299.824076][T20660] [ 300.156224][T20663] netlink: 132 bytes leftover after parsing attributes in process `syz.4.6340'. [ 300.208812][T20681] netlink: 20 bytes leftover after parsing attributes in process `syz.1.6345'. [ 300.253798][ T29] audit: type=1400 audit(1769609159.977:6559): avc: denied { mount } for pid=20682 comm="syz.1.6346" name="/" dev="cgroup2" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cgroup_t tclass=filesystem permissive=1 [ 300.294258][T20688] netlink: 'syz.2.6348': attribute type 4 has an invalid length. [ 300.346066][T20695] xt_policy: neither incoming nor outgoing policy selected [ 300.365941][T20692] netdevsim netdevsim2 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 300.409538][T20646] llcp: llcp_sock_recvmsg: Recv datagram failed state 4 -512 0 [ 300.454010][T20683] batman_adv: Cannot find parent device. Skipping batadv-on-batadv check for gretap1 [ 300.472196][T20683] gretap1: entered allmulticast mode [ 300.488820][T20692] netdevsim netdevsim2 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 300.548979][T20692] netdevsim netdevsim2 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 300.622725][T20692] netdevsim netdevsim2 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 300.662525][T20728] netlink: 'syz.4.6361': attribute type 4 has an invalid length. [ 300.690440][T20717] netlink: 132 bytes leftover after parsing attributes in process `syz.6.6357'. [ 300.707738][ T3323] netdevsim netdevsim2 eth0: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.716340][ T3323] netdevsim netdevsim2 eth1: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.724562][ T3323] netdevsim netdevsim2 eth2: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.749798][ T3323] netdevsim netdevsim2 eth3: set [1, 0] type 2 family 0 port 6081 - 0 [ 300.791841][ T29] audit: type=1400 audit(1769609160.517:6560): avc: denied { listen } for pid=20733 comm="syz.4.6363" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 301.092257][ T29] audit: type=1400 audit(1769609160.787:6561): avc: denied { execute } for pid=20733 comm="syz.4.6363" path="/dev/sg0" dev="devtmpfs" ino=135 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:scsi_generic_device_t tclass=chr_file permissive=1 [ 301.527914][T20772] netlink: 'syz.2.6373': attribute type 4 has an invalid length. [ 302.167175][ T29] audit: type=1400 audit(1769609161.897:6562): avc: denied { mount } for pid=20789 comm="syz.1.6379" name="/" dev="hugetlbfs" ino=72489 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 302.222934][ T29] audit: type=1400 audit(1769609161.947:6563): avc: denied { unmount } for pid=18393 comm="syz-executor" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:hugetlbfs_t tclass=filesystem permissive=1 [ 302.251445][T20799] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=1792 sclass=netlink_route_socket pid=20799 comm=syz.6.6382 [ 302.266316][T20801] netlink: 'syz.2.6384': attribute type 4 has an invalid length. [ 302.286919][ T29] audit: type=1400 audit(1769609162.017:6564): avc: denied { write } for pid=20803 comm="syz.1.6383" name="ptp0" dev="devtmpfs" ino=247 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 [ 302.405538][T20821] netlink: 4 bytes leftover after parsing attributes in process `syz.6.6387'. [ 302.425573][T20822] netlink: 12 bytes leftover after parsing attributes in process `syz.6.6387'. [ 302.439027][T20821] netlink: 12 bytes leftover after parsing attributes in process `syz.6.6387'. [ 302.448696][T20824] netlink: 'syz.6.6387': attribute type 10 has an invalid length. [ 302.456670][T20822] netlink: 'syz.6.6387': attribute type 10 has an invalid length. [ 302.567844][T20795] chnl_net:caif_netlink_parms(): no params data found [ 302.649221][T20795] bridge0: port 1(bridge_slave_0) entered blocking state [ 302.656478][T20795] bridge0: port 1(bridge_slave_0) entered disabled state [ 302.663825][T20795] bridge_slave_0: entered allmulticast mode [ 302.674452][T20836] netlink: 132 bytes leftover after parsing attributes in process `syz.6.6390'. [ 302.692583][T20795] bridge_slave_0: entered promiscuous mode [ 302.705381][T20795] bridge0: port 2(bridge_slave_1) entered blocking state [ 302.712511][T20795] bridge0: port 2(bridge_slave_1) entered disabled state [ 302.720634][T20795] bridge_slave_1: entered allmulticast mode [ 302.727536][T20795] bridge_slave_1: entered promiscuous mode [ 302.730473][ T29] audit: type=1400 audit(1769609162.457:6565): avc: denied { kexec_image_load } for pid=20803 comm="syz.1.6383" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=system permissive=1 [ 302.756280][T20804] syzkaller0: entered promiscuous mode [ 302.761806][T20804] syzkaller0: entered allmulticast mode [ 302.776537][T20795] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 302.787327][T20795] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 302.811356][T20795] team0: Port device team_slave_0 added [ 302.818349][T20795] team0: Port device team_slave_1 added [ 302.849647][ T31] netdevsim netdevsim4 eth3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 302.872482][T20795] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 302.879541][T20795] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 302.905599][T20795] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 302.918621][T20795] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 302.925759][T20795] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1532 would solve the problem. [ 302.951821][T20795] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 302.963683][T20850] netlink: 'syz.6.6394': attribute type 4 has an invalid length. [ 302.987393][ T31] netdevsim netdevsim4 eth2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 303.001652][T20795] hsr_slave_0: entered promiscuous mode [ 303.010222][T20795] hsr_slave_1: entered promiscuous mode [ 303.017398][T20795] debugfs: 'hsr0' already exists in 'hsr' [ 303.023279][T20795] Cannot create hsr debugfs directory [ 303.029194][ T29] audit: type=1400 audit(1769609162.747:6566): avc: denied { getopt } for pid=20851 comm="syz.2.6395" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 [ 303.048906][ T29] audit: type=1400 audit(1769609162.747:6567): avc: denied { ioctl } for pid=20853 comm="syz.6.6396" path="socket:[73362]" dev="sockfs" ino=73362 ioctlcmd=0x8933 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 303.077230][ T31] netdevsim netdevsim4 eth1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 303.150962][ T31] netdevsim netdevsim4 eth0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 303.165854][T20857] syzkaller0: entered promiscuous mode [ 303.171397][T20857] syzkaller0: entered allmulticast mode [ 303.182235][T20857] netlink: 'syz.6.6397': attribute type 39 has an invalid length. [ 303.377497][ T31] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 303.387619][ T31] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 303.397561][ T31] bond0 (unregistering): Released all slaves [ 303.405417][ T31] bond1 (unregistering): Released all slaves [ 303.448765][ T31] tipc: Left network mode [ 303.471034][T20880] FAULT_INJECTION: forcing a failure. [ 303.471034][T20880] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 303.484303][T20880] CPU: 0 UID: 0 PID: 20880 Comm: syz.6.6402 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 303.484353][T20880] Tainted: [W]=WARN [ 303.484363][T20880] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 303.484379][T20880] Call Trace: [ 303.484387][T20880] [ 303.484397][T20880] __dump_stack+0x1d/0x30 [ 303.484450][T20880] dump_stack_lvl+0x95/0xd0 [ 303.484478][T20880] dump_stack+0x15/0x1b [ 303.484533][T20880] should_fail_ex+0x263/0x280 [ 303.484566][T20880] should_fail+0xb/0x20 [ 303.484645][T20880] should_fail_usercopy+0x1a/0x20 [ 303.484684][T20880] _copy_from_user+0x1c/0xb0 [ 303.484707][T20880] kstrtouint_from_user+0x69/0xf0 [ 303.484745][T20880] proc_fail_nth_write+0x50/0x160 [ 303.484843][T20880] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 303.484880][T20880] vfs_write+0x269/0x9f0 [ 303.484922][T20880] ? __rcu_read_unlock+0x4e/0x70 [ 303.485019][T20880] ? __fget_files+0x184/0x1c0 [ 303.485092][T20880] ? mutex_lock+0x57/0x90 [ 303.485116][T20880] ksys_write+0xdc/0x1a0 [ 303.485141][T20880] __x64_sys_write+0x40/0x50 [ 303.485168][T20880] x64_sys_call+0x2847/0x3000 [ 303.485221][T20880] do_syscall_64+0xc0/0x2a0 [ 303.485262][T20880] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 303.485310][T20880] RIP: 0033:0x7f63eb8bb78e [ 303.485340][T20880] Code: 08 0f 85 a5 a8 ff ff 49 89 fb 48 89 f0 48 89 d7 48 89 ce 4c 89 c2 4d 89 ca 4c 8b 44 24 08 4c 8b 4c 24 10 4c 89 5c 24 08 0f 05 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 80 00 00 00 00 48 83 ec 08 [ 303.485363][T20880] RSP: 002b:00007f63ea356fe8 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 303.485453][T20880] RAX: ffffffffffffffda RBX: 00007f63ea3576c0 RCX: 00007f63eb8bb78e [ 303.485472][T20880] RDX: 0000000000000001 RSI: 00007f63ea3570a0 RDI: 0000000000000004 [ 303.485490][T20880] RBP: 00007f63ea357090 R08: 0000000000000000 R09: 0000000000000000 [ 303.485507][T20880] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 303.485524][T20880] R13: 00007f63ebb76038 R14: 00007f63ebb75fa0 R15: 00007ffe1722c348 [ 303.485675][T20880] [ 303.685890][ T31] hsr_slave_0: left promiscuous mode [ 303.691724][ T31] hsr_slave_1: left promiscuous mode [ 303.697661][ T31] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 303.705136][ T31] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 303.745247][ T31] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 303.752724][ T31] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 303.779227][ T31] veth1_macvtap: left promiscuous mode [ 303.785282][ T31] veth0_macvtap: left promiscuous mode [ 303.791135][ T31] veth1_vlan: left promiscuous mode [ 303.797385][ T31] veth0_vlan: left promiscuous mode [ 303.807784][T20899] netlink: 44 bytes leftover after parsing attributes in process `syz.2.6405'. [ 303.928830][ T31] team0 (unregistering): Port device team_slave_1 removed [ 303.938934][ T31] team0 (unregistering): Port device team_slave_0 removed [ 304.025610][T20913] syzkaller0: entered promiscuous mode [ 304.031170][T20913] syzkaller0: entered allmulticast mode [ 304.156152][T20937] FAULT_INJECTION: forcing a failure. [ 304.156152][T20937] name failslab, interval 1, probability 0, space 0, times 0 [ 304.169097][T20937] CPU: 1 UID: 0 PID: 20937 Comm: syz.2.6412 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 304.169139][T20937] Tainted: [W]=WARN [ 304.169152][T20937] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 304.169165][T20937] Call Trace: [ 304.169172][T20937] [ 304.169183][T20937] __dump_stack+0x1d/0x30 [ 304.169208][T20937] dump_stack_lvl+0x95/0xd0 [ 304.169249][T20937] dump_stack+0x15/0x1b [ 304.169335][T20937] should_fail_ex+0x263/0x280 [ 304.169377][T20937] should_failslab+0x8c/0xb0 [ 304.169408][T20937] kmem_cache_alloc_noprof+0x68/0x490 [ 304.169441][T20937] ? skb_clone+0x151/0x1f0 [ 304.169548][T20937] skb_clone+0x151/0x1f0 [ 304.169573][T20937] dev_queue_xmit_nit+0x13e/0x510 [ 304.169656][T20937] ? validate_xmit_xfrm+0x43/0x7a0 [ 304.169763][T20937] dev_hard_start_xmit+0xd3/0x3e0 [ 304.169812][T20937] __dev_queue_xmit+0xdb1/0x1f20 [ 304.169898][T20937] ? __dev_queue_xmit+0x148/0x1f20 [ 304.169945][T20937] ? should_fail_ex+0xd9/0x280 [ 304.170006][T20937] ? __copy_skb_header+0x22f/0x2b0 [ 304.170041][T20937] ? __skb_clone+0x2a6/0x2d0 [ 304.170109][T20937] __netlink_deliver_tap+0x3c3/0x500 [ 304.170157][T20937] netlink_unicast+0x66b/0x690 [ 304.170217][T20937] netlink_sendmsg+0x5c8/0x6f0 [ 304.170243][T20937] ? __pfx_netlink_sendmsg+0x10/0x10 [ 304.170264][T20937] ____sys_sendmsg+0x5af/0x600 [ 304.170289][T20937] ___sys_sendmsg+0x195/0x1e0 [ 304.170389][T20937] __x64_sys_sendmsg+0xd4/0x160 [ 304.170416][T20937] x64_sys_call+0x17ba/0x3000 [ 304.170446][T20937] do_syscall_64+0xc0/0x2a0 [ 304.170544][T20937] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 304.170570][T20937] RIP: 0033:0x7f737db3aeb9 [ 304.170619][T20937] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 304.170642][T20937] RSP: 002b:00007f737c597028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 304.170742][T20937] RAX: ffffffffffffffda RBX: 00007f737ddb5fa0 RCX: 00007f737db3aeb9 [ 304.170757][T20937] RDX: 0000000000000000 RSI: 00002000000000c0 RDI: 0000000000000003 [ 304.170796][T20937] RBP: 00007f737c597090 R08: 0000000000000000 R09: 0000000000000000 [ 304.170810][T20937] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.170822][T20937] R13: 00007f737ddb6038 R14: 00007f737ddb5fa0 R15: 00007ffd4424ff88 [ 304.170860][T20937] [ 304.442276][ T31] IPVS: stop unused estimator thread 0... [ 304.520864][T20956] serio: Serial port ttyS3 [ 304.570385][T20956] FAULT_INJECTION: forcing a failure. [ 304.570385][T20956] name failslab, interval 1, probability 0, space 0, times 0 [ 304.583150][T20956] CPU: 1 UID: 0 PID: 20956 Comm: syz.7.6417 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 304.583312][T20956] Tainted: [W]=WARN [ 304.583319][T20956] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 304.583332][T20956] Call Trace: [ 304.583340][T20956] [ 304.583348][T20956] __dump_stack+0x1d/0x30 [ 304.583452][T20956] dump_stack_lvl+0x95/0xd0 [ 304.583484][T20956] dump_stack+0x15/0x1b [ 304.583578][T20956] should_fail_ex+0x263/0x280 [ 304.583625][T20956] should_failslab+0x8c/0xb0 [ 304.583751][T20956] __kmalloc_cache_noprof+0x64/0x4a0 [ 304.583791][T20956] ? kobject_uevent_env+0x1c0/0x570 [ 304.583852][T20956] ? _raw_spin_lock_irq+0x53/0xb0 [ 304.583899][T20956] kobject_uevent_env+0x1c0/0x570 [ 304.583932][T20956] kobject_uevent+0x1d/0x30 [ 304.584017][T20956] device_del+0x70f/0x790 [ 304.584049][T20956] serio_destroy_port+0x3c5/0x5a0 [ 304.584185][T20956] ? device_release_driver_internal+0x4f5/0x510 [ 304.584227][T20956] serio_unregister_port+0xe1/0x130 [ 304.584271][T20956] serport_ldisc_read+0x2cd/0x300 [ 304.584304][T20956] ? __pfx_autoremove_wake_function+0x10/0x10 [ 304.584351][T20956] tty_read+0x154/0x490 [ 304.584395][T20956] ? avc_policy_seqno+0x15/0x30 [ 304.584429][T20956] ? selinux_file_permission+0x1f2/0x690 [ 304.584488][T20956] do_iter_readv_writev+0x4fd/0x5a0 [ 304.584522][T20956] vfs_readv+0x1f4/0x6e0 [ 304.584556][T20956] ? save_fpregs_to_fpstate+0x100/0x150 [ 304.584670][T20956] do_readv+0xe9/0x210 [ 304.584708][T20956] __x64_sys_readv+0x45/0x50 [ 304.584750][T20956] x64_sys_call+0x2831/0x3000 [ 304.584799][T20956] do_syscall_64+0xc0/0x2a0 [ 304.584871][T20956] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 304.584905][T20956] RIP: 0033:0x7ff964a3aeb9 [ 304.584926][T20956] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 304.584950][T20956] RSP: 002b:00007ff963497028 EFLAGS: 00000246 ORIG_RAX: 0000000000000013 [ 304.584977][T20956] RAX: ffffffffffffffda RBX: 00007ff964cb5fa0 RCX: 00007ff964a3aeb9 [ 304.585043][T20956] RDX: 0000000000000001 RSI: 0000200000000600 RDI: 0000000000000003 [ 304.585061][T20956] RBP: 00007ff963497090 R08: 0000000000000000 R09: 0000000000000000 [ 304.585078][T20956] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 304.585091][T20956] R13: 00007ff964cb6038 R14: 00007ff964cb5fa0 R15: 00007ffce3c0a488 [ 304.585111][T20956] [ 304.881208][T20795] netdevsim netdevsim4 netdevsim0: renamed from eth0 [ 304.891005][T20795] netdevsim netdevsim4 netdevsim1: renamed from eth1 [ 304.946251][T20974] netlink: 8 bytes leftover after parsing attributes in process `syz.6.6420'. [ 304.955841][T20795] netdevsim netdevsim4 netdevsim2: renamed from eth2 [ 304.989668][T20795] netdevsim netdevsim4 netdevsim3: renamed from eth3 [ 305.058220][T20795] 8021q: adding VLAN 0 to HW filter on device bond0 [ 305.070050][T20795] 8021q: adding VLAN 0 to HW filter on device team0 [ 305.470621][ T3323] bridge0: port 1(bridge_slave_0) entered blocking state [ 305.477772][ T3323] bridge0: port 1(bridge_slave_0) entered forwarding state [ 305.495535][ T3323] bridge0: port 2(bridge_slave_1) entered blocking state [ 305.502664][ T3323] bridge0: port 2(bridge_slave_1) entered forwarding state [ 305.529787][T20997] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6425'. [ 305.538866][T20997] FAULT_INJECTION: forcing a failure. [ 305.538866][T20997] name failslab, interval 1, probability 0, space 0, times 0 [ 305.551893][T20997] CPU: 0 UID: 0 PID: 20997 Comm: syz.1.6425 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 305.551934][T20997] Tainted: [W]=WARN [ 305.551942][T20997] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 305.551963][T20997] Call Trace: [ 305.551969][T20997] [ 305.551978][T20997] __dump_stack+0x1d/0x30 [ 305.552012][T20997] dump_stack_lvl+0x95/0xd0 [ 305.552042][T20997] dump_stack+0x15/0x1b [ 305.552063][T20997] should_fail_ex+0x263/0x280 [ 305.552134][T20997] should_failslab+0x8c/0xb0 [ 305.552167][T20997] __kmalloc_cache_noprof+0x64/0x4a0 [ 305.552197][T20997] ? netlbl_mgmt_add_common+0x3b/0x960 [ 305.552224][T20997] netlbl_mgmt_add_common+0x3b/0x960 [ 305.552293][T20997] ? __nla_parse+0x40/0x60 [ 305.552394][T20997] ? selinux_current_getlsmprop_subj+0x6d/0x80 [ 305.552439][T20997] netlbl_mgmt_adddef+0x19d/0x1d0 [ 305.552473][T20997] genl_family_rcv_msg_doit+0x187/0x1f0 [ 305.552576][T20997] genl_rcv_msg+0x432/0x470 [ 305.552649][T20997] ? __pfx_netlbl_mgmt_adddef+0x10/0x10 [ 305.552683][T20997] netlink_rcv_skb+0x123/0x220 [ 305.552753][T20997] ? __pfx_genl_rcv_msg+0x10/0x10 [ 305.552786][T20997] genl_rcv+0x28/0x40 [ 305.552808][T20997] netlink_unicast+0x5c0/0x690 [ 305.552852][T20997] netlink_sendmsg+0x5c8/0x6f0 [ 305.552938][T20997] ? __pfx_netlink_sendmsg+0x10/0x10 [ 305.552958][T20997] ____sys_sendmsg+0x5af/0x600 [ 305.553046][T20997] ___sys_sendmsg+0x195/0x1e0 [ 305.553090][T20997] __x64_sys_sendmsg+0xd4/0x160 [ 305.553123][T20997] x64_sys_call+0x17ba/0x3000 [ 305.553220][T20997] do_syscall_64+0xc0/0x2a0 [ 305.553263][T20997] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 305.553294][T20997] RIP: 0033:0x7f917a1faeb9 [ 305.553386][T20997] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 305.553485][T20997] RSP: 002b:00007f9178c57028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 305.553575][T20997] RAX: ffffffffffffffda RBX: 00007f917a475fa0 RCX: 00007f917a1faeb9 [ 305.553594][T20997] RDX: 0000000000000000 RSI: 0000200000000400 RDI: 0000000000000007 [ 305.553612][T20997] RBP: 00007f9178c57090 R08: 0000000000000000 R09: 0000000000000000 [ 305.553630][T20997] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 305.553674][T20997] R13: 00007f917a476038 R14: 00007f917a475fa0 R15: 00007ffc06ba31a8 [ 305.553708][T20997] [ 305.567360][T20795] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 305.859061][T21003] FAULT_INJECTION: forcing a failure. [ 305.859061][T21003] name failslab, interval 1, probability 0, space 0, times 0 [ 305.871806][T21003] CPU: 0 UID: 0 PID: 21003 Comm: syz.6.6427 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 305.871848][T21003] Tainted: [W]=WARN [ 305.871858][T21003] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 305.871947][T21003] Call Trace: [ 305.871956][T21003] [ 305.871966][T21003] __dump_stack+0x1d/0x30 [ 305.872055][T21003] dump_stack_lvl+0x95/0xd0 [ 305.872145][T21003] dump_stack+0x15/0x1b [ 305.872172][T21003] should_fail_ex+0x263/0x280 [ 305.872211][T21003] should_failslab+0x8c/0xb0 [ 305.872313][T21003] kmem_cache_alloc_lru_noprof+0x6c/0x490 [ 305.872380][T21003] ? __d_alloc+0x37/0x340 [ 305.872411][T21003] __d_alloc+0x37/0x340 [ 305.872439][T21003] ? default_pointer+0xf2/0x5e0 [ 305.872467][T21003] d_alloc+0x2e/0x100 [ 305.872505][T21003] lookup_one_qstr_excl+0x99/0x250 [ 305.872546][T21003] start_dirop+0x3e/0x70 [ 305.872630][T21003] simple_start_creating+0xa2/0xd0 [ 305.872655][T21003] debugfs_start_creating+0xda/0x150 [ 305.872690][T21003] __debugfs_create_file+0x70/0x2b0 [ 305.872720][T21003] debugfs_create_file_full+0x3f/0x60 [ 305.872772][T21003] ? __pfx_ieee802154_if_setup+0x10/0x10 [ 305.872850][T21003] ref_tracker_dir_debugfs+0x10e/0x220 [ 305.872936][T21003] alloc_netdev_mqs+0x1a7/0xa40 [ 305.872988][T21003] ? __kmalloc_node_track_caller_noprof+0x391/0x590 [ 305.873015][T21003] ? __alloc_skb+0x328/0x4b0 [ 305.873115][T21003] ieee802154_if_add+0x8e/0x7f0 [ 305.873147][T21003] ? __nlmsg_put+0xa0/0xc0 [ 305.873176][T21003] ? genlmsg_put+0x116/0x150 [ 305.873234][T21003] ieee802154_add_iface_deprecated+0x43/0x70 [ 305.873258][T21003] ieee802154_add_iface+0x296/0x480 [ 305.873282][T21003] ? __nla_parse+0x40/0x60 [ 305.873313][T21003] ? genl_family_rcv_msg_attrs_parse+0x13b/0x190 [ 305.873413][T21003] ? genl_family_rcv_msg_attrs_parse+0x184/0x190 [ 305.873444][T21003] genl_family_rcv_msg_doit+0x187/0x1f0 [ 305.873474][T21003] genl_rcv_msg+0x432/0x470 [ 305.873497][T21003] ? __pfx_ieee802154_add_iface+0x10/0x10 [ 305.873523][T21003] netlink_rcv_skb+0x123/0x220 [ 305.873652][T21003] ? __pfx_genl_rcv_msg+0x10/0x10 [ 305.873685][T21003] genl_rcv+0x28/0x40 [ 305.873704][T21003] netlink_unicast+0x5c0/0x690 [ 305.873734][T21003] netlink_sendmsg+0x5c8/0x6f0 [ 305.873821][T21003] ? __pfx_netlink_sendmsg+0x10/0x10 [ 305.873838][T21003] ____sys_sendmsg+0x5af/0x600 [ 305.873868][T21003] ___sys_sendmsg+0x195/0x1e0 [ 305.873960][T21003] __x64_sys_sendmsg+0xd4/0x160 [ 305.873981][T21003] x64_sys_call+0x17ba/0x3000 [ 305.874070][T21003] do_syscall_64+0xc0/0x2a0 [ 305.874100][T21003] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 305.874121][T21003] RIP: 0033:0x7f63eb8faeb9 [ 305.874179][T21003] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 305.874197][T21003] RSP: 002b:00007f63ea357028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 305.874215][T21003] RAX: ffffffffffffffda RBX: 00007f63ebb75fa0 RCX: 00007f63eb8faeb9 [ 305.874277][T21003] RDX: 0000000000000000 RSI: 0000200000000280 RDI: 0000000000000007 [ 305.874289][T21003] RBP: 00007f63ea357090 R08: 0000000000000000 R09: 0000000000000000 [ 305.874301][T21003] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 305.874312][T21003] R13: 00007f63ebb76038 R14: 00007f63ebb75fa0 R15: 00007ffe1722c348 [ 305.874330][T21003] [ 306.265967][T21013] netlink: 'syz.6.6431': attribute type 4 has an invalid length. [ 306.306759][T20795] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 306.321519][ T29] audit: type=1400 audit(1769609166.017:6568): avc: denied { getopt } for pid=21015 comm="syz.6.6432" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=can_socket permissive=1 [ 306.352139][T21007] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6429'. [ 306.365330][T21025] FAULT_INJECTION: forcing a failure. [ 306.365330][T21025] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 306.378528][T21025] CPU: 1 UID: 0 PID: 21025 Comm: syz.7.6433 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 306.378678][T21025] Tainted: [W]=WARN [ 306.378688][T21025] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 306.378705][T21025] Call Trace: [ 306.378752][T21025] [ 306.378760][T21025] __dump_stack+0x1d/0x30 [ 306.378785][T21025] dump_stack_lvl+0x95/0xd0 [ 306.378815][T21025] dump_stack+0x15/0x1b [ 306.378842][T21025] should_fail_ex+0x263/0x280 [ 306.379036][T21025] should_fail+0xb/0x20 [ 306.379073][T21025] should_fail_usercopy+0x1a/0x20 [ 306.379147][T21025] strncpy_from_user+0x27/0x250 [ 306.379176][T21025] __se_sys_memfd_create+0x205/0x6c0 [ 306.379271][T21025] __x64_sys_memfd_create+0x31/0x40 [ 306.379307][T21025] x64_sys_call+0x28cb/0x3000 [ 306.379339][T21025] do_syscall_64+0xc0/0x2a0 [ 306.379456][T21025] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 306.379487][T21025] RIP: 0033:0x7ff964a3aeb9 [ 306.379508][T21025] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 306.379552][T21025] RSP: 002b:00007ff963496e08 EFLAGS: 00000202 ORIG_RAX: 000000000000013f [ 306.379575][T21025] RAX: ffffffffffffffda RBX: 000000000000046f RCX: 00007ff964a3aeb9 [ 306.379589][T21025] RDX: 00007ff963496ee0 RSI: 0000000000000000 RDI: 00007ff964aa7333 [ 306.379603][T21025] RBP: 0000200000000bc0 R08: 00000000ffffffff R09: 0000000000000000 [ 306.379621][T21025] R10: 0000000000000001 R11: 0000000000000202 R12: 00002000000001c0 [ 306.379639][T21025] R13: 00007ff963496ee0 R14: 00007ff963496ea0 R15: 00002000000007c0 [ 306.379736][T21025] [ 306.438308][ T3420] Process accounting resumed [ 306.690857][T20795] veth0_vlan: entered promiscuous mode [ 306.780739][T21050] hub 8-0:1.0: USB hub found [ 306.785700][T21050] hub 8-0:1.0: 8 ports detected [ 306.807706][T21052] set match dimension is over the limit! [ 306.835052][T21054] netlink: 8 bytes leftover after parsing attributes in process `syz.1.6439'. [ 306.872966][T21029] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 306.878038][T20795] veth1_vlan: entered promiscuous mode [ 306.911035][T20795] veth0_macvtap: entered promiscuous mode [ 306.996807][T20795] veth1_macvtap: entered promiscuous mode [ 307.054132][T20795] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 307.124212][T20795] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 307.139368][T21059] FAULT_INJECTION: forcing a failure. [ 307.139368][T21059] name failslab, interval 1, probability 0, space 0, times 0 [ 307.152149][T21059] CPU: 0 UID: 0 PID: 21059 Comm: syz.1.6441 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 307.152237][T21059] Tainted: [W]=WARN [ 307.152279][T21059] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 307.152297][T21059] Call Trace: [ 307.152303][T21059] [ 307.152338][T21059] __dump_stack+0x1d/0x30 [ 307.152371][T21059] dump_stack_lvl+0x95/0xd0 [ 307.152423][T21059] dump_stack+0x15/0x1b [ 307.152515][T21059] should_fail_ex+0x263/0x280 [ 307.152557][T21059] should_failslab+0x8c/0xb0 [ 307.152581][T21059] __kmalloc_cache_noprof+0x64/0x4a0 [ 307.152613][T21059] ? rtnl_newlink+0x5c/0x1370 [ 307.152681][T21059] ? __pfx_rtnl_newlink+0x10/0x10 [ 307.152705][T21059] rtnl_newlink+0x5c/0x1370 [ 307.152744][T21059] ? trace_reschedule_exit+0xd/0xb0 [ 307.152785][T21059] ? __memcg_slab_free_hook+0x135/0x230 [ 307.152820][T21059] ? __rcu_read_unlock+0x4e/0x70 [ 307.152861][T21059] ? avc_has_perm_noaudit+0xab/0x130 [ 307.152899][T21059] ? cred_has_capability+0x224/0x290 [ 307.152997][T21059] ? selinux_capable+0x31/0x40 [ 307.153089][T21059] ? security_capable+0x7b/0x90 [ 307.153129][T21059] ? ns_capable+0x7c/0xb0 [ 307.153165][T21059] ? __pfx_rtnl_newlink+0x10/0x10 [ 307.153231][T21059] rtnetlink_rcv_msg+0x64b/0x720 [ 307.153261][T21059] netlink_rcv_skb+0x123/0x220 [ 307.153336][T21059] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 307.153424][T21059] rtnetlink_rcv+0x1c/0x30 [ 307.153451][T21059] netlink_unicast+0x5c0/0x690 [ 307.153495][T21059] netlink_sendmsg+0x5c8/0x6f0 [ 307.153521][T21059] ? __pfx_netlink_sendmsg+0x10/0x10 [ 307.153587][T21059] ____sys_sendmsg+0x5af/0x600 [ 307.153618][T21059] ___sys_sendmsg+0x195/0x1e0 [ 307.153655][T21059] __x64_sys_sendmsg+0xd4/0x160 [ 307.153679][T21059] x64_sys_call+0x17ba/0x3000 [ 307.153771][T21059] do_syscall_64+0xc0/0x2a0 [ 307.153811][T21059] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 307.153917][T21059] RIP: 0033:0x7f917a1faeb9 [ 307.153938][T21059] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 307.153963][T21059] RSP: 002b:00007f9178c57028 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 307.153988][T21059] RAX: ffffffffffffffda RBX: 00007f917a475fa0 RCX: 00007f917a1faeb9 [ 307.154002][T21059] RDX: 0000000004008000 RSI: 0000200000000000 RDI: 0000000000000003 [ 307.154087][T21059] RBP: 00007f9178c57090 R08: 0000000000000000 R09: 0000000000000000 [ 307.154105][T21059] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 307.154122][T21059] R13: 00007f917a476038 R14: 00007f917a475fa0 R15: 00007ffc06ba31a8 [ 307.154145][T21059] [ 307.510534][ T29] audit: type=1400 audit(1769609167.237:6569): avc: denied { mount } for pid=20795 comm="syz-executor" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 307.553884][T19557] netdevsim netdevsim4 netdevsim0: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.564686][T21061] netlink: 'syz.7.6442': attribute type 4 has an invalid length. [ 307.589313][T19557] netdevsim netdevsim4 netdevsim1: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.598820][T19557] netdevsim netdevsim4 netdevsim2: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.608477][T19557] netdevsim netdevsim4 netdevsim3: set [1, 0] type 2 family 0 port 6081 - 0 [ 307.661664][ T29] audit: type=1400 audit(1769609167.387:6570): avc: denied { ioctl } for pid=21062 comm="syz.1.6443" path="socket:[73950]" dev="sockfs" ino=73950 ioctlcmd=0x89e0 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=kcm_socket permissive=1 [ 307.742967][T21077] ucma_write: process 148 (syz.7.6449) changed security contexts after opening file descriptor, this is not allowed. [ 307.752816][ T3383] Process accounting resumed [ 307.780666][T21080] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21080 comm=syz.6.6445 [ 307.793372][T21080] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=21080 comm=syz.6.6445 [ 307.830341][ T29] audit: type=1400 audit(1769609167.557:6571): avc: denied { setopt } for pid=21084 comm="syz.7.6451" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 307.883676][T21090] netlink: 'syz.7.6454': attribute type 4 has an invalid length. [ 307.912492][ T29] audit: type=1326 audit(1769609167.637:6572): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21091 comm="syz.6.6453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 307.931464][T21087] vlan2: entered allmulticast mode [ 307.936168][ T29] audit: type=1326 audit(1769609167.637:6573): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21091 comm="syz.6.6453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 307.941992][T21087] bridge0: port 3(vlan2) entered blocking state [ 307.971319][T21087] bridge0: port 3(vlan2) entered disabled state [ 308.011062][T21087] vlan2: entered promiscuous mode [ 308.044977][ T29] audit: type=1326 audit(1769609167.737:6574): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21091 comm="syz.6.6453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=265 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 308.068595][ T29] audit: type=1326 audit(1769609167.737:6575): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21091 comm="syz.6.6453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 308.092181][ T29] audit: type=1326 audit(1769609167.737:6576): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21091 comm="syz.6.6453" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f63eb8faeb9 code=0x7ffc0000 [ 308.143042][T21102] xt_connbytes: Forcing CT accounting to be enabled [ 308.150056][T21083] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 308.154950][T21102] set match dimension is over the limit! [ 308.194988][T21106] IPv6: Can't replace route, no match found [ 308.196310][ T29] audit: type=1326 audit(1769609167.887:6577): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21103 comm="syz.4.6457" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f144827aeb9 code=0x7ffc0000 [ 308.345956][T21119] FAULT_INJECTION: forcing a failure. [ 308.345956][T21119] name failslab, interval 1, probability 0, space 0, times 0 [ 308.358861][T21119] CPU: 0 UID: 0 PID: 21119 Comm: syz.2.6460 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 308.358976][T21119] Tainted: [W]=WARN [ 308.358986][T21119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 308.359003][T21119] Call Trace: [ 308.359012][T21119] [ 308.359022][T21119] __dump_stack+0x1d/0x30 [ 308.359056][T21119] dump_stack_lvl+0x95/0xd0 [ 308.359092][T21119] dump_stack+0x15/0x1b [ 308.359119][T21119] should_fail_ex+0x263/0x280 [ 308.359163][T21119] should_failslab+0x8c/0xb0 [ 308.359196][T21119] __kmalloc_node_track_caller_noprof+0xb8/0x590 [ 308.359316][T21119] ? sidtab_sid2str_get+0xa0/0x130 [ 308.359423][T21119] kmemdup_noprof+0x2b/0x70 [ 308.359452][T21119] sidtab_sid2str_get+0xa0/0x130 [ 308.359485][T21119] security_sid_to_context_core+0x1eb/0x2e0 [ 308.359523][T21119] security_sid_to_context+0x27/0x40 [ 308.359669][T21119] selinux_lsmprop_to_secctx+0x67/0xf0 [ 308.359699][T21119] security_lsmprop_to_secctx+0x1a3/0x1c0 [ 308.359737][T21119] audit_log_subj_ctx+0xa4/0x3e0 [ 308.359779][T21119] ? skb_put+0xa9/0xf0 [ 308.359860][T21119] audit_log_task_context+0x48/0x70 [ 308.359982][T21119] audit_log_task+0xf3/0x250 [ 308.360017][T21119] ? kstrtouint+0x76/0xc0 [ 308.360051][T21119] audit_seccomp+0x60/0x100 [ 308.360148][T21119] ? __seccomp_filter+0x8db/0x1350 [ 308.360178][T21119] __seccomp_filter+0x8ec/0x1350 [ 308.360256][T21119] ? __pfx_proc_fail_nth_write+0x10/0x10 [ 308.360293][T21119] ? vfs_write+0x86e/0x9f0 [ 308.360318][T21119] ? __rcu_read_unlock+0x4e/0x70 [ 308.360435][T21119] ? __fget_files+0x184/0x1c0 [ 308.360561][T21119] __secure_computing+0x81/0x150 [ 308.360588][T21119] syscall_trace_enter+0xce/0x1e0 [ 308.360695][T21119] do_syscall_64+0x9a/0x2a0 [ 308.360785][T21119] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 308.360813][T21119] RIP: 0033:0x7f737db3aeb9 [ 308.360833][T21119] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 308.360856][T21119] RSP: 002b:00007f737c597028 EFLAGS: 00000246 ORIG_RAX: 0000000000000109 [ 308.360882][T21119] RAX: ffffffffffffffda RBX: 00007f737ddb5fa0 RCX: 00007f737db3aeb9 [ 308.360940][T21119] RDX: ffffffffffffffff RSI: 0000000000000000 RDI: ffffffffffffffff [ 308.360959][T21119] RBP: 00007f737c597090 R08: 0000000000000000 R09: 0000000000000000 [ 308.360975][T21119] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 308.360989][T21119] R13: 00007f737ddb6038 R14: 00007f737ddb5fa0 R15: 00007ffd4424ff88 [ 308.361015][T21119] [ 308.636224][T21116] syzkaller0: entered promiscuous mode [ 308.641901][T21116] syzkaller0: entered allmulticast mode [ 308.706718][T21129] FAULT_INJECTION: forcing a failure. [ 308.706718][T21129] name failslab, interval 1, probability 0, space 0, times 0 [ 308.714739][T21113] netlink: 132 bytes leftover after parsing attributes in process `syz.6.6461'. [ 308.719532][T21129] CPU: 1 UID: 0 PID: 21129 Comm: syz.2.6467 Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 308.719600][T21129] Tainted: [W]=WARN [ 308.719609][T21129] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 308.719627][T21129] Call Trace: [ 308.719636][T21129] [ 308.719646][T21129] __dump_stack+0x1d/0x30 [ 308.719675][T21129] dump_stack_lvl+0x95/0xd0 [ 308.719705][T21129] dump_stack+0x15/0x1b [ 308.719771][T21129] should_fail_ex+0x263/0x280 [ 308.719810][T21129] should_failslab+0x8c/0xb0 [ 308.719842][T21129] __kmalloc_cache_noprof+0x64/0x4a0 [ 308.719874][T21129] ? rtnl_newlink+0x5c/0x1370 [ 308.719905][T21129] ? __pfx_rtnl_newlink+0x10/0x10 [ 308.719957][T21129] rtnl_newlink+0x5c/0x1370 [ 308.719998][T21129] ? __memcg_slab_free_hook+0x135/0x230 [ 308.720046][T21129] ? __rcu_read_unlock+0x4e/0x70 [ 308.720087][T21129] ? avc_has_perm_noaudit+0xab/0x130 [ 308.720164][T21129] ? cred_has_capability+0x224/0x290 [ 308.720226][T21129] ? selinux_capable+0x31/0x40 [ 308.720247][T21129] ? security_capable+0x7b/0x90 [ 308.720356][T21129] ? ns_capable+0x7c/0xb0 [ 308.720389][T21129] ? __pfx_rtnl_newlink+0x10/0x10 [ 308.720418][T21129] rtnetlink_rcv_msg+0x64b/0x720 [ 308.720464][T21129] netlink_rcv_skb+0x123/0x220 [ 308.720509][T21129] ? __pfx_rtnetlink_rcv_msg+0x10/0x10 [ 308.720548][T21129] rtnetlink_rcv+0x1c/0x30 [ 308.720573][T21129] netlink_unicast+0x5c0/0x690 [ 308.720657][T21129] netlink_sendmsg+0x5c8/0x6f0 [ 308.720879][T21129] ? __pfx_netlink_sendmsg+0x10/0x10 [ 308.720957][T21129] ____sys_sendmsg+0x5af/0x600 [ 308.721075][T21129] ___sys_sendmsg+0x195/0x1e0 [ 308.721177][T21129] __sys_sendmmsg+0x185/0x320 [ 308.721416][T21129] __x64_sys_sendmmsg+0x57/0x70 [ 308.721486][T21129] x64_sys_call+0x1e28/0x3000 [ 308.721600][T21129] do_syscall_64+0xc0/0x2a0 [ 308.721704][T21129] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 308.721778][T21129] RIP: 0033:0x7f737db3aeb9 [ 308.721834][T21129] Code: ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 44 00 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 [ 308.721896][T21129] RSP: 002b:00007f737c597028 EFLAGS: 00000246 ORIG_RAX: 0000000000000133 [ 308.722012][T21129] RAX: ffffffffffffffda RBX: 00007f737ddb5fa0 RCX: 00007f737db3aeb9 [ 308.722063][T21129] RDX: 040000000000009f RSI: 00002000000002c0 RDI: 0000000000000003 [ 308.722148][T21129] RBP: 00007f737c597090 R08: 0000000000000000 R09: 0000000000000000 [ 308.722199][T21129] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 308.722263][T21129] R13: 00007f737ddb6038 R14: 00007f737ddb5fa0 R15: 00007ffd4424ff88 [ 308.722377][T21129] [ 309.153252][T18572] Process accounting resumed [ 309.213706][T21147] can0: slcan on ptm0. [ 309.241730][T21147] x_tables: ip_tables: recent.0 match: invalid size 216 (kernel) != (user) 4096 [ 309.315011][T21146] can0 (unregistered): slcan off ptm0. [ 309.349074][T21148] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 309.351666][T21141] set match dimension is over the limit! [ 310.264966][T21219] syzkaller0: entered promiscuous mode [ 310.270568][T21219] syzkaller0: entered allmulticast mode [ 310.691862][T18572] Process accounting resumed [ 310.792345][T21234] netlink: 132 bytes leftover after parsing attributes in process `syz.4.6496'. [ 310.818684][T21239] syzkaller0: entered promiscuous mode [ 310.824264][T21239] syzkaller0: entered allmulticast mode [ 310.874835][T21236] llcp: llcp_sock_recvmsg: Recv datagram failed state 3 -6 0 [ 310.876441][T21231] set match dimension is over the limit! [ 310.988800][T21246] hub 8-0:1.0: USB hub found [ 310.993580][T21246] hub 8-0:1.0: 8 ports detected [ 311.465972][ T29] kauditd_printk_skb: 23 callbacks suppressed [ 311.465988][ T29] audit: type=1326 audit(1769609171.197:6600): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21259 comm="syz.1.6503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f917a1faeb9 code=0x7ffc0000 [ 311.507570][ T29] audit: type=1326 audit(1769609171.227:6601): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21259 comm="syz.1.6503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f917a1faeb9 code=0x7ffc0000 [ 311.531230][ T29] audit: type=1326 audit(1769609171.227:6602): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21259 comm="syz.1.6503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=319 compat=0 ip=0x7f917a1faeb9 code=0x7ffc0000 [ 311.554939][ T29] audit: type=1326 audit(1769609171.227:6603): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21259 comm="syz.1.6503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=9 compat=0 ip=0x7f917a1fac22 code=0x7ffc0000 [ 311.578518][ T29] audit: type=1326 audit(1769609171.227:6604): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21259 comm="syz.1.6503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=1 compat=0 ip=0x7f917a1bb78e code=0x7ffc0000 [ 311.602039][ T29] audit: type=1326 audit(1769609171.227:6605): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21259 comm="syz.1.6503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=11 compat=0 ip=0x7f917a1face7 code=0x7ffc0000 [ 311.625708][ T29] audit: type=1326 audit(1769609171.227:6606): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21259 comm="syz.1.6503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=257 compat=0 ip=0x7f917a1bb78e code=0x7ffc0000 [ 311.649442][ T29] audit: type=1326 audit(1769609171.227:6607): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21259 comm="syz.1.6503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=3 compat=0 ip=0x7f917a1bb78e code=0x7ffc0000 [ 311.672966][ T29] audit: type=1326 audit(1769609171.227:6608): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21259 comm="syz.1.6503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f917a1faeb9 code=0x7ffc0000 [ 311.696567][ T29] audit: type=1326 audit(1769609171.227:6609): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=root:sysadm_r:sysadm_t pid=21259 comm="syz.1.6503" exe="/root/syz-executor" sig=0 arch=c000003e syscall=202 compat=0 ip=0x7f917a1faeb9 code=0x7ffc0000 [ 311.972594][T21268] syzkaller0: entered promiscuous mode [ 311.978265][T21268] syzkaller0: entered allmulticast mode [ 312.112050][T21285] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6511'. [ 312.157656][T21288] netlink: 'syz.7.6512': attribute type 142 has an invalid length. [ 312.238693][T21280] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 [ 312.649729][T21314] netlink: 132 bytes leftover after parsing attributes in process `syz.6.6514'. [ 313.298422][T21373] netlink: 132 bytes leftover after parsing attributes in process `syz.1.6523'. [ 313.603067][T21389] netlink: 188 bytes leftover after parsing attributes in process `syz.1.6528'. [ 313.618725][T17584] ================================================================== [ 313.626890][T17584] BUG: KCSAN: data-race in generic_fillattr / inode_set_ctime_to_ts [ 313.634975][T17584] [ 313.634987][T17584] write to 0xffff888106116998 of 8 bytes by task 15168 on cpu 1: [ 313.645179][T17584] inode_set_ctime_to_ts+0x8f/0x190 [ 313.650410][T17584] inode_set_ctime_current+0x1e5/0x810 [ 313.655895][T17584] shmem_symlink+0x36b/0x3b0 [ 313.660658][T17584] vfs_symlink+0x2c3/0x3c0 [ 313.665179][T17584] do_symlinkat+0xf0/0x460 [ 313.669627][T17584] __x64_sys_symlink+0x50/0x60 [ 313.674436][T17584] x64_sys_call+0x24a9/0x3000 [ 313.679137][T17584] do_syscall_64+0xc0/0x2a0 [ 313.683666][T17584] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 313.689584][T17584] [ 313.691920][T17584] read to 0xffff888106116998 of 8 bytes by task 17584 on cpu 0: [ 313.699584][T17584] generic_fillattr+0x1c4/0x340 [ 313.704481][T17584] shmem_getattr+0x181/0x200 [ 313.709093][T17584] vfs_getattr_nosec+0x146/0x1e0 [ 313.714050][T17584] vfs_getattr+0x48/0x60 [ 313.718422][T17584] vfs_statx_path+0x28/0x140 [ 313.723065][T17584] vfs_statx+0xc4/0x170 [ 313.727266][T17584] vfs_fstatat+0x115/0x170 [ 313.731693][T17584] __se_sys_newfstatat+0x55/0x3e0 [ 313.736732][T17584] __x64_sys_newfstatat+0x55/0x70 [ 313.741785][T17584] x64_sys_call+0x111f/0x3000 [ 313.746474][T17584] do_syscall_64+0xc0/0x2a0 [ 313.750995][T17584] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 313.756897][T17584] [ 313.759225][T17584] value changed: 0x00000000697a17c6 -> 0x00000000697a17d5 [ 313.766334][T17584] [ 313.768681][T17584] Reported by Kernel Concurrency Sanitizer on: [ 313.774850][T17584] CPU: 0 UID: 0 PID: 17584 Comm: udevd Tainted: G W syzkaller #0 PREEMPT(voluntary) [ 313.785812][T17584] Tainted: [W]=WARN [ 313.789702][T17584] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 10/25/2025 [ 313.799767][T17584] ==================================================================